CN105373743A - Method and system for controlling call of input method process, and terminal - Google Patents

Method and system for controlling call of input method process, and terminal Download PDF

Info

Publication number
CN105373743A
CN105373743A CN201510703821.6A CN201510703821A CN105373743A CN 105373743 A CN105373743 A CN 105373743A CN 201510703821 A CN201510703821 A CN 201510703821A CN 105373743 A CN105373743 A CN 105373743A
Authority
CN
China
Prior art keywords
information
input
method process
input method
application program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510703821.6A
Other languages
Chinese (zh)
Other versions
CN105373743B (en
Inventor
许乾桥
熊忠凯
宋豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Dongguan Coolpad Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Coolpad Software Technology Co Ltd filed Critical Dongguan Coolpad Software Technology Co Ltd
Priority to CN201510703821.6A priority Critical patent/CN105373743B/en
Publication of CN105373743A publication Critical patent/CN105373743A/en
Application granted granted Critical
Publication of CN105373743B publication Critical patent/CN105373743B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Abstract

The present invention provides a method and a system for controlling the call of an input method process, and a terminal. The method for controlling the call of the input method process comprises the following steps: obtaining an input instruction in a specified type of application for a user to call the input method process; generating an authentication prompt interface according to the input instruction, to prompt the user to input biometric feature information through the authentication prompt interface; judging whether the biometric feature information is matched with preset biometric feature information or not; and when judging that the biometric feature information is not matched with the preset biometric feature information, controlling the input method process to stop working. According to the technical solution of the present invention, after opening the specified application and before calling an input method for editing, the user needs to authenticate the biometric feature information, thereby effectively ensuring that the application is not edited illegally, preventing the leakage of personal information, and protecting the data security of the user.

Description

The calling control method, call control system and terminal of input method process
Technical field
The present invention relates to field of terminal, in particular to a kind of input method process call control method, a kind of input method process call control system and a kind of terminal.
Background technology
In correlation technique, along with the development of internet is with universal, mobile intelligent terminal is (as mobile phone, panel computer etc.) use also more and more extensive, the application program of current terminal and file etc. are all generally open editors, namely non-terminal user also directly can access application program and the file of described terminal, if lost terminal or by people malice check, associated personal information will be leaked, in addition, the used association vocabulary of user is have recorded in the dictionary of input method, this also easily causes non-terminal user by the security information of association bilingual lexicon acquisition user.
Therefore, that how to design the higher input method process of a kind of security calls the technical matters that control program becomes urgently to be resolved hurrily.
Summary of the invention
The present invention just based on above-mentioned technical matters one of at least; what propose a kind of new input method process calls control program; by generating authentication prompting interface according to input instruction; and when judging that biological information authentication is unsuccessful; control inputs method process quits work; effectively ensure that described application program is not illegally edited, prevent personal information to leak, protect the data security of user.
In view of this, what the present invention proposes a kind of input method process calls control method, comprising: obtain user and call the input instruction of input method process in the application program of specified type; Authentication prompting interface is generated, to input biological information by described authentication prompting interface prompt user according to described input instruction; Judge described biological information whether with default biometric information matches; When judging that described biological information does not mate with described default biological information, controlling described input method process and quitting work.
In this technical scheme; by generating authentication prompting interface according to input instruction; and when judging that biological information authentication is unsuccessful; control inputs method process quits work; effectively ensure that described application program is not illegally edited; prevent personal information to leak, protect the data security of user.
Particularly, due to enriching of input method dictionary, and the writing function to user's input habit, even if user is provided with password in order to ensure the data security of application program for application program, but, if non-end-user has cracked password, important association keyword can be obtained by attempting inputting some characters in input method process, thus steal the secret of user, therefore, when technical scheme of the present invention can be set in input process and preset characters information be detected, start the authentication process of input method process, in addition, the application program that non-end-user is arbitrarily edited is not wished for some, as long as non-end-user starts input method process and namely carries out authentication process.
In technique scheme, preferably, generate authentication prompting interface according to described input instruction, to input biological information by described authentication prompting interface prompt user, specifically comprise the following steps: resolve described input instruction to determine corresponding character information; Judge described character information whether with preset characters information matches; When judging described character information and described preset characters information matches, generate authentication prompting interface according to described input instruction.
In this technical scheme, by judge input command information whether with presupposed information to mating, determine whether to generate authentication prompting interface, achieve the detection for character in input process, thus automatically trigger authentication process according to character information, wherein, character information can be the safe words of some input method automated provisionings, as " payment ", " account number cipher " and " I.D. " etc., input method process can detect above-mentioned keyword and preset characters information matches automatically, then start authentication procedure, if the biological information obtained does not mate with default biological information, then terminal thinks that the caller of current input method process is illegal, thus control inputs method process quits work, to guarantee data security.
In above-mentioned any one technical scheme, preferably, also comprise: acquisition user before the input instruction of the input method process of the application program of specified type, create that comprise can the prompting list of editing application program; According to the selection instruction of user to the arbitrary application program in described prompting list, determine that described arbitrary application program corresponding to described selection instruction is the application program of described specified type.
In this technical scheme; for the application program in intelligent terminal; not all application program is all necessary to carry out authentication; setting up editablely should have program listing; user can being facilitated to select to need protected application program to join in list according to self needing, reaching flexible editor, customization, accounting for the object of internal memory and information leakage preventing less.
In above-mentioned any one technical scheme, preferably, also comprise: when judging that described biological information does not mate with default biological information, send information, wherein, described information comprises at least one in acoustics information, optics information and vibration prompting information.
In this technical scheme, during by judging that described biological information does not mate with default biological information, send information, the caller of input method process is known and calls input method failure, to improve the input efficiency of caller, in addition, for illegal caller, be also a kind of warning function.
In above-mentioned any one technical scheme, preferably, described biological information comprises at least one in fingerprint feature information, iris feature information, recognition of face information and voice recognition information.
In this technical scheme, by arranging at least one in fingerprint feature information, iris feature information, recognition of face information and voice recognition information as authentication feature information, simplify authentication step on the one hand, on the other hand, because fingerprint, iris, face and voice are all characteristic informations that the opposite sex is stronger, so authentication process adopts above-mentioned biological information effectively to improve the security of data.
Wherein, fingerprint feature information can be obtained by the finger print acquisition module in terminal, as the home key in i Phone, iris feature information and face characteristic information all can be obtained by the camera of mobile phone, voice characteristics information can be obtained by the sound identification module of terminal, wherein, speech recognition relates to the identification of tone color and the feature of vocal print, is not the conversions of simple voice to word.
According to a second aspect of the invention, what also proposed a kind of input method process calls control system, comprising: obtain user and call the input instruction of input method process in the application program of specified type; Authentication prompting interface is generated, to input biological information by described authentication prompting interface prompt user according to described input instruction; Judge described biological information whether with default biometric information matches; When judging that described biological information does not mate with described default biological information, controlling described input method process and quitting work.
In this technical scheme; by generating authentication prompting interface according to input instruction; and when judging that biological information authentication is unsuccessful; control inputs method process quits work; effectively ensure that described application program is not illegally edited; prevent personal information to leak, protect the data security of user.
Particularly, due to enriching of input method dictionary, and the writing function to user's input habit, even if user is provided with password in order to ensure the data security of application program for application program, but, if non-end-user has cracked password, important association keyword can be obtained by attempting inputting some characters in input method process, thus steal the secret of user, therefore, when technical scheme of the present invention can be set in input process and preset characters information be detected, start the authentication process of input method process, in addition, the application program that non-end-user is arbitrarily edited is not wished for some, as long as non-end-user starts input method process and namely carries out authentication process.
In technique scheme, preferably, generate authentication prompting interface according to described input instruction, to input biological information by described authentication prompting interface prompt user, specifically comprise the following steps: resolve described input instruction to determine corresponding character information; Judge described character information whether with preset characters information matches; When judging described character information and described preset characters information matches, generate authentication prompting interface according to described input instruction.
In this technical scheme, by judge input command information whether with presupposed information to mating, determine whether to generate authentication prompting interface, achieve the detection for character in input process, thus automatically trigger authentication process according to character information, wherein, character information can be the safe words of some input method automated provisionings, as " payment ", " account number cipher " and " I.D. " etc., input method process can detect above-mentioned keyword and preset characters information matches automatically, then start authentication procedure, if the biological information obtained does not mate with default biological information, then terminal thinks that the caller of current input method process is illegal, thus control inputs method process quits work, to guarantee data security.
In above-mentioned any one technical scheme, preferably, acquisition user before the input instruction of the input method process of the application program of specified type, also comprise: create that comprise can the prompting list of editing application program; According to the selection instruction of user to the arbitrary application program in described prompting list, determine that described arbitrary application program corresponding to described selection instruction is the application program of described specified type.
In this technical scheme; for the application program in intelligent terminal; not all application program is all necessary to carry out authentication; setting up editablely should have program listing; user can being facilitated to select to need protected application program to join in list according to self needing, reaching flexible editor, customization, accounting for the object of internal memory and information leakage preventing less.
In above-mentioned any one technical scheme, preferably, comprising: when judging that described biological information does not mate with default biological information, send information, wherein, described information comprises at least one in acoustics information, optics information and vibration prompting information.
In this technical scheme, during by judging that described biological information does not mate with default biological information, send information, the caller of input method process is known and calls input method failure, to improve the input efficiency of caller, in addition, for illegal caller, be also a kind of warning function.
According to a third aspect of the invention we, also proposed a kind of terminal, comprising: the input method process as described in above-mentioned any one technical scheme call control system.
By above technical scheme; by generating authentication prompting interface according to input instruction; and when judging that biological information authentication is unsuccessful; control inputs method process quits work; effectively ensure that described application program is not illegally edited; prevent personal information to leak, protect the data security of user.
Accompanying drawing explanation
Fig. 1 shows the schematic flow diagram calling control method of input method process according to an embodiment of the invention;
Fig. 2 shows the schematic block diagram calling control system of input method process according to an embodiment of the invention;
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention;
Fig. 4 shows the interface schematic diagram calling control program of input method process according to an embodiment of the invention;
Fig. 5 shows the interface schematic diagram calling control program of input method process according to another embodiment of the invention.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not by the restriction of following public specific embodiment.
Fig. 1 shows the schematic flow diagram calling control method of input method process according to an embodiment of the invention.
As shown in Figure 1, according to an embodiment of the invention input method process call control method, comprising: step 102, obtain user call the input instruction of input method process in the application program of specified type; Step 104, generates authentication prompting interface according to described input instruction, to input biological information by described authentication prompting interface prompt user; Step 106, judge described biological information whether with default biometric information matches; Step 108, when judging described biological information and described default biometric information matches, controls described input method process works; Step 110, when judging that described biological information does not mate with described default biological information, controlling described input method process and quitting work.
In this technical scheme; by generating authentication prompting interface according to input instruction; and when judging that biological information authentication is unsuccessful; control inputs method process quits work; effectively ensure that described application program is not illegally edited; prevent personal information to leak, protect the data security of user.
Particularly, due to enriching of input method dictionary, and the writing function to user's input habit, even if user is provided with password in order to ensure the data security of application program for application program, but, if non-end-user has cracked password, important association keyword can be obtained by attempting inputting some characters in input method process, thus steal the secret of user, therefore, when technical scheme of the present invention can be set in input process and preset characters information be detected, start the authentication process of input method process, in addition, the application program that non-end-user is arbitrarily edited is not wished for some, as long as non-end-user starts input method process and namely carries out authentication process.
In technique scheme, preferably, generate authentication prompting interface according to described input instruction, to input biological information by described authentication prompting interface prompt user, specifically comprise the following steps: resolve described input instruction to determine corresponding character information; Judge described character information whether with preset characters information matches; When judging described character information and described preset characters information matches, generate authentication prompting interface according to described input instruction.
In this technical scheme, by judge input command information whether with presupposed information to mating, determine whether to generate authentication prompting interface, achieve the detection for character in input process, thus automatically trigger authentication process according to character information, wherein, character information can be the safe words of some input method automated provisionings, as " payment ", " account number cipher " and " I.D. " etc., input method process can detect above-mentioned keyword and preset characters information matches automatically, then start authentication procedure, if the biological information obtained does not mate with default biological information, then terminal thinks that the caller of current input method process is illegal, thus control inputs method process quits work, to guarantee data security.
In above-mentioned any one technical scheme, preferably, also comprise: acquisition user before the input instruction of the input method process of the application program of specified type, create that comprise can the prompting list of editing application program; According to the selection instruction of user to the arbitrary application program in described prompting list, determine that described arbitrary application program corresponding to described selection instruction is the application program of described specified type.
In this technical scheme; for the application program in intelligent terminal; not all application program is all necessary to carry out authentication; setting up editablely should have program listing; user can being facilitated to select to need protected application program to join in list according to self needing, reaching flexible editor, customization, accounting for the object of internal memory and information leakage preventing less.
In above-mentioned any one technical scheme, preferably, also comprise: when judging that described biological information does not mate with default biological information, send information, wherein, described information comprises at least one in acoustics information, optics information and vibration prompting information.
In this technical scheme, during by judging that described biological information does not mate with default biological information, send information, the caller of input method process is known and calls input method failure, to improve the input efficiency of caller, in addition, for illegal caller, be also a kind of warning function.
In above-mentioned any one technical scheme, preferably, also comprise: described biological information comprises at least one in fingerprint feature information, iris feature information, recognition of face information and voice recognition information.
In this technical scheme, by arranging at least one in fingerprint feature information, iris feature information, recognition of face information and voice recognition information as authentication feature information, simplify authentication step on the one hand, on the other hand, because fingerprint, iris, face and voice are all characteristic informations that the opposite sex is stronger, so authentication process adopts above-mentioned biological information effectively to improve the security of data.
Wherein, fingerprint feature information can be obtained by the finger print acquisition module in terminal, as the home key in i Phone, iris feature information and face characteristic information all can be obtained by the camera of mobile phone, voice characteristics information can be obtained by the sound identification module of terminal, wherein, speech recognition relates to the identification of tone color and the feature of vocal print, is not the conversions of simple voice to word.
Fig. 2 shows the schematic block diagram calling control system of input method process according to an embodiment of the invention.
As shown in Figure 2, according to an embodiment of the invention input method process call control system 200, comprising: acquiring unit 202, obtain user call the input instruction of input method process in the application program of specified type; Input block 204, generates authentication prompting interface according to described input instruction, to input biological information by described authentication prompting interface prompt user; Judging unit 206, judge described biological information whether with default biometric information matches; Control module 208, when judging that described biological information does not mate with described default biological information, controlling described input method process and quitting work.
In this technical scheme; by generating authentication prompting interface according to input instruction; and when judging that biological information authentication is unsuccessful; control inputs method process quits work; effectively ensure that described application program is not illegally edited; prevent personal information to leak, protect the data security of user.
Particularly, due to enriching of input method dictionary, and the writing function to user's input habit, even if user is provided with password in order to ensure the data security of application program for application program, but, if non-end-user has cracked password, important association keyword can be obtained by attempting inputting some characters in input method process, thus steal the secret of user, therefore, when technical scheme of the present invention can be set in input process and preset characters information be detected, start the authentication process of input method process, in addition, the application program that non-end-user is arbitrarily edited is not wished for some, as long as non-end-user starts input method process and namely carries out authentication process.
In technique scheme, preferably, generate authentication prompting interface according to described input instruction, to input biological information by described authentication prompting interface prompt user, specifically comprise the following steps: resolution unit 210, resolve described input instruction to determine corresponding character information; Judge described character information whether with preset characters information matches; Generation unit 212, when judging described character information and described preset characters information matches, generates authentication prompting interface according to described input instruction.
In this technical scheme, by judge input command information whether with presupposed information to mating, determine whether to generate authentication prompting interface, achieve the detection for character in input process, thus automatically trigger authentication process according to character information, wherein, character information can be the safe words of some input method automated provisionings, as " payment ", " account number cipher " and " I.D. " etc., input method process can detect above-mentioned keyword and preset characters information matches automatically, then start authentication procedure, if the biological information obtained does not mate with default biological information, then terminal thinks that the caller of current input method process is illegal, thus control inputs method process quits work, to guarantee data security.
In above-mentioned any one technical scheme, preferably, acquisition user before the input instruction of the input method process of the application program of specified type, also comprise: creating unit 214, create that comprise can the prompting list of editing application program; According to the selection instruction of user to the arbitrary application program in described prompting list, determine that described arbitrary application program corresponding to described selection instruction is the application program of described specified type.
In this technical scheme; for the application program in intelligent terminal; not all application program is all necessary to carry out authentication; setting up editablely should have program listing; user can being facilitated to select to need protected application program to join in list according to self needing, reaching flexible editor, customization, accounting for the object of internal memory and information leakage preventing less.
In above-mentioned any one technical scheme, preferably, comprising: when judging that described biological information does not mate with default biological information, send information, wherein, described information comprises at least one in acoustics information, optics information and vibration prompting information.
In this technical scheme, during by judging that described biological information does not mate with default biological information, send information, the caller of input method process is known and calls input method failure, to improve the input efficiency of caller, in addition, for illegal caller, be also a kind of warning function.
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention.
As shown in Figure 3, terminal 300 according to an embodiment of the invention, comprising: the input method process as described in above-mentioned any one technical scheme call control system 200.
As shown in Figure 4 and Figure 5, terminal is when the user to number being " 186XXXX1234 " sends information, have input " zhanghumima " as reference character, the character that input method process detection associates to " zhanghumima " comprises " account password ", " Zhang Hu ", " thought ", " burning incense " and " Warring states " etc., wherein, " account password " and preset characters information matches, user account password may be caused to leak, now, generate authentication prompting interface as " fingerprint authentication district ", or directly adopt the fingerprint identification module of home key to obtain fingerprint feature information, fingerprint feature information as obtained mates with preset fingerprint characteristic information, then determine authentication success, thus control inputs method process works on, otherwise, control inputs method process quits work immediately.
More than be described with reference to the accompanying drawings technical scheme of the present invention; what the present invention proposes a kind of new input method process calls control program; by generating authentication prompting interface according to input instruction; and when judging that biological information authentication is unsuccessful; control inputs method process quits work; effectively ensure that described application program is not illegally edited, prevent personal information to leak, protect the data security of user.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. input method process call a control method, it is characterized in that, comprising:
Obtain user and call the input instruction of input method process in the application program of specified type;
Authentication prompting interface is generated, to input biological information by described authentication prompting interface prompt user according to described input instruction;
Judge described biological information whether with default biometric information matches;
When judging that described biological information does not mate with described default biological information, controlling described input method process and quitting work.
2. input method process according to claim 1 call control method, it is characterized in that, generate authentication prompting interface according to described input instruction, to input biological information by described authentication prompting interface prompt user, specifically comprise the following steps:
Resolve described input instruction to determine corresponding character information;
Judge described character information whether with preset characters information matches;
When judging described character information and described preset characters information matches, generate authentication prompting interface according to described input instruction.
3. input method process according to claim 2 call control method, it is characterized in that, acquisition user before the input instruction of the input method process of the application program of specified type, also comprise:
Create that comprise can the prompting list of editing application program;
According to the selection instruction of user to the arbitrary application program in described prompting list, determine that described arbitrary application program corresponding to described selection instruction is the application program of described specified type.
4. input method process according to any one of claim 1 to 3 call control method, it is characterized in that, also comprise:
When judging that described biological information does not mate with default biological information, send information,
Wherein, described information comprises at least one in acoustics information, optics information and vibration prompting information.
5. input method process according to claim 4 call control method, it is characterized in that, described biological information comprises at least one in fingerprint feature information, iris feature information, recognition of face information and voice recognition information.
6. input method process call a control system, it is characterized in that, comprising:
Obtain user and call the input instruction of input method process in the application program of specified type;
Authentication prompting interface is generated, to input biological information by described authentication prompting interface prompt user according to described input instruction;
Judge described biological information whether with default biometric information matches;
When judging that described biological information does not mate with described default biological information, controlling described input method process and quitting work.
7. input method process according to claim 6 call control system, it is characterized in that, generate authentication prompting interface according to described input instruction, to input biological information by described authentication prompting interface prompt user, specifically comprise the following steps:
Resolve described input instruction to determine corresponding character information;
Judge described character information whether with preset characters information matches;
When judging described character information and described preset characters information matches, generate authentication prompting interface according to described input instruction.
8. input method process according to claim 7 call control system, it is characterized in that, acquisition user before the input instruction of the input method process of the application program of specified type, also comprise:
Create that comprise can the prompting list of editing application program;
According to the selection instruction of user to the arbitrary application program in described prompting list, determine that described arbitrary application program corresponding to described selection instruction is the application program of described specified type.
9. the input method process according to any one of claim 6 to 8 call control system, it is characterized in that, also comprise:
When judging that described biological information does not mate with default biological information, send information,
Wherein, described information comprises at least one in acoustics information, optics information and vibration prompting information.
10. a terminal, is characterized in that, comprising: the input method process according to any one of claim 6 to 9 call control system.
CN201510703821.6A 2015-10-23 2015-10-23 The calling control method of input method process, call control system and terminal Active CN105373743B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510703821.6A CN105373743B (en) 2015-10-23 2015-10-23 The calling control method of input method process, call control system and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510703821.6A CN105373743B (en) 2015-10-23 2015-10-23 The calling control method of input method process, call control system and terminal

Publications (2)

Publication Number Publication Date
CN105373743A true CN105373743A (en) 2016-03-02
CN105373743B CN105373743B (en) 2018-05-15

Family

ID=55375931

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510703821.6A Active CN105373743B (en) 2015-10-23 2015-10-23 The calling control method of input method process, call control system and terminal

Country Status (1)

Country Link
CN (1) CN105373743B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106485172A (en) * 2016-11-23 2017-03-08 深圳市金立通信设备有限公司 A kind of cipher code protection method and terminal
CN108932068A (en) * 2018-06-30 2018-12-04 珠海市魅族科技有限公司 A kind of input method application method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894232A (en) * 2010-07-26 2010-11-24 深圳市永达电子股份有限公司 Safe input method applied to identity authentication and input terminal
CN102073810A (en) * 2010-12-06 2011-05-25 上海合合信息科技发展有限公司 Method for integrating account management function in input method software
CN104573485A (en) * 2014-12-31 2015-04-29 广东欧珀移动通信有限公司 Method and device for starting terminal application

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894232A (en) * 2010-07-26 2010-11-24 深圳市永达电子股份有限公司 Safe input method applied to identity authentication and input terminal
CN102073810A (en) * 2010-12-06 2011-05-25 上海合合信息科技发展有限公司 Method for integrating account management function in input method software
CN104573485A (en) * 2014-12-31 2015-04-29 广东欧珀移动通信有限公司 Method and device for starting terminal application

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106485172A (en) * 2016-11-23 2017-03-08 深圳市金立通信设备有限公司 A kind of cipher code protection method and terminal
CN108932068A (en) * 2018-06-30 2018-12-04 珠海市魅族科技有限公司 A kind of input method application method and device

Also Published As

Publication number Publication date
CN105373743B (en) 2018-05-15

Similar Documents

Publication Publication Date Title
CN105224838B (en) A kind of user authority control method and system based on recognition of face
CN105631275B (en) information display method, information display device and terminal
CN109085975A (en) Screenshotss method, apparatus, storage medium and electronic device
CN104820805B (en) A kind of method and device of subscriber identification card information theft-preventing
KR20150012989A (en) Method and apparatus for application protection
WO2015117332A1 (en) Method and device for enabling interface in usb debugging mode, and terminal
JP2006215705A (en) Information communication apparatus, information communication system, information recording device, and information reproducing device
EP1460513B1 (en) Apparatus and method for preventing unauthorized use of an information processing device
CN105072249A (en) Method and device of preventing mobile device from being stolen, and corresponding mobile device
CN104700050A (en) Mobile terminal safety positioning method and device
CN102611774B (en) Based on the mobile phone information safety protection system and method that fingerprint overlaps with navigation key
CN103391354A (en) Information security system and information security method
CN104598122B (en) A kind of terminal
CN105069333A (en) User domain access method, access system and terminal
CN104142796A (en) Unlocking method of terminal and terminal
CN103324874A (en) Verification method and electronic device
CN106485170A (en) A kind of data inputting method and device
CN108038361A (en) Dual system recognition methods, mobile terminal and storage medium based on vocal print
CN108604268B (en) A kind of voice unlocking method and terminal of terminal
CN105373743A (en) Method and system for controlling call of input method process, and terminal
CN105653918A (en) Safe operation method, safe operation device and terminal
CN105703909A (en) Authentication method and electronic equipment
CN105306691A (en) Personal information protection method and terminal
JP2006215730A (en) Electronic device
CN106231594B (en) Mobile terminal information protection method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231219

Address after: 518000 floor 21, block a, Kupai building, intersection of Keyuan Avenue and Baoshen Road, north high tech Zone, songpingshan community, Xili street, Nanshan District, Shenzhen, Guangdong

Patentee after: YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) Co.,Ltd.

Address before: 523000 Dongguan Songshan Lake Hi-tech Industrial Development Zone, Guangdong Province

Patentee before: DONGGUAN COOLPAD SOFTWARE TECH Co.,Ltd.

TR01 Transfer of patent right