CN105373743B - The calling control method of input method process, call control system and terminal - Google Patents

The calling control method of input method process, call control system and terminal Download PDF

Info

Publication number
CN105373743B
CN105373743B CN201510703821.6A CN201510703821A CN105373743B CN 105373743 B CN105373743 B CN 105373743B CN 201510703821 A CN201510703821 A CN 201510703821A CN 105373743 B CN105373743 B CN 105373743B
Authority
CN
China
Prior art keywords
information
input
method process
application program
input method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510703821.6A
Other languages
Chinese (zh)
Other versions
CN105373743A (en
Inventor
许乾桥
熊忠凯
宋豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Dongguan Coolpad Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Coolpad Software Technology Co Ltd filed Critical Dongguan Coolpad Software Technology Co Ltd
Priority to CN201510703821.6A priority Critical patent/CN105373743B/en
Publication of CN105373743A publication Critical patent/CN105373743A/en
Application granted granted Critical
Publication of CN105373743B publication Critical patent/CN105373743B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides a kind of calling control method of input method process, control system and terminal are called, wherein, the calling control method of the input method process includes:Obtain the input instruction that user calls input method process in the application program of specified type;Authentication prompting interface is generated according to the input instruction, to prompt user to input biological information by the authentication prompting interface;Judge the biological information whether with default biometric information matches;When judging that the biological information is mismatched with the default biological information, the input method process is controlled to be stopped.By technical scheme, user is after specified application is opened, before calling input method editor; it is required for carrying out the authentication of biological information; it is effectively guaranteed the application program not edited illegally, it is therefore prevented that personal information leaks, and protects the data safety of user.

Description

The calling control method of input method process, call control system and terminal
Technical field
The present invention relates to field of terminal, in particular to a kind of calling control method of input method process, a kind of input The calling control system and a kind of terminal of method process.
Background technology
In correlation technique, with the development and popularization of internet, mobile intelligent terminal (such as mobile phone, tablet computer) makes With also more and more extensive, the application program of terminal and file etc. are typically all open editor at present, i.e. non-terminal use Family can also directly access the application program and file of the terminal, if lost terminal or checked by people's malice, related People's information will be compromised, in addition, have recorded the used association vocabulary of user in the dictionary of input method, this is also easy to cause non- This terminal user is by associating the security information of bilingual lexicon acquisition user.
Therefore, how to design a kind of calling control program of the input method process of security higher becomes skill urgently to be resolved hurrily Art problem.
The content of the invention
The present invention is based at least one above-mentioned technical problem, it is proposed that a kind of calling control of new input method process Scheme, by generating authentication prompting interface according to input instruction, and when judging that biological information authentication is unsuccessful, control is defeated Enter method process to be stopped, be effectively guaranteed the application program and do not edited illegally, it is therefore prevented that personal information leaks, protection The data safety of user.
In view of this, the present invention proposes a kind of calling control method of input method process, including:It is defeated to obtain user's calling Enter input instruction of the method process in the application program of specified type;Authentication prompting interface is generated according to the input instruction, with logical Cross the authentication prompting interface prompting user and input biological information;Judge the biological information whether with default biology Characteristic information matches;When judging that the biological information is mismatched with the default biological information, control is described defeated Enter method process to be stopped.
In the technical scheme, by generating authentication prompting interface according to input instruction, and biological information is being judged When authenticating unsuccessful, control input method process is stopped, and is effectively guaranteed the application program and is not edited illegally, is prevented Personal information leaks, and protects the data safety of user.
Specifically, it is abundant due to input method dictionary, and the writing function to user's input habit, though user in order to Ensure the data safety of application program and be provided with password for application program, still, if non-end-user has cracked password, Important association keyword may be obtained by attempting to input some characters in input method process, so as to steal the machine of user Close, therefore, technical scheme may be set in input process when detecting preset characters information, start input method into The authentication process of journey, in addition, for some are not intended to the application program that non-end-user arbitrarily edits, non-end-user is only Start input method process and carry out authentication process.
In the above-mentioned technical solutions, it is preferable that authentication prompting interface is generated according to the input instruction, to pass through the mirror Weigh prompting interface prompting user and input biological information, specifically include following steps:The input instruction is parsed with definite pair The character information answered;Judge the character information whether with preset characters information matches;Judge the character information with it is described During preset characters information matches, authentication prompting interface is generated according to the input instruction.
In the technical scheme, by judge input instruction information whether with presupposed information to matching, determine whether to generate Prompting interface is authenticated, realizes the detection that character is directed in input process, so that according to character information automatic trigger authentication process, Wherein, character information can be the safe word that some input methods automatically provide, such as " payment ", " account number cipher " and " identity card " Deng, input method process can detect above-mentioned keyword and preset characters information matches automatically, then start authentication procedure, if obtain Biological information and default biological information mismatch, then terminal thinks that the caller of current input method process is illegal , so that control input method process is stopped, to guarantee data security.
In any of the above-described technical solution, it is preferable that further include:Obtaining application program of the user in specified type Before the input instruction of input method process, the prompting list for including editable application program is created;The prompting is arranged according to user The selection instruction of any application program in table, determines that the corresponding any application program of the selection instruction is specified to be described The application program of type.
In the technical scheme, for the application program in intelligent terminal, not all application program is it is necessary to progress Authentication, establish it is editable should have program listing, user can be facilitated to select to need protected application program according to their needs It is added in list, has achieveed the purpose that flexible editor, customization, accounted for memory and information leakage preventing less.
In any of the above-described technical solution, it is preferable that further include:Judging the biological information and default biology When characteristic information mismatches, prompt message is sent, wherein, the prompt message includes acoustics prompt message, optical cue information At least one of with vibration prompting information.
When in the technical scheme, by judging that the biological information is mismatched with default biological information, hair Go out prompt message, make the caller of input method process know to call input method failure, to improve the input efficiency of caller, separately Outside, it is also a kind of warning function for illegal caller.
In any of the above-described technical solution, it is preferable that it is special that the biological information includes fingerprint feature information, iris At least one of reference breath, recognition of face information and voice recognition information.
In the technical scheme, by setting fingerprint feature information, iris feature information, recognition of face information and voice to know At least one of other information is used as authentication feature information, on the one hand simplifies authentication step, on the other hand, due to fingerprint, rainbow Film, face and voice are all a stronger characteristic informations of the opposite sex, so authentication process is effective using above-mentioned biological information Ground improves the security of data.
Wherein, fingerprint feature information can be obtained by the finger print acquisition module in terminal, such as the home in iPhone Key, iris feature information and face characteristic information can be obtained by the camera of mobile phone, and voice characteristics information can pass through The sound identification module of terminal obtains, wherein, speech recognition is related to the identification of tone color and the feature of vocal print, is not simple Voice to word conversion.
According to the second aspect of the invention, it is also proposed that a kind of calling control system of input method process, including:Obtain and use Input method process is called in the input instruction of the application program of specified type in family;Authentication prompting circle is generated according to the input instruction Face, to prompt user to input biological information by the authentication prompting interface;Judge the biological information whether with Default biometric information matches;When judging that the biological information is mismatched with the default biological information, control The input method process is made to be stopped.
In the technical scheme, by generating authentication prompting interface according to input instruction, and biological information is being judged When authenticating unsuccessful, control input method process is stopped, and is effectively guaranteed the application program and is not edited illegally, is prevented Personal information leaks, and protects the data safety of user.
Specifically, it is abundant due to input method dictionary, and the writing function to user's input habit, though user in order to Ensure the data safety of application program and be provided with password for application program, still, if non-end-user has cracked password, Important association keyword may be obtained by attempting to input some characters in input method process, so as to steal the machine of user Close, therefore, technical scheme may be set in input process when detecting preset characters information, start input method into The authentication process of journey, in addition, for some are not intended to the application program that non-end-user arbitrarily edits, non-end-user is only Start input method process and carry out authentication process.
In the above-mentioned technical solutions, it is preferable that authentication prompting interface is generated according to the input instruction, to pass through the authentication Prompting interface prompting user inputs biological information, specifically includes following steps:The input instruction is parsed to determine to correspond to Character information;Judge the character information whether with preset characters information matches;Judge the character information with it is described pre- If character information matches, authentication prompting interface is generated according to the input instruction.
In the technical scheme, by judge input instruction information whether with presupposed information to matching, determine whether to generate Prompting interface is authenticated, realizes the detection that character is directed in input process, so that according to character information automatic trigger authentication process, Wherein, character information can be the safe word that some input methods automatically provide, such as " payment ", " account number cipher " and " identity card " Deng, input method process can detect above-mentioned keyword and preset characters information matches automatically, then start authentication procedure, if obtain Biological information and default biological information mismatch, then terminal thinks that the caller of current input method process is illegal , so that control input method process is stopped, to guarantee data security.
In any of the above-described technical solution, it is preferable that obtaining input method of the user in the application program of specified type Before the input instruction of process, further include:Creating includes the prompting list of editable application program;The prompting is arranged according to user The selection instruction of any application program in table, determines that the corresponding any application program of the selection instruction is specified to be described The application program of type.
In the technical scheme, for the application program in intelligent terminal, not all application program is it is necessary to progress Authentication, establish it is editable should have program listing, user can be facilitated to select to need protected application program according to their needs It is added in list, has achieveed the purpose that flexible editor, customization, accounted for memory and information leakage preventing less.
In any of the above-described technical solution, it is preferable that including:Judging that the biological information and default biology are special Reference breath mismatch when, send prompt message, wherein, the prompt message include acoustics prompt message, optical cue information and At least one of vibration prompting information.
When in the technical scheme, by judging that the biological information is mismatched with default biological information, hair Go out prompt message, make the caller of input method process know to call input method failure, to improve the input efficiency of caller, separately Outside, it is also a kind of warning function for illegal caller.
According to the third aspect of the invention we, it is also proposed that a kind of terminal, including:As described in any of the above-described technical solution The calling control system of input method process.
By above technical scheme, by generating authentication prompting interface according to input instruction, and biological characteristic letter is being judged When breath authentication is unsuccessful, control input method process is stopped, and is effectively guaranteed the application program and is not edited illegally, prevents Stop personal information to leak, protect the data safety of user.
Brief description of the drawings
Fig. 1 shows the schematic flow diagram of the calling control method of input method process according to an embodiment of the invention;
Fig. 2 shows the schematic block diagram of the calling control system of input method process according to an embodiment of the invention;
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention;
Fig. 4 shows the interface signal of the calling control program of input method process according to an embodiment of the invention Figure;
Fig. 5 shows the interface signal of the calling control program of input method process according to another embodiment of the invention Figure.
Embodiment
It is to better understand the objects, features and advantages of the present invention, below in conjunction with the accompanying drawings and specific real Mode is applied the present invention is further described in detail.It should be noted that in the case where there is no conflict, the implementation of the application Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also To be implemented using other different from other modes described here, therefore, protection scope of the present invention and from described below Specific embodiment limitation.
Fig. 1 shows the schematic flow diagram of the calling control method of input method process according to an embodiment of the invention.
As shown in Figure 1, the calling control method of input method process according to an embodiment of the invention, including:Step 102, Obtain the input instruction that user calls input method process in the application program of specified type;Step 104, according to the input instruction Generation authentication prompting interface, to prompt user to input biological information by the authentication prompting interface;Step 106, judge The biological information whether with default biometric information matches;Step 108, the biological information and institute are being judged When stating default biometric information matches, the input method process works are controlled;Step 110, the biological characteristic letter is being judged When breath is mismatched with the default biological information, the input method process is controlled to be stopped.
In the technical scheme, by generating authentication prompting interface according to input instruction, and biological information is being judged When authenticating unsuccessful, control input method process is stopped, and is effectively guaranteed the application program and is not edited illegally, is prevented Personal information leaks, and protects the data safety of user.
Specifically, it is abundant due to input method dictionary, and the writing function to user's input habit, though user in order to Ensure the data safety of application program and be provided with password for application program, still, if non-end-user has cracked password, Important association keyword may be obtained by attempting to input some characters in input method process, so as to steal the machine of user Close, therefore, technical scheme may be set in input process when detecting preset characters information, start input method into The authentication process of journey, in addition, for some are not intended to the application program that non-end-user arbitrarily edits, non-end-user is only Start input method process and carry out authentication process.
In the above-mentioned technical solutions, it is preferable that authentication prompting interface is generated according to the input instruction, to pass through the mirror Weigh prompting interface prompting user and input biological information, specifically include following steps:The input instruction is parsed with definite pair The character information answered;Judge the character information whether with preset characters information matches;Judge the character information with it is described During preset characters information matches, authentication prompting interface is generated according to the input instruction.
In the technical scheme, by judge input instruction information whether with presupposed information to matching, determine whether to generate Prompting interface is authenticated, realizes the detection that character is directed in input process, so that according to character information automatic trigger authentication process, Wherein, character information can be the safe word that some input methods automatically provide, such as " payment ", " account number cipher " and " identity card " Deng, input method process can detect above-mentioned keyword and preset characters information matches automatically, then start authentication procedure, if obtain Biological information and default biological information mismatch, then terminal thinks that the caller of current input method process is illegal , so that control input method process is stopped, to guarantee data security.
In any of the above-described technical solution, it is preferable that further include:Obtaining application program of the user in specified type Before the input instruction of input method process, the prompting list for including editable application program is created;The prompting is arranged according to user The selection instruction of any application program in table, determines that the corresponding any application program of the selection instruction is specified to be described The application program of type.
In the technical scheme, for the application program in intelligent terminal, not all application program is it is necessary to progress Authentication, establish it is editable should have program listing, user can be facilitated to select to need protected application program according to their needs It is added in list, has achieveed the purpose that flexible editor, customization, accounted for memory and information leakage preventing less.
In any of the above-described technical solution, it is preferable that further include:Judging the biological information and default biology When characteristic information mismatches, prompt message is sent, wherein, the prompt message includes acoustics prompt message, optical cue information At least one of with vibration prompting information.
When in the technical scheme, by judging that the biological information is mismatched with default biological information, hair Go out prompt message, make the caller of input method process know to call input method failure, to improve the input efficiency of caller, separately Outside, it is also a kind of warning function for illegal caller.
In any of the above-described technical solution, it is preferable that further include:The biological information is believed including fingerprint characteristic At least one of breath, iris feature information, recognition of face information and voice recognition information.
In the technical scheme, by setting fingerprint feature information, iris feature information, recognition of face information and voice to know At least one of other information is used as authentication feature information, on the one hand simplifies authentication step, on the other hand, due to fingerprint, rainbow Film, face and voice are all a stronger characteristic informations of the opposite sex, so authentication process is effective using above-mentioned biological information Ground improves the security of data.
Wherein, fingerprint feature information can be obtained by the finger print acquisition module in terminal, such as the home in iPhone Key, iris feature information and face characteristic information can be obtained by the camera of mobile phone, and voice characteristics information can pass through The sound identification module of terminal obtains, wherein, speech recognition is related to the identification of tone color and the feature of vocal print, is not simple Voice to word conversion.
Fig. 2 shows the schematic block diagram of the calling control system of input method process according to an embodiment of the invention.
As shown in Fig. 2, the calling control system 200 of input method process according to an embodiment of the invention, including:Obtain single Member 202, obtains the input instruction that user calls input method process in the application program of specified type;Input unit 204, according to institute Input instruction generation authentication prompting interface is stated, to prompt user to input biological information by the authentication prompting interface;Sentence Disconnected unit 206, judge the biological information whether with default biometric information matches;Control unit 208, is judging institute When stating biological information with the default biological information mismatch, the input method process is controlled to be stopped.
In the technical scheme, by generating authentication prompting interface according to input instruction, and biological information is being judged When authenticating unsuccessful, control input method process is stopped, and is effectively guaranteed the application program and is not edited illegally, is prevented Personal information leaks, and protects the data safety of user.
Specifically, it is abundant due to input method dictionary, and the writing function to user's input habit, though user in order to Ensure the data safety of application program and be provided with password for application program, still, if non-end-user has cracked password, Important association keyword may be obtained by attempting to input some characters in input method process, so as to steal the machine of user Close, therefore, technical scheme may be set in input process when detecting preset characters information, start input method into The authentication process of journey, in addition, for some are not intended to the application program that non-end-user arbitrarily edits, non-end-user is only Start input method process and carry out authentication process.
In the above-mentioned technical solutions, it is preferable that authentication prompting interface is generated according to the input instruction, to pass through the authentication Prompting interface prompting user inputs biological information, specifically includes following steps:Resolution unit 210, parses the input and refers to Order is with definite corresponding character information;Judge the character information whether with preset characters information matches;Generation unit 212, When judging the character information with the preset characters information matches, authentication prompting interface is generated according to the input instruction.
In the technical scheme, by judge input instruction information whether with presupposed information to matching, determine whether to generate Prompting interface is authenticated, realizes the detection that character is directed in input process, so that according to character information automatic trigger authentication process, Wherein, character information can be the safe word that some input methods automatically provide, such as " payment ", " account number cipher " and " identity card " Deng, input method process can detect above-mentioned keyword and preset characters information matches automatically, then start authentication procedure, if obtain Biological information and default biological information mismatch, then terminal thinks that the caller of current input method process is illegal , so that control input method process is stopped, to guarantee data security.
In any of the above-described technical solution, it is preferable that obtaining input method of the user in the application program of specified type Before the input instruction of process, further include:Creating unit 214, creates the prompting list for including editable application program;According to user To the selection instruction of any application program in the prompting list, determine that the selection instruction is corresponding and described any apply journey Sequence is the application program of the specified type.
In the technical scheme, for the application program in intelligent terminal, not all application program is it is necessary to progress Authentication, establish it is editable should have program listing, user can be facilitated to select to need protected application program according to their needs It is added in list, has achieveed the purpose that flexible editor, customization, accounted for memory and information leakage preventing less.
In any of the above-described technical solution, it is preferable that including:Judging that the biological information and default biology are special Reference breath mismatch when, send prompt message, wherein, the prompt message include acoustics prompt message, optical cue information and At least one of vibration prompting information.
When in the technical scheme, by judging that the biological information is mismatched with default biological information, hair Go out prompt message, make the caller of input method process know to call input method failure, to improve the input efficiency of caller, separately Outside, it is also a kind of warning function for illegal caller.
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention.
As shown in figure 3, terminal 300 according to an embodiment of the invention, including:As described in any of the above-described technical solution The calling control system 200 of input method process.
As shown in Figure 4 and Figure 5, terminal have input when sending information to number for the user of " 186XXXX1234 " " zhanghumima " as character is referred to, input method process detection to " zhanghumima " associated character is including " account is close Code ", " Zhang Hu ", " thinking ", " burning incense " and " Warring states " etc., wherein, " account password " and preset characters information matches, may cause User account password leaks, and at this time, generation authentication prompting interface such as " fingerprint authentication area ", or is directly known using the fingerprint of home keys Other module obtains fingerprint feature information, and the fingerprint feature information such as obtained is matched with preset fingerprint characteristic information, it is determined that authentication Success, so that control input method process works on, otherwise, control input method process is stopped immediately.
Technical scheme is described in detail above in association with attached drawing, the present invention proposes a kind of new input method process Calling control program, by according to input instruction generate authentication prompting interface, and judge biological information can not authenticate During work(, control input method process is stopped, and is effectively guaranteed the application program and is not edited illegally, it is therefore prevented that individual's letter Breath leaks, and protects the data safety of user.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the invention, for the skill of this area For art personnel, the invention may be variously modified and varied.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should all be included in the protection scope of the present invention.

Claims (8)

  1. A kind of 1. calling control method of input method process, it is characterised in that including:
    Obtain the input instruction that user calls input method process in the application program of specified type;
    Authentication prompting interface is generated according to the input instruction, it is special to prompt user to input biology by the authentication prompting interface Reference ceases;
    Judge the biological information whether with default biometric information matches;
    When judging that the biological information is mismatched with the default biological information, the input method process is controlled to stop Only work;
    Wherein, authentication prompting interface is generated according to the input instruction, to prompt user to input by the authentication prompting interface Biological information, specifically includes following steps:
    The input instruction is parsed to determine corresponding character information;
    Judge the character information whether with preset characters information matches;
    When judging the character information with the preset characters information matches, authentication prompting circle is generated according to the input instruction Face.
  2. 2. the calling control method of input method process according to claim 1, it is characterised in that specified obtaining user Before the input instruction of the input method process of the application program of type, further include:
    Creating includes the prompting list of editable application program;
    Selection instruction according to user to any application program in the prompting list, determines the corresponding institute of the selection instruction State the application program that any application program is the specified type.
  3. 3. the calling control method of input method process according to claim 1 or 2, it is characterised in that further include:
    When judging that the biological information is mismatched with default biological information, prompt message is sent,
    Wherein, the prompt message includes at least one of acoustics prompt message, optical cue information and vibration prompting information.
  4. 4. the calling control method of input method process according to claim 3, it is characterised in that the biological information Including at least one of fingerprint feature information, iris feature information, recognition of face information and voice recognition information.
  5. A kind of 5. calling control system of input method process, it is characterised in that including:
    Obtain the input instruction that user calls input method process in the application program of specified type;
    Authentication prompting interface is generated according to the input instruction, it is special to prompt user to input biology by the authentication prompting interface Reference ceases;
    Judge the biological information whether with default biometric information matches;
    When judging that the biological information is mismatched with the default biological information, the input method process is controlled to stop Only work;
    Wherein, authentication prompting interface is generated according to the input instruction, to prompt user to input by the authentication prompting interface Biological information, specifically includes following steps:
    The input instruction is parsed to determine corresponding character information;
    Judge the character information whether with preset characters information matches;
    When judging the character information with the preset characters information matches, authentication prompting circle is generated according to the input instruction Face.
  6. 6. the calling control system of input method process according to claim 5, it is characterised in that specified obtaining user Before the input instruction of the input method process of the application program of type, further include:
    Creating includes the prompting list of editable application program;
    Selection instruction according to user to any application program in the prompting list, determines the corresponding institute of the selection instruction State the application program that any application program is the specified type.
  7. 7. the calling control system of the input method process according to claim 5 or 6, it is characterised in that further include:
    When judging that the biological information is mismatched with default biological information, prompt message is sent,
    Wherein, the prompt message includes at least one of acoustics prompt message, optical cue information and vibration prompting information.
  8. A kind of 8. terminal, it is characterised in that including:The calling control of input method process as any one of claim 5 to 7 System processed.
CN201510703821.6A 2015-10-23 2015-10-23 The calling control method of input method process, call control system and terminal Active CN105373743B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510703821.6A CN105373743B (en) 2015-10-23 2015-10-23 The calling control method of input method process, call control system and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510703821.6A CN105373743B (en) 2015-10-23 2015-10-23 The calling control method of input method process, call control system and terminal

Publications (2)

Publication Number Publication Date
CN105373743A CN105373743A (en) 2016-03-02
CN105373743B true CN105373743B (en) 2018-05-15

Family

ID=55375931

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510703821.6A Active CN105373743B (en) 2015-10-23 2015-10-23 The calling control method of input method process, call control system and terminal

Country Status (1)

Country Link
CN (1) CN105373743B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106485172A (en) * 2016-11-23 2017-03-08 深圳市金立通信设备有限公司 A kind of cipher code protection method and terminal
CN108932068A (en) * 2018-06-30 2018-12-04 珠海市魅族科技有限公司 A kind of input method application method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894232A (en) * 2010-07-26 2010-11-24 深圳市永达电子股份有限公司 Safe input method applied to identity authentication and input terminal
CN102073810A (en) * 2010-12-06 2011-05-25 上海合合信息科技发展有限公司 Method for integrating account management function in input method software
CN104573485A (en) * 2014-12-31 2015-04-29 广东欧珀移动通信有限公司 Method and device for starting terminal application

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894232A (en) * 2010-07-26 2010-11-24 深圳市永达电子股份有限公司 Safe input method applied to identity authentication and input terminal
CN102073810A (en) * 2010-12-06 2011-05-25 上海合合信息科技发展有限公司 Method for integrating account management function in input method software
CN104573485A (en) * 2014-12-31 2015-04-29 广东欧珀移动通信有限公司 Method and device for starting terminal application

Also Published As

Publication number Publication date
CN105373743A (en) 2016-03-02

Similar Documents

Publication Publication Date Title
CN105631275B (en) information display method, information display device and terminal
US8082448B2 (en) System and method for user authentication using non-language words
US8396711B2 (en) Voice authentication system and method
KR101438869B1 (en) Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data
CN105138882B (en) A kind of terminal unlock method and device
WO2016110002A1 (en) Screen interface unlocking method and screen interface unlocking device
US20030074201A1 (en) Continuous authentication of the identity of a speaker
US20150088760A1 (en) Automatic injection of security confirmation
CN108510290B (en) Customer information amending method, device, computer equipment and storage medium in call
CN107533598B (en) Input method and device of login password of application program and terminal
CN109085975A (en) Screenshotss method, apparatus, storage medium and electronic device
CN102543084A (en) Online voiceprint recognition system and implementation method thereof
CN104820805B (en) A kind of method and device of subscriber identification card information theft-preventing
CN106156575A (en) A kind of user interface control method and terminal
EP1460513B1 (en) Apparatus and method for preventing unauthorized use of an information processing device
CN105072249A (en) Method and device of preventing mobile device from being stolen, and corresponding mobile device
CN104142796A (en) Unlocking method of terminal and terminal
CN107644172A (en) The guard method of content displaying and device
US11182466B2 (en) User authentication apparatus and recording media
CN108074577A (en) Identity identifying method and identity authorization system
CN108038361A (en) Dual system recognition methods, mobile terminal and storage medium based on vocal print
CN105373743B (en) The calling control method of input method process, call control system and terminal
CN107147499A (en) The method and system verified using phonetic entry
CN107068149A (en) unlocking method and device
CN107786566A (en) Method for protecting privacy, system, server and receiving terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231219

Address after: 518000 floor 21, block a, Kupai building, intersection of Keyuan Avenue and Baoshen Road, north high tech Zone, songpingshan community, Xili street, Nanshan District, Shenzhen, Guangdong

Patentee after: YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) Co.,Ltd.

Address before: 523000 Dongguan Songshan Lake Hi-tech Industrial Development Zone, Guangdong Province

Patentee before: DONGGUAN COOLPAD SOFTWARE TECH Co.,Ltd.

TR01 Transfer of patent right