CN105373743B - The calling control method of input method process, call control system and terminal - Google Patents
The calling control method of input method process, call control system and terminal Download PDFInfo
- Publication number
- CN105373743B CN105373743B CN201510703821.6A CN201510703821A CN105373743B CN 105373743 B CN105373743 B CN 105373743B CN 201510703821 A CN201510703821 A CN 201510703821A CN 105373743 B CN105373743 B CN 105373743B
- Authority
- CN
- China
- Prior art keywords
- information
- input
- method process
- application program
- input method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 226
- 230000008569 process Effects 0.000 title claims abstract description 106
- 230000003287 optical effect Effects 0.000 claims description 6
- 230000006870 function Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 238000001514 detection method Methods 0.000 description 5
- 238000006243 chemical reaction Methods 0.000 description 2
- 230000001755 vocal effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides a kind of calling control method of input method process, control system and terminal are called, wherein, the calling control method of the input method process includes:Obtain the input instruction that user calls input method process in the application program of specified type;Authentication prompting interface is generated according to the input instruction, to prompt user to input biological information by the authentication prompting interface;Judge the biological information whether with default biometric information matches;When judging that the biological information is mismatched with the default biological information, the input method process is controlled to be stopped.By technical scheme, user is after specified application is opened, before calling input method editor; it is required for carrying out the authentication of biological information; it is effectively guaranteed the application program not edited illegally, it is therefore prevented that personal information leaks, and protects the data safety of user.
Description
Technical field
The present invention relates to field of terminal, in particular to a kind of calling control method of input method process, a kind of input
The calling control system and a kind of terminal of method process.
Background technology
In correlation technique, with the development and popularization of internet, mobile intelligent terminal (such as mobile phone, tablet computer) makes
With also more and more extensive, the application program of terminal and file etc. are typically all open editor at present, i.e. non-terminal use
Family can also directly access the application program and file of the terminal, if lost terminal or checked by people's malice, related
People's information will be compromised, in addition, have recorded the used association vocabulary of user in the dictionary of input method, this is also easy to cause non-
This terminal user is by associating the security information of bilingual lexicon acquisition user.
Therefore, how to design a kind of calling control program of the input method process of security higher becomes skill urgently to be resolved hurrily
Art problem.
The content of the invention
The present invention is based at least one above-mentioned technical problem, it is proposed that a kind of calling control of new input method process
Scheme, by generating authentication prompting interface according to input instruction, and when judging that biological information authentication is unsuccessful, control is defeated
Enter method process to be stopped, be effectively guaranteed the application program and do not edited illegally, it is therefore prevented that personal information leaks, protection
The data safety of user.
In view of this, the present invention proposes a kind of calling control method of input method process, including:It is defeated to obtain user's calling
Enter input instruction of the method process in the application program of specified type;Authentication prompting interface is generated according to the input instruction, with logical
Cross the authentication prompting interface prompting user and input biological information;Judge the biological information whether with default biology
Characteristic information matches;When judging that the biological information is mismatched with the default biological information, control is described defeated
Enter method process to be stopped.
In the technical scheme, by generating authentication prompting interface according to input instruction, and biological information is being judged
When authenticating unsuccessful, control input method process is stopped, and is effectively guaranteed the application program and is not edited illegally, is prevented
Personal information leaks, and protects the data safety of user.
Specifically, it is abundant due to input method dictionary, and the writing function to user's input habit, though user in order to
Ensure the data safety of application program and be provided with password for application program, still, if non-end-user has cracked password,
Important association keyword may be obtained by attempting to input some characters in input method process, so as to steal the machine of user
Close, therefore, technical scheme may be set in input process when detecting preset characters information, start input method into
The authentication process of journey, in addition, for some are not intended to the application program that non-end-user arbitrarily edits, non-end-user is only
Start input method process and carry out authentication process.
In the above-mentioned technical solutions, it is preferable that authentication prompting interface is generated according to the input instruction, to pass through the mirror
Weigh prompting interface prompting user and input biological information, specifically include following steps:The input instruction is parsed with definite pair
The character information answered;Judge the character information whether with preset characters information matches;Judge the character information with it is described
During preset characters information matches, authentication prompting interface is generated according to the input instruction.
In the technical scheme, by judge input instruction information whether with presupposed information to matching, determine whether to generate
Prompting interface is authenticated, realizes the detection that character is directed in input process, so that according to character information automatic trigger authentication process,
Wherein, character information can be the safe word that some input methods automatically provide, such as " payment ", " account number cipher " and " identity card "
Deng, input method process can detect above-mentioned keyword and preset characters information matches automatically, then start authentication procedure, if obtain
Biological information and default biological information mismatch, then terminal thinks that the caller of current input method process is illegal
, so that control input method process is stopped, to guarantee data security.
In any of the above-described technical solution, it is preferable that further include:Obtaining application program of the user in specified type
Before the input instruction of input method process, the prompting list for including editable application program is created;The prompting is arranged according to user
The selection instruction of any application program in table, determines that the corresponding any application program of the selection instruction is specified to be described
The application program of type.
In the technical scheme, for the application program in intelligent terminal, not all application program is it is necessary to progress
Authentication, establish it is editable should have program listing, user can be facilitated to select to need protected application program according to their needs
It is added in list, has achieveed the purpose that flexible editor, customization, accounted for memory and information leakage preventing less.
In any of the above-described technical solution, it is preferable that further include:Judging the biological information and default biology
When characteristic information mismatches, prompt message is sent, wherein, the prompt message includes acoustics prompt message, optical cue information
At least one of with vibration prompting information.
When in the technical scheme, by judging that the biological information is mismatched with default biological information, hair
Go out prompt message, make the caller of input method process know to call input method failure, to improve the input efficiency of caller, separately
Outside, it is also a kind of warning function for illegal caller.
In any of the above-described technical solution, it is preferable that it is special that the biological information includes fingerprint feature information, iris
At least one of reference breath, recognition of face information and voice recognition information.
In the technical scheme, by setting fingerprint feature information, iris feature information, recognition of face information and voice to know
At least one of other information is used as authentication feature information, on the one hand simplifies authentication step, on the other hand, due to fingerprint, rainbow
Film, face and voice are all a stronger characteristic informations of the opposite sex, so authentication process is effective using above-mentioned biological information
Ground improves the security of data.
Wherein, fingerprint feature information can be obtained by the finger print acquisition module in terminal, such as the home in iPhone
Key, iris feature information and face characteristic information can be obtained by the camera of mobile phone, and voice characteristics information can pass through
The sound identification module of terminal obtains, wherein, speech recognition is related to the identification of tone color and the feature of vocal print, is not simple
Voice to word conversion.
According to the second aspect of the invention, it is also proposed that a kind of calling control system of input method process, including:Obtain and use
Input method process is called in the input instruction of the application program of specified type in family;Authentication prompting circle is generated according to the input instruction
Face, to prompt user to input biological information by the authentication prompting interface;Judge the biological information whether with
Default biometric information matches;When judging that the biological information is mismatched with the default biological information, control
The input method process is made to be stopped.
In the technical scheme, by generating authentication prompting interface according to input instruction, and biological information is being judged
When authenticating unsuccessful, control input method process is stopped, and is effectively guaranteed the application program and is not edited illegally, is prevented
Personal information leaks, and protects the data safety of user.
Specifically, it is abundant due to input method dictionary, and the writing function to user's input habit, though user in order to
Ensure the data safety of application program and be provided with password for application program, still, if non-end-user has cracked password,
Important association keyword may be obtained by attempting to input some characters in input method process, so as to steal the machine of user
Close, therefore, technical scheme may be set in input process when detecting preset characters information, start input method into
The authentication process of journey, in addition, for some are not intended to the application program that non-end-user arbitrarily edits, non-end-user is only
Start input method process and carry out authentication process.
In the above-mentioned technical solutions, it is preferable that authentication prompting interface is generated according to the input instruction, to pass through the authentication
Prompting interface prompting user inputs biological information, specifically includes following steps:The input instruction is parsed to determine to correspond to
Character information;Judge the character information whether with preset characters information matches;Judge the character information with it is described pre-
If character information matches, authentication prompting interface is generated according to the input instruction.
In the technical scheme, by judge input instruction information whether with presupposed information to matching, determine whether to generate
Prompting interface is authenticated, realizes the detection that character is directed in input process, so that according to character information automatic trigger authentication process,
Wherein, character information can be the safe word that some input methods automatically provide, such as " payment ", " account number cipher " and " identity card "
Deng, input method process can detect above-mentioned keyword and preset characters information matches automatically, then start authentication procedure, if obtain
Biological information and default biological information mismatch, then terminal thinks that the caller of current input method process is illegal
, so that control input method process is stopped, to guarantee data security.
In any of the above-described technical solution, it is preferable that obtaining input method of the user in the application program of specified type
Before the input instruction of process, further include:Creating includes the prompting list of editable application program;The prompting is arranged according to user
The selection instruction of any application program in table, determines that the corresponding any application program of the selection instruction is specified to be described
The application program of type.
In the technical scheme, for the application program in intelligent terminal, not all application program is it is necessary to progress
Authentication, establish it is editable should have program listing, user can be facilitated to select to need protected application program according to their needs
It is added in list, has achieveed the purpose that flexible editor, customization, accounted for memory and information leakage preventing less.
In any of the above-described technical solution, it is preferable that including:Judging that the biological information and default biology are special
Reference breath mismatch when, send prompt message, wherein, the prompt message include acoustics prompt message, optical cue information and
At least one of vibration prompting information.
When in the technical scheme, by judging that the biological information is mismatched with default biological information, hair
Go out prompt message, make the caller of input method process know to call input method failure, to improve the input efficiency of caller, separately
Outside, it is also a kind of warning function for illegal caller.
According to the third aspect of the invention we, it is also proposed that a kind of terminal, including:As described in any of the above-described technical solution
The calling control system of input method process.
By above technical scheme, by generating authentication prompting interface according to input instruction, and biological characteristic letter is being judged
When breath authentication is unsuccessful, control input method process is stopped, and is effectively guaranteed the application program and is not edited illegally, prevents
Stop personal information to leak, protect the data safety of user.
Brief description of the drawings
Fig. 1 shows the schematic flow diagram of the calling control method of input method process according to an embodiment of the invention;
Fig. 2 shows the schematic block diagram of the calling control system of input method process according to an embodiment of the invention;
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention;
Fig. 4 shows the interface signal of the calling control program of input method process according to an embodiment of the invention
Figure;
Fig. 5 shows the interface signal of the calling control program of input method process according to another embodiment of the invention
Figure.
Embodiment
It is to better understand the objects, features and advantages of the present invention, below in conjunction with the accompanying drawings and specific real
Mode is applied the present invention is further described in detail.It should be noted that in the case where there is no conflict, the implementation of the application
Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also
To be implemented using other different from other modes described here, therefore, protection scope of the present invention and from described below
Specific embodiment limitation.
Fig. 1 shows the schematic flow diagram of the calling control method of input method process according to an embodiment of the invention.
As shown in Figure 1, the calling control method of input method process according to an embodiment of the invention, including:Step 102,
Obtain the input instruction that user calls input method process in the application program of specified type;Step 104, according to the input instruction
Generation authentication prompting interface, to prompt user to input biological information by the authentication prompting interface;Step 106, judge
The biological information whether with default biometric information matches;Step 108, the biological information and institute are being judged
When stating default biometric information matches, the input method process works are controlled;Step 110, the biological characteristic letter is being judged
When breath is mismatched with the default biological information, the input method process is controlled to be stopped.
In the technical scheme, by generating authentication prompting interface according to input instruction, and biological information is being judged
When authenticating unsuccessful, control input method process is stopped, and is effectively guaranteed the application program and is not edited illegally, is prevented
Personal information leaks, and protects the data safety of user.
Specifically, it is abundant due to input method dictionary, and the writing function to user's input habit, though user in order to
Ensure the data safety of application program and be provided with password for application program, still, if non-end-user has cracked password,
Important association keyword may be obtained by attempting to input some characters in input method process, so as to steal the machine of user
Close, therefore, technical scheme may be set in input process when detecting preset characters information, start input method into
The authentication process of journey, in addition, for some are not intended to the application program that non-end-user arbitrarily edits, non-end-user is only
Start input method process and carry out authentication process.
In the above-mentioned technical solutions, it is preferable that authentication prompting interface is generated according to the input instruction, to pass through the mirror
Weigh prompting interface prompting user and input biological information, specifically include following steps:The input instruction is parsed with definite pair
The character information answered;Judge the character information whether with preset characters information matches;Judge the character information with it is described
During preset characters information matches, authentication prompting interface is generated according to the input instruction.
In the technical scheme, by judge input instruction information whether with presupposed information to matching, determine whether to generate
Prompting interface is authenticated, realizes the detection that character is directed in input process, so that according to character information automatic trigger authentication process,
Wherein, character information can be the safe word that some input methods automatically provide, such as " payment ", " account number cipher " and " identity card "
Deng, input method process can detect above-mentioned keyword and preset characters information matches automatically, then start authentication procedure, if obtain
Biological information and default biological information mismatch, then terminal thinks that the caller of current input method process is illegal
, so that control input method process is stopped, to guarantee data security.
In any of the above-described technical solution, it is preferable that further include:Obtaining application program of the user in specified type
Before the input instruction of input method process, the prompting list for including editable application program is created;The prompting is arranged according to user
The selection instruction of any application program in table, determines that the corresponding any application program of the selection instruction is specified to be described
The application program of type.
In the technical scheme, for the application program in intelligent terminal, not all application program is it is necessary to progress
Authentication, establish it is editable should have program listing, user can be facilitated to select to need protected application program according to their needs
It is added in list, has achieveed the purpose that flexible editor, customization, accounted for memory and information leakage preventing less.
In any of the above-described technical solution, it is preferable that further include:Judging the biological information and default biology
When characteristic information mismatches, prompt message is sent, wherein, the prompt message includes acoustics prompt message, optical cue information
At least one of with vibration prompting information.
When in the technical scheme, by judging that the biological information is mismatched with default biological information, hair
Go out prompt message, make the caller of input method process know to call input method failure, to improve the input efficiency of caller, separately
Outside, it is also a kind of warning function for illegal caller.
In any of the above-described technical solution, it is preferable that further include:The biological information is believed including fingerprint characteristic
At least one of breath, iris feature information, recognition of face information and voice recognition information.
In the technical scheme, by setting fingerprint feature information, iris feature information, recognition of face information and voice to know
At least one of other information is used as authentication feature information, on the one hand simplifies authentication step, on the other hand, due to fingerprint, rainbow
Film, face and voice are all a stronger characteristic informations of the opposite sex, so authentication process is effective using above-mentioned biological information
Ground improves the security of data.
Wherein, fingerprint feature information can be obtained by the finger print acquisition module in terminal, such as the home in iPhone
Key, iris feature information and face characteristic information can be obtained by the camera of mobile phone, and voice characteristics information can pass through
The sound identification module of terminal obtains, wherein, speech recognition is related to the identification of tone color and the feature of vocal print, is not simple
Voice to word conversion.
Fig. 2 shows the schematic block diagram of the calling control system of input method process according to an embodiment of the invention.
As shown in Fig. 2, the calling control system 200 of input method process according to an embodiment of the invention, including:Obtain single
Member 202, obtains the input instruction that user calls input method process in the application program of specified type;Input unit 204, according to institute
Input instruction generation authentication prompting interface is stated, to prompt user to input biological information by the authentication prompting interface;Sentence
Disconnected unit 206, judge the biological information whether with default biometric information matches;Control unit 208, is judging institute
When stating biological information with the default biological information mismatch, the input method process is controlled to be stopped.
In the technical scheme, by generating authentication prompting interface according to input instruction, and biological information is being judged
When authenticating unsuccessful, control input method process is stopped, and is effectively guaranteed the application program and is not edited illegally, is prevented
Personal information leaks, and protects the data safety of user.
Specifically, it is abundant due to input method dictionary, and the writing function to user's input habit, though user in order to
Ensure the data safety of application program and be provided with password for application program, still, if non-end-user has cracked password,
Important association keyword may be obtained by attempting to input some characters in input method process, so as to steal the machine of user
Close, therefore, technical scheme may be set in input process when detecting preset characters information, start input method into
The authentication process of journey, in addition, for some are not intended to the application program that non-end-user arbitrarily edits, non-end-user is only
Start input method process and carry out authentication process.
In the above-mentioned technical solutions, it is preferable that authentication prompting interface is generated according to the input instruction, to pass through the authentication
Prompting interface prompting user inputs biological information, specifically includes following steps:Resolution unit 210, parses the input and refers to
Order is with definite corresponding character information;Judge the character information whether with preset characters information matches;Generation unit 212,
When judging the character information with the preset characters information matches, authentication prompting interface is generated according to the input instruction.
In the technical scheme, by judge input instruction information whether with presupposed information to matching, determine whether to generate
Prompting interface is authenticated, realizes the detection that character is directed in input process, so that according to character information automatic trigger authentication process,
Wherein, character information can be the safe word that some input methods automatically provide, such as " payment ", " account number cipher " and " identity card "
Deng, input method process can detect above-mentioned keyword and preset characters information matches automatically, then start authentication procedure, if obtain
Biological information and default biological information mismatch, then terminal thinks that the caller of current input method process is illegal
, so that control input method process is stopped, to guarantee data security.
In any of the above-described technical solution, it is preferable that obtaining input method of the user in the application program of specified type
Before the input instruction of process, further include:Creating unit 214, creates the prompting list for including editable application program;According to user
To the selection instruction of any application program in the prompting list, determine that the selection instruction is corresponding and described any apply journey
Sequence is the application program of the specified type.
In the technical scheme, for the application program in intelligent terminal, not all application program is it is necessary to progress
Authentication, establish it is editable should have program listing, user can be facilitated to select to need protected application program according to their needs
It is added in list, has achieveed the purpose that flexible editor, customization, accounted for memory and information leakage preventing less.
In any of the above-described technical solution, it is preferable that including:Judging that the biological information and default biology are special
Reference breath mismatch when, send prompt message, wherein, the prompt message include acoustics prompt message, optical cue information and
At least one of vibration prompting information.
When in the technical scheme, by judging that the biological information is mismatched with default biological information, hair
Go out prompt message, make the caller of input method process know to call input method failure, to improve the input efficiency of caller, separately
Outside, it is also a kind of warning function for illegal caller.
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention.
As shown in figure 3, terminal 300 according to an embodiment of the invention, including:As described in any of the above-described technical solution
The calling control system 200 of input method process.
As shown in Figure 4 and Figure 5, terminal have input when sending information to number for the user of " 186XXXX1234 "
" zhanghumima " as character is referred to, input method process detection to " zhanghumima " associated character is including " account is close
Code ", " Zhang Hu ", " thinking ", " burning incense " and " Warring states " etc., wherein, " account password " and preset characters information matches, may cause
User account password leaks, and at this time, generation authentication prompting interface such as " fingerprint authentication area ", or is directly known using the fingerprint of home keys
Other module obtains fingerprint feature information, and the fingerprint feature information such as obtained is matched with preset fingerprint characteristic information, it is determined that authentication
Success, so that control input method process works on, otherwise, control input method process is stopped immediately.
Technical scheme is described in detail above in association with attached drawing, the present invention proposes a kind of new input method process
Calling control program, by according to input instruction generate authentication prompting interface, and judge biological information can not authenticate
During work(, control input method process is stopped, and is effectively guaranteed the application program and is not edited illegally, it is therefore prevented that individual's letter
Breath leaks, and protects the data safety of user.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the invention, for the skill of this area
For art personnel, the invention may be variously modified and varied.Within the spirit and principles of the invention, that is made any repaiies
Change, equivalent substitution, improvement etc., should all be included in the protection scope of the present invention.
Claims (8)
- A kind of 1. calling control method of input method process, it is characterised in that including:Obtain the input instruction that user calls input method process in the application program of specified type;Authentication prompting interface is generated according to the input instruction, it is special to prompt user to input biology by the authentication prompting interface Reference ceases;Judge the biological information whether with default biometric information matches;When judging that the biological information is mismatched with the default biological information, the input method process is controlled to stop Only work;Wherein, authentication prompting interface is generated according to the input instruction, to prompt user to input by the authentication prompting interface Biological information, specifically includes following steps:The input instruction is parsed to determine corresponding character information;Judge the character information whether with preset characters information matches;When judging the character information with the preset characters information matches, authentication prompting circle is generated according to the input instruction Face.
- 2. the calling control method of input method process according to claim 1, it is characterised in that specified obtaining user Before the input instruction of the input method process of the application program of type, further include:Creating includes the prompting list of editable application program;Selection instruction according to user to any application program in the prompting list, determines the corresponding institute of the selection instruction State the application program that any application program is the specified type.
- 3. the calling control method of input method process according to claim 1 or 2, it is characterised in that further include:When judging that the biological information is mismatched with default biological information, prompt message is sent,Wherein, the prompt message includes at least one of acoustics prompt message, optical cue information and vibration prompting information.
- 4. the calling control method of input method process according to claim 3, it is characterised in that the biological information Including at least one of fingerprint feature information, iris feature information, recognition of face information and voice recognition information.
- A kind of 5. calling control system of input method process, it is characterised in that including:Obtain the input instruction that user calls input method process in the application program of specified type;Authentication prompting interface is generated according to the input instruction, it is special to prompt user to input biology by the authentication prompting interface Reference ceases;Judge the biological information whether with default biometric information matches;When judging that the biological information is mismatched with the default biological information, the input method process is controlled to stop Only work;Wherein, authentication prompting interface is generated according to the input instruction, to prompt user to input by the authentication prompting interface Biological information, specifically includes following steps:The input instruction is parsed to determine corresponding character information;Judge the character information whether with preset characters information matches;When judging the character information with the preset characters information matches, authentication prompting circle is generated according to the input instruction Face.
- 6. the calling control system of input method process according to claim 5, it is characterised in that specified obtaining user Before the input instruction of the input method process of the application program of type, further include:Creating includes the prompting list of editable application program;Selection instruction according to user to any application program in the prompting list, determines the corresponding institute of the selection instruction State the application program that any application program is the specified type.
- 7. the calling control system of the input method process according to claim 5 or 6, it is characterised in that further include:When judging that the biological information is mismatched with default biological information, prompt message is sent,Wherein, the prompt message includes at least one of acoustics prompt message, optical cue information and vibration prompting information.
- A kind of 8. terminal, it is characterised in that including:The calling control of input method process as any one of claim 5 to 7 System processed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510703821.6A CN105373743B (en) | 2015-10-23 | 2015-10-23 | The calling control method of input method process, call control system and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510703821.6A CN105373743B (en) | 2015-10-23 | 2015-10-23 | The calling control method of input method process, call control system and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105373743A CN105373743A (en) | 2016-03-02 |
CN105373743B true CN105373743B (en) | 2018-05-15 |
Family
ID=55375931
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510703821.6A Active CN105373743B (en) | 2015-10-23 | 2015-10-23 | The calling control method of input method process, call control system and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105373743B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106485172A (en) * | 2016-11-23 | 2017-03-08 | 深圳市金立通信设备有限公司 | A kind of cipher code protection method and terminal |
CN108932068A (en) * | 2018-06-30 | 2018-12-04 | 珠海市魅族科技有限公司 | A kind of input method application method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101894232A (en) * | 2010-07-26 | 2010-11-24 | 深圳市永达电子股份有限公司 | Safe input method applied to identity authentication and input terminal |
CN102073810A (en) * | 2010-12-06 | 2011-05-25 | 上海合合信息科技发展有限公司 | Method for integrating account management function in input method software |
CN104573485A (en) * | 2014-12-31 | 2015-04-29 | 广东欧珀移动通信有限公司 | Method and device for starting terminal application |
-
2015
- 2015-10-23 CN CN201510703821.6A patent/CN105373743B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101894232A (en) * | 2010-07-26 | 2010-11-24 | 深圳市永达电子股份有限公司 | Safe input method applied to identity authentication and input terminal |
CN102073810A (en) * | 2010-12-06 | 2011-05-25 | 上海合合信息科技发展有限公司 | Method for integrating account management function in input method software |
CN104573485A (en) * | 2014-12-31 | 2015-04-29 | 广东欧珀移动通信有限公司 | Method and device for starting terminal application |
Also Published As
Publication number | Publication date |
---|---|
CN105373743A (en) | 2016-03-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105631275B (en) | information display method, information display device and terminal | |
US8082448B2 (en) | System and method for user authentication using non-language words | |
US8396711B2 (en) | Voice authentication system and method | |
KR101438869B1 (en) | Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data | |
CN105138882B (en) | A kind of terminal unlock method and device | |
WO2016110002A1 (en) | Screen interface unlocking method and screen interface unlocking device | |
US20030074201A1 (en) | Continuous authentication of the identity of a speaker | |
US20150088760A1 (en) | Automatic injection of security confirmation | |
CN108510290B (en) | Customer information amending method, device, computer equipment and storage medium in call | |
CN107533598B (en) | Input method and device of login password of application program and terminal | |
CN109085975A (en) | Screenshotss method, apparatus, storage medium and electronic device | |
CN102543084A (en) | Online voiceprint recognition system and implementation method thereof | |
CN104820805B (en) | A kind of method and device of subscriber identification card information theft-preventing | |
CN106156575A (en) | A kind of user interface control method and terminal | |
EP1460513B1 (en) | Apparatus and method for preventing unauthorized use of an information processing device | |
CN105072249A (en) | Method and device of preventing mobile device from being stolen, and corresponding mobile device | |
CN104142796A (en) | Unlocking method of terminal and terminal | |
CN107644172A (en) | The guard method of content displaying and device | |
US11182466B2 (en) | User authentication apparatus and recording media | |
CN108074577A (en) | Identity identifying method and identity authorization system | |
CN108038361A (en) | Dual system recognition methods, mobile terminal and storage medium based on vocal print | |
CN105373743B (en) | The calling control method of input method process, call control system and terminal | |
CN107147499A (en) | The method and system verified using phonetic entry | |
CN107068149A (en) | unlocking method and device | |
CN107786566A (en) | Method for protecting privacy, system, server and receiving terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20231219 Address after: 518000 floor 21, block a, Kupai building, intersection of Keyuan Avenue and Baoshen Road, north high tech Zone, songpingshan community, Xili street, Nanshan District, Shenzhen, Guangdong Patentee after: YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) Co.,Ltd. Address before: 523000 Dongguan Songshan Lake Hi-tech Industrial Development Zone, Guangdong Province Patentee before: DONGGUAN COOLPAD SOFTWARE TECH Co.,Ltd. |
|
TR01 | Transfer of patent right |