CN105512542B - Data inputting method and device - Google Patents
Data inputting method and device Download PDFInfo
- Publication number
- CN105512542B CN105512542B CN201510917294.9A CN201510917294A CN105512542B CN 105512542 B CN105512542 B CN 105512542B CN 201510917294 A CN201510917294 A CN 201510917294A CN 105512542 B CN105512542 B CN 105512542B
- Authority
- CN
- China
- Prior art keywords
- terminal
- request
- information
- target information
- sent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
Abstract
The disclosure is directed to data inputting method and devices.This method includes:It monitors whether to receive the trigger action for obtaining target information;When receiving trigger action, the request source for controlling first terminal sends information acquisition request to second terminal, and information acquisition request is used for the target information that acquisition request second terminal receives;Receive the target information that second terminal is sent;Target information is input in corresponding input area.Pass through the technical solution, when receiving trigger action, can automatically information acquisition request be sent to second terminal, to obtain the target information that the second terminal is obtained according to the trigger action, and the target information is automatically inputted into corresponding input area, to avoid the currently used user of first terminal from being checked by manual labor and obtain the target information in second terminal, then the target information is manually input to the input area, user is greatly facilitated, and can the target information be input to the input area as soon as possible.
Description
Technical field
This disclosure relates to information technology field more particularly to data inputting method and device.
Background technology
Currently, when the webpage of computer such as registers, pays at the operations, prompt user can be usually shown on webpage by user
It is clicked to obtain the window of identifying code, and after the window that user clicks the acquisition identifying code, identifying code will be sent to
In phone number input by user or the phone number bound before, and after mobile phone receives the identifying code, user needs
Then the identifying code bowed in seeing the mobile phone comes back and inputs the identifying code in the corresponding region in webpage again, could be in the webpage
The operations such as middle completion registration, payment, it is seen then that whole operation process flow is too cumbersome, and user experience is very bad.
Invention content
The embodiment of the present disclosure provides data inputting method and device.The technical solution is as follows:
According to the first aspect of the embodiments of the present disclosure, a kind of data inputting method is provided, including:
It monitors whether to receive the trigger action for obtaining target information;
When receiving the trigger action, the request source for controlling first terminal is asked to second terminal transmission acquisition of information
It asks, described information obtains request and is used for the target information that second terminal receives described in acquisition request;
Receive the target information that the second terminal is sent;
The target information is input in corresponding input area.
In one embodiment, the target information is identifying code or password.
In one embodiment, when the target information is identifying code, it includes that short message is monitored that described information, which obtains request,
Request;
The short message monitors request, is used to indicate the short message that the second terminal begins listening for receiving, from described
Judgement includes the target message information of identifying code in short message, and identifying code is extracted from the target message information.
In one embodiment, described information obtains the request source mark that request further includes first terminal;
The request source of the first terminal identifies, for when the second terminal extracts the identifying code, for described
Second terminal determines whether the identifying code being sent to the first terminal according to the request source of first terminal mark
Request source.
In one embodiment, when the target information is password, it includes that password acquisition is asked that described information, which obtains request,
It asks;
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the
The request source of one terminal.
In one embodiment, the request source of the first terminal includes:The application program installed in the first terminal
Or plug-in unit.
According to the second aspect of the embodiment of the present disclosure, another data inputting method is also provided, including:
The information acquisition request that the request source of first terminal is sent is received, described information obtains request and is used for acquisition request institute
State the target information that second terminal receives;
When receiving the target information, the target information is sent to the request source of the first terminal.
In one embodiment, the target information is identifying code or password.
In one embodiment, the target information is identifying code, and it includes that short message monitors request that described information, which obtains request,;
It is described that the target information is sent to the request source of the first terminal when receiving the target information,
Including:
It monitors described information and obtains the short message that the corresponding server of request is sent;
Judgement includes the target message information of identifying code from the short message;
The identifying code is extracted from the target message information, the identifying code is sent to the first terminal
Request source.
In one embodiment, described information obtains the request source mark that request further includes the first terminal;
The request source that the target information is sent to the first terminal, including:
In the identifying code in extracting the target message information for including the identifying code, according to the first terminal
Request source mark judges whether the request source that the identifying code is sent to the first terminal;
When judging result is to be, the identifying code is sent to the request source of the first terminal.
In one embodiment, the mark according to the application program judges whether the identifying code being sent to institute
Application program is stated, including:
The security level of the request source of the first terminal is identified according to the request source of first terminal mark;
Judge the security level whether higher than default security level;
When the security level is higher than default security level, the identifying code is sent to the first terminal by judgement
Request source;
When the security level is less than default security level, the identifying code is not sent to the first terminal by judgement
Request source.
In one embodiment, when the target information is password, it includes that password acquisition is asked that described information, which obtains request,
It asks,
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the
The request source of one terminal.
In one embodiment, the request source that the target information is sent to the first terminal, including:
The target information is forwarded to institute by the server being connected with the first terminal and the second terminal
First terminal is stated, the target information is transmitted to the request source of the first terminal by the first terminal;Or
The target information is logical by any one of WIFI, infrared, distance of near field wireless telecommunications, mobile data network
Letter mode is sent to the first terminal, and the target information is transmitted to the request of the first terminal by the first terminal
Source.
According to the third aspect of the embodiment of the present disclosure, a kind of message input device is provided, including:
Monitoring modular receives the trigger action for obtaining target information for monitoring whether;
Sending module, the request source for when receiving the trigger action, controlling first terminal are sent out to second terminal
Information acquisition request, described information is sent to obtain request and be used for the target information that second terminal receives described in acquisition request;
Receiving module, the target information sent for receiving the second terminal;
Input module, for the target information to be input in corresponding input area.
In one embodiment, the target information is identifying code or password.
In one embodiment, when the target information is identifying code, it includes that short message is monitored that described information, which obtains request,
Request;
The short message monitors request, is used to indicate the short message that the second terminal begins listening for receiving, from described
Judgement includes the target message information of identifying code in short message, and identifying code is extracted from the target message information.
In one embodiment, described information obtains the request source mark that request further includes the first terminal;
The request source of the first terminal identifies, for when the second terminal extracts the identifying code, for described
Second terminal determines whether the identifying code being sent to the first terminal according to the request source of first terminal mark
Request source.
In one embodiment, when the target information is password, it includes that password acquisition is asked that described information, which obtains request,
It asks;
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the
The request source of one terminal.
In one embodiment, the request source of the first terminal includes:The application program installed in the first terminal
Or plug-in unit.
According to the fourth aspect of the embodiment of the present disclosure, a kind of message input device is provided, including:
Receiving module, the information acquisition request for receiving the transmission of the request source in first terminal, described information acquisition are asked
Seek the target information received for second terminal described in acquisition request;
Sending module, for when receiving the target information, the target information to be sent to the first terminal
Request source.
In one embodiment, the target information is identifying code or password.
In one embodiment, the target information is identifying code, and it includes that short message monitors request that described information, which obtains request,;
The sending module includes:
First sending submodule obtains the short message that the corresponding server of request is sent for monitoring described information;
First judging submodule is used for the target message information that the judgement from the short message includes identifying code;
Extracting sub-module sends the identifying code for extracting the identifying code from the target message information
To the request source of the first terminal.
In one embodiment, described information obtains the request source mark that request further includes the first terminal;
The sending module further includes:
Second judgment submodule, for the identifying code in the target message information that extraction includes the identifying code
When, the request that the identifying code is sent to the first terminal is judged whether according to the request source of first terminal mark
Source;
Second sending submodule, for when judging result is to be, the identifying code to be sent to the first terminal
Request source.
In one embodiment, the second judgment submodule is additionally operable to:
The security level of the request source of the first terminal is identified according to the request source of first terminal mark;
Judge the security level whether higher than default security level;
When the security level is higher than default security level, the identifying code is sent to the first terminal by judgement
Request source;
When the security level is less than default security level, the identifying code is not sent to the first terminal by judgement
Request source.
In one embodiment, when the target information is password, it includes that password acquisition is asked that described information, which obtains request,
It asks,
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the
The request source of one terminal.
In one embodiment, the sending module further includes:
Forward submodule, for by the target information by being connected with the first terminal and the second terminal
Server is forwarded to the first terminal, and the target information is transmitted to the request of the first terminal by the first terminal
Source;Or
Third sending submodule, for the target information to be passed through WIFI, infrared, distance of near field wireless telecommunications, movement
Any one of data network communication mode is sent to the first terminal, is forwarded the target information by the first terminal
To the request source of the first terminal.
According to a fifth aspect of the embodiments of the present disclosure, a kind of message input device is provided, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
It monitors whether to receive the trigger action for obtaining target information;
When receiving the trigger action, the request source for controlling first terminal is asked to second terminal transmission acquisition of information
It asks, described information obtains request and is used for the target information that second terminal receives described in acquisition request;
Receive the target information that the second terminal is sent;
The target information is input in corresponding input area.
According to the 6th of the embodiment of the present disclosure the aspect, a kind of message input device is provided, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
The information acquisition request that the request source of the first terminal in first terminal is sent is received, described information obtains request and uses
The target information that the second terminal described in acquisition request receives;
When receiving the target information, the target information is sent to the request source of the first terminal.
The technical scheme provided by this disclosed embodiment can include the following benefits:
The technical scheme provided by this disclosed embodiment can be automatically to second terminal when receiving trigger action
Information acquisition request is sent, to obtain the target information that the second terminal is obtained according to the trigger action, and automatically should
Target information inputs corresponding input area, to avoid the currently used user of first terminal from checking and obtain by manual labor
The target information in second terminal is taken, the target information is manually then input to the input area, greatly facilitating makes
With the user of the first terminal, and can the target information be input to the input area as soon as possible, so that user can use up
Current operation is completed soon.
It should be understood that above general description and following detailed description is only exemplary and explanatory, not
The disclosure can be limited.
Description of the drawings
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure
Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is a kind of flow chart of data inputting method shown according to an exemplary embodiment.
Fig. 2 is the flow chart of another data inputting method shown according to an exemplary embodiment.
Fig. 3 is the flow chart according to another data inputting method shown in an exemplary embodiment one.
Fig. 4 is the flow chart according to another data inputting method shown in an exemplary embodiment one.
Fig. 5 is the flow chart according to another data inputting method shown in an exemplary embodiment one.
Fig. 6 is the flow chart according to another data inputting method shown in an exemplary embodiment one.
Fig. 7 is the flow chart according to another data inputting method shown in an exemplary embodiment one.
Fig. 8 is a kind of block diagram of message input device shown according to an exemplary embodiment.
Fig. 9 is the block diagram of another message input device shown according to an exemplary embodiment.
Figure 10 is the block diagram according to another message input device shown in an exemplary embodiment.
Figure 11 is the block diagram according to another message input device shown in an exemplary embodiment.
Figure 12 is the block diagram according to another message input device shown in an exemplary embodiment.
Figure 13 is the block diagram according to another message input device shown in an exemplary embodiment.
Figure 14 is according to the block diagram for being suitable for referring to message input device shown in an exemplary embodiment.
Specific implementation mode
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
Currently, user when the webpage of computer such as registers, pays at the operations, can usually show that prompt is used on webpage
Family is clicked to obtain the window of identifying code, and after the window that user clicks the acquisition identifying code, and identifying code will be sent
Into phone number input by user or the phone number bound before, and after mobile phone receives the identifying code, Yong Huxu
Then the identifying code bowed in seeing the mobile phone comes back and inputs the identifying code in the corresponding region in webpage again, could be in the net
The operations such as registration, payment are completed in page, it is seen then that whole operation process flow is too cumbersome, and user experience is very bad.
In order to solve the above-mentioned technical problem, the embodiment of the present disclosure provides a kind of data inputting method, and this method can be used for
In information input program, system or device, as shown in Figure 1, the method comprising the steps of S101-S104:
In step S101, monitor whether to receive the trigger action for obtaining target information;
The target information can be the request source of the first terminal current display interface in identifying code to be entered or
Password, and the trigger action is the operational motion that triggering generates the identifying code or password, can be click action, can also be cunning
Dynamic action or be some gesture, and the current display interface can be that the current display of the request source of the first terminal is paid
Interface, current register interface, the currently active interface etc., which need to input identifying code or password, could complete the interface of relevant operation,
Wherein, the request source of first terminal can be:The application program or plug-in unit installed in first terminal.
In step s 102, when receiving trigger action, information acquisition request is sent to second terminal, acquisition of information is asked
Seek the target information received for acquisition request second terminal;
The second terminal be mutually bound with the identifying code or password terminal (such as:Currently make when first terminal is user
When PC machine, which is exactly the personal mobile phone mutually bound with the identifying code or password), receiving trigger action
When, the identifying code or password needed for the active user using the first terminal can be sent to the second terminal, therefore, it is necessary to
Send the information acquisition request automatically to second terminal, it, can be certainly so that second terminal is when receiving the information acquisition request
It moves and the target information got is sent to first terminal in time.
In step s 103, the target information that second terminal is sent is received;
In step S104, target information is input in corresponding input area.
The request source of the first terminal in the first terminal receive the second terminal transmission the target information after,
Corresponding input area can be inputted automatically or by the other applications in first terminal by the target information, to keep away
The currently used user for exempting from first terminal checked by manual labor and obtains the target information in second terminal, then manually
The target information is input to the input area, greatly facilitates user, and can the target information be input to this as soon as possible
Input area, so that user can complete current operation as soon as possible.
In one embodiment, target information includes identifying code or password.
The identifying code can be random verification code and the password can be the password being randomly provided or be shown with current
The fixed password that the request source of the first terminal where interface is mutually bound, such as:Where current display interface this first
When the payment interface that the request source of terminal is Alipay, current display interface is Alipay, which is exactly the payment of Alipay
Password, the request source of the first terminal where current display interface be XX bank clients, current display interface be XX silver
When the payment interface of row client, which is exactly the payment cipher of XX bank cards.
In one embodiment, when target information is identifying code, information acquisition request is that short message monitors request;
Short message monitors request, is used to indicate the short message that second terminal begins listening for receiving, sentences from short message
Disconnected includes the target message information of identifying code, and identifying code is extracted from target message information.
Since identifying code is sent to second terminal in the form of short message, it is identifying code in the target information
When, which can be that short message monitors request, and the short message is monitored and asks to indicate that second terminal is begun listening for
The short message received, then according in the short message that listens to whether include N bit digitals or letter or
Simultaneously including number and letter, to judge whether the short message listened to is the target message information for including identifying code, such as
Fruit includes N bit digitals or letter or includes simultaneously number and letter, then judges that the short message is exactly the mesh for including identifying code
Mark short message, just automatically extract the identifying code in the target message information, then by the identifying code be sent to this
One terminal.
In one embodiment, information acquisition request further includes the request source mark of first terminal;
The request source of first terminal identifies, for when second terminal extracts identifying code, for second terminal according to first
The request source mark of terminal determines whether the request source that identifying code is sent to first terminal.
Since the request source security level of different first terminals is different, in order to prevent the request source of illegal first terminal or
The request source malice of the lower first terminal of person's security level, which obtains, is sent to the identifying code of second terminal, then can by this first
The request source mark of terminal is sent to the second terminal, and after the second terminal extracts the identifying code, so that it may with according to this
The request source mark of one terminal determines the security level of the request source of the first terminal whether higher than default security level, if high
Security level is preset in this, illustrates that the request source of the first terminal is the request source of the higher first terminal of security level, then may be used
The identifying code to be sent to the request source of the first terminal;, whereas if the security level of the request source of the first terminal is low
Security level is preset in this, illustrates that the request source of the first terminal is the request source of the lower first terminal of security level, in order to
It prevents the request source malice of the first terminal from obtaining the identifying code and carries out illegal operation, then the identifying code can not be sent to this
The request source of first terminal.
In one embodiment, when target information is password, information acquisition request includes that password obtains request;
Password obtains request, is used to indicate the request that the password of the input received is sent to first terminal by second terminal
Source.
When target information is password, the currently used user of usual first terminal, the currently used use with second terminal
Family is different, and the currently used user of first terminal is often desirable to remotely obtain the password, therefore, when target information is close
When code, which can be that password obtains request, to indicate password input by user that second terminal will receive
It is sent to the request source of the first terminal, so that the currently used user of first terminal is on the basis of knowing the password,
The password can be easily and quickly obtained, while ensuring the safety of the password.
In one embodiment, the request source of first terminal includes:The application program or plug-in unit installed in first terminal, example
Such as:The application program installed in first terminal can be payment application, bank client etc. in first terminal, and first eventually
Plug-in unit in end can be the plug-in unit of some webpage browsed in first terminal.
As shown in Fig. 2, the embodiment of the present disclosure also provides a kind of data inputting method, it is used for second terminal, including:
In step s 201, the information acquisition request that the request source of the first terminal in first terminal is sent, information are received
It obtains request and is used for the target information that acquisition request second terminal receives;
It, can be according to the information in the information acquisition request that the request source for the first terminal for receiving first terminal is sent
It obtains request and rapidly obtains the target informations such as password or identifying code that the second terminal receives automatically.
In step S202, when receiving target information, target information is sent to the request source of first terminal.
It, can be to avoid the currently used use of first terminal by the way that the target information to be sent to the request source of the first terminal
Family checked by manual labor and obtains the target information in second terminal, and it is defeated that the target information is manually then input to this
Enter region, greatly facilitates the currently used user of first terminal, and can the target information be passed through into first end as soon as possible
The request source or the other applications in first terminal at end are automatically entered to the input area, are enabled a user to the greatest extent
Current operation is completed soon.
In one embodiment, target information is identifying code or password.
The identifying code can be random verification code and the password can be the password being randomly provided or be shown with current
The fixed password that the request source of the first terminal where interface is mutually bound, such as:Where current display interface this first
When the payment interface that the request source of terminal is Alipay, current display interface is Alipay, which is exactly the payment of Alipay
Password, the request source of the first terminal where current display interface be XX bank clients, current display interface be XX silver
When the payment interface of row client, which is exactly the payment cipher of XX bank cards.
As shown in figure 3, in one embodiment, target information is identifying code, information acquisition request includes that short message monitoring is asked
It asks;
Since identifying code is sent to second terminal in the form of short message, it is identifying code in the target information
When, which can be that short message monitors request.
Above-mentioned steps S202 can be performed as:
In step A1, monitoring information obtains the short message that the corresponding server of request is sent;
In step A2, judgement includes the target message information of identifying code from short message;
In step A3, identifying code is extracted from target message information, identifying code is sent to the request of first terminal
Source.
When receiving short message monitoring request, the short message that can be arrived with monitoring reception then should according to what is listened to
Whether including N bit digitals or letter or simultaneously including number and letter in short message, to determine whether it includes testing to be
The target message information of code is demonstrate,proved, if including N bit digitals or letter or simultaneously including number and letter, judges that this is short
Letter is exactly the target message information for including identifying code, automatically extracts the identifying code in the target message information, then will
The identifying code is sent to the first terminal
As shown in figure 4, in one embodiment, information acquisition request further includes the request source mark of first terminal;
Above-mentioned steps S202 can be also performed as:
In step bl is determined, in the identifying code in extracting the target message information for including identifying code, according to first terminal
Request source mark judges whether the request source that identifying code is sent to first terminal;
In step B2, when judging result is to be, identifying code is sent to the request source of first terminal.
When extracting the identifying code, the request for determining the first terminal can be identified according to the request source of the first terminal
The security level in source whether higher than default security level, then accurately judge whether to need by the identifying code be sent to this first
The request source of terminal.
As shown in figure 5, in one embodiment, above-mentioned steps B1 can be performed as:
In step C1, the security level of the request source of identification first terminal is identified according to the request source of first terminal;The
Request source of the request source mark of one terminal for the unique mark first terminal, can be the name of the request source of the first terminal
Claim, number etc..
In step C2, judge security level whether higher than default security level;
In step C3, when security level is higher than default security level, identifying code is sent to first terminal by judgement
Request source;
In step C4, when security level is less than default security level, identifying code is not sent to first terminal by judgement
Request source.
When extracting the identifying code, the request for determining the first terminal can be identified according to the request source of the first terminal
If whether the security level in source higher than the default security level, illustrates the request of the first terminal higher than default security level
Source is the request source of the higher first terminal of security level, then the identifying code can be sent to the request source of the first terminal,
, whereas if the security level of the request source of the first terminal illustrates the request of the first terminal less than the default security level
Source is the request source of the lower first terminal of security level, and the request source malice of the first terminal obtains the identifying code in order to prevent
Illegal operation is carried out, then the identifying code can not be sent to the request source of the first terminal.
In one embodiment, when target information is password, information acquisition request includes that password obtains request;
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the
The request source of one terminal.
When target information is password, the currently used user of usual first terminal, the currently used use with second terminal
Family is different, and the currently used user of first terminal is often desirable to remotely obtain the password, therefore, when target information is close
When code, the information acquisition request are that password obtains request, which, which obtains request, can indicate the use that second terminal will receive
The password of family input is sent to the request source of the first terminal, so that the currently used user of first terminal is not knowing the password
On the basis of, the password can also be easily and quickly obtained, while ensuring the safety of the password.
As shown in fig. 6, in one embodiment, above-mentioned steps S202 can be performed as:
In step D1, target information is forwarded to first by the server being connected with first terminal and second terminal
Target information is sent to the request source of first terminal by first terminal by terminal;
When target information to be sent to the request source of the first terminal, which can be first sent to the service
Device, then by the server by the target information indirectly in go to the first terminal, with by the first terminal by the mesh
Mark information is forwarded to the request source of the first terminal.
Or
As shown in fig. 7, in one embodiment, above-mentioned steps S202 can be performed as:
In step d 2, target information is passed through in WIFI, infrared, distance of near field wireless telecommunications, mobile data network
Any communication mode is sent to first terminal, and target information is sent to the request source of first terminal by first terminal.
WIFI, infrared, distance of near field wireless telecommunications, mobile data network (cellular networks such as 2G, 3G, 4G) can also be passed through
Any one of communication mode the target information is sent directly to the first terminal, then further should by the first terminal
Target information is forwarded to the request source of the first terminal, to pass through other in the request source or first terminal of first terminal
Application program is inputted the corresponding region of current display interface, to complete relevant operation as early as possible.
The above- mentioned information input method that the corresponding embodiment of the present disclosure provides, the embodiment of the present disclosure also provide a kind of information input
Device, as shown in figure 8, the device includes:
Monitoring modular 801 is configured as monitoring whether to receive the trigger action for being configured as obtaining target information;
Sending module 802 is configured as when receiving the trigger action, controls the request source of first terminal to second
Terminal sends information acquisition request, and described information obtains request and is configured as the target that second terminal described in acquisition request receives
Information;
Receiving module 803 is configured as receiving the target information that the second terminal is sent;
Input module 804 is configured as the target information being input in corresponding input area.
In one embodiment, the target information is identifying code or password.
In one embodiment, when the target information is identifying code, it includes that short message is monitored that described information, which obtains request,
Request;
The short message monitors request, is configured as indicating the short message that the second terminal begins listening for receiving, from
Judgement includes the target message information of identifying code in the short message, and identifying code is extracted from the target message information.
In one embodiment, described information obtains the request source mark that request further includes the first terminal;
The request source of the first terminal identifies, and is configured as when the second terminal extracts the identifying code, supplies
The second terminal determines whether the identifying code being sent to described first eventually according to the request source of first terminal mark
The request source at end.
In one embodiment, when the target information is password, it includes that password acquisition is asked that described information, which obtains request,
It asks;
The password obtains request, is configured as indicating that the password of the input received is sent to institute by the second terminal
State the request source of first terminal.
In one embodiment, the request source of the first terminal includes:The application program installed in the first terminal
Or plug-in unit.
The embodiment of the present disclosure also provides another message input device, as shown in figure 9, the device includes:
Receiving module 901, the acquisition of information for being configured as receiving the request source transmission of the first terminal in first terminal are asked
It asks, described information obtains request and is configured as the target information that second terminal described in acquisition request receives;
Sending module 902 is configured as when receiving the target information, and the target information is sent to described
The request source of one terminal.
In one embodiment, the target information is identifying code or password.
As shown in Figure 10, in one embodiment, the target information is identifying code, and it includes short that described information, which obtains request,
Letter monitors request;
The sending module 902 includes:
First sending submodule 9021 is configured to listen for described information and obtains the short of the corresponding server transmission of request
Letter information;
First judging submodule 9022 is configured as the target message letter that the judgement from the short message includes identifying code
Breath;
Extracting sub-module 9023 is configured as extracting the identifying code from the target message information, be tested described
Card code is sent to the request source of the first terminal.
As shown in figure 11, in one embodiment, described information obtains the request source that request further includes the first terminal
Mark;
The sending module 902 further includes:
Second judgment submodule 9024, be configured as extraction include the identifying code target message information in described in
When identifying code, judge whether the identifying code being sent to the first terminal according to the request source of first terminal mark
Request source;
Second sending submodule 9025 is configured as, when judging result is to be, the identifying code being sent to described the
The request source of one terminal.
In one embodiment, the second judgment submodule 9024 is additionally configured to:
The security level of the request source of the first terminal is identified according to the request source of first terminal mark;
Judge the security level whether higher than default security level;
When the security level is higher than default security level, the identifying code is sent to the first terminal by judgement
Request source;
When the security level is less than default security level, the identifying code is not sent to the first terminal by judgement
Request source.
In one embodiment, when the target information is password, it includes that password acquisition is asked that described information, which obtains request,
It asks;
When the target information is password, it includes that password obtains request that described information, which obtains request,
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the
The request source of one terminal.
As shown in figure 12, in one embodiment, the sending module 902 further includes:
Third sending submodule 9026, be configured as by the target information by with the first terminal and described second
The server that terminal is connected is forwarded to the first terminal, and the target information is sent to described by the first terminal
The request source of one terminal;Or
As shown in figure 13, in one embodiment, the sending module 902 further includes:
4th sending submodule 9027 is configured as the target information passing through WIFI, infrared, distance of near field channel radio
News, any one of mobile data network communication mode are sent to the first terminal, by the first terminal by the target
Information is transmitted to the request source of the first terminal.
According to a fifth aspect of the embodiments of the present disclosure, a kind of message input device is provided, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, processor is configured as:
It monitors whether to receive the trigger action for obtaining target information;
When receiving the trigger action, the request source for controlling first terminal is asked to second terminal transmission acquisition of information
It asks, described information obtains request and is used for the target information that second terminal receives described in acquisition request;
Receive the target information that the second terminal is sent;
The target information is input in corresponding input area.
Above-mentioned processor is also configured to:
The target information is identifying code or password.
Above-mentioned processor is also configured to:
When the target information is identifying code, it includes that short message monitors request that described information, which obtains request,;
The short message monitors request, is used to indicate the short message that the second terminal begins listening for receiving, from described
Judgement includes the target message information of identifying code in short message, and identifying code is extracted from the target message information.
Above-mentioned processor is also configured to:
Described information obtains the request source mark that request further includes first terminal;
The request source of the first terminal identifies, for when the second terminal extracts the identifying code, for described
Second terminal determines whether the identifying code being sent to the first terminal according to the request source of first terminal mark
Request source.
Above-mentioned processor is also configured to:
When the target information is password, it includes that password obtains request that described information, which obtains request,;
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the
The request source of one terminal.
Above-mentioned processor is also configured to:
The request source of the first terminal includes:The application program or plug-in unit installed in the first terminal.
According to the 6th of the embodiment of the present disclosure the aspect, a kind of message input device is provided, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, processor is configured as:
The information acquisition request that the request source of first terminal is sent is received, described information obtains request and is used for acquisition request institute
State the target information that second terminal receives;
When receiving the target information, the target information is sent to the request source of the first terminal.
Above-mentioned processor is also configured to:
The target information is identifying code or password.
Above-mentioned processor is also configured to:
The target information is identifying code, and it includes that short message monitors request that described information, which obtains request,;
It is described that the target information is sent to the request source of the first terminal when receiving the target information,
Including:
It monitors described information and obtains the short message that the corresponding server of request is sent;
Judgement includes the target message information of identifying code from the short message;
The identifying code is extracted from the target message information, the identifying code is sent to the first terminal
Request source.
Above-mentioned processor is also configured to:
Described information obtains the request source mark that request further includes the first terminal;
The request source that the target information is sent to the first terminal, including:
In the identifying code in extracting the target message information for including the identifying code, according to the first terminal
Request source mark judges whether the request source that the identifying code is sent to the first terminal;
When judging result is to be, the identifying code is sent to the request source of the first terminal.
Above-mentioned processor is also configured to:
The mark according to the application program judges whether the identifying code being sent to the application program, wrap
It includes:
The security level of the request source of the first terminal is identified according to the request source of first terminal mark;
Judge the security level whether higher than default security level;
When the security level is higher than default security level, the identifying code is sent to the first terminal by judgement
Request source;
When the security level is less than default security level, the identifying code is not sent to the first terminal by judgement
Request source.
Above-mentioned processor is also configured to:
When the target information is password, it includes that password obtains request that described information, which obtains request,
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the
The request source of one terminal.
Above-mentioned processor is also configured to:
The request source that the target information is sent to the first terminal, including:
The target information is forwarded to institute by the server being connected with the first terminal and the second terminal
First terminal is stated, the target information is transmitted to the request source of the first terminal by the first terminal;Or
The target information is logical by any one of WIFI, infrared, distance of near field wireless telecommunications, mobile data network
Letter mode is sent to the first terminal, and the target information is transmitted to the request of the first terminal by the first terminal
Source.
Figure 14 is a kind of block diagram for message input device 1400 shown according to an exemplary embodiment, and the device is suitable
For terminal device.For example, device 1400 can be mobile phone, and computer, digital broadcast terminal, messaging devices, trip
Play console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..
Referring to Fig.1 4, device 1400 may include with next or at least two components:Processing component 1402, memory
1404, power supply module 1406, multimedia component 1408, audio component 1410, the interface 1414 of input/output (I/O), sensor
Component 1414 and communication component 1416.
The integrated operation of 1402 usual control device 1400 of processing component, such as with display, call, data communication,
Camera operation and record operate associated operation.Processing component 1402 may include one or at least two processors 1420
It executes instruction, to perform all or part of the steps of the methods described above.In addition, processing component 1402 may include one or at least
Two modules, convenient for the interaction between processing component 1402 and other assemblies.For example, processing component 1402 may include multimedia
Module, to facilitate the interaction between multimedia component 1408 and processing component 1402.
Memory 1404 is configured as storing various types of data to support the operation in equipment 1400.These data
Example includes the instruction for any storage object or method that are operated on device 1400, contact data, telephone book data,
Message, picture, video etc..Memory 1404 can by any kind of volatibility or non-volatile memory device or they
Combination is realized, such as static RAM (SRAM), electrically erasable programmable read-only memory (EEPROM), it is erasable can
Program read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory
Reservoir, disk or CD.
Electric power assembly 1406 provides electric power for the various assemblies of device 1400.Electric power assembly 1406 may include power management
System, one or at least two power supplys and other generated with for device 1400, management and the associated component of distribution electric power.
Multimedia component 1408 is included in the screen of one output interface of offer between described device 1400 and user.
In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel,
Screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes that one or at least two touch
Sensor is touched to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or cunning
The boundary of action, but also detect duration and pressure associated with the touch or slide operation.In some embodiments
In, multimedia component 1408 includes a front camera and/or rear camera.When equipment 1400 is in operation mode, such as
When screening-mode or video mode, front camera and/or rear camera can receive external multi-medium data.Before each
It sets camera and rear camera can be a fixed optical lens system or have a focusing and optical zoom capabilities.
Audio component 1410 is configured as output and/or input audio signal.For example, audio component 1410 includes a wheat
Gram wind (MIC), when device 1400 is in operation mode, when such as call model, logging mode and speech recognition mode, microphone quilt
It is configured to receive external audio signal.The received audio signal can be further stored in memory 1404 or via communication
Component 1416 is sent.In some embodiments, audio component 1410 further includes a loud speaker, is used for exports audio signal.
I/O interfaces 1414 provide interface, above-mentioned peripheral interface module between processing component 1402 and peripheral interface module
Can be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and
Locking press button.
Sensor module 1414 includes one or at least two sensors, the shape for providing various aspects for device 1400
State is assessed.For example, sensor module 1414 can detect the state that opens/closes of equipment 1400, the relative positioning of component, example
Such as the display and keypad that the component is device 1400, sensor module 1414 can be with detection device 1400 or device
The position change of 1400 1 components, the existence or non-existence that user contacts with device 1400,1400 orientation of device or acceleration/subtract
The temperature change of speed and device 1400.Sensor module 1414 may include proximity sensor, be configured to not any
Physical contact when detect the presence of nearby objects.Sensor module 1414 can also include optical sensor, as CMOS or CCD schemes
As sensor, for being used in imaging applications.In some embodiments, which can also include acceleration
Sensor, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 1416 is configured to facilitate the communication of wired or wireless way between device 1400 and other equipment.Dress
The wireless network based on communication standard, such as WiFi can be accessed by setting 1400,2G or 3G or combination thereof.It is exemplary at one
In embodiment, communication component 1416 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel
Information.In one exemplary embodiment, the communication component 1416 further includes near-field communication (NFC) module, to promote short distance
Communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module
(UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 1400 can by one or at least two application specific integrated circuits (ASIC),
Digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field-programmable gate array
It arranges (FPGA), controller, microcontroller, microprocessor or other electronic building bricks to realize, for executing the above method.
In the exemplary embodiment, it includes the non-transitorycomputer readable storage medium instructed, example to additionally provide a kind of
Such as include the memory 1404 of instruction, above-metioned instruction can be executed by the processor 1420 of device 1400 to complete the above method.Example
Such as, the non-transitorycomputer readable storage medium can be ROM, it is random access memory (RAM), CD-ROM, tape, soft
Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by above-mentioned apparatus 1400
When processor executes so that above-mentioned apparatus 1400 is able to carry out a kind of data inputting method, including:
It monitors whether to receive the trigger action for obtaining target information;
When receiving the trigger action, the request source for controlling first terminal is asked to second terminal transmission acquisition of information
It asks, described information obtains request and is used for the target information that second terminal receives described in acquisition request;
Receive the target information that the second terminal is sent;
The target information is input in corresponding input area.
In one embodiment, the target information is identifying code or password.
In one embodiment, when the target information is identifying code, it includes that short message is monitored that described information, which obtains request,
Request;
The short message monitors request, is used to indicate the short message that the second terminal begins listening for receiving, from described
Judgement includes the target message information of identifying code in short message, and identifying code is extracted from the target message information.
In one embodiment, described information obtains the request source mark that request further includes first terminal;
The request source of the first terminal identifies, for when the second terminal extracts the identifying code, for described
Second terminal determines whether the identifying code being sent to the first terminal according to the request source of first terminal mark
Request source.
In one embodiment, when the target information is password, it includes that password acquisition is asked that described information, which obtains request,
It asks;
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the
The request source of one terminal.
In one embodiment, the request source of the first terminal includes:The application program installed in the first terminal
Or plug-in unit.
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by above-mentioned apparatus 1400
When processor executes so that above-mentioned apparatus 1400 can also execute another data inputting method, including:
The information acquisition request that the request source of first terminal is sent is received, described information obtains request and is used for acquisition request institute
State the target information that second terminal receives;
When receiving the target information, the target information is sent to the request source of the first terminal.
In one embodiment, the target information is identifying code or password.
In one embodiment, the target information is identifying code, and it includes that short message monitors request that described information, which obtains request,;
It is described that the target information is sent to the request source of the first terminal when receiving the target information,
Including:
It monitors described information and obtains the short message that the corresponding server of request is sent;
Judgement includes the target message information of identifying code from the short message;
The identifying code is extracted from the target message information, the identifying code is sent to the first terminal
Request source.
In one embodiment, described information obtains the request source mark that request further includes the first terminal;
The request source that the target information is sent to the first terminal, including:
In the identifying code in extracting the target message information for including the identifying code, according to the first terminal
Request source mark judges whether the request source that the identifying code is sent to the first terminal;
When judging result is to be, the identifying code is sent to the request source of the first terminal.
In one embodiment, the mark according to the application program judges whether the identifying code being sent to institute
Application program is stated, including:
The security level of the request source of the first terminal is identified according to the request source of first terminal mark;
Judge the security level whether higher than default security level;
When the security level is higher than default security level, the identifying code is sent to the first terminal by judgement
Request source;
When the security level is less than default security level, the identifying code is not sent to the first terminal by judgement
Request source.
In one embodiment, when the target information is password, it includes that password acquisition is asked that described information, which obtains request,
It asks,
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the
The request source of one terminal.
In one embodiment, the request source that the target information is sent to the first terminal, including:
The target information is forwarded to institute by the server being connected with the first terminal and the second terminal
First terminal is stated, the target information is transmitted to the request source of the first terminal by the first terminal;Or
The target information is logical by any one of WIFI, infrared, distance of near field wireless telecommunications, mobile data network
Letter mode is sent to the first terminal, and the target information is transmitted to the request of the first terminal by the first terminal
Source.
Those skilled in the art will readily occur to its of the disclosure after considering specification and putting into practice disclosure disclosed herein
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or
Person's adaptive change follows the general principles of this disclosure and includes the undocumented common knowledge in the art of the disclosure
Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following
Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.
Claims (28)
1. a kind of data inputting method is used for first terminal, which is characterized in that including:
It monitors whether to receive the trigger action for obtaining target information;
When receiving the trigger action, the request source for controlling first terminal sends information acquisition request, institute to second terminal
It states information acquisition request and is used for the target information that second terminal receives described in acquisition request;
Receive the target information that the second terminal is sent;
The target information is input in corresponding input area;
The request source of the first terminal includes:The application program or plug-in unit installed in the first terminal.
2. according to the method described in claim 1, it is characterized in that, the target information is identifying code or password.
3. method according to claim 1 or 2, which is characterized in that
When the target information is identifying code, it includes that short message monitors request that described information, which obtains request,;
The short message monitors request, the short message that the second terminal begins listening for receiving is used to indicate, from the short message
Judgement includes the target message information of identifying code in information, and identifying code is extracted from the target message information.
4. according to the method described in claim 3, it is characterized in that,
Described information obtains the request source mark that request further includes first terminal;
The request source of the first terminal identifies, for when the second terminal extracts the identifying code, for described second
Terminal determines whether the request that the identifying code is sent to the first terminal according to the request source of first terminal mark
Source.
5. method according to claim 1 or 2, which is characterized in that
When the target information is password, it includes that password obtains request that described information, which obtains request,;
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described first eventually
The request source at end.
6. a kind of data inputting method is used for second terminal, which is characterized in that including:
Receive the information acquisition request that the request source of first terminal is sent, described information obtains request for described in acquisition request the
The target information that two terminals receive;
When receiving the target information, the target information is sent to the request source of the first terminal, described first
The request source of terminal includes:The application program or plug-in unit installed in the first terminal.
7. according to the method described in claim 6, it is characterized in that,
The target information is identifying code or password.
8. the method according to the description of claim 7 is characterized in that
The target information is identifying code, and it includes that short message monitors request that described information, which obtains request,;
It is described that the target information is sent to the request source of the first terminal when receiving the target information, including:
It monitors described information and obtains the short message that the corresponding server of request is sent;
Judgement includes the target message information of identifying code from the short message;
The identifying code is extracted from the target message information, the identifying code is sent to the request of the first terminal
Source.
9. according to the method described in claim 8, it is characterized in that,
Described information obtains the mark that request further includes the request source of the first terminal;
The request source that the target information is sent to the first terminal, including:
In the identifying code in extracting the target message information for including the identifying code, according to the request of the first terminal
The mark in source judges whether the request source that the identifying code is sent to the first terminal;
When judging result is to be, the identifying code is sent to the request source of the first terminal.
10. according to the method described in claim 9, it is characterized in that,
The mark of the request source according to the first terminal judges whether the identifying code being sent to the application program,
Including:
The security level of the request source of the first terminal is identified according to the mark of the request source of the first terminal;
Judge the security level whether higher than default security level;
When the security level is higher than default security level, the identifying code is sent to the request of the first terminal by judgement
Source;
When the security level is less than default security level, the identifying code is not sent to asking for the first terminal by judgement
Ask source.
11. the method according to the description of claim 7 is characterized in that
When the target information is password, it includes that password obtains request that described information, which obtains request,
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described first eventually
The request source at end.
12. the method according to any one of claim 6 to 11, which is characterized in that
The request source that the target information is sent to the first terminal, including:
The target information is forwarded to described by the server being connected with the first terminal and the second terminal
The target information is sent to the request source of the first terminal by the first terminal by one terminal;Or
The target information is passed through into any one of WIFI, infrared, distance of near field wireless telecommunications, mobile data network communication party
Formula is sent to the first terminal, and the target information is sent to the request source of the first terminal by the first terminal.
13. a kind of message input device is used for first terminal, which is characterized in that including:
Monitoring modular receives the trigger action for obtaining target information for monitoring whether;
Sending module, the request source for when receiving the trigger action, controlling first terminal is sent to second terminal to be believed
Breath obtains request, and described information obtains the target information for asking to receive for second terminal described in acquisition request;
Receiving module, the target information sent for receiving the second terminal;
Input module, for the target information to be input in corresponding input area, the request source packet of the first terminal
It includes:The application program or plug-in unit installed in the first terminal.
14. device according to claim 13, which is characterized in that the target information is identifying code or password.
15. the device according to claim 13 or 14, which is characterized in that
When the target information is identifying code, it includes that short message monitors request that described information, which obtains request,;
The short message monitors request, the short message that the second terminal begins listening for receiving is used to indicate, from the short message
Judgement includes the target message information of identifying code in information, and identifying code is extracted from the target message information.
16. device according to claim 15, which is characterized in that
Described information obtains the request source mark that request further includes the first terminal;
The request source of the first terminal identifies, for when the second terminal extracts the identifying code, for described second
Terminal determines whether the request that the identifying code is sent to the first terminal according to the request source of first terminal mark
Source.
17. the device according to claim 13 or 14, which is characterized in that
When the target information is password, it includes that password obtains request that described information, which obtains request,;
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described first eventually
The request source at end.
18. a kind of message input device is used for second terminal, which is characterized in that including:
Receiving module, the information acquisition request for receiving the transmission of the request source in first terminal, described information obtain request and use
The target information that the second terminal described in acquisition request receives;
Sending module, for when receiving the target information, the target information to be sent to asking for the first terminal
The source, the request source of the first terminal is asked to include:The application program or plug-in unit installed in the first terminal.
19. device according to claim 18, which is characterized in that
The target information is identifying code or password.
20. device according to claim 19, which is characterized in that
The target information is identifying code, and it includes that short message monitors request that described information, which obtains request,;
The sending module includes:
First sending submodule obtains the short message that the corresponding server of request is sent for monitoring described information;
First judging submodule is used for the target message information that the judgement from the short message includes identifying code;
The identifying code is sent to institute by extracting sub-module for extracting the identifying code from the target message information
State the request source of first terminal.
21. device according to claim 20, which is characterized in that
Described information obtains the request source mark that request further includes the first terminal;
The sending module further includes:
Second judgment submodule is used in the identifying code in extracting the target message information for including the identifying code, root
Judge whether the request source that the identifying code is sent to the first terminal according to the request source mark of the first terminal;
Second sending submodule, for when judging result is to be, the identifying code to be sent to the request of the first terminal
Source.
22. device according to claim 21, which is characterized in that
The second judgment submodule is additionally operable to:
The security level of the request source of the first terminal is identified according to the request source of first terminal mark;
Judge the security level whether higher than default security level;
When the security level is higher than default security level, the identifying code is sent to the request of the first terminal by judgement
Source;
When the security level is less than default security level, the identifying code is not sent to asking for the first terminal by judgement
Ask source.
23. device according to claim 19, which is characterized in that
When the target information is password, it includes that password obtains request that described information, which obtains request,
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described first eventually
The request source at end.
24. the device according to any one of claim 18 to 23, which is characterized in that
The sending module further includes:
Third sending submodule, for by the target information by being connected with the first terminal and the second terminal
Server is forwarded to the first terminal, and the target information is transmitted to the request of the first terminal by the first terminal
Source;Or
4th sending submodule, for the target information to be passed through WIFI, infrared, distance of near field wireless telecommunications, mobile data
Any one of network communication mode is sent to the first terminal, and the target information is transmitted to institute by the first terminal
State the request source of first terminal.
25. a kind of message input device, which is characterized in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
It monitors whether to receive the trigger action for obtaining target information;
When receiving the trigger action, the request source for controlling first terminal sends information acquisition request, institute to second terminal
It states information acquisition request and is used for the target information that second terminal receives described in acquisition request;
Receive the target information that the second terminal is sent;
The target information is input in corresponding input area, the request source of the first terminal includes:Described first eventually
The application program or plug-in unit installed in end.
26. a kind of message input device, which is characterized in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
The information acquisition request that the request source of the first terminal in first terminal is sent is received, described information obtains request for asking
It asks and obtains the target information that second terminal receives;
When receiving the target information, the target information is sent to the request source of the first terminal, described first
The request source of terminal includes:The application program or plug-in unit installed in the first terminal.
27. a kind of non-transitorycomputer readable storage medium, is stored thereon with computer instruction, which is characterized in that the finger
The step of any one of claim 1 to 5 the method is realized when order is executed by processor.
28. a kind of non-transitorycomputer readable storage medium, is stored thereon with computer instruction, which is characterized in that the finger
The step of any one of claim 6 to 12 the method is realized when order is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510917294.9A CN105512542B (en) | 2015-12-10 | 2015-12-10 | Data inputting method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510917294.9A CN105512542B (en) | 2015-12-10 | 2015-12-10 | Data inputting method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105512542A CN105512542A (en) | 2016-04-20 |
CN105512542B true CN105512542B (en) | 2018-09-04 |
Family
ID=55720517
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510917294.9A Active CN105512542B (en) | 2015-12-10 | 2015-12-10 | Data inputting method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105512542B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106130998A (en) * | 2016-06-30 | 2016-11-16 | 珠海市魅族科技有限公司 | A kind of identifying code transmission method and device |
CN109510797A (en) * | 2017-09-14 | 2019-03-22 | 中兴通讯股份有限公司 | Message forwarding method, system, server and computer readable storage medium |
CN111866885A (en) * | 2020-06-09 | 2020-10-30 | 维沃移动通信有限公司 | Verification information sharing method and device and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013150492A1 (en) * | 2012-04-05 | 2013-10-10 | Thakker Mitesh L | Systems and methods to input or access data using remote submitting mechanism |
CN104469714A (en) * | 2014-11-28 | 2015-03-25 | 小米科技有限责任公司 | Short message sending method and device |
CN104954383A (en) * | 2015-06-24 | 2015-09-30 | 深圳市兰丁科技有限公司 | Application program login method and system |
CN105049607A (en) * | 2015-06-24 | 2015-11-11 | 广东欧珀移动通信有限公司 | Text message display method and mobile terminal |
-
2015
- 2015-12-10 CN CN201510917294.9A patent/CN105512542B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013150492A1 (en) * | 2012-04-05 | 2013-10-10 | Thakker Mitesh L | Systems and methods to input or access data using remote submitting mechanism |
CN104469714A (en) * | 2014-11-28 | 2015-03-25 | 小米科技有限责任公司 | Short message sending method and device |
CN104954383A (en) * | 2015-06-24 | 2015-09-30 | 深圳市兰丁科技有限公司 | Application program login method and system |
CN105049607A (en) * | 2015-06-24 | 2015-11-11 | 广东欧珀移动通信有限公司 | Text message display method and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN105512542A (en) | 2016-04-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104936304B (en) | Smart machine binding method, smart machine and server | |
CN104318741B (en) | Bluetooth equipment control method and device | |
CN104270404B (en) | A kind of login method and device based on terminal iidentification | |
EP3151507A1 (en) | Methods and apparatuses for controlling device | |
CN104703252B (en) | Terminal device accesses the method and device of wireless network | |
EP3179397A1 (en) | Methods and devices for managing automatic parallel login and logout in several applications | |
CN104933351A (en) | Information security processing method and information security processing device | |
CN106792953A (en) | The method and apparatus of network switching | |
CN106375096B (en) | short message verification method and device | |
CN105095366B (en) | Word message treating method and apparatus | |
CN105100061B (en) | Network address kidnaps the method and device of detection | |
CN104506443A (en) | Router setting interface display method and device | |
CN105072079A (en) | Account logon method, account logon device and terminal device | |
CN104717622A (en) | Information forwarding method and device, terminal and server | |
CN104735670A (en) | Network access method and device | |
CN105323244A (en) | Method and device for network identification | |
EP3113051A1 (en) | Method and apparatus for acquiring search results, computer program and recording medium | |
CN104899501A (en) | Dialog list display method and device and terminal | |
CN108112089A (en) | Accidental access method, device and non-transitorycomputer readable storage medium | |
CN104063654A (en) | Monitoring method and device for application program | |
CN105512542B (en) | Data inputting method and device | |
CN109560986A (en) | Test method, device and the test macro of things-internet gateway equipment | |
CN104539497B (en) | Method for connecting network and device | |
CN107070707B (en) | Method and device for determining initialization mode of router | |
CN105991626A (en) | Network access method and network access device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |