CN105512542B - Data inputting method and device - Google Patents

Data inputting method and device Download PDF

Info

Publication number
CN105512542B
CN105512542B CN201510917294.9A CN201510917294A CN105512542B CN 105512542 B CN105512542 B CN 105512542B CN 201510917294 A CN201510917294 A CN 201510917294A CN 105512542 B CN105512542 B CN 105512542B
Authority
CN
China
Prior art keywords
terminal
request
information
target information
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510917294.9A
Other languages
Chinese (zh)
Other versions
CN105512542A (en
Inventor
冯智勇
张鹏飞
夏勇峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510917294.9A priority Critical patent/CN105512542B/en
Publication of CN105512542A publication Critical patent/CN105512542A/en
Application granted granted Critical
Publication of CN105512542B publication Critical patent/CN105512542B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly

Abstract

The disclosure is directed to data inputting method and devices.This method includes:It monitors whether to receive the trigger action for obtaining target information;When receiving trigger action, the request source for controlling first terminal sends information acquisition request to second terminal, and information acquisition request is used for the target information that acquisition request second terminal receives;Receive the target information that second terminal is sent;Target information is input in corresponding input area.Pass through the technical solution, when receiving trigger action, can automatically information acquisition request be sent to second terminal, to obtain the target information that the second terminal is obtained according to the trigger action, and the target information is automatically inputted into corresponding input area, to avoid the currently used user of first terminal from being checked by manual labor and obtain the target information in second terminal, then the target information is manually input to the input area, user is greatly facilitated, and can the target information be input to the input area as soon as possible.

Description

Data inputting method and device
Technical field
This disclosure relates to information technology field more particularly to data inputting method and device.
Background technology
Currently, when the webpage of computer such as registers, pays at the operations, prompt user can be usually shown on webpage by user It is clicked to obtain the window of identifying code, and after the window that user clicks the acquisition identifying code, identifying code will be sent to In phone number input by user or the phone number bound before, and after mobile phone receives the identifying code, user needs Then the identifying code bowed in seeing the mobile phone comes back and inputs the identifying code in the corresponding region in webpage again, could be in the webpage The operations such as middle completion registration, payment, it is seen then that whole operation process flow is too cumbersome, and user experience is very bad.
Invention content
The embodiment of the present disclosure provides data inputting method and device.The technical solution is as follows:
According to the first aspect of the embodiments of the present disclosure, a kind of data inputting method is provided, including:
It monitors whether to receive the trigger action for obtaining target information;
When receiving the trigger action, the request source for controlling first terminal is asked to second terminal transmission acquisition of information It asks, described information obtains request and is used for the target information that second terminal receives described in acquisition request;
Receive the target information that the second terminal is sent;
The target information is input in corresponding input area.
In one embodiment, the target information is identifying code or password.
In one embodiment, when the target information is identifying code, it includes that short message is monitored that described information, which obtains request, Request;
The short message monitors request, is used to indicate the short message that the second terminal begins listening for receiving, from described Judgement includes the target message information of identifying code in short message, and identifying code is extracted from the target message information.
In one embodiment, described information obtains the request source mark that request further includes first terminal;
The request source of the first terminal identifies, for when the second terminal extracts the identifying code, for described Second terminal determines whether the identifying code being sent to the first terminal according to the request source of first terminal mark Request source.
In one embodiment, when the target information is password, it includes that password acquisition is asked that described information, which obtains request, It asks;
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the The request source of one terminal.
In one embodiment, the request source of the first terminal includes:The application program installed in the first terminal Or plug-in unit.
According to the second aspect of the embodiment of the present disclosure, another data inputting method is also provided, including:
The information acquisition request that the request source of first terminal is sent is received, described information obtains request and is used for acquisition request institute State the target information that second terminal receives;
When receiving the target information, the target information is sent to the request source of the first terminal.
In one embodiment, the target information is identifying code or password.
In one embodiment, the target information is identifying code, and it includes that short message monitors request that described information, which obtains request,;
It is described that the target information is sent to the request source of the first terminal when receiving the target information, Including:
It monitors described information and obtains the short message that the corresponding server of request is sent;
Judgement includes the target message information of identifying code from the short message;
The identifying code is extracted from the target message information, the identifying code is sent to the first terminal Request source.
In one embodiment, described information obtains the request source mark that request further includes the first terminal;
The request source that the target information is sent to the first terminal, including:
In the identifying code in extracting the target message information for including the identifying code, according to the first terminal Request source mark judges whether the request source that the identifying code is sent to the first terminal;
When judging result is to be, the identifying code is sent to the request source of the first terminal.
In one embodiment, the mark according to the application program judges whether the identifying code being sent to institute Application program is stated, including:
The security level of the request source of the first terminal is identified according to the request source of first terminal mark;
Judge the security level whether higher than default security level;
When the security level is higher than default security level, the identifying code is sent to the first terminal by judgement Request source;
When the security level is less than default security level, the identifying code is not sent to the first terminal by judgement Request source.
In one embodiment, when the target information is password, it includes that password acquisition is asked that described information, which obtains request, It asks,
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the The request source of one terminal.
In one embodiment, the request source that the target information is sent to the first terminal, including:
The target information is forwarded to institute by the server being connected with the first terminal and the second terminal First terminal is stated, the target information is transmitted to the request source of the first terminal by the first terminal;Or
The target information is logical by any one of WIFI, infrared, distance of near field wireless telecommunications, mobile data network Letter mode is sent to the first terminal, and the target information is transmitted to the request of the first terminal by the first terminal Source.
According to the third aspect of the embodiment of the present disclosure, a kind of message input device is provided, including:
Monitoring modular receives the trigger action for obtaining target information for monitoring whether;
Sending module, the request source for when receiving the trigger action, controlling first terminal are sent out to second terminal Information acquisition request, described information is sent to obtain request and be used for the target information that second terminal receives described in acquisition request;
Receiving module, the target information sent for receiving the second terminal;
Input module, for the target information to be input in corresponding input area.
In one embodiment, the target information is identifying code or password.
In one embodiment, when the target information is identifying code, it includes that short message is monitored that described information, which obtains request, Request;
The short message monitors request, is used to indicate the short message that the second terminal begins listening for receiving, from described Judgement includes the target message information of identifying code in short message, and identifying code is extracted from the target message information.
In one embodiment, described information obtains the request source mark that request further includes the first terminal;
The request source of the first terminal identifies, for when the second terminal extracts the identifying code, for described Second terminal determines whether the identifying code being sent to the first terminal according to the request source of first terminal mark Request source.
In one embodiment, when the target information is password, it includes that password acquisition is asked that described information, which obtains request, It asks;
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the The request source of one terminal.
In one embodiment, the request source of the first terminal includes:The application program installed in the first terminal Or plug-in unit.
According to the fourth aspect of the embodiment of the present disclosure, a kind of message input device is provided, including:
Receiving module, the information acquisition request for receiving the transmission of the request source in first terminal, described information acquisition are asked Seek the target information received for second terminal described in acquisition request;
Sending module, for when receiving the target information, the target information to be sent to the first terminal Request source.
In one embodiment, the target information is identifying code or password.
In one embodiment, the target information is identifying code, and it includes that short message monitors request that described information, which obtains request,;
The sending module includes:
First sending submodule obtains the short message that the corresponding server of request is sent for monitoring described information;
First judging submodule is used for the target message information that the judgement from the short message includes identifying code;
Extracting sub-module sends the identifying code for extracting the identifying code from the target message information To the request source of the first terminal.
In one embodiment, described information obtains the request source mark that request further includes the first terminal;
The sending module further includes:
Second judgment submodule, for the identifying code in the target message information that extraction includes the identifying code When, the request that the identifying code is sent to the first terminal is judged whether according to the request source of first terminal mark Source;
Second sending submodule, for when judging result is to be, the identifying code to be sent to the first terminal Request source.
In one embodiment, the second judgment submodule is additionally operable to:
The security level of the request source of the first terminal is identified according to the request source of first terminal mark;
Judge the security level whether higher than default security level;
When the security level is higher than default security level, the identifying code is sent to the first terminal by judgement Request source;
When the security level is less than default security level, the identifying code is not sent to the first terminal by judgement Request source.
In one embodiment, when the target information is password, it includes that password acquisition is asked that described information, which obtains request, It asks,
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the The request source of one terminal.
In one embodiment, the sending module further includes:
Forward submodule, for by the target information by being connected with the first terminal and the second terminal Server is forwarded to the first terminal, and the target information is transmitted to the request of the first terminal by the first terminal Source;Or
Third sending submodule, for the target information to be passed through WIFI, infrared, distance of near field wireless telecommunications, movement Any one of data network communication mode is sent to the first terminal, is forwarded the target information by the first terminal To the request source of the first terminal.
According to a fifth aspect of the embodiments of the present disclosure, a kind of message input device is provided, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
It monitors whether to receive the trigger action for obtaining target information;
When receiving the trigger action, the request source for controlling first terminal is asked to second terminal transmission acquisition of information It asks, described information obtains request and is used for the target information that second terminal receives described in acquisition request;
Receive the target information that the second terminal is sent;
The target information is input in corresponding input area.
According to the 6th of the embodiment of the present disclosure the aspect, a kind of message input device is provided, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
The information acquisition request that the request source of the first terminal in first terminal is sent is received, described information obtains request and uses The target information that the second terminal described in acquisition request receives;
When receiving the target information, the target information is sent to the request source of the first terminal.
The technical scheme provided by this disclosed embodiment can include the following benefits:
The technical scheme provided by this disclosed embodiment can be automatically to second terminal when receiving trigger action Information acquisition request is sent, to obtain the target information that the second terminal is obtained according to the trigger action, and automatically should Target information inputs corresponding input area, to avoid the currently used user of first terminal from checking and obtain by manual labor The target information in second terminal is taken, the target information is manually then input to the input area, greatly facilitating makes With the user of the first terminal, and can the target information be input to the input area as soon as possible, so that user can use up Current operation is completed soon.
It should be understood that above general description and following detailed description is only exemplary and explanatory, not The disclosure can be limited.
Description of the drawings
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is a kind of flow chart of data inputting method shown according to an exemplary embodiment.
Fig. 2 is the flow chart of another data inputting method shown according to an exemplary embodiment.
Fig. 3 is the flow chart according to another data inputting method shown in an exemplary embodiment one.
Fig. 4 is the flow chart according to another data inputting method shown in an exemplary embodiment one.
Fig. 5 is the flow chart according to another data inputting method shown in an exemplary embodiment one.
Fig. 6 is the flow chart according to another data inputting method shown in an exemplary embodiment one.
Fig. 7 is the flow chart according to another data inputting method shown in an exemplary embodiment one.
Fig. 8 is a kind of block diagram of message input device shown according to an exemplary embodiment.
Fig. 9 is the block diagram of another message input device shown according to an exemplary embodiment.
Figure 10 is the block diagram according to another message input device shown in an exemplary embodiment.
Figure 11 is the block diagram according to another message input device shown in an exemplary embodiment.
Figure 12 is the block diagram according to another message input device shown in an exemplary embodiment.
Figure 13 is the block diagram according to another message input device shown in an exemplary embodiment.
Figure 14 is according to the block diagram for being suitable for referring to message input device shown in an exemplary embodiment.
Specific implementation mode
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
Currently, user when the webpage of computer such as registers, pays at the operations, can usually show that prompt is used on webpage Family is clicked to obtain the window of identifying code, and after the window that user clicks the acquisition identifying code, and identifying code will be sent Into phone number input by user or the phone number bound before, and after mobile phone receives the identifying code, Yong Huxu Then the identifying code bowed in seeing the mobile phone comes back and inputs the identifying code in the corresponding region in webpage again, could be in the net The operations such as registration, payment are completed in page, it is seen then that whole operation process flow is too cumbersome, and user experience is very bad.
In order to solve the above-mentioned technical problem, the embodiment of the present disclosure provides a kind of data inputting method, and this method can be used for In information input program, system or device, as shown in Figure 1, the method comprising the steps of S101-S104:
In step S101, monitor whether to receive the trigger action for obtaining target information;
The target information can be the request source of the first terminal current display interface in identifying code to be entered or Password, and the trigger action is the operational motion that triggering generates the identifying code or password, can be click action, can also be cunning Dynamic action or be some gesture, and the current display interface can be that the current display of the request source of the first terminal is paid Interface, current register interface, the currently active interface etc., which need to input identifying code or password, could complete the interface of relevant operation, Wherein, the request source of first terminal can be:The application program or plug-in unit installed in first terminal.
In step s 102, when receiving trigger action, information acquisition request is sent to second terminal, acquisition of information is asked Seek the target information received for acquisition request second terminal;
The second terminal be mutually bound with the identifying code or password terminal (such as:Currently make when first terminal is user When PC machine, which is exactly the personal mobile phone mutually bound with the identifying code or password), receiving trigger action When, the identifying code or password needed for the active user using the first terminal can be sent to the second terminal, therefore, it is necessary to Send the information acquisition request automatically to second terminal, it, can be certainly so that second terminal is when receiving the information acquisition request It moves and the target information got is sent to first terminal in time.
In step s 103, the target information that second terminal is sent is received;
In step S104, target information is input in corresponding input area.
The request source of the first terminal in the first terminal receive the second terminal transmission the target information after, Corresponding input area can be inputted automatically or by the other applications in first terminal by the target information, to keep away The currently used user for exempting from first terminal checked by manual labor and obtains the target information in second terminal, then manually The target information is input to the input area, greatly facilitates user, and can the target information be input to this as soon as possible Input area, so that user can complete current operation as soon as possible.
In one embodiment, target information includes identifying code or password.
The identifying code can be random verification code and the password can be the password being randomly provided or be shown with current The fixed password that the request source of the first terminal where interface is mutually bound, such as:Where current display interface this first When the payment interface that the request source of terminal is Alipay, current display interface is Alipay, which is exactly the payment of Alipay Password, the request source of the first terminal where current display interface be XX bank clients, current display interface be XX silver When the payment interface of row client, which is exactly the payment cipher of XX bank cards.
In one embodiment, when target information is identifying code, information acquisition request is that short message monitors request;
Short message monitors request, is used to indicate the short message that second terminal begins listening for receiving, sentences from short message Disconnected includes the target message information of identifying code, and identifying code is extracted from target message information.
Since identifying code is sent to second terminal in the form of short message, it is identifying code in the target information When, which can be that short message monitors request, and the short message is monitored and asks to indicate that second terminal is begun listening for The short message received, then according in the short message that listens to whether include N bit digitals or letter or Simultaneously including number and letter, to judge whether the short message listened to is the target message information for including identifying code, such as Fruit includes N bit digitals or letter or includes simultaneously number and letter, then judges that the short message is exactly the mesh for including identifying code Mark short message, just automatically extract the identifying code in the target message information, then by the identifying code be sent to this One terminal.
In one embodiment, information acquisition request further includes the request source mark of first terminal;
The request source of first terminal identifies, for when second terminal extracts identifying code, for second terminal according to first The request source mark of terminal determines whether the request source that identifying code is sent to first terminal.
Since the request source security level of different first terminals is different, in order to prevent the request source of illegal first terminal or The request source malice of the lower first terminal of person's security level, which obtains, is sent to the identifying code of second terminal, then can by this first The request source mark of terminal is sent to the second terminal, and after the second terminal extracts the identifying code, so that it may with according to this The request source mark of one terminal determines the security level of the request source of the first terminal whether higher than default security level, if high Security level is preset in this, illustrates that the request source of the first terminal is the request source of the higher first terminal of security level, then may be used The identifying code to be sent to the request source of the first terminal;, whereas if the security level of the request source of the first terminal is low Security level is preset in this, illustrates that the request source of the first terminal is the request source of the lower first terminal of security level, in order to It prevents the request source malice of the first terminal from obtaining the identifying code and carries out illegal operation, then the identifying code can not be sent to this The request source of first terminal.
In one embodiment, when target information is password, information acquisition request includes that password obtains request;
Password obtains request, is used to indicate the request that the password of the input received is sent to first terminal by second terminal Source.
When target information is password, the currently used user of usual first terminal, the currently used use with second terminal Family is different, and the currently used user of first terminal is often desirable to remotely obtain the password, therefore, when target information is close When code, which can be that password obtains request, to indicate password input by user that second terminal will receive It is sent to the request source of the first terminal, so that the currently used user of first terminal is on the basis of knowing the password, The password can be easily and quickly obtained, while ensuring the safety of the password.
In one embodiment, the request source of first terminal includes:The application program or plug-in unit installed in first terminal, example Such as:The application program installed in first terminal can be payment application, bank client etc. in first terminal, and first eventually Plug-in unit in end can be the plug-in unit of some webpage browsed in first terminal.
As shown in Fig. 2, the embodiment of the present disclosure also provides a kind of data inputting method, it is used for second terminal, including:
In step s 201, the information acquisition request that the request source of the first terminal in first terminal is sent, information are received It obtains request and is used for the target information that acquisition request second terminal receives;
It, can be according to the information in the information acquisition request that the request source for the first terminal for receiving first terminal is sent It obtains request and rapidly obtains the target informations such as password or identifying code that the second terminal receives automatically.
In step S202, when receiving target information, target information is sent to the request source of first terminal.
It, can be to avoid the currently used use of first terminal by the way that the target information to be sent to the request source of the first terminal Family checked by manual labor and obtains the target information in second terminal, and it is defeated that the target information is manually then input to this Enter region, greatly facilitates the currently used user of first terminal, and can the target information be passed through into first end as soon as possible The request source or the other applications in first terminal at end are automatically entered to the input area, are enabled a user to the greatest extent Current operation is completed soon.
In one embodiment, target information is identifying code or password.
The identifying code can be random verification code and the password can be the password being randomly provided or be shown with current The fixed password that the request source of the first terminal where interface is mutually bound, such as:Where current display interface this first When the payment interface that the request source of terminal is Alipay, current display interface is Alipay, which is exactly the payment of Alipay Password, the request source of the first terminal where current display interface be XX bank clients, current display interface be XX silver When the payment interface of row client, which is exactly the payment cipher of XX bank cards.
As shown in figure 3, in one embodiment, target information is identifying code, information acquisition request includes that short message monitoring is asked It asks;
Since identifying code is sent to second terminal in the form of short message, it is identifying code in the target information When, which can be that short message monitors request.
Above-mentioned steps S202 can be performed as:
In step A1, monitoring information obtains the short message that the corresponding server of request is sent;
In step A2, judgement includes the target message information of identifying code from short message;
In step A3, identifying code is extracted from target message information, identifying code is sent to the request of first terminal Source.
When receiving short message monitoring request, the short message that can be arrived with monitoring reception then should according to what is listened to Whether including N bit digitals or letter or simultaneously including number and letter in short message, to determine whether it includes testing to be The target message information of code is demonstrate,proved, if including N bit digitals or letter or simultaneously including number and letter, judges that this is short Letter is exactly the target message information for including identifying code, automatically extracts the identifying code in the target message information, then will The identifying code is sent to the first terminal
As shown in figure 4, in one embodiment, information acquisition request further includes the request source mark of first terminal;
Above-mentioned steps S202 can be also performed as:
In step bl is determined, in the identifying code in extracting the target message information for including identifying code, according to first terminal Request source mark judges whether the request source that identifying code is sent to first terminal;
In step B2, when judging result is to be, identifying code is sent to the request source of first terminal.
When extracting the identifying code, the request for determining the first terminal can be identified according to the request source of the first terminal The security level in source whether higher than default security level, then accurately judge whether to need by the identifying code be sent to this first The request source of terminal.
As shown in figure 5, in one embodiment, above-mentioned steps B1 can be performed as:
In step C1, the security level of the request source of identification first terminal is identified according to the request source of first terminal;The Request source of the request source mark of one terminal for the unique mark first terminal, can be the name of the request source of the first terminal Claim, number etc..
In step C2, judge security level whether higher than default security level;
In step C3, when security level is higher than default security level, identifying code is sent to first terminal by judgement Request source;
In step C4, when security level is less than default security level, identifying code is not sent to first terminal by judgement Request source.
When extracting the identifying code, the request for determining the first terminal can be identified according to the request source of the first terminal If whether the security level in source higher than the default security level, illustrates the request of the first terminal higher than default security level Source is the request source of the higher first terminal of security level, then the identifying code can be sent to the request source of the first terminal, , whereas if the security level of the request source of the first terminal illustrates the request of the first terminal less than the default security level Source is the request source of the lower first terminal of security level, and the request source malice of the first terminal obtains the identifying code in order to prevent Illegal operation is carried out, then the identifying code can not be sent to the request source of the first terminal.
In one embodiment, when target information is password, information acquisition request includes that password obtains request;
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the The request source of one terminal.
When target information is password, the currently used user of usual first terminal, the currently used use with second terminal Family is different, and the currently used user of first terminal is often desirable to remotely obtain the password, therefore, when target information is close When code, the information acquisition request are that password obtains request, which, which obtains request, can indicate the use that second terminal will receive The password of family input is sent to the request source of the first terminal, so that the currently used user of first terminal is not knowing the password On the basis of, the password can also be easily and quickly obtained, while ensuring the safety of the password.
As shown in fig. 6, in one embodiment, above-mentioned steps S202 can be performed as:
In step D1, target information is forwarded to first by the server being connected with first terminal and second terminal Target information is sent to the request source of first terminal by first terminal by terminal;
When target information to be sent to the request source of the first terminal, which can be first sent to the service Device, then by the server by the target information indirectly in go to the first terminal, with by the first terminal by the mesh Mark information is forwarded to the request source of the first terminal.
Or
As shown in fig. 7, in one embodiment, above-mentioned steps S202 can be performed as:
In step d 2, target information is passed through in WIFI, infrared, distance of near field wireless telecommunications, mobile data network Any communication mode is sent to first terminal, and target information is sent to the request source of first terminal by first terminal.
WIFI, infrared, distance of near field wireless telecommunications, mobile data network (cellular networks such as 2G, 3G, 4G) can also be passed through Any one of communication mode the target information is sent directly to the first terminal, then further should by the first terminal Target information is forwarded to the request source of the first terminal, to pass through other in the request source or first terminal of first terminal Application program is inputted the corresponding region of current display interface, to complete relevant operation as early as possible.
The above- mentioned information input method that the corresponding embodiment of the present disclosure provides, the embodiment of the present disclosure also provide a kind of information input Device, as shown in figure 8, the device includes:
Monitoring modular 801 is configured as monitoring whether to receive the trigger action for being configured as obtaining target information;
Sending module 802 is configured as when receiving the trigger action, controls the request source of first terminal to second Terminal sends information acquisition request, and described information obtains request and is configured as the target that second terminal described in acquisition request receives Information;
Receiving module 803 is configured as receiving the target information that the second terminal is sent;
Input module 804 is configured as the target information being input in corresponding input area.
In one embodiment, the target information is identifying code or password.
In one embodiment, when the target information is identifying code, it includes that short message is monitored that described information, which obtains request, Request;
The short message monitors request, is configured as indicating the short message that the second terminal begins listening for receiving, from Judgement includes the target message information of identifying code in the short message, and identifying code is extracted from the target message information.
In one embodiment, described information obtains the request source mark that request further includes the first terminal;
The request source of the first terminal identifies, and is configured as when the second terminal extracts the identifying code, supplies The second terminal determines whether the identifying code being sent to described first eventually according to the request source of first terminal mark The request source at end.
In one embodiment, when the target information is password, it includes that password acquisition is asked that described information, which obtains request, It asks;
The password obtains request, is configured as indicating that the password of the input received is sent to institute by the second terminal State the request source of first terminal.
In one embodiment, the request source of the first terminal includes:The application program installed in the first terminal Or plug-in unit.
The embodiment of the present disclosure also provides another message input device, as shown in figure 9, the device includes:
Receiving module 901, the acquisition of information for being configured as receiving the request source transmission of the first terminal in first terminal are asked It asks, described information obtains request and is configured as the target information that second terminal described in acquisition request receives;
Sending module 902 is configured as when receiving the target information, and the target information is sent to described The request source of one terminal.
In one embodiment, the target information is identifying code or password.
As shown in Figure 10, in one embodiment, the target information is identifying code, and it includes short that described information, which obtains request, Letter monitors request;
The sending module 902 includes:
First sending submodule 9021 is configured to listen for described information and obtains the short of the corresponding server transmission of request Letter information;
First judging submodule 9022 is configured as the target message letter that the judgement from the short message includes identifying code Breath;
Extracting sub-module 9023 is configured as extracting the identifying code from the target message information, be tested described Card code is sent to the request source of the first terminal.
As shown in figure 11, in one embodiment, described information obtains the request source that request further includes the first terminal Mark;
The sending module 902 further includes:
Second judgment submodule 9024, be configured as extraction include the identifying code target message information in described in When identifying code, judge whether the identifying code being sent to the first terminal according to the request source of first terminal mark Request source;
Second sending submodule 9025 is configured as, when judging result is to be, the identifying code being sent to described the The request source of one terminal.
In one embodiment, the second judgment submodule 9024 is additionally configured to:
The security level of the request source of the first terminal is identified according to the request source of first terminal mark;
Judge the security level whether higher than default security level;
When the security level is higher than default security level, the identifying code is sent to the first terminal by judgement Request source;
When the security level is less than default security level, the identifying code is not sent to the first terminal by judgement Request source.
In one embodiment, when the target information is password, it includes that password acquisition is asked that described information, which obtains request, It asks;
When the target information is password, it includes that password obtains request that described information, which obtains request,
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the The request source of one terminal.
As shown in figure 12, in one embodiment, the sending module 902 further includes:
Third sending submodule 9026, be configured as by the target information by with the first terminal and described second The server that terminal is connected is forwarded to the first terminal, and the target information is sent to described by the first terminal The request source of one terminal;Or
As shown in figure 13, in one embodiment, the sending module 902 further includes:
4th sending submodule 9027 is configured as the target information passing through WIFI, infrared, distance of near field channel radio News, any one of mobile data network communication mode are sent to the first terminal, by the first terminal by the target Information is transmitted to the request source of the first terminal.
According to a fifth aspect of the embodiments of the present disclosure, a kind of message input device is provided, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, processor is configured as:
It monitors whether to receive the trigger action for obtaining target information;
When receiving the trigger action, the request source for controlling first terminal is asked to second terminal transmission acquisition of information It asks, described information obtains request and is used for the target information that second terminal receives described in acquisition request;
Receive the target information that the second terminal is sent;
The target information is input in corresponding input area.
Above-mentioned processor is also configured to:
The target information is identifying code or password.
Above-mentioned processor is also configured to:
When the target information is identifying code, it includes that short message monitors request that described information, which obtains request,;
The short message monitors request, is used to indicate the short message that the second terminal begins listening for receiving, from described Judgement includes the target message information of identifying code in short message, and identifying code is extracted from the target message information.
Above-mentioned processor is also configured to:
Described information obtains the request source mark that request further includes first terminal;
The request source of the first terminal identifies, for when the second terminal extracts the identifying code, for described Second terminal determines whether the identifying code being sent to the first terminal according to the request source of first terminal mark Request source.
Above-mentioned processor is also configured to:
When the target information is password, it includes that password obtains request that described information, which obtains request,;
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the The request source of one terminal.
Above-mentioned processor is also configured to:
The request source of the first terminal includes:The application program or plug-in unit installed in the first terminal.
According to the 6th of the embodiment of the present disclosure the aspect, a kind of message input device is provided, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, processor is configured as:
The information acquisition request that the request source of first terminal is sent is received, described information obtains request and is used for acquisition request institute State the target information that second terminal receives;
When receiving the target information, the target information is sent to the request source of the first terminal.
Above-mentioned processor is also configured to:
The target information is identifying code or password.
Above-mentioned processor is also configured to:
The target information is identifying code, and it includes that short message monitors request that described information, which obtains request,;
It is described that the target information is sent to the request source of the first terminal when receiving the target information, Including:
It monitors described information and obtains the short message that the corresponding server of request is sent;
Judgement includes the target message information of identifying code from the short message;
The identifying code is extracted from the target message information, the identifying code is sent to the first terminal Request source.
Above-mentioned processor is also configured to:
Described information obtains the request source mark that request further includes the first terminal;
The request source that the target information is sent to the first terminal, including:
In the identifying code in extracting the target message information for including the identifying code, according to the first terminal Request source mark judges whether the request source that the identifying code is sent to the first terminal;
When judging result is to be, the identifying code is sent to the request source of the first terminal.
Above-mentioned processor is also configured to:
The mark according to the application program judges whether the identifying code being sent to the application program, wrap It includes:
The security level of the request source of the first terminal is identified according to the request source of first terminal mark;
Judge the security level whether higher than default security level;
When the security level is higher than default security level, the identifying code is sent to the first terminal by judgement Request source;
When the security level is less than default security level, the identifying code is not sent to the first terminal by judgement Request source.
Above-mentioned processor is also configured to:
When the target information is password, it includes that password obtains request that described information, which obtains request,
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the The request source of one terminal.
Above-mentioned processor is also configured to:
The request source that the target information is sent to the first terminal, including:
The target information is forwarded to institute by the server being connected with the first terminal and the second terminal First terminal is stated, the target information is transmitted to the request source of the first terminal by the first terminal;Or
The target information is logical by any one of WIFI, infrared, distance of near field wireless telecommunications, mobile data network Letter mode is sent to the first terminal, and the target information is transmitted to the request of the first terminal by the first terminal Source.
Figure 14 is a kind of block diagram for message input device 1400 shown according to an exemplary embodiment, and the device is suitable For terminal device.For example, device 1400 can be mobile phone, and computer, digital broadcast terminal, messaging devices, trip Play console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..
Referring to Fig.1 4, device 1400 may include with next or at least two components:Processing component 1402, memory 1404, power supply module 1406, multimedia component 1408, audio component 1410, the interface 1414 of input/output (I/O), sensor Component 1414 and communication component 1416.
The integrated operation of 1402 usual control device 1400 of processing component, such as with display, call, data communication, Camera operation and record operate associated operation.Processing component 1402 may include one or at least two processors 1420 It executes instruction, to perform all or part of the steps of the methods described above.In addition, processing component 1402 may include one or at least Two modules, convenient for the interaction between processing component 1402 and other assemblies.For example, processing component 1402 may include multimedia Module, to facilitate the interaction between multimedia component 1408 and processing component 1402.
Memory 1404 is configured as storing various types of data to support the operation in equipment 1400.These data Example includes the instruction for any storage object or method that are operated on device 1400, contact data, telephone book data, Message, picture, video etc..Memory 1404 can by any kind of volatibility or non-volatile memory device or they Combination is realized, such as static RAM (SRAM), electrically erasable programmable read-only memory (EEPROM), it is erasable can Program read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory Reservoir, disk or CD.
Electric power assembly 1406 provides electric power for the various assemblies of device 1400.Electric power assembly 1406 may include power management System, one or at least two power supplys and other generated with for device 1400, management and the associated component of distribution electric power.
Multimedia component 1408 is included in the screen of one output interface of offer between described device 1400 and user. In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, Screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes that one or at least two touch Sensor is touched to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or cunning The boundary of action, but also detect duration and pressure associated with the touch or slide operation.In some embodiments In, multimedia component 1408 includes a front camera and/or rear camera.When equipment 1400 is in operation mode, such as When screening-mode or video mode, front camera and/or rear camera can receive external multi-medium data.Before each It sets camera and rear camera can be a fixed optical lens system or have a focusing and optical zoom capabilities.
Audio component 1410 is configured as output and/or input audio signal.For example, audio component 1410 includes a wheat Gram wind (MIC), when device 1400 is in operation mode, when such as call model, logging mode and speech recognition mode, microphone quilt It is configured to receive external audio signal.The received audio signal can be further stored in memory 1404 or via communication Component 1416 is sent.In some embodiments, audio component 1410 further includes a loud speaker, is used for exports audio signal.
I/O interfaces 1414 provide interface, above-mentioned peripheral interface module between processing component 1402 and peripheral interface module Can be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and Locking press button.
Sensor module 1414 includes one or at least two sensors, the shape for providing various aspects for device 1400 State is assessed.For example, sensor module 1414 can detect the state that opens/closes of equipment 1400, the relative positioning of component, example Such as the display and keypad that the component is device 1400, sensor module 1414 can be with detection device 1400 or device The position change of 1400 1 components, the existence or non-existence that user contacts with device 1400,1400 orientation of device or acceleration/subtract The temperature change of speed and device 1400.Sensor module 1414 may include proximity sensor, be configured to not any Physical contact when detect the presence of nearby objects.Sensor module 1414 can also include optical sensor, as CMOS or CCD schemes As sensor, for being used in imaging applications.In some embodiments, which can also include acceleration Sensor, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 1416 is configured to facilitate the communication of wired or wireless way between device 1400 and other equipment.Dress The wireless network based on communication standard, such as WiFi can be accessed by setting 1400,2G or 3G or combination thereof.It is exemplary at one In embodiment, communication component 1416 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel Information.In one exemplary embodiment, the communication component 1416 further includes near-field communication (NFC) module, to promote short distance Communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 1400 can by one or at least two application specific integrated circuits (ASIC), Digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field-programmable gate array It arranges (FPGA), controller, microcontroller, microprocessor or other electronic building bricks to realize, for executing the above method.
In the exemplary embodiment, it includes the non-transitorycomputer readable storage medium instructed, example to additionally provide a kind of Such as include the memory 1404 of instruction, above-metioned instruction can be executed by the processor 1420 of device 1400 to complete the above method.Example Such as, the non-transitorycomputer readable storage medium can be ROM, it is random access memory (RAM), CD-ROM, tape, soft Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by above-mentioned apparatus 1400 When processor executes so that above-mentioned apparatus 1400 is able to carry out a kind of data inputting method, including:
It monitors whether to receive the trigger action for obtaining target information;
When receiving the trigger action, the request source for controlling first terminal is asked to second terminal transmission acquisition of information It asks, described information obtains request and is used for the target information that second terminal receives described in acquisition request;
Receive the target information that the second terminal is sent;
The target information is input in corresponding input area.
In one embodiment, the target information is identifying code or password.
In one embodiment, when the target information is identifying code, it includes that short message is monitored that described information, which obtains request, Request;
The short message monitors request, is used to indicate the short message that the second terminal begins listening for receiving, from described Judgement includes the target message information of identifying code in short message, and identifying code is extracted from the target message information.
In one embodiment, described information obtains the request source mark that request further includes first terminal;
The request source of the first terminal identifies, for when the second terminal extracts the identifying code, for described Second terminal determines whether the identifying code being sent to the first terminal according to the request source of first terminal mark Request source.
In one embodiment, when the target information is password, it includes that password acquisition is asked that described information, which obtains request, It asks;
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the The request source of one terminal.
In one embodiment, the request source of the first terminal includes:The application program installed in the first terminal Or plug-in unit.
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by above-mentioned apparatus 1400 When processor executes so that above-mentioned apparatus 1400 can also execute another data inputting method, including:
The information acquisition request that the request source of first terminal is sent is received, described information obtains request and is used for acquisition request institute State the target information that second terminal receives;
When receiving the target information, the target information is sent to the request source of the first terminal.
In one embodiment, the target information is identifying code or password.
In one embodiment, the target information is identifying code, and it includes that short message monitors request that described information, which obtains request,;
It is described that the target information is sent to the request source of the first terminal when receiving the target information, Including:
It monitors described information and obtains the short message that the corresponding server of request is sent;
Judgement includes the target message information of identifying code from the short message;
The identifying code is extracted from the target message information, the identifying code is sent to the first terminal Request source.
In one embodiment, described information obtains the request source mark that request further includes the first terminal;
The request source that the target information is sent to the first terminal, including:
In the identifying code in extracting the target message information for including the identifying code, according to the first terminal Request source mark judges whether the request source that the identifying code is sent to the first terminal;
When judging result is to be, the identifying code is sent to the request source of the first terminal.
In one embodiment, the mark according to the application program judges whether the identifying code being sent to institute Application program is stated, including:
The security level of the request source of the first terminal is identified according to the request source of first terminal mark;
Judge the security level whether higher than default security level;
When the security level is higher than default security level, the identifying code is sent to the first terminal by judgement Request source;
When the security level is less than default security level, the identifying code is not sent to the first terminal by judgement Request source.
In one embodiment, when the target information is password, it includes that password acquisition is asked that described information, which obtains request, It asks,
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described the The request source of one terminal.
In one embodiment, the request source that the target information is sent to the first terminal, including:
The target information is forwarded to institute by the server being connected with the first terminal and the second terminal First terminal is stated, the target information is transmitted to the request source of the first terminal by the first terminal;Or
The target information is logical by any one of WIFI, infrared, distance of near field wireless telecommunications, mobile data network Letter mode is sent to the first terminal, and the target information is transmitted to the request of the first terminal by the first terminal Source.
Those skilled in the art will readily occur to its of the disclosure after considering specification and putting into practice disclosure disclosed herein Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and includes the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (28)

1. a kind of data inputting method is used for first terminal, which is characterized in that including:
It monitors whether to receive the trigger action for obtaining target information;
When receiving the trigger action, the request source for controlling first terminal sends information acquisition request, institute to second terminal It states information acquisition request and is used for the target information that second terminal receives described in acquisition request;
Receive the target information that the second terminal is sent;
The target information is input in corresponding input area;
The request source of the first terminal includes:The application program or plug-in unit installed in the first terminal.
2. according to the method described in claim 1, it is characterized in that, the target information is identifying code or password.
3. method according to claim 1 or 2, which is characterized in that
When the target information is identifying code, it includes that short message monitors request that described information, which obtains request,;
The short message monitors request, the short message that the second terminal begins listening for receiving is used to indicate, from the short message Judgement includes the target message information of identifying code in information, and identifying code is extracted from the target message information.
4. according to the method described in claim 3, it is characterized in that,
Described information obtains the request source mark that request further includes first terminal;
The request source of the first terminal identifies, for when the second terminal extracts the identifying code, for described second Terminal determines whether the request that the identifying code is sent to the first terminal according to the request source of first terminal mark Source.
5. method according to claim 1 or 2, which is characterized in that
When the target information is password, it includes that password obtains request that described information, which obtains request,;
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described first eventually The request source at end.
6. a kind of data inputting method is used for second terminal, which is characterized in that including:
Receive the information acquisition request that the request source of first terminal is sent, described information obtains request for described in acquisition request the The target information that two terminals receive;
When receiving the target information, the target information is sent to the request source of the first terminal, described first The request source of terminal includes:The application program or plug-in unit installed in the first terminal.
7. according to the method described in claim 6, it is characterized in that,
The target information is identifying code or password.
8. the method according to the description of claim 7 is characterized in that
The target information is identifying code, and it includes that short message monitors request that described information, which obtains request,;
It is described that the target information is sent to the request source of the first terminal when receiving the target information, including:
It monitors described information and obtains the short message that the corresponding server of request is sent;
Judgement includes the target message information of identifying code from the short message;
The identifying code is extracted from the target message information, the identifying code is sent to the request of the first terminal Source.
9. according to the method described in claim 8, it is characterized in that,
Described information obtains the mark that request further includes the request source of the first terminal;
The request source that the target information is sent to the first terminal, including:
In the identifying code in extracting the target message information for including the identifying code, according to the request of the first terminal The mark in source judges whether the request source that the identifying code is sent to the first terminal;
When judging result is to be, the identifying code is sent to the request source of the first terminal.
10. according to the method described in claim 9, it is characterized in that,
The mark of the request source according to the first terminal judges whether the identifying code being sent to the application program, Including:
The security level of the request source of the first terminal is identified according to the mark of the request source of the first terminal;
Judge the security level whether higher than default security level;
When the security level is higher than default security level, the identifying code is sent to the request of the first terminal by judgement Source;
When the security level is less than default security level, the identifying code is not sent to asking for the first terminal by judgement Ask source.
11. the method according to the description of claim 7 is characterized in that
When the target information is password, it includes that password obtains request that described information, which obtains request,
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described first eventually The request source at end.
12. the method according to any one of claim 6 to 11, which is characterized in that
The request source that the target information is sent to the first terminal, including:
The target information is forwarded to described by the server being connected with the first terminal and the second terminal The target information is sent to the request source of the first terminal by the first terminal by one terminal;Or
The target information is passed through into any one of WIFI, infrared, distance of near field wireless telecommunications, mobile data network communication party Formula is sent to the first terminal, and the target information is sent to the request source of the first terminal by the first terminal.
13. a kind of message input device is used for first terminal, which is characterized in that including:
Monitoring modular receives the trigger action for obtaining target information for monitoring whether;
Sending module, the request source for when receiving the trigger action, controlling first terminal is sent to second terminal to be believed Breath obtains request, and described information obtains the target information for asking to receive for second terminal described in acquisition request;
Receiving module, the target information sent for receiving the second terminal;
Input module, for the target information to be input in corresponding input area, the request source packet of the first terminal It includes:The application program or plug-in unit installed in the first terminal.
14. device according to claim 13, which is characterized in that the target information is identifying code or password.
15. the device according to claim 13 or 14, which is characterized in that
When the target information is identifying code, it includes that short message monitors request that described information, which obtains request,;
The short message monitors request, the short message that the second terminal begins listening for receiving is used to indicate, from the short message Judgement includes the target message information of identifying code in information, and identifying code is extracted from the target message information.
16. device according to claim 15, which is characterized in that
Described information obtains the request source mark that request further includes the first terminal;
The request source of the first terminal identifies, for when the second terminal extracts the identifying code, for described second Terminal determines whether the request that the identifying code is sent to the first terminal according to the request source of first terminal mark Source.
17. the device according to claim 13 or 14, which is characterized in that
When the target information is password, it includes that password obtains request that described information, which obtains request,;
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described first eventually The request source at end.
18. a kind of message input device is used for second terminal, which is characterized in that including:
Receiving module, the information acquisition request for receiving the transmission of the request source in first terminal, described information obtain request and use The target information that the second terminal described in acquisition request receives;
Sending module, for when receiving the target information, the target information to be sent to asking for the first terminal The source, the request source of the first terminal is asked to include:The application program or plug-in unit installed in the first terminal.
19. device according to claim 18, which is characterized in that
The target information is identifying code or password.
20. device according to claim 19, which is characterized in that
The target information is identifying code, and it includes that short message monitors request that described information, which obtains request,;
The sending module includes:
First sending submodule obtains the short message that the corresponding server of request is sent for monitoring described information;
First judging submodule is used for the target message information that the judgement from the short message includes identifying code;
The identifying code is sent to institute by extracting sub-module for extracting the identifying code from the target message information State the request source of first terminal.
21. device according to claim 20, which is characterized in that
Described information obtains the request source mark that request further includes the first terminal;
The sending module further includes:
Second judgment submodule is used in the identifying code in extracting the target message information for including the identifying code, root Judge whether the request source that the identifying code is sent to the first terminal according to the request source mark of the first terminal;
Second sending submodule, for when judging result is to be, the identifying code to be sent to the request of the first terminal Source.
22. device according to claim 21, which is characterized in that
The second judgment submodule is additionally operable to:
The security level of the request source of the first terminal is identified according to the request source of first terminal mark;
Judge the security level whether higher than default security level;
When the security level is higher than default security level, the identifying code is sent to the request of the first terminal by judgement Source;
When the security level is less than default security level, the identifying code is not sent to asking for the first terminal by judgement Ask source.
23. device according to claim 19, which is characterized in that
When the target information is password, it includes that password obtains request that described information, which obtains request,
The password obtains request, is used to indicate the second terminal and the password of the input received is sent to described first eventually The request source at end.
24. the device according to any one of claim 18 to 23, which is characterized in that
The sending module further includes:
Third sending submodule, for by the target information by being connected with the first terminal and the second terminal Server is forwarded to the first terminal, and the target information is transmitted to the request of the first terminal by the first terminal Source;Or
4th sending submodule, for the target information to be passed through WIFI, infrared, distance of near field wireless telecommunications, mobile data Any one of network communication mode is sent to the first terminal, and the target information is transmitted to institute by the first terminal State the request source of first terminal.
25. a kind of message input device, which is characterized in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
It monitors whether to receive the trigger action for obtaining target information;
When receiving the trigger action, the request source for controlling first terminal sends information acquisition request, institute to second terminal It states information acquisition request and is used for the target information that second terminal receives described in acquisition request;
Receive the target information that the second terminal is sent;
The target information is input in corresponding input area, the request source of the first terminal includes:Described first eventually The application program or plug-in unit installed in end.
26. a kind of message input device, which is characterized in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
The information acquisition request that the request source of the first terminal in first terminal is sent is received, described information obtains request for asking It asks and obtains the target information that second terminal receives;
When receiving the target information, the target information is sent to the request source of the first terminal, described first The request source of terminal includes:The application program or plug-in unit installed in the first terminal.
27. a kind of non-transitorycomputer readable storage medium, is stored thereon with computer instruction, which is characterized in that the finger The step of any one of claim 1 to 5 the method is realized when order is executed by processor.
28. a kind of non-transitorycomputer readable storage medium, is stored thereon with computer instruction, which is characterized in that the finger The step of any one of claim 6 to 12 the method is realized when order is executed by processor.
CN201510917294.9A 2015-12-10 2015-12-10 Data inputting method and device Active CN105512542B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510917294.9A CN105512542B (en) 2015-12-10 2015-12-10 Data inputting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510917294.9A CN105512542B (en) 2015-12-10 2015-12-10 Data inputting method and device

Publications (2)

Publication Number Publication Date
CN105512542A CN105512542A (en) 2016-04-20
CN105512542B true CN105512542B (en) 2018-09-04

Family

ID=55720517

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510917294.9A Active CN105512542B (en) 2015-12-10 2015-12-10 Data inputting method and device

Country Status (1)

Country Link
CN (1) CN105512542B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106130998A (en) * 2016-06-30 2016-11-16 珠海市魅族科技有限公司 A kind of identifying code transmission method and device
CN109510797A (en) * 2017-09-14 2019-03-22 中兴通讯股份有限公司 Message forwarding method, system, server and computer readable storage medium
CN111866885A (en) * 2020-06-09 2020-10-30 维沃移动通信有限公司 Verification information sharing method and device and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013150492A1 (en) * 2012-04-05 2013-10-10 Thakker Mitesh L Systems and methods to input or access data using remote submitting mechanism
CN104469714A (en) * 2014-11-28 2015-03-25 小米科技有限责任公司 Short message sending method and device
CN104954383A (en) * 2015-06-24 2015-09-30 深圳市兰丁科技有限公司 Application program login method and system
CN105049607A (en) * 2015-06-24 2015-11-11 广东欧珀移动通信有限公司 Text message display method and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013150492A1 (en) * 2012-04-05 2013-10-10 Thakker Mitesh L Systems and methods to input or access data using remote submitting mechanism
CN104469714A (en) * 2014-11-28 2015-03-25 小米科技有限责任公司 Short message sending method and device
CN104954383A (en) * 2015-06-24 2015-09-30 深圳市兰丁科技有限公司 Application program login method and system
CN105049607A (en) * 2015-06-24 2015-11-11 广东欧珀移动通信有限公司 Text message display method and mobile terminal

Also Published As

Publication number Publication date
CN105512542A (en) 2016-04-20

Similar Documents

Publication Publication Date Title
CN104936304B (en) Smart machine binding method, smart machine and server
CN104318741B (en) Bluetooth equipment control method and device
CN104270404B (en) A kind of login method and device based on terminal iidentification
EP3151507A1 (en) Methods and apparatuses for controlling device
CN104703252B (en) Terminal device accesses the method and device of wireless network
EP3179397A1 (en) Methods and devices for managing automatic parallel login and logout in several applications
CN104933351A (en) Information security processing method and information security processing device
CN106792953A (en) The method and apparatus of network switching
CN106375096B (en) short message verification method and device
CN105095366B (en) Word message treating method and apparatus
CN105100061B (en) Network address kidnaps the method and device of detection
CN104506443A (en) Router setting interface display method and device
CN105072079A (en) Account logon method, account logon device and terminal device
CN104717622A (en) Information forwarding method and device, terminal and server
CN104735670A (en) Network access method and device
CN105323244A (en) Method and device for network identification
EP3113051A1 (en) Method and apparatus for acquiring search results, computer program and recording medium
CN104899501A (en) Dialog list display method and device and terminal
CN108112089A (en) Accidental access method, device and non-transitorycomputer readable storage medium
CN104063654A (en) Monitoring method and device for application program
CN105512542B (en) Data inputting method and device
CN109560986A (en) Test method, device and the test macro of things-internet gateway equipment
CN104539497B (en) Method for connecting network and device
CN107070707B (en) Method and device for determining initialization mode of router
CN105991626A (en) Network access method and network access device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant