CN106815534A - A kind of method for protecting privacy of user, device and mobile terminal - Google Patents

A kind of method for protecting privacy of user, device and mobile terminal Download PDF

Info

Publication number
CN106815534A
CN106815534A CN201710031325.XA CN201710031325A CN106815534A CN 106815534 A CN106815534 A CN 106815534A CN 201710031325 A CN201710031325 A CN 201710031325A CN 106815534 A CN106815534 A CN 106815534A
Authority
CN
China
Prior art keywords
character
character string
user inputs
user
string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710031325.XA
Other languages
Chinese (zh)
Other versions
CN106815534B (en
Inventor
张晓璇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710031325.XA priority Critical patent/CN106815534B/en
Publication of CN106815534A publication Critical patent/CN106815534A/en
Application granted granted Critical
Publication of CN106815534B publication Critical patent/CN106815534B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the invention discloses a kind of method for protecting privacy of user, device and mobile terminal.The method includes obtaining touch operation of the user to the dummy keyboard in application program;User inputs character string is determined according to the touch operation, judges whether the user inputs character string meets preset rules;When the user inputs character string meets preset rules, using the user inputs character of subsequent time as bebinning character, since the bebinning character, user inputs character is substituted using default target character and is shown.The embodiment of the present invention solves the problems, such as that current user input individual privacy information is easily spied on by other people and may threaten user information safety, reaches the effect for improving information of terminal user security and mobile terminal administration efficiency.

Description

A kind of method for protecting privacy of user, device and mobile terminal
Technical field
The present embodiments relate to information security technology, more particularly to a kind of method for protecting privacy of user, device and shifting Dynamic terminal.
Background technology
As the use of the mobile terminals such as smart mobile phone, panel computer is increasingly popularized, many business can be by phone Handle, and business hall need not be gone to handle, it is very big to improve business handling efficiency, improve Consumer's Experience.
For example, user is when the Help by Phone credit card service condition of credit card centre is dialed, credit card centre is often needed Verify user identity.Now, credit card centre would generally by voice message user input identification number or other Privacy information.User typically can be input into identification number after the voice message is heard by dial.User is performing During aforesaid operations, there is the risk that input information is peeped, it is impossible to ensure user information safety.
The content of the invention
The embodiment of the present invention provides a kind of method for protecting privacy of user, device and mobile terminal, can improve user's letter Breath security.
In a first aspect, a kind of method for protecting privacy of user is the embodiment of the invention provides, including:
Obtain touch operation of the user to the dummy keyboard in application program;
User inputs character string is determined according to the touch operation, judges whether the user inputs character string meets default Rule;
When the user inputs character string meets preset rules, using the user inputs character of subsequent time as banner word Symbol, since the bebinning character, substitutes user inputs character and is shown using default target character.
Second aspect, the embodiment of the present invention additionally provides a kind of device of protection privacy of user, and the device includes:
Operation acquisition module, for obtaining touch operation of the user to the dummy keyboard in application program;
Rule judgment module, for determining user inputs character string according to the touch operation, judges the user input Whether character string meets preset rules;
Character display module, for when the user inputs character string meets preset rules, by the user of subsequent time Input character since the bebinning character, substitutes user inputs character and enters as bebinning character using default target character Row display.
The third aspect, the embodiment of the present invention additionally provides a kind of mobile terminal, including memory, processor and storage are being deposited On reservoir and the computer program that can run on a processor, following step is realized described in the computing device during computer program Suddenly:
Obtain touch operation of the user to the dummy keyboard in application program;
User inputs character string is determined according to the touch operation, judges whether the user inputs character string meets default Rule;
When the user inputs character string meets preset rules, using the user inputs character of subsequent time as banner word Symbol, since the bebinning character, substitutes user inputs character and is shown using default target character.
The embodiment of the present invention provides a kind of method for protecting privacy of user, also provides a kind of protection user for performing the method The device and mobile terminal of privacy, it is possible to achieve replace the portion met in the user inputs character string of preset rules to set character Character is divided to be shown, it is to avoid other people spy upon the individual privacy information to user input.The embodiment of the present invention solves current user Input individual privacy information is easily spied on by other people and may threaten the problem of user information safety, reaches raising terminal user's letter The effect of breath security and mobile terminal administration efficiency.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the method for protection privacy of user provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic diagram of dialing interface provided in an embodiment of the present invention;
Fig. 3 is the flow chart of the method for another protection privacy of user provided in an embodiment of the present invention;
Fig. 4 is the method whether a kind of character string for judging user input provided in an embodiment of the present invention meets preset rules Flow chart;
Fig. 5 is the schematic diagram of another dialing interface provided in an embodiment of the present invention;
Fig. 6 is a kind of device of protection privacy of user provided in an embodiment of the present invention;
Fig. 7 is a kind of structural representation of mobile terminal provided in an embodiment of the present invention.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention, rather than limitation of the invention.It also should be noted that, in order to just Part rather than entire infrastructure related to the present invention is illustrate only in description, accompanying drawing.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail The treatment described as flow chart or method.Although each step to be described as flow chart the treatment of order, many of which Step can be implemented concurrently, concomitantly or simultaneously.Additionally, the order of each step can be rearranged.When its operation The treatment can be terminated during completion, it is also possible to have the additional step being not included in accompanying drawing.The treatment can be with Corresponding to method, function, code, subroutine, subprogram etc..
Fig. 1 is a kind of flow chart of the method for protection privacy of user provided in an embodiment of the present invention.The method can be by one The device of protection privacy of user is planted to perform, wherein, the device can be realized by software and/or hardware, can typically be integrated in movement In terminal.The method may include steps of:
The touch operation of step 110, acquisition user to the dummy keyboard in application program.
Wherein, dummy keyboard can be the confession user for touching screen display to the input control of terminal input message.For example, Dummy keyboard can include the dial of telephony application, the keyboard in wechat or short message application program etc..
The touch operation can be the clicking operation of the dummy keyboard shown to touch-screen.For example, the touch operation can be with It is the clicking operation to numeral on dial in telephony application.And for example, the touch operation can be the English mould to wechat The clicking operation of the dummy keyboard Chinese and English character under formula.
Obtain the application program that mobile terminal is currently at running status, application journey of the monitoring positioned at the stack top of task stack Sequence, determines whether user carries out touch operation to the dummy keyboard in the application program.Wherein, application program can be mobile whole Pre-configured phone application or short message application in end, can also be the third-party application that user voluntarily installs.
Further, white list can be pre-configured with.When application in the setting white list starts, secret protection is opened Pattern.Wherein, white list can be the set of the application program for needing to carry out privacy of user protection, be put under the application of white list Program can be licensed the operation for performing protection privacy of user under specific circumstances.Determining the method for white list has many kinds, for example, The application program of user privacy information will likely be related to be configured to white list and be preset in mobile terminal by manufacturer terminal.Again Such as, when user begins to use mobile terminal, initially enter privacy protection function and interface is set, point out user's selection to need to set The application program of secret protection, according to the application program update white list that user selects.For example, white list can be answered including phone With program, wechat or short message application program etc..Specifically, when some business are handled by calling, it is necessary to be input into user The privacy informations such as identification number, can hide true by privacy of user defencive function in user input privacy information Real information.And for example, user may sometimes need, by the privacy information such as wechat or short message sending identification number, to pass through Privacy of user defencive function can hide real information in user input privacy information.
On the basis of above-mentioned prioritization scheme, obtain user to the touch operation of the dummy keyboard in application program it Before, also include:Whether the application program that judgement operates in foreground belongs to the white list being pre-configured with;Operating in the application on foreground When program belongs to the white list, privacy protection mode is opened;Wherein, the privacy protection mode is that hiding user input is true The pattern of character.
Exemplary, the application program that mobile terminal is currently at running status is obtained, it is determined that positioned at the stack top of task stack Application program bag name.According to the white list that bag name inquiry is pre-configured with, answering for current mobile terminal front stage operation is determined Whether belong to the white list with program.When the application program belongs to the white list, the user in current application program is defeated for monitoring The touch operation to dummy keyboard for entering.Specifically, by taking capacitive touch screen as an example, when finger is touched in metal level, due to Human body electric field, user and touch screen surface form a coupled capacitor, and for high frequency electric, electric capacity is direct conductor, in It is that finger siphons away an electric current for very little from contact point, this electric current flows out from the electrode on the corner of touch-screen respectively, and And flow through this four electric currents of electrode and be directly proportional to the distance of finger to corner, controller is by this four essences of current ratio Really calculate, draw the contact coordinate of touch point.Determine whether the touch operation is right according to the corresponding contact coordinate of touch operation The operation of dummy keyboard.
Step 120, user inputs character string is determined according to the touch operation, whether judge the user inputs character string Meet preset rules.
Wherein, the preset rules are that user inputs character string includes setting character string, wherein, the setting character string includes At least two continuous setting characters.For example, it is 44528 that user presets character string, then mobile terminal is detecting user When being input into 44528, determine that user inputs character string includes setting character string.
Specifically, in being application program to present terminal front stage operation in the touch operation of user dummy keyboard touch During operation, the character string of user input is determined according to the corresponding contact coordinate of the touch operation.Judge user inputs character string Whether string length according to judged result determines whether execution judge institute not less than the string length for setting character string State the operation whether user inputs character string meets preset rules.For example, the string length in user inputs character string is less than During the setting character string, user inputs character string can not be performed and operated with the comparing of the setting character string, to save end Reason flow, improves terminal processes efficiency.When user inputs character string is identical with the string length of the setting character string, judge Whether user inputs character string is identical with the setting character string, if, it is determined that the user inputs character string meets default rule Then, otherwise, it determines the user inputs character string does not meet preset rules.It is more than in the string length of user inputs character string During the setting character string, by the corresponding character in the end of user inputs character string, in user inputs character string select connect It is continuous with setting character string string length identical character substring, judge whether are the character substring and the setting character string It is identical, if, it is determined that the user inputs character string meets preset rules, otherwise, it determines the user inputs character string is not Meet preset rules.
Step 130, when the user inputs character string meets preset rules, the user inputs character of subsequent time is made It is bebinning character, since the bebinning character, user inputs character is substituted using default target character and is shown.
Terminal can determine that user inputs character string meets moment of preset rules and is defined as current time, if lower a period of time Carve user carries out touch operation to the dummy keyboard again, then obtain the corresponding contact coordinate of the touch operation.So as to be touched according to this Point coordinates determines the character of subsequent time user input, using the character as bebinning character.
Target character can be manufacturer terminal be pre-configured in terminal for substituting user under privacy protection mode The character of input information.Can also be the character for substituting user input information under privacy protection mode that user specifies. The target character can be that (such as &, $, %......, order obtain many for a character (such as &) or different multiple characters One in individual character substitutes user input information).Specifically, target character list can be pre-set, in target character row Multiple target characters for substituting user input information are stored in table.Exemplary, set into privacy protection function in user When putting interface, user input target character is pointed out, for example, user input " &, $, % and+", according to the target word of user input Symbol generation target character list.
For example, user when specific transactions are handled by mobile terminal, it is necessary to be input into identification number.User is advance The character of the setting digit in identification number is set to set character string.In user according to the voice of the specific transactions During prompting input identification number, terminal compares user inputs character string and the setting character string in real time.With When family input character string includes the setting character string, using target character (except full stop or character with other specific meanings Outer character) setting position of touch-screen is displayed in instead of the actual characters of user input.Fig. 2 shows that the embodiment of the present invention is carried A kind of schematic diagram of the dialing interface for supplying.As shown in Fig. 2 user inputs character string includes setting character string 201, it is true for hiding Real user is input into the target character 202 and final character 203 of character.Specifically, including setting user inputs character string is detected When determining character string " 44528 ", since user the character being input into again after digital " 8 ", target character " " generation can be used True character for user input shows on the touchscreen.Alternatively, user inputs character string is being detected including setting word During symbol string " 44528 ", since user the character being input into again after digital " 8 ", target character list can be inquired about, order The true character for replacing user input using the target character in the target character list shows on the touchscreen.For example, user " 1 " is input into after " 44528 ".The list of terminal inquiry target character determines to be displayed in touch using target character " & " replacement " 1 " On screen.Then, user input " 9 " is detected again.Terminal is inquired about the target character list and is determined using target character " $ " again Instead of " 9 " display on the touchscreen.
Further, when the final character of user input is detected, since the final character, user input is shown Character.Wherein, final character can be that mark terminates replacing the character of user input information using target character.The final character Determination mode have many kinds, for example, can be using user-defined character as final character.And for example, manufacturer terminal can be with Conventional final character is counted, is pre-configured in mobile terminal.
The technical scheme of the present embodiment, by the void for obtaining the application program in setting white list of the user to current operation Intend the touch operation of keyboard, user inputs character string is determined according to the touch operation, judge whether user inputs character string meets Preset rules, when preset rules are met, using the user inputs character of subsequent time as bebinning character, by the bebinning character extremely Character string between setting final character is shown that individual subscriber privacy information is hidden in realization using default target character, Individual subscriber privacy information can be avoided to be spied on by other people.It is easy that the present embodiment solves current user input individual privacy information Spied on by other people and the problem of user information safety may be threatened, reach raising information of terminal user security and mobile terminal pipe Manage the effect of efficiency.
Preferably, when the user inputs character string meets preset rules, using replacement word corresponding with true character True character of the symbol display dummy keyboard in English input state or numeral input state.So set and be advantageous in that The substitute character corresponding with true character that the character shown on dummy keyboard pre-sets for user, it is to avoid other people are by spying on Individual subscriber privacy information is stolen in operation of the user to dummy keyboard, has further ensured user information safety.
Fig. 3 is the flow chart of the method for another protection privacy of user provided in an embodiment of the present invention.As shown in figure 3, should Method can include:
When step 310, the application program in setting white list are in running status, user is obtained to the application program In dummy keyboard touch operation.
When the triggering of secret protection event is detected, privacy of user defencive function is performed.For example, being dialed user is detected During phone, during reserved phone number of voice message user input identification number, password for inquiry or bank etc., touch Hair secret protection event.Substituting, in wechat or short message is detected, user input ID card No., login setting application During the keywords such as the user name or password of program, secret protection event is triggered.Specific transactions are handled by mobile terminal with user As a example by, when voice message user input identification number is detected, secret protection event is triggered, to detect present terminal Whether the application program of front stage operation is to set the application program in white list.
It is exemplary, by taking the mobile terminal for carrying Android system as an example, can be by calling ActivityManager classes in GetRunningAppProcesses () method obtain the process that is currently running of system.Then, judge that the process is corresponding to answer Whether the stack top of task stack is located at program.Task stack is one has the container of stack architecture, can place multiple Activity Example.One Activity is an application component, there is provided a screen, user can be carried out by the screen with terminal Interaction, to complete a certain task, for example, dials, takes pictures, sends email, seeing map etc..Start an application program, system is just A task (task), the root Activity for placing the application program can for it be created.In the corresponding application journey of the process When stack top, the bag name inquiry setting white list according to the application program determines if to belong to the setting white list tagmeme.
If the application program belongs to setting white list, the touch operation of user is obtained.Specifically, existing mobile terminal is adopted Touch-screen has resistive touch screen, capacitive touch screen and piezoelectric type touch screen etc., when user touches touch-screen, touches Screen can detect touch information, and then identify the touch operation of user.By taking capacitive touch screen as an example, touch-screen can sense To the change of electric capacity, when user touches touch-screen, the change of touch screen induction to electric capacity recognizes touch information, touches Information includes x coordinate and y-coordinate, and coordinate information is reported to upper strata by input systems, just determines to touch using touch information The touch operation that the somewhere of screen occurs.
Because the display location of the dummy keyboard of application program is known, according to the x of the corresponding contact of the touch operation Coordinate and y-coordinate, it may be determined that whether the touch operation is touch operation to dummy keyboard in the application program.
Step 320, user inputs character string is determined according to the touch operation.
It is corresponding according to the touch operation in being to the application program in the touch operation during touch operation of dummy keyboard The x coordinate and y-coordinate of contact, determine the touch operation corresponds to which character on the dummy keyboard, so that, determine user Input character string.
Step 330, judge user inputs character string string length whether not less than setting character string character string it is long Degree, if so, step 340 is then performed, if it is not, then performing step 320.
If the string length of user inputs character string is less than the string length of setting character string, step 320 is performed. If specifically, user inputs character string " 445 ", its string length then performs step less than the length of setting character string " 4528 " Rapid 320.If terminal performs step 320 and detects user input " 2 ", now, user inputs character string is " 4452 ", its character string Length is equal to the length of setting character string, performs step 340.
Step 340, judge whether the user inputs character string meets preset rules, if so, step 350 is then performed, if It is no, then perform step 320.
Fig. 4 is the method whether a kind of character string for judging user input provided in an embodiment of the present invention meets preset rules Flow chart.As shown in figure 4, the method can include:
Step 341, by the string length of user inputs character string with setting character string string length be compared.
The setting character string may be located at the head position of user inputs character string, may be located on user inputs character string Medium position.For example, setting character string can be " 44528 ", can also be " 4528 ".
Whether step 342, the two string length of judgement are identical, if so, step 343 is then performed, if it is not, then performing step 344。
Step 343, by user inputs character string with setting character string compare.
For example, user inputs character string be " 44528 ", and setting character string also be " 44528 " when, by user input word Symbol string is compared with setting character string, because the character that two character strings include is identical, so that, determine user input word Symbol string meets preset rules, goes to execution step 350.
For example, be " 4452 " in user inputs character string, and when setting character as " 4528 ", its string length with set The string length of character string is identical.Then, compare user inputs character string " 4452 " and setting character string " 4528 ", determine two Whether the character that individual character string includes is identical, so that, determine whether user inputs character string meets according to comparative result pre- If regular.In this example, user inputs character string is incomplete same with the character that setting two character strings of character string include, and because For the string length of user inputs character string is not more than setting character string, it is determined that user inputs character string does not meet default rule Then, return and perform step 320.
Step 344, by the corresponding character in the end of user inputs character string, in user inputs character string select connect The continuous string length identical character substring with setting character string.
When user inputs character string is " 44528 ", string length of its string length more than setting character string.With The corresponding character in the end " 8 " of user inputs character string starts, selected in user inputs character string continuously with setting character The string length identical character substring of string " 4528 ", the character substring is " 4528 ", continues executing with step 345.
Step 345, by the character substring with setting character string compare.
Exemplary, the character substring " 4528 " is compared with setting character string " 4528 ", determine two character strings Including character it is whether identical.Due to the complete phase of character that the character substring includes with setting two character strings of character string Together, so that, determine that user inputs character string meets preset rules, go to execution step 350.
Step 350, the dummy keyboard is shown using substitute character corresponding with true character in English input state or True character during numeral input state.
The corresponding relation of substitute character and true character is preset by user.For example, secret protection work(can entered Interface can be set, and after user sets white list, point out user that the substitute character of true character is set, generation character is replaced Table.Exemplary, character substitution table can be as shown in table 1:
Table 1 is the character substitution table of true character and substitute character
When user inputs character meets preset rules, for English input state or the dummy keyboard of digital state, The substitute character of the true character for pre-setting is shown thereon.Fig. 5 shows another dialing circle provided in an embodiment of the present invention The schematic diagram in face.As shown in figure 5, terminal is shown true character 0~9 in dial using corresponding substitute character.
Exemplary, if user is after input 44528, in addition it is also necessary to be input into 199012116022, and terminated with #, then exist After showing substitute character on dummy keyboard, that user needs input is azztapaaetpp#, and the character for showing on a display screen It is 44528&&&&&&&&&&&&#.So design is advantageous in that even if user is spied on when privacy information is input into by other people, but It is that, due to the substitute character of true character being shown in dummy keyboard, other people do not know the true character that user actually enters, User privacy information can be protected not compromised.
Fig. 6 is a kind of device of protection privacy of user provided in an embodiment of the present invention.As shown in fig. 6, the device includes:Behaviour Make acquisition module 610, rule judgment module 620 and character display module 630.
Operation acquisition module 610, for obtaining touch operation of the user to the dummy keyboard in application program;
Rule judgment module 620, for determining user inputs character string according to the touch operation, judges that the user is defeated Enter whether character string meets preset rules;
Character display module 630, for when the user inputs character string meets preset rules, by the use of subsequent time Family is input into character as bebinning character, since the bebinning character, user inputs character is substituted using default target character Shown.
A kind of device of protection privacy of user is present embodiments provided, realizes hiding individual subscriber privacy information, can kept away Exempt from individual subscriber privacy information to be spied on by other people.The present embodiment solves current user input individual privacy information easily by other people Spy on and the problem of user information safety may be threatened, reach raising information of terminal user security and mobile terminal administration efficiency Effect.
Preferably, the device also includes pattern opening module, for obtaining user to the dummy keyboard in application program Touch operation before, whether judgement operates in the application program on foreground and belongs to the white list being pre-configured with;Operating in foreground Application program when belonging to the white list, open privacy protection mode;Wherein, the privacy protection mode is that hiding user is defeated Enter the pattern of true character.
Preferably, the character display module is additionally operable to:When the final character of user input is detected, from the termination Character starts, and shows user inputs character.
Preferably, the preset rules are that user inputs character string includes setting character string, wherein, the setting character string includes At least two continuous setting characters.
Preferably, the device also includes:
Length judge module, for before judging whether the user inputs character string meets preset rules, judging to use Whether the string length of family input character string determines not less than the string length for setting character string according to judged result Whether execution judges whether the user inputs character string meets the operation of preset rules.In the character string of user inputs character string When length is less than the string length of the setting character string, does not perform and judge whether the user inputs character string meets default The operation of rule, to save the process resource of terminal, improves mobile terminal administration efficiency.
Preferably, the rule judgment module 620 specifically for:
When user inputs character string is identical with the string length of the setting character string, user inputs character string is judged It is whether identical with the setting character string, if, it is determined that the user inputs character string meets preset rules, otherwise, it determines The user inputs character string does not meet preset rules;
When the string length of user inputs character string is more than the setting character string, by the end of user inputs character string The corresponding character of tail starts, and selects the string length continuously with the setting character string identical in user inputs character string Character substring, judge the character substring with it is described setting character string it is whether identical, if, it is determined that the user input word Symbol string meets preset rules, otherwise, it determines the user inputs character string does not meet preset rules.
Preferably, the device also includes:
Keyboard replacement module, for when the user inputs character string meets preset rules, using with true character pair The substitute character answered shows true character of the dummy keyboard in English input state or numeral input state.
The device of above-mentioned protection privacy of user can perform the side of the protection privacy of user that any embodiment of the present invention is provided Method, possesses the corresponding functional module of execution method and beneficial effect.Not ins and outs of detailed description in the above-described embodiments, can The method of the protection privacy of user provided referring to any embodiment of the present invention.
A kind of mobile terminal is the embodiment of the invention provides, can integrated guarantor provided in an embodiment of the present invention in the mobile terminal Protect the device of privacy of user.Fig. 7 is a kind of structural representation of mobile terminal provided in an embodiment of the present invention.As shown in fig. 7, should Mobile terminal can include:Housing (not shown), memory 701, central processing unit (Central Processing Unit, CPU) 702 (also known as processors, hereinafter referred to as CPU), circuit board (not shown) and power circuit (do not show in figure Go out).The circuit board is placed in the interior volume that touch-screen 712 is surrounded with the housing;The CPU702 and the memory 701 are arranged on the circuit board;The power circuit, powers for each circuit or device for the mobile terminal;Institute Memory 701 is stated, for storing computer program;The CPU702 reads and performs the calculating stored in the memory 701 Machine program.The CPU702 realizes following steps when the computer program is performed:
Obtain touch operation of the user to the dummy keyboard in application program;
User inputs character string is determined according to the touch operation, judges whether the user inputs character string meets default Rule;
When the user inputs character string meets preset rules, using the user inputs character of subsequent time as banner word Symbol, since the bebinning character, substitutes user inputs character and is shown using default target character.
The mobile terminal also includes:Peripheral Interface 703, RF (Radio Frequency, radio frequency) circuit 705, audio-frequency electric Road 706, loudspeaker 711, touch-screen 712, power management chip 708, input/output (I/O) subsystem 709, other input/controls Control equipment 710 and outside port 704, these parts are communicated by one or more communication bus or holding wire 707.
It should be understood that diagram mobile terminal 700 is only an example of mobile terminal, and mobile terminal 700 Can have than the more or less part shown in figure, can combine two or more parts, or can be with Configured with different parts.Various parts shown in figure can be including one or more signal transactings and/or special Integrated circuit is realized in the combination of interior hardware, software or hardware and software.
The mobile terminal 700 of the device for being integrated with protection privacy of user for being provided with regard to the present embodiment below carries out detailed retouching State, the mobile terminal is by taking mobile phone as an example.
Memory 701, the memory 701 can be accessed by CPU702, Peripheral Interface 703 etc., and the memory 701 can With including high-speed random access memory, nonvolatile memory can also be included, such as one or more disk memories, Flush memory device or other volatile solid-state parts.
The input of equipment and output peripheral hardware can be connected to CPU702 and deposited by Peripheral Interface 703, the Peripheral Interface 703 Reservoir 701.
I/O subsystems 709, the I/O subsystems 709 can be by the input/output peripheral in equipment, such as touch-screen 712 With other input/control devicess 710, Peripheral Interface 703 is connected to.I/O subsystems 709 can include the He of display controller 7091 One or more input controllers 7092 for controlling other input/control devicess 710.Wherein, one or more input controls Device processed 7092 receives electric signal or sends electric signal to other input/control devicess 710 from other input/control devicess 710, Other input/control devicess 710 can be including physical button (pressing button, rocker buttons etc.), dial, slide switch, behaviour Vertical pole, click roller.What deserves to be explained is, input controller 7092 can with it is following any one be connected:Keyboard, infrared port, The instruction equipment of USB interface and such as mouse.
Touch-screen 712, the touch-screen 712 is the input interface and output interface between user terminal and user, can Depending on output display to user, visual output can be including figure, text, icon, video etc..
Display controller 7091 in I/O subsystems 709 receives electric signal or is sent out to touch-screen 712 from touch-screen 712 Electric signals.Contact on the detection touch-screen of touch-screen 712, the contact that display controller 7091 will be detected is converted to and display The interaction of the user interface object on touch-screen 712, that is, realize man-machine interaction, is displayed in the user interface on touch-screen 712 Object can be the icon of running game, the icon etc. that is networked to corresponding network.What deserves to be explained is, equipment can also include light Mouse, light mouse is the extension for not showing the visual touch sensitive surface for exporting, or the touch sensitive surface formed by touch-screen.
RF circuits 705, are mainly used in setting up the communication of mobile phone and wireless network (i.e. network side), realize mobile phone and wireless network The data receiver of network and transmission.Such as transmitting-receiving short message, Email etc..Specifically, RF circuits 705 are received and send RF letters Number, RF signals are also referred to as electromagnetic signal, and RF circuits 705 convert electrical signals to electromagnetic signal or electromagnetic signal is converted into telecommunications Number, and communicated with communication network and other equipment by the electromagnetic signal.RF circuits 705 can be included for performing The known circuit of these functions, it includes but is not limited to antenna system, RF transceivers, one or more amplifiers, tuner, one Individual or multiple oscillators, digital signal processor, CODEC (COder-DECoder, coder) chipset, ID mould Block (Subscriber Identity Module, SIM) etc..
Voicefrequency circuit 706, is mainly used in receiving voice data from Peripheral Interface 703, and the voice data is converted into telecommunications Number, and the electric signal is sent to loudspeaker 711.
Loudspeaker 711, for the voice signal for receiving mobile phone from wireless network by RF circuits 705, is reduced to sound And play the sound to user.
Power management chip 708, for being powered by the hardware that CPU702, I/O subsystem and Peripheral Interface are connected And power management.
The mobile terminal provided in the present embodiment is realized hiding individual subscriber privacy information, can avoid individual subscriber privacy Information is spied on by other people.The present embodiment solves current user input individual privacy information and is easily spied on by other people and may threatened The problem of user information safety, reaches the effect for improving information of terminal user security and mobile terminal administration efficiency.
Note, above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that The invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art various obvious changes, Readjust and substitute without departing from protection scope of the present invention.Therefore, although the present invention is carried out by above example It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also More other Equivalent embodiments can be included, and the scope of the present invention is determined by scope of the appended claims.

Claims (13)

1. it is a kind of protect privacy of user method, it is characterised in that including:
Obtain touch operation of the user to the dummy keyboard in application program;
User inputs character string is determined according to the touch operation, judges whether the user inputs character string meets default rule Then;
When the user inputs character string meets preset rules, using the user inputs character of subsequent time as bebinning character, Since the bebinning character, user inputs character is substituted using default target character and is shown.
2. method according to claim 1, it is characterised in that obtaining user's touching to the dummy keyboard in application program Before touching operation, also include:
Whether the application program that judgement operates in foreground belongs to the white list being pre-configured with;
When the application program for operating in foreground belongs to the white list, privacy protection mode is opened;Wherein, the secret protection Pattern is to hide the pattern of the true character of user input.
3. method according to claim 1, it is characterised in that also include:
When the final character of user input is detected, since the final character, user inputs character is shown.
4. method according to claim 1, it is characterised in that the preset rules are that user inputs character string includes setting Character string, wherein, the setting character string includes at least two continuous setting characters.
5. method according to claim 4, it is characterised in that judge whether the user inputs character string meets default rule Then, including:
When user inputs character string is identical with the string length of the setting character string, user inputs character string and institute are judged Whether identical state setting character string, if, it is determined that the user inputs character string meets preset rules, otherwise, it determines described User inputs character string does not meet preset rules;
When the string length of user inputs character string is more than the setting character string, by the end pair of user inputs character string The character answered starts, and the string length identical word continuously with the setting character string is selected in user inputs character string Symbol substring, judges whether the character substring is identical with the setting character string, if, it is determined that the user inputs character string Meet preset rules, otherwise, it determines the user inputs character string does not meet preset rules.
6. method according to any one of claim 1 to 5, it is characterised in that also include:
When the user inputs character string meets preset rules, the void is shown using substitute character corresponding with true character Intend true character of the keyboard in English input state or numeral input state.
7. it is a kind of protect privacy of user device, it is characterised in that including:
Operation acquisition module, for obtaining touch operation of the user to the dummy keyboard in application program;
Rule judgment module, for determining user inputs character string according to the touch operation, judges the user inputs character Whether string meets preset rules;
Character display module, for when the user inputs character string meets preset rules, by the user input of subsequent time Character since the bebinning character, substitutes user inputs character and is shown as bebinning character using default target character Show.
8. device according to claim 7, it is characterised in that also include:
Pattern opening module, for before touch operation of the user to the dummy keyboard in application program is obtained, judging operation Whether the application program on foreground belongs to the white list being pre-configured with;Belong to the white list in the application program for operating in foreground When, open privacy protection mode;Wherein, the privacy protection mode is to hide the pattern of the true character of user input.
9. device according to claim 7, it is characterised in that the character display module is additionally operable to:
When the final character of user input is detected, since the final character, user inputs character is shown.
10. device according to claim 7, it is characterised in that the preset rules are that user inputs character string includes setting Determine character string, wherein, the setting character string includes at least two continuous setting characters.
11. devices according to claim 10, it is characterised in that the rule judgment module specifically for:
When user inputs character string is identical with the string length of the setting character string, user inputs character string and institute are judged Whether identical state setting character string, if, it is determined that the user inputs character string meets preset rules, otherwise, it determines described User inputs character string does not meet preset rules;
When the string length of user inputs character string is more than the setting character string, by the end pair of user inputs character string The character answered starts, and the string length identical word continuously with the setting character string is selected in user inputs character string Symbol substring, judges whether the character substring is identical with the setting character string, if, it is determined that the user inputs character string Meet preset rules, otherwise, it determines the user inputs character string does not meet preset rules.
12. device according to any one of claim 7 to 11, it is characterised in that described device also includes:
Keyboard replacement module, for when the user inputs character string meets preset rules, using corresponding with true character Substitute character shows true character of the dummy keyboard in English input state or numeral input state.
A kind of 13. mobile terminals, including memory, processor and storage are on a memory and the calculating that can run on a processor Machine program, it is characterised in that realize following steps during computer program described in the computing device:
Obtain touch operation of the user to the dummy keyboard in application program;
User inputs character string is determined according to the touch operation, judges whether the user inputs character string meets default rule Then;
When the user inputs character string meets preset rules, using the user inputs character of subsequent time as bebinning character, Since the bebinning character, user inputs character is substituted using default target character and is shown.
CN201710031325.XA 2017-01-17 2017-01-17 Method and device for protecting user privacy and mobile terminal Active CN106815534B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710031325.XA CN106815534B (en) 2017-01-17 2017-01-17 Method and device for protecting user privacy and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710031325.XA CN106815534B (en) 2017-01-17 2017-01-17 Method and device for protecting user privacy and mobile terminal

Publications (2)

Publication Number Publication Date
CN106815534A true CN106815534A (en) 2017-06-09
CN106815534B CN106815534B (en) 2020-02-14

Family

ID=59111715

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710031325.XA Active CN106815534B (en) 2017-01-17 2017-01-17 Method and device for protecting user privacy and mobile terminal

Country Status (1)

Country Link
CN (1) CN106815534B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107451442A (en) * 2017-07-07 2017-12-08 珠海格力电器股份有限公司 Multimedia file protection method and device and electronic equipment
CN109446794A (en) * 2018-10-15 2019-03-08 维沃移动通信有限公司 A kind of cipher-code input method and its mobile terminal
CN110598489A (en) * 2018-06-13 2019-12-20 北京搜狗科技发展有限公司 Privacy protection method for inputting prompt information and related device
CN112462953A (en) * 2020-11-23 2021-03-09 厦门理工学院 Dynamic input method and device
WO2021179155A1 (en) * 2020-03-10 2021-09-16 深圳市欢太科技有限公司 Compliance test method and apparatus for storage information, electronic device, and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702191A (en) * 2009-10-31 2010-05-05 浙江德施曼机电有限公司 Device and method for verifying passwords
CN102929498A (en) * 2011-09-12 2013-02-13 微软公司 Password reveal selector
CN104156678A (en) * 2013-05-13 2014-11-19 联想(北京)有限公司 Input character protection method and system and electronic device
CN105335633A (en) * 2015-10-08 2016-02-17 广东欧珀移动通信有限公司 Mobile terminal anti-peeping method and mobile terminal
CN106027804A (en) * 2016-07-19 2016-10-12 努比亚技术有限公司 Unlocking method and unlocking apparatus of mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702191A (en) * 2009-10-31 2010-05-05 浙江德施曼机电有限公司 Device and method for verifying passwords
CN102929498A (en) * 2011-09-12 2013-02-13 微软公司 Password reveal selector
CN104156678A (en) * 2013-05-13 2014-11-19 联想(北京)有限公司 Input character protection method and system and electronic device
CN105335633A (en) * 2015-10-08 2016-02-17 广东欧珀移动通信有限公司 Mobile terminal anti-peeping method and mobile terminal
CN106027804A (en) * 2016-07-19 2016-10-12 努比亚技术有限公司 Unlocking method and unlocking apparatus of mobile terminal

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107451442A (en) * 2017-07-07 2017-12-08 珠海格力电器股份有限公司 Multimedia file protection method and device and electronic equipment
CN110598489A (en) * 2018-06-13 2019-12-20 北京搜狗科技发展有限公司 Privacy protection method for inputting prompt information and related device
CN110598489B (en) * 2018-06-13 2024-05-28 北京搜狗科技发展有限公司 Privacy protection method and related device for input prompt information
CN109446794A (en) * 2018-10-15 2019-03-08 维沃移动通信有限公司 A kind of cipher-code input method and its mobile terminal
WO2021179155A1 (en) * 2020-03-10 2021-09-16 深圳市欢太科技有限公司 Compliance test method and apparatus for storage information, electronic device, and storage medium
CN112462953A (en) * 2020-11-23 2021-03-09 厦门理工学院 Dynamic input method and device
CN112462953B (en) * 2020-11-23 2023-02-28 厦门理工学院 Dynamic input method and device

Also Published As

Publication number Publication date
CN106815534B (en) 2020-02-14

Similar Documents

Publication Publication Date Title
US10996834B2 (en) Touchscreen apparatus user interface processing method and touchscreen apparatus
CN106855784A (en) Prevent method, device and the terminal of touch key-press false triggering
CN106815534A (en) A kind of method for protecting privacy of user, device and mobile terminal
CN106775087B (en) Touch screen control method and device of mobile terminal and mobile terminal
CN106681635A (en) Method and device for preventing split screen touch by mistake and mobile terminal
CN106708407A (en) Method and device for preventing mistaken triggering of touch key and mobile terminal
CN106681555A (en) Touch screen control method and device of mobile terminal and mobile terminal
CN106681638A (en) Method, device and mobile terminal for controlling touch screen
CN107483721A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
CN108563933A (en) Control method, device, storage medium and the mobile terminal of application program
CN106708263A (en) Method and device for preventing mistaken touch of touch screens and mobile terminal
CN107861773A (en) Associate management-control method, device, storage medium and the mobile terminal started
CN106598249A (en) Wrong touch prevention method and device for touch key, and mobile terminal
CN107450839A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
CN106648232A (en) Method, device and terminal for preventing false triggering of touch keys
CN106681554A (en) Mobile terminal touch screen control method and device and mobile terminal
CN106775086A (en) A kind of touch-screen control method of mobile terminal, device and mobile terminal
CN108984095A (en) gesture interaction method, device, storage medium and electronic equipment
CN109375854B (en) Drawing method, drawing device, storage medium and electronic equipment
CN106775407A (en) A kind of touch-screen control method of mobile terminal, device and mobile terminal
CN107643871A (en) Control method for screen display, device, storage medium and mobile terminal
CN107422976A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
CN106951766A (en) scene mode switching method and device of intelligent terminal
CN107450801A (en) A kind of control method of screen display, device, storage medium and mobile terminal
CN106681637A (en) Method and device for touch screen display, and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong Opel Mobile Communications Co., Ltd.

GR01 Patent grant
GR01 Patent grant