CN106815534B - Method and device for protecting user privacy and mobile terminal - Google Patents

Method and device for protecting user privacy and mobile terminal Download PDF

Info

Publication number
CN106815534B
CN106815534B CN201710031325.XA CN201710031325A CN106815534B CN 106815534 B CN106815534 B CN 106815534B CN 201710031325 A CN201710031325 A CN 201710031325A CN 106815534 B CN106815534 B CN 106815534B
Authority
CN
China
Prior art keywords
character string
user
character
input
user input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710031325.XA
Other languages
Chinese (zh)
Other versions
CN106815534A (en
Inventor
张晓璇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710031325.XA priority Critical patent/CN106815534B/en
Publication of CN106815534A publication Critical patent/CN106815534A/en
Application granted granted Critical
Publication of CN106815534B publication Critical patent/CN106815534B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors

Abstract

The embodiment of the invention discloses a method and a device for protecting user privacy and a mobile terminal. The method comprises the steps of obtaining touch operation of a user on a virtual keyboard in an application program; determining a user input character string according to the touch operation, and judging whether the user input character string meets a preset rule or not; and when the user input character string conforms to a preset rule, taking the user input character at the next moment as an initial character, and starting from the initial character, displaying by adopting a preset target character to replace the user input character. The embodiment of the invention solves the problem that the user input personal privacy information is easy to be peeped by others and possibly threatens the information security of the user at present, and achieves the effect of improving the information security of the terminal user and the management efficiency of the mobile terminal.

Description

Method and device for protecting user privacy and mobile terminal
Technical Field
The embodiment of the invention relates to an information security technology, in particular to a method and a device for protecting user privacy and a mobile terminal.
Background
With the use of mobile terminals such as smart phones and tablet computers becoming more and more popular, many services can be handled through the telephone without going to a business hall, so that the service handling efficiency is greatly improved, and the user experience is improved.
For example, when a user dials a phone of a credit card center to inquire about the use of a credit card, the credit card center often needs to verify the identity of the user. At this time, the credit card center typically prompts the user to enter a personal identification number or other private information via voice. After hearing the voice prompt, the user typically enters the personal identification number through a dial. In the process of executing the operation, the user has the risk of peeping the input information, and the information safety of the user cannot be ensured.
Disclosure of Invention
The embodiment of the invention provides a method and a device for protecting user privacy and a mobile terminal, which can improve the user information security.
In a first aspect, an embodiment of the present invention provides a method for protecting user privacy, including:
acquiring touch operation of a user on a virtual keyboard in an application program;
determining a user input character string according to the touch operation, and judging whether the user input character string meets a preset rule or not;
and when the user input character string conforms to a preset rule, taking the user input character at the next moment as an initial character, and starting from the initial character, displaying by adopting a preset target character to replace the user input character.
In a second aspect, an embodiment of the present invention further provides an apparatus for protecting user privacy, where the apparatus includes:
the operation acquisition module is used for acquiring the touch operation of a user on a virtual keyboard in the application program;
the rule judging module is used for determining a user input character string according to the touch operation and judging whether the user input character string meets a preset rule or not;
and the character display module is used for taking the user input character at the next moment as an initial character when the user input character string conforms to a preset rule, and displaying by adopting a preset target character to replace the user input character from the initial character.
In a third aspect, an embodiment of the present invention further provides a mobile terminal, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the following steps when executing the computer program:
acquiring touch operation of a user on a virtual keyboard in an application program;
determining a user input character string according to the touch operation, and judging whether the user input character string meets a preset rule or not;
and when the user input character string conforms to a preset rule, taking the user input character at the next moment as an initial character, and starting from the initial character, displaying by adopting a preset target character to replace the user input character.
The embodiment of the invention provides a method for protecting user privacy, and also provides a device and a mobile terminal for executing the method for protecting user privacy, which can replace part of characters in a user input character string which accords with a preset rule with set characters to display, and prevent others from snooping personal privacy information input by a user. The embodiment of the invention solves the problem that the user input personal privacy information is easy to be peeped by others and possibly threatens the information security of the user at present, and achieves the effect of improving the information security of the terminal user and the management efficiency of the mobile terminal.
Drawings
Fig. 1 is a flowchart of a method for protecting user privacy according to an embodiment of the present invention;
FIG. 2 is a diagram illustrating a dialing interface according to an embodiment of the present invention;
FIG. 3 is a flow chart of another method for protecting user privacy according to an embodiment of the present invention;
fig. 4 is a flowchart of a method for determining whether a character string input by a user meets a preset rule according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of another dialing interface provided by embodiments of the present invention;
fig. 6 is a device for protecting user privacy according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the steps as a sequential process, many of the steps can be performed in parallel, concurrently or simultaneously. In addition, the order of the steps may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
Fig. 1 is a flowchart of a method for protecting user privacy according to an embodiment of the present invention. The method may be performed by an apparatus for protecting user privacy, wherein the apparatus may be implemented by software and/or hardware, and may be generally integrated in a mobile terminal. The method may comprise the steps of:
and step 110, acquiring touch operation of the user on the virtual keyboard in the application program.
The virtual keyboard may be an input control displayed on the touch screen for a user to input information to the terminal. For example, the virtual keyboard may include a dial of a telephone application, a keyboard in a WeChat or SMS application, and the like.
The touch operation may be a click operation on a virtual keyboard displayed on the touch screen. For example, the touch operation may be a click operation on a number on a dial in a phone application. For another example, the touch operation may be a click operation on an english character in the virtual keyboard in the english mode of WeChat.
The method comprises the steps of obtaining an application program of the mobile terminal in a running state at present, monitoring the application program located at the top of a task stack, and determining whether a user touches a virtual keyboard in the application program. The application program may be a phone application or a short message application pre-configured in the mobile terminal, or may be a third party application installed by the user.
Further, the white list may be preconfigured. And when the application in the set white list is started, starting a privacy protection mode. The white list may be a collection of applications that need to be protected from user privacy, and the applications that are white listed may be permitted to perform operations that protect user privacy under certain circumstances. There are many ways to determine the white list, for example, by configuring an application program, which may relate to user privacy information, as a white list by a terminal manufacturer and presetting the white list in the mobile terminal. For another example, when the user starts to use the mobile terminal, the user first enters a privacy protection function setting interface to prompt the user to select an application program needing privacy protection, and the white list is updated according to the application program selected by the user. For example, the white list may include a phone application, a WeChat or SMS application, and the like. Specifically, when some services are handled by dialing a telephone, privacy information such as a personal identification number of a user needs to be input, and real information can be hidden when the user inputs the privacy information through the user privacy protection function. For another example, the user may need to send privacy information such as a personal identification number through WeChat or short message sometimes, and the real information can be hidden when the user inputs the privacy information through the user privacy protection function.
On the basis of the above optimization scheme, before obtaining the touch operation of the user on the virtual keyboard in the application program, the method further includes: judging whether the application program running in the foreground belongs to a pre-configured white list or not; when the application program running in the foreground belongs to the white list, a privacy protection mode is started; the privacy protection mode is a mode for hiding real characters input by a user.
Illustratively, the application program currently in the running state of the mobile terminal is obtained, and the package name of the application program positioned at the top of the task stack is determined. And inquiring a pre-configured white list according to the packet name, and determining whether the application program operated by the foreground of the current mobile terminal belongs to the white list. And monitoring the touch operation of the virtual keyboard input by the user in the current application program when the application program belongs to the white list. Specifically, taking a capacitive touch screen as an example, when a finger touches a metal layer, due to an electric field of a human body, a coupling capacitor is formed between a user and the surface of the touch screen, for a high-frequency current, the capacitor is a direct conductor, so that the finger sucks a very small current from a contact point, the currents respectively flow out from electrodes on four corners of the touch screen, the currents flowing through the four electrodes are in direct proportion to distances from the finger to the four corners, and a controller obtains a contact point coordinate of the touch point through accurate calculation of the proportions of the four currents. And determining whether the touch operation is the operation on the virtual keyboard according to the touch point coordinates corresponding to the touch operation.
And step 120, determining a user input character string according to the touch operation, and judging whether the user input character string meets a preset rule.
The preset rule is that the character string input by the user comprises a setting character string, wherein the setting character string comprises at least two continuous setting characters. For example, if the user preset character string is 44528, the mobile terminal determines that the user input character string includes the preset character string when detecting the user input 44528.
Specifically, when the touch operation of the user is a touch operation on a virtual keyboard in an application program running in the foreground of the current terminal, the character string input by the user is determined according to the touch point coordinates corresponding to the touch operation. Judging whether the character string length of the character string input by the user is not less than the character string length of the set character string, and determining whether to execute the operation of judging whether the character string input by the user accords with the preset rule or not according to the judgment result. For example, when the length of the character string of the user input character string is smaller than the set character string, the comparison operation between the user input character string and the set character string may not be executed, so as to save the terminal processing flow and improve the terminal processing efficiency. And when the character string length of the user input character string is the same as that of the set character string, judging whether the user input character string is the same as the set character string, if so, determining that the user input character string accords with a preset rule, otherwise, determining that the user input character string does not accord with the preset rule. When the length of the character string input by the user is larger than the set character string, starting from a character corresponding to the tail of the character string input by the user, selecting a continuous character sub-string with the same length as the character string of the set character string in the character string input by the user, judging whether the character sub-string is the same as the set character string or not, if so, determining that the character string input by the user accords with a preset rule, otherwise, determining that the character string input by the user does not accord with the preset rule.
And step 130, when the user input character string conforms to a preset rule, taking the user input character at the next moment as an initial character, and starting from the initial character, displaying by adopting a preset target character to replace the user input character.
The terminal can determine the moment when the character string input by the user meets the preset rule as the current moment, and if the user performs touch operation on the virtual keyboard at the next moment, the touch point coordinate corresponding to the touch operation is acquired. Thus, the character input by the user at the next moment is determined according to the touch point coordinates, and the character is taken as a starting character.
The target characters may be one character (e.g., &) or a different plurality of characters (e.g., &, ¥,%. to sequentially acquire one of the plurality of characters) and, in particular, a target character list may be preset in which a plurality of target characters for replacing the user input information are stored.
For example, when a user transacts a specific service through a mobile terminal, the user needs to input a personal identification number, the user sets a set number of characters in the personal identification number as a set character string in advance, in the process of inputting the personal identification number according to a voice prompt of the specific service, the terminal compares the user input character string with the set character string in real time, when the user input character string includes the set character string, a target character (a character other than a terminator or a character having other specific meanings) is displayed at a set position on a touch screen instead of an actual character input by the user, fig. 2 shows a schematic view of a dialing interface provided by an embodiment of the present invention, as shown in fig. 2, the user input character string includes the set character string 201 for hiding a target character 202 and a termination character 203 of a real user input character, specifically, when it is detected that the user input character string includes the set character string 44528, a character input from the user again after the number "8" is displayed on the touch screen, a query list of the target character string is displayed on the touch screen instead of a query list of a target character, and then a query list of the user is displayed on the touch screen, when it is detected that the user input character string includes the target character string 449, the target character list of a query number No. 528, and the target character list of a query No. 4 is displayed on the touch screen, the target character list of the user is displayed on the touch screen, if a query No. 2.
Further, upon detecting a termination character input by the user, the user input character is displayed starting from the termination character. Wherein the termination character may be a character that identifies termination of employing the target character in place of the user input information. The termination character can be determined in various ways, for example, a user-defined character can be used as the termination character. For another example, the terminal manufacturer may count the commonly used termination characters and pre-configure the termination characters in the mobile terminal.
According to the technical scheme, the touch operation of the user on the virtual keyboard of the application program in the currently running set white list is obtained, the user input character string is determined according to the touch operation, whether the user input character string meets the preset rule or not is judged, when the user input character string meets the preset rule, the user input character at the next moment is used as the initial character, the character string from the initial character to the set termination character is displayed by adopting the preset target character, the user privacy information is hidden, and the user privacy information can be prevented from being peeped by others. The embodiment solves the problem that the user information security is possibly threatened because the user inputs the personal privacy information and is easy to be peeped by others at present, and achieves the effect of improving the information security of the terminal user and the management efficiency of the mobile terminal.
Preferably, when the user input character string conforms to a preset rule, the real character of the virtual keyboard in the English input state or the digital input state is displayed by adopting a replacement character corresponding to the real character. The method has the advantages that the characters displayed on the virtual keyboard are replacement characters which are preset by the user and correspond to the real characters, so that the situation that other people steal personal privacy information of the user by peeping the operation of the user on the virtual keyboard is avoided, and the information safety of the user is further guaranteed.
Fig. 3 is a flowchart of another method for protecting user privacy according to an embodiment of the present invention. As shown in fig. 3, the method may include:
and 310, when the application program in the white list is set to be in the running state, acquiring the touch operation of the user on the virtual keyboard in the application program.
And when the privacy protection event trigger is detected, executing the user privacy protection function. For example, in the process of detecting that the user dials a call, the user is prompted by voice to input a personal identification number, a query password or a bank reserved mobile phone number, and the like, a privacy protection event is triggered. Alternatively, when a WeChat or a short message is detected, and a user inputs a key word such as an identity card number, a user name or a password for logging in a set application program, and the like, a privacy protection event is triggered. Taking the example that a user transacts a specific service through a mobile terminal, when detecting that the voice prompts the user to input a personal identification number, a privacy protection event is triggered to detect whether an application program currently running in the foreground of the terminal is an application program in a set white list.
For example, taking a mobile terminal equipped with an android system as an example, a running process of the system may be obtained by calling a getringing appprocesses () method in an ActivityManager class. And then, judging whether the application program corresponding to the process is positioned at the stack top of the task stack. A task stack is a container with a stack structure that can hold multiple Activity instances. An Activity is an application component that provides a screen through which a user can interact with the terminal to perform some task, such as dialing numbers, taking pictures, sending emails, looking at maps, etc. When an application is launched, the system creates a task (task) for the application to place the root Activity of the application. And when the application program corresponding to the process is positioned at the top of the stack, inquiring a set white list according to the packet name of the application program, and determining whether the application program belongs to the set white list.
And if the application program belongs to the set white list, acquiring the touch operation of the user. Specifically, the touch screen adopted by the existing mobile terminal includes a resistive touch screen, a capacitive touch screen, a piezoelectric touch screen, and the like, and when a user touches the touch screen, the touch screen can detect touch information, and then the touch operation of the user is identified. Taking a capacitive touch screen as an example, the touch screen can sense the change of capacitance, when a user touches the touch screen, the touch screen senses the change of capacitance and recognizes touch information, the touch information comprises an x coordinate and a y coordinate, and the coordinate information is reported to an upper layer through an input system, so that the touch operation occurring at a certain position of the touch screen can be determined by using the touch information.
Since the display position of the virtual keyboard of the application program is known, it can be determined whether the touch operation is a touch operation on the virtual keyboard in the application program according to the x coordinate and the y coordinate of the touch point corresponding to the touch operation.
And step 320, determining a character string input by the user according to the touch operation.
When the touch operation is the touch operation on the virtual keyboard in the application program, determining which characters on the virtual keyboard correspond to the touch operation according to the x coordinate and the y coordinate of the touch point corresponding to the touch operation, and accordingly determining that a user inputs a character string.
Step 330, determining whether the string length of the user input string is not less than the string length of the set string, if yes, executing step 340, and if no, executing step 320.
If the string length of the user input string is smaller than the string length of the set string, step 320 is executed. Specifically, if the user inputs the character string "445" whose length is smaller than the length of the setting character string "4528", step 320 is executed. If the terminal executes step 320 to detect that the user inputs "2", in this case, the user inputs "4452" as the character string, and the length of the character string is equal to the length of the set character string, execute step 340.
Step 340, determining whether the user input character string meets a preset rule, if yes, executing step 350, and if not, executing step 320.
Fig. 4 is a flowchart of a method for determining whether a character string input by a user meets a preset rule according to an embodiment of the present invention. As shown in fig. 4, the method may include:
step 341, comparing the character string length of the character string input by the user with the character string length of the set character string.
The setting character string may be located at a head position of the user input character string, and may also be located at a middle position of the user input character string. For example, the setting string may be "44528" or "4528".
Step 342, determine whether the two strings have the same length, if yes, go to step 343, otherwise go to step 344.
Step 343, comparing the character string input by the user with the set character string.
For example, when the user input character string is "44528" and the setting character string is also "44528", the user input character string is compared with the setting character string, and since the characters included in the two character strings are completely the same, it is determined that the user input character string meets the preset rule, and the process goes to step 350.
For example, when the user inputs "4452" as the character string and "4528" as the setting character, the character string length is the same as the character string length of the setting character string. Then, the user input character string "4452" is compared with the setting character string "4528" to determine whether the characters included in the two character strings are identical, and thus, whether the user input character string conforms to a preset rule is determined according to the comparison result. In this example, the two character strings of the user input character string and the setting character string do not include exactly the same characters, and because the length of the character string of the user input character string is not greater than the setting character string, it is determined that the user input character string does not conform to the preset rule, and the step 320 is returned to.
And 344, starting from the character corresponding to the tail of the character string input by the user, selecting a continuous character sub-string with the same length as the character string of the set character string in the character string input by the user.
When the user inputs the character string as "44528", the character string length is larger than the character string length of the setting character string. Starting with the character "8" corresponding to the end of the user input character string, a character sub-string having the same character string length as the set character string "4528" is selected from the user input character string, and the execution proceeds to step 345, where the character sub-string is "4528".
Step 345, comparing the character sub-string with the set character string.
Illustratively, the character sub-string "4528" is compared with the set character string "4528" to determine whether the two character strings include identical characters. Because the two character strings of the character sub-string and the set character string comprise the same characters, the user input character string is determined to accord with the preset rule, and the step 350 is executed.
And 350, displaying the real characters of the virtual keyboard in an English input state or a digital input state by adopting the replacing characters corresponding to the real characters.
The corresponding relation between the replacing character and the real character is preset by the user. For example, after entering the privacy protection function setting interface and setting a white list by the user, the user may be prompted to set a replacement character of the real character, and a character replacement table may be generated. For example, the character substitution table may be as shown in table 1:
table 1 is a character substitution table of real characters and substitution characters
Figure BDA0001211609930000091
When the user input characters accord with the preset rules, the preset replacement characters of the real characters are displayed on the virtual keyboard in the English input state or the digital state. Fig. 5 is a schematic diagram illustrating another dialing interface provided by an embodiment of the invention. As shown in fig. 5, the terminal displays the real characters 0-9 in the dial by using corresponding replacement characters.
Illustratively, if the user further needs to input 199012116022 after inputting 44528 and ends with # and the replacement character is displayed on the virtual keyboard, the user needs to input azztaaatcpp # and the characters displayed on the display screen are 44528& & & & & & & & & & & & & & & & & & &. The design has the advantages that even though the user is peeped by others when inputting the privacy information, the user privacy information can be protected from being leaked because the replacement characters of the real characters are displayed in the virtual keyboard, and the real characters actually input by the user are not clear to others.
Fig. 6 is a device for protecting user privacy according to an embodiment of the present invention. As shown in fig. 6, the apparatus includes: an operation acquisition module 610, a rule judgment module 620 and a character display module 630.
An operation obtaining module 610, configured to obtain a touch operation of a virtual keyboard in an application program by a user;
a rule judging module 620, configured to determine a user input character string according to the touch operation, and judge whether the user input character string meets a preset rule;
and a character display module 630, configured to, when the user input character string meets a preset rule, use a user input character at a next moment as an initial character, and display, starting from the initial character, by using a preset target character instead of the user input character.
The embodiment provides a device for protecting user privacy, which can hide user individual privacy information and prevent the user individual privacy information from being peeped by others. The embodiment solves the problem that the user information security is possibly threatened because the user inputs the personal privacy information and is easy to be peeped by others at present, and achieves the effect of improving the information security of the terminal user and the management efficiency of the mobile terminal.
Preferably, the device further includes a mode starting module, configured to determine whether the application program running in the foreground belongs to a preconfigured white list before obtaining the touch operation of the user on the virtual keyboard in the application program; when the application program running in the foreground belongs to the white list, a privacy protection mode is started; the privacy protection mode is a mode for hiding real characters input by a user.
Preferably, the character display module is further configured to: upon detecting a termination character entered by a user, displaying a user-entered character starting from the termination character.
Preferably, the preset rule is that the user input character string includes a setting character string, wherein the setting character string includes at least two consecutive setting characters.
Preferably, the apparatus further comprises:
and the length judging module is used for judging whether the character string length of the user input character string is not less than the character string length of the set character string before judging whether the user input character string accords with the preset rule, and determining whether to execute the operation of judging whether the user input character string accords with the preset rule according to the judgment result. When the character string length of the character string input by the user is smaller than the character string length of the set character string, the operation of judging whether the character string input by the user meets the preset rule is not executed, so that the processing resource of the terminal is saved, and the management efficiency of the mobile terminal is improved.
Preferably, the rule determining module 620 is specifically configured to:
when the character string lengths of the user input character string and the set character string are the same, judging whether the user input character string is the same as the set character string, if so, determining that the user input character string accords with a preset rule, otherwise, determining that the user input character string does not accord with the preset rule;
when the character string length of the user input character string is larger than the set character string, starting from a character corresponding to the tail of the user input character string, selecting a continuous character sub-string with the same character string length as the set character string in the user input character string, judging whether the character sub-string is the same as the set character string or not, if so, determining that the user input character string accords with a preset rule, otherwise, determining that the user input character string does not accord with the preset rule.
Preferably, the apparatus further comprises:
and the keyboard replacing module is used for displaying the real characters of the virtual keyboard in an English input state or a digital input state by adopting replacing characters corresponding to the real characters when the character string input by the user accords with a preset rule.
The device for protecting the user privacy can execute the method for protecting the user privacy provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method. Technical details that are not described in detail in the above embodiments may be referred to a method for protecting user privacy provided in any embodiment of the present invention.
The embodiment of the invention provides a mobile terminal, and the device for protecting the privacy of a user, which is provided by the embodiment of the invention, can be integrated in the mobile terminal. Fig. 7 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention. As shown in fig. 7, the mobile terminal may include: a housing (not shown), a memory 701, a Central Processing Unit (CPU) 702 (also called a processor, hereinafter referred to as CPU), a circuit board (not shown), and a power circuit (not shown). The circuit board is arranged in a space enclosed by the touch screen 712 and the shell; the CPU702 and the memory 701 are provided on the circuit board; the power supply circuit is used for supplying power to each circuit or device of the mobile terminal; the memory 701 is used for storing a computer program; the CPU702 reads and executes the computer program stored in the memory 701. The CPU702, when executing the computer program, implements the steps of:
acquiring touch operation of a user on a virtual keyboard in an application program;
determining a user input character string according to the touch operation, and judging whether the user input character string meets a preset rule or not;
and when the user input character string conforms to a preset rule, taking the user input character at the next moment as an initial character, and starting from the initial character, displaying by adopting a preset target character to replace the user input character.
The mobile terminal further includes: peripheral interfaces 703, RF (Radio Frequency) circuitry 705, audio circuitry 706, speakers 711, touch screen 712, power management chip 708, input/output (I/O) subsystems 709, other input/control devices 710, and external ports 704, which communicate over one or more communication buses or signal lines 707.
It should be understood that the illustrated mobile terminal 700 is merely one example of a mobile terminal and that the mobile terminal 700 may have more or fewer components than shown, may combine two or more components, or may have a different configuration of components. The various components shown in the figures may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
The following describes the mobile terminal 700 integrated with the device for protecting user privacy provided in this embodiment in detail, and the mobile terminal is a mobile phone as an example.
A memory 701, the memory 701 being accessible by the CPU702, the peripheral interface 703, and the like, the memory 701 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other volatile solid state storage devices.
A peripheral interface 703, said peripheral interface 703 may connect input and output peripherals of the device to the CPU702 and the memory 701.
An I/O subsystem 709, which I/O subsystem 709 may connect input and output peripherals on the device, such as a touch screen 712 and other input/control devices 710, to the peripheral interface 703. The I/O subsystem 709 may include a display controller 7091 and one or more input controllers 7092 for controlling other input/control devices 710. Where one or more input controllers 7092 receive electrical signals from or transmit electrical signals to other input/control devices 710, the other input/control devices 710 may include physical buttons (push buttons, rocker buttons, etc.), dials, slide switches, joysticks, click wheels. It is worth noting that the input controller 7092 may be connected to any one of the following: a keyboard, an infrared port, a USB interface, and a pointing device such as a mouse.
A touch screen 712, the touch screen 712 being an input interface and an output interface between the user terminal and the user, displaying visual output to the user, which may include graphics, text, icons, video, and the like.
The display controller 7091 in the I/O subsystem 709 receives electrical signals from the touch screen 712 or transmits electrical signals to the touch screen 712. The touch screen 712 detects a contact on the touch screen, and the display controller 7091 converts the detected contact into an interaction with a user interface object displayed on the touch screen 712, i.e., implements a human-computer interaction, and the user interface object displayed on the touch screen 712 may be an icon for running a game, an icon networked to a corresponding network, or the like. It is worth mentioning that the device may also comprise a light mouse, which is a touch sensitive surface that does not show visual output, or an extension of the touch sensitive surface formed by the touch screen.
The RF circuit 705 is mainly used to establish communication between the mobile phone and the wireless network (i.e., network side), and implement data reception and transmission between the mobile phone and the wireless network. Such as sending and receiving short messages, e-mails, etc. In particular, RF circuitry 705 receives and transmits RF signals, also referred to as electromagnetic signals, through which RF circuitry 705 converts electrical signals to or from electromagnetic signals and communicates with communication networks and other devices. RF circuitry 705 may include known circuitry for performing these functions including, but not limited to, an antenna system, an RF transceiver, one or more amplifiers, a tuner, one or more oscillators, a digital signal processor, a CODEC (CODEC) chipset, a Subscriber Identity Module (SIM), and so forth.
The audio circuit 706 is mainly used to receive audio data from the peripheral interface 703, convert the audio data into an electric signal, and transmit the electric signal to the speaker 711.
The speaker 711 is used to convert the voice signal received by the handset from the wireless network through the RF circuit 705 into sound and play the sound to the user.
And a power management chip 708 for supplying power and managing power to the hardware connected to the CPU702, the I/O subsystem, and the peripheral interface.
The mobile terminal provided by the embodiment can hide the personal privacy information of the user, and can prevent the personal privacy information of the user from being peeped by others. The embodiment solves the problem that the user information security is possibly threatened because the user inputs the personal privacy information and is easy to be peeped by others at present, and achieves the effect of improving the information security of the terminal user and the management efficiency of the mobile terminal.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (7)

1. A method of protecting user privacy, comprising:
acquiring touch operation of a user on a virtual keyboard in an application program;
determining a user input character string according to the touch operation, and judging whether the user input character string meets a preset rule or not;
when the user input character string conforms to a preset rule, taking the user input character at the next moment as an initial character, and displaying by using a preset target character to replace the user input character from the initial character, wherein a target character list is preset, a plurality of target characters used for replacing the user input character are stored in the target character list, and different input characters correspond to different target characters;
when the user input character string conforms to a preset rule, displaying a real character of the virtual keyboard in an English input state or a digital input state by adopting a replacement character corresponding to the real character;
the preset rule is that a user input character string comprises a setting character string, wherein the setting character string comprises at least two continuous setting characters;
wherein, judge whether the user input character string accords with preset rule, include:
when the character string lengths of the user input character string and the set character string are the same, judging whether the user input character string is the same as the set character string, if so, determining that the user input character string accords with a preset rule, otherwise, determining that the user input character string does not accord with the preset rule;
when the character string length of the character string input by the user is larger than the set character string, starting from a character corresponding to the tail of the character string input by the user, selecting a continuous character sub-string with the same length as the character string of the set character string in the character string input by the user, judging whether the character sub-string is the same as the set character string or not, if so, determining that the character string input by the user accords with the preset rule, otherwise, determining that the character string input by the user does not accord with the preset rule until all characters of the character string input by the user are completely matched.
2. The method according to claim 1, before acquiring the touch operation of the user on the virtual keyboard in the application program, further comprising:
judging whether the application program running in the foreground belongs to a pre-configured white list or not;
when the application program running in the foreground belongs to the white list, a privacy protection mode is started; the privacy protection mode is a mode for hiding real characters input by a user.
3. The method of claim 1, further comprising:
upon detecting a termination character entered by a user, displaying a user-entered character starting from the termination character.
4. An apparatus for protecting privacy of a user, comprising:
the operation acquisition module is used for acquiring the touch operation of a user on a virtual keyboard in the application program;
the rule judging module is used for determining a user input character string according to the touch operation and judging whether the user input character string meets a preset rule or not;
the character display module is used for taking the user input character at the next moment as an initial character when the user input character string conforms to a preset rule, and displaying by adopting a preset target character to replace the user input character from the initial character, wherein a target character list is preset, a plurality of target characters used for replacing the user input character are stored in the target character list, and different input characters correspond to different target characters;
the device further comprises:
the keyboard replacement module is used for displaying real characters of the virtual keyboard in an English input state or a digital input state by adopting replacement characters corresponding to the real characters when the user input character string conforms to a preset rule;
the preset rule is that a user input character string comprises a setting character string, wherein the setting character string comprises at least two continuous setting characters;
wherein the rule judging module is specifically configured to:
when the character string lengths of the user input character string and the set character string are the same, judging whether the user input character string is the same as the set character string, if so, determining that the user input character string accords with a preset rule, otherwise, determining that the user input character string does not accord with the preset rule;
when the character string length of the character string input by the user is larger than the set character string, starting from a character corresponding to the tail of the character string input by the user, selecting a continuous character sub-string with the same length as the character string of the set character string in the character string input by the user, judging whether the character sub-string is the same as the set character string or not, if so, determining that the character string input by the user accords with the preset rule, otherwise, determining that the character string input by the user does not accord with the preset rule until all characters of the character string input by the user are completely matched.
5. The apparatus of claim 4, further comprising:
the mode starting module is used for judging whether the application program running in the foreground belongs to a pre-configured white list or not before acquiring the touch operation of a user on a virtual keyboard in the application program; when the application program running in the foreground belongs to the white list, a privacy protection mode is started; the privacy protection mode is a mode for hiding real characters input by a user.
6. The apparatus of claim 4, wherein the character display module is further configured to:
upon detecting a termination character entered by a user, displaying a user-entered character starting from the termination character.
7. A mobile terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executing the computer program implements the steps of:
acquiring touch operation of a user on a virtual keyboard in an application program;
determining a user input character string according to the touch operation, and judging whether the user input character string meets a preset rule or not;
when the user input character string conforms to a preset rule, taking the user input character at the next moment as an initial character, and displaying by using a preset target character to replace the user input character from the initial character, wherein a target character list is preset, a plurality of target characters used for replacing the user input character are stored in the target character list, and different input characters correspond to different target characters;
when the user input character string conforms to a preset rule, displaying a real character of the virtual keyboard in an English input state or a digital input state by adopting a replacement character corresponding to the real character;
the preset rule is that a user input character string comprises a setting character string, wherein the setting character string comprises at least two continuous setting characters;
wherein, judge whether the user input character string accords with preset rule, include:
when the character string lengths of the user input character string and the set character string are the same, judging whether the user input character string is the same as the set character string, if so, determining that the user input character string accords with a preset rule, otherwise, determining that the user input character string does not accord with the preset rule;
when the character string length of the character string input by the user is larger than the set character string, starting from a character corresponding to the tail of the character string input by the user, selecting a continuous character sub-string with the same length as the character string of the set character string in the character string input by the user, judging whether the character sub-string is the same as the set character string or not, if so, determining that the character string input by the user accords with the preset rule, otherwise, determining that the character string input by the user does not accord with the preset rule until all characters of the character string input by the user are completely matched.
CN201710031325.XA 2017-01-17 2017-01-17 Method and device for protecting user privacy and mobile terminal Active CN106815534B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710031325.XA CN106815534B (en) 2017-01-17 2017-01-17 Method and device for protecting user privacy and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710031325.XA CN106815534B (en) 2017-01-17 2017-01-17 Method and device for protecting user privacy and mobile terminal

Publications (2)

Publication Number Publication Date
CN106815534A CN106815534A (en) 2017-06-09
CN106815534B true CN106815534B (en) 2020-02-14

Family

ID=59111715

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710031325.XA Active CN106815534B (en) 2017-01-17 2017-01-17 Method and device for protecting user privacy and mobile terminal

Country Status (1)

Country Link
CN (1) CN106815534B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107451442A (en) * 2017-07-07 2017-12-08 珠海格力电器股份有限公司 A kind of multimedia file guard method and its device, electronic equipment
CN110598489A (en) * 2018-06-13 2019-12-20 北京搜狗科技发展有限公司 Privacy protection method for inputting prompt information and related device
CN109446794B (en) * 2018-10-15 2020-06-02 维沃移动通信有限公司 Password input method and mobile terminal thereof
WO2021179155A1 (en) * 2020-03-10 2021-09-16 深圳市欢太科技有限公司 Compliance test method and apparatus for storage information, electronic device, and storage medium
CN112462953B (en) * 2020-11-23 2023-02-28 厦门理工学院 Dynamic input method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702191A (en) * 2009-10-31 2010-05-05 浙江德施曼机电有限公司 Device and method for verifying passwords
CN102929498A (en) * 2011-09-12 2013-02-13 微软公司 Password reveal selector
CN104156678A (en) * 2013-05-13 2014-11-19 联想(北京)有限公司 Input character protection method and system and electronic device
CN105335633A (en) * 2015-10-08 2016-02-17 广东欧珀移动通信有限公司 Mobile terminal anti-peeping method and mobile terminal
CN106027804A (en) * 2016-07-19 2016-10-12 努比亚技术有限公司 Unlocking method and unlocking apparatus of mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702191A (en) * 2009-10-31 2010-05-05 浙江德施曼机电有限公司 Device and method for verifying passwords
CN102929498A (en) * 2011-09-12 2013-02-13 微软公司 Password reveal selector
CN104156678A (en) * 2013-05-13 2014-11-19 联想(北京)有限公司 Input character protection method and system and electronic device
CN105335633A (en) * 2015-10-08 2016-02-17 广东欧珀移动通信有限公司 Mobile terminal anti-peeping method and mobile terminal
CN106027804A (en) * 2016-07-19 2016-10-12 努比亚技术有限公司 Unlocking method and unlocking apparatus of mobile terminal

Also Published As

Publication number Publication date
CN106815534A (en) 2017-06-09

Similar Documents

Publication Publication Date Title
CN106815534B (en) Method and device for protecting user privacy and mobile terminal
US10614202B2 (en) Electronic device
CN106681635B (en) Split screen false touch prevention method and device and mobile terminal
CN106775087B (en) Touch screen control method and device of mobile terminal and mobile terminal
CN106778175B (en) Interface locking method and device and terminal equipment
EP3148225A1 (en) Bluetooth connection-based audio playback method and apparatus
CN106658489B (en) Terminal application processing method and device and mobile terminal
CN105447368A (en) User terminal access right control method and user terminal
CN107357458B (en) Touch key response method and device, storage medium and mobile terminal
CN109074171B (en) Input method and electronic equipment
CN110765502B (en) Information processing method and related product
CN109375854B (en) Drawing method, drawing device, storage medium and electronic equipment
CN111277991B (en) Operator name display method and device, mobile terminal and storage medium
CN107450839A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
CN106105168B (en) Call forwarding method, terminal and portable electronic equipment
US20170047640A1 (en) Electronic device and method of improving antenna performance thereof
CN107291302B (en) Control method and device of touch screen, storage medium and terminal
CN107422860A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
CN107844341A (en) Management-control method, device and the storage medium and mobile terminal of process initiation
EP3480685B1 (en) Electronic device including touchpad and fingerprint sensor and method of detecting touch
CN104933340A (en) Message sending method and mobile terminal
CN106385415B (en) Information security control method and device and terminal
CN110851014B (en) Touch recognition method and device, storage medium and terminal equipment
CN106101361A (en) The display packing of cell phone address book, device and mobile phone
CN106648298B (en) Application control method and device and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong Opel Mobile Communications Co., Ltd.

GR01 Patent grant
GR01 Patent grant