CN106874751A - Input method, device and mobile terminal under system protection pattern - Google Patents
Input method, device and mobile terminal under system protection pattern Download PDFInfo
- Publication number
- CN106874751A CN106874751A CN201710025476.4A CN201710025476A CN106874751A CN 106874751 A CN106874751 A CN 106874751A CN 201710025476 A CN201710025476 A CN 201710025476A CN 106874751 A CN106874751 A CN 106874751A
- Authority
- CN
- China
- Prior art keywords
- input method
- input
- application
- protection pattern
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 295
- 230000009885 systemic effect Effects 0.000 claims abstract description 82
- 238000012544 monitoring process Methods 0.000 claims abstract description 9
- 230000001960 triggered effect Effects 0.000 claims abstract description 8
- 230000006870 function Effects 0.000 claims description 24
- 230000006399 behavior Effects 0.000 claims description 15
- 230000006854 communication Effects 0.000 description 27
- 238000004891 communication Methods 0.000 description 26
- 238000013507 mapping Methods 0.000 description 22
- 230000008859 change Effects 0.000 description 13
- 238000002955 isolation Methods 0.000 description 13
- 238000005516 engineering process Methods 0.000 description 11
- 239000004744 fabric Substances 0.000 description 8
- 238000003825 pressing Methods 0.000 description 8
- 238000003860 storage Methods 0.000 description 7
- 244000035744 Hura crepitans Species 0.000 description 6
- 238000007726 management method Methods 0.000 description 6
- 238000009434 installation Methods 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 230000006872 improvement Effects 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000004913 activation Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000002155 anti-virotic effect Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000033001 locomotion Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 239000004576 sand Substances 0.000 description 2
- 229910052709 silver Inorganic materials 0.000 description 2
- 239000004332 silver Substances 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 239000011800 void material Substances 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 241000196324 Embryophyta Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 238000012905 input function Methods 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1066—Hiding content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
The present invention provides a kind of input method and device under system protection pattern; what monitoring was triggered under with the system protection pattern of domestic consumer's account identity logs calls behavior to input method interface; under system protection pattern; it is configured with the safe space that operation resource is provided for the operation to make a reservation for application, safe space inaccessible under system general mode;When input method interface is called, the input text type of input control is obtained;If the input text type is password, the input method application of systemic presupposition is enabled, the input method application of the systemic presupposition is installed on the safe space.Under system protection pattern, if the behavior of calling to input method interface were listened to, and the input text type of input control would be password; then prove that user to be ready being input into password; the input method application of systemic presupposition now all can be automatically enabled, password disclosure risk can be avoided, improve security.Additionally provide a kind of mobile terminal.
Description
Technical field
The present invention relates to input method technique field, specifically, the present invention relates to a kind of defeated under system protection pattern
Enter method and apparatus, further relate to a kind of mobile terminal.
Background technology
Some mobile terminals are for security consideration, there is provided corresponding system protection pattern, to protect user to be handed on the net
Easily, the safety of online payment, bank's inquiry etc. occasion.For example, the property shielding system of 360 mobile phones, the system is on the one hand logical
Cross the mode in built-in security application shop to prevent from stealing the invasion of wooden horse, counterfeit application, coming for application is ensure that from source
Source safety;On the other hand also by building ad-hoc networks passage, transmission is encrypted to data such as account passwords, it is ensured that data exist
Safety in transmitting procedure.Meanwhile, the data such as finance and money management are also carried out into isolation of system, forbid malicious application illegally to read, from
The safety of user's payment environment is fundamentally ensured.
If being mounted with input methods, when inputing password under system protection pattern, use may be directly invoked
The default third party's input method in family, consequently, it is possible to there is the risk of password leakage, security has much room for improvement.
On the other hand, these safe modes are normally based on " sandbox " isolation technology, but because many applications are required
The authority outside sandbox is obtained, when user downloads installation one to apply, may will be required that giving the application program breaks sand
The authority of case.Because user wants to use the repertoire of the application, thus this applies associated rights to be directed imparting, causes sand
The security isolation of case is not guaranteed, and security has much room for improvement.
The content of the invention
The purpose of the present invention is intended at least to solve one of above-mentioned technological deficiency, particularly security technology not high and lacks
Fall into.
The present invention provides a kind of input method under system protection pattern, it is characterised in that comprise the following steps:
What monitoring was triggered under with the system protection pattern of domestic consumer's account identity logs calls to input method interface
Behavior, under system protection pattern, is configured with the safe space that operation resource is provided for the operation to make a reservation for application, and the safety is empty
Between under system general mode inaccessible;
When input method interface is called, the input text type of input control is obtained;
If the input text type is password, enable the input method application of systemic presupposition, the systemic presupposition it is defeated
Enter method application and be installed on the safe space.
Wherein in one embodiment, the predetermined application includes paying related application, the application of financing correlation and silver
It is a kind of at least within the related application of row.
Wherein in one embodiment, it is described operation resource include the application program in itself, the application configuration data and should
Using user data wherein at least one, the safe space includes memory space.
Wherein in one embodiment, the operation resource includes running protection strategy, and the safe space includes storage
Space and its corresponding running protection strategy configuration surroundings.
Wherein in one embodiment, the system is Android system, and the input method interface is Inp
utMethodManager。
Wherein in one embodiment, the system is Android system, and the input control is EditTe xt controls, is led to
The inputType attributes for obtaining EditText controls are crossed to obtain the input text type;If inputType="
TextPassword " or inputType=" textVisiblePassword ", then the input text type is password.
Wherein in one embodiment, the input method application of the systemic presupposition is the input method that can not reach external network
Using.
Wherein in one embodiment, the input method application of the systemic presupposition is set to possess network savvy by system
It is set to the input method application in off-line state.
Wherein in one embodiment, the input method application for enabling systemic presupposition includes:
The input method of the systemic presupposition and the communication connection of external network are disconnected during Password Input, password is completed defeated
Fashionable recovery communication connection.
Wherein in one embodiment, the input method application of the systemic presupposition is that the input method without network savvy should
With.
Wherein in one embodiment, the input method application of the systemic presupposition is used for:
Show the dummy keyboard of initialization after called;
When the keyboard for then listening to setting each time is touched by event, the key mapping cloth of the dummy keyboard is changed at random
Office.
Wherein in one embodiment, the keyboard layout of the dummy keyboard of the initialization is random generation.
Wherein in one embodiment, the input method application of the systemic presupposition is used for:
Show the dummy keyboard of initialization after called;
Receive the switching command of setting;
When the keyboard for then listening to setting each time is touched by event, the key mapping cloth of the dummy keyboard is changed at random
Office.
Wherein in one embodiment, the switching command of the setting includes being generated by the press event of setting physical keyboard
Instruction, by fingerprint sensor touch by event generate instruction and by the dummy keyboard set key mapping touch by event give birth to
Into instruction at least one.
Wherein in one embodiment, the keyboard for setting touches the touching by thing as figure case or letters case by event
Part.
Wherein in one embodiment, it is described change the dummy keyboard at random keyboard layout be:It is random to change described
The keyboard layout of figure case or letters case on dummy keyboard.
The present invention also provides a kind of input unit under system protection pattern, and it includes:
Monitor module, for monitor under with the system protection pattern of domestic consumer's account identity logs trigger to input
Method interface calls behavior, under system protection pattern, is configured with and provides the safety for running resource for the operation to make a reservation for application
Space, safe space inaccessible under system general mode;
Acquisition module, for when input method interface is called, obtaining the input text type of input control;
Module is enabled, if being password for the input text type, the input method application of systemic presupposition is enabled, it is described
The input method application of systemic presupposition is installed on the safe space.
Wherein in one embodiment, the predetermined application includes paying related application, the application of financing correlation and silver
It is a kind of at least within the related application of row.
Wherein in one embodiment, it is described operation resource include the application program in itself, the application configuration data and should
Using user data wherein at least one, the safe space includes memory space.
Wherein in one embodiment, the operation resource includes running protection strategy, and the safe space includes storage
Space and its corresponding running protection strategy configuration surroundings.
Wherein in one embodiment, the system is Android system, and the input method interface is Inp
utMethodManager。
Wherein in one embodiment, the system is Android system, and the input control is EditTe xt controls, institute
State acquisition module and obtain the input text type by obtaining the inputType attributes of EditText controls;If
InputType=" textPassword " or inputType=" textVisibl ePassword ", then it is described to be input into text class
Type is password.
Wherein in one embodiment, the input method application of the systemic presupposition is the input method that can not reach external network
Using.
Wherein in one embodiment, the input method application of the systemic presupposition is set to possess network savvy by system
It is set to the input method application in off-line state.
Wherein in one embodiment, the module that enables is used for:The systemic presupposition is disconnected during Password Input
Input method and the communication connection of external network, complete to recover the communication connection during Password Input.
Wherein in one embodiment, the input method application of the systemic presupposition is that the input method without network savvy should
With.
Wherein in one embodiment, the input method application of the systemic presupposition is used for:
Show the dummy keyboard of initialization after called;
When the keyboard for then listening to setting each time is touched by event, the key mapping cloth of the dummy keyboard is changed at random
Office.
Wherein in one embodiment, the keyboard layout of the dummy keyboard of the initialization is random generation.
Wherein in one embodiment, the input method application of the systemic presupposition is used for:
Show the dummy keyboard of initialization after called;
Receive the switching command of setting;
When the keyboard for then listening to setting each time is touched by event, the key mapping cloth of the dummy keyboard is changed at random
Office.
Wherein in one embodiment, the switching command of the setting includes being generated by the press event of setting physical keyboard
Instruction, by fingerprint sensor touch by event generate instruction and by the dummy keyboard set key mapping touch by event give birth to
Into instruction at least one.
Wherein in one embodiment, the keyboard for setting touches the touching by thing as figure case or letters case by event
Part.
Wherein in one embodiment, it is described change the dummy keyboard at random keyboard layout be:It is random to change described
The keyboard layout of figure case or letters case on dummy keyboard.
The present invention also provides a kind of mobile terminal, and it includes:
Touch-sensitive display;
One or more processors;
Memory;
One or more application programs, wherein one or more of application programs are stored in the memory and quilt
It is configured to by one or more of computing devices, one or more of programs are configured to carry out any of the above-described embodiment
The described input method under system protection pattern.
The above-mentioned input method under system protection pattern, device and mobile terminal, monitor with domestic consumer's account
The behavior of calling to input method interface triggered under the system protection pattern of identity logs, under system protection pattern, is configured with use
The safe space of operation resource, safe space inaccessible under system general mode are provided in the operation to make a reservation for application;
When input method interface is called, the input text type of input control is obtained;If the input text type is password, open
With the input method application of systemic presupposition, the input method application of the systemic presupposition is installed on the safe space.In system protection
Under pattern, if the behavior of calling to input method interface were listened to, and the input text type of input control would be password, then prove
User to be ready being input into password, and what the input method application no matter system default is called (put by user preset) is, now all can
The automatic input method application for enabling systemic presupposition.So, even if the input method application that system default is called is third-party application,
Password disclosure risk can be avoided, security is improve.
In the present invention, system protection pattern is realized by the multi-user mode of system.I.e. system is in keeper
It is system general mode when account is logged in, it is system protection pattern that system is in when domestic consumer account is logged in, system is from system
General mode is to be switched to user EXEC from administrator mode equivalent to system into system protection pattern.Due to multi-user
Pattern can realize certain data isolation between user, such that it is able to realize safe operation of the user under system protection pattern,
Realize security isolation.
The additional aspect of the present invention and advantage will be set forth in part in the description, and these will become from the following description
Obtain substantially, or recognized by practice of the invention.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, below will be to that will make needed for embodiment description
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those skilled in the art, on the premise of not paying creative work, can also obtain other attached according to these accompanying drawings
Figure.
Fig. 1 is the input method flow chart under system protection pattern of one embodiment;
Fig. 2 is the input unit module map under system protection pattern of one embodiment;
Fig. 3 is illustrated that the block diagram of the part-structure of the mobile phone related to mobile terminal provided in an embodiment of the present invention.
Specific embodiment
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention
Accompanying drawing, is clearly and completely described to the technical scheme in the embodiment of the present invention.
In some flows of description in description and claims of this specification and above-mentioned accompanying drawing, contain according to
Multiple operations of particular order appearance, but it should be clearly understood that these operations can not be according to the suitable of its appearance herein
Sequence is performed or executed in parallel, the sequence number such as 101,102 etc. of operation, is only used for distinguishing each different operation, sequence number
Any execution sequence is not represented for itself.In addition, these flows can include more or less operation, and these operations can
To perform in order or executed in parallel.It should be noted that " first ", " second " herein etc. describes, it is for distinguishing not
Same message, equipment, module etc., does not represent sequencing, and it is different types also not limit " first " and " second ".
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " " used herein, " one
It is individual ", " described " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that what is used in specification of the invention arranges
Diction " including " refer to the presence of the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
One or more other features, integer, step, operation, element, component and/or their group.It should be understood that when we claim unit
Part is " connected " or during " coupled " to another element, and it can be directly connected or coupled to other elements, or can also exist
Intermediary element.Additionally, " connection " used herein or " coupling " can include wireless connection or wireless coupling.It is used herein to arrange
Diction "and/or" includes one or more associated wholes or any cell of listing item and all combines.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific terminology), with art of the present invention in those of ordinary skill general understanding identical meaning.Should also
Understand, those terms defined in such as general dictionary, it should be understood that with the context with prior art
The consistent meaning of meaning, and unless by specific definitions as here, will not otherwise use idealization or excessively formal implication
To explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal device " both include wireless communication
The equipment of number receiver, the equipment of its wireless signal receiver for only possessing non-emissive ability, and including receiving and transmitting hardware
Equipment, its have can on bidirectional communication link, perform two-way communication reception and transmitting hardware equipment.This equipment
Can include:Honeycomb or other communication equipments, it has single line display or multi-line display or is shown without multi-line
The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), it can
With combine voice, data processing, fax and/or its communication ability;PDA (Personal Digital Assistant, it is personal
Digital assistants), it can include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day
Go through and/or GPS (Global Positioning System, global positioning system) receiver;Conventional laptop and/or palm
Type computer or other equipment, its have and/or conventional laptop and/or palmtop computer including radio frequency receiver or its
His equipment." terminal " used herein above, " terminal device " they can be portable, can transport, installed in the vehicles (aviation,
Sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in the earth
And/or any other position operation in space." terminal " used herein above, " terminal device " can also be communication terminal, on
Network termination, music/video playback terminal, for example, can be PDA, MID (Mobile Internet Device, mobile Internet
Equipment) and/or the equipment such as mobile phone, or intelligent television, Set Top Box with music/video playing function.
Those skilled in the art of the present technique are appreciated that remote network devices used herein above, and it includes but is not limited to meter
The cloud that calculation machine, network host, single network server, multiple webserver collection or multiple servers are constituted.Here, Yun Youji
Constituted in a large amount of computers or the webserver of cloud computing (Cloud Computing), wherein, cloud computing is Distributed Calculation
One kind, a super virtual computer being made up of the computer collection of a group loose couplings.In embodiments of the invention, distal end
Can realize communicating by any communication mode between the network equipment, terminal device and WNS servers, including but not limited to, be based on
The mobile communication of 3GPP, LTE, WIMAX, based on TCP/IP, the computer network communication of udp protocol and based on bluetooth, infrared
The low coverage wireless transmission method of transmission standard.
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on
Embodiment in the present invention, the every other implementation that those skilled in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
In the following description, system is the operating system of mobile terminal, for example Android system, iOS Mobile operating systems
Etc..In the following description, with Android system, property illustrates that mobile terminal can be the intelligence such as mobile phone, panel computer as an example
Can terminal.
Fig. 1 is the input method flow chart under system protection pattern of one embodiment.
The present invention is provided in the embodiment of the present invention a kind of input method under system protection pattern is provided, its feature exists
In comprising the following steps:
Step S100:What monitoring was triggered under with the system protection pattern of domestic consumer's account identity logs connects to input method
Mouthful call behavior.Under system protection pattern, the safe space that operation resource is provided for the operation to make a reservation for application is configured with,
Safe space inaccessible under system general mode.
Under system protection pattern, predetermined application will carry out strict safety detection under running protection strategy, all
Transactional operation, delivery operation about fund all can be monitored strictly, and can tightly protect the personal information of user, be prevented
The user profile leakage of such as chat record, short message verification code etc..Wherein, making a reservation for application includes paying related application (example
Such as wechat APP, Alipay APP), (such as industry and commerce is silver-colored for the related application (such as Lu Jin institute APP) of the financing application related to bank
Row APP) in it is a kind of at least within, to protect fund security and the information security of user, certain predetermined application can also include
All applications for being installed on safe space under system protection pattern.
Here the operation resource being somebody's turn to do, both can be understood to the application program in itself, it is understood that be the application configuration
Data (configuration data of application program), it is also understood that for this applies user data (personal data of user), in these feelings
Under condition, the safe space being somebody's turn to do is it can be understood that be memory space.Certainly, operation resource is also understood that to be running protection strategy,
This safe space is it can be understood that be memory space and its corresponding running protection strategy configuration surroundings, running protection strategy is matched somebody with somebody
Putting environment is:Running the configuration surroundings of startup antivirus, checking and killing Trojan etc. safety precautions when this is applied.
In the conventional technology, system protection pattern can be realized with routine " sandbox " isolation technology.But in this reality
Apply in example, realized with multi-user mode.Multi-user mode is supported in Android system, the multi-user with WINDOWS systems
Pattern is similar to, and the user data that different user is logged in lower system is separate, mutual unaffected.Therefore, at system
It is system general mode when keeper's account (usual UID=0) is logged in, system is in domestic consumer's account (such as UID=
10) log in when be system protection pattern, system from system general mode into system protection pattern be equivalent to system from management
Member's pattern switching is to user EXEC.Because multi-user mode can realize certain data isolation between user, such that it is able to
Realize user in protected mode system safety (application install safety, transaction security, user information safety), realize safety every
From safer than " sandbox " isolation technology in any case.
Therefore, the process that the system is switched to protected mode from general mode switches equivalent to the system from keeper's account
To domestic consumer's account.In Android system, by call the switchUser () method in ActivityManager classes with
Domestic consumer's account is switched to from keeper's account.The corresponding domestic consumer's account of system protection pattern is in system to log in
During state, what monitoring was triggered under with the system protection pattern of domestic consumer's account identity logs calls row to input method interface
For.
If the system is Android system, the input method interface is InputMethodManager (input method manager).
Android platform has opened input method framework (Input Met hod Framework, IMF) from after 1.5 versions, and IMF is
The Characteristic Design of Android platform.Its appearance, for the equipment being born without physical keyboard provides possibility.Meanwhile, IMF is opened
The development interface of Android platform input method is put, for the input method of Android platform provides scalability.
The IMF of Android platform is divided into three main modulars according to function, respectively:Client control (including input control
Part), input method manager (IMM), and input method application (IME).Client control, refers to be with copy editor's function
System control (such as EditText controls), is the starting point of platform interior input method application man-machine interaction.Input method manager, be
One of underlying basis service of Android platform, is responsible for input method, including input method installation, registration, activation etc..It is defeated
Enter method application, then refer to preset or subsequent installation input method procedure in platform.
Client control, when client control receives focus, starts input method application and shows by taking EditText as an example
Show dummy keyboard;And when losing focus, then hide keyboard.This generic operation belongs to the friendship between client control and input method manager
Mutually.
Additionally, client control can also transmit text status, including cursor position, text selecting to input method application
Deng;Receive the input word of simultaneously display input method application feedback.This kind of interaction belongs to the friendship of client control and input method application
Mutually.
Client control, to input method service and the operation of input method application, is all by InputMe
ThodManager examples call to realize.InputMethodManager uses API more like one for client control
The set of operation, the sequence of operations that definition is serviced input method application and input method.
Can realize calling InputMethodManager by code below:
InputMethodManager m=(InputMethodManager) getSystemService (Co
ntext.INPUT_METHOD_SERVICE);// obtain InputMethodManager.
m.toggleSoftInput(0,InputMethodManager.HIDE_NOT_ALWAYS);// realize input method
On window switch display, if input method on window it has been shown that if hide, if hide, display input method to window
On mouth.
Step S200:When input method interface is called, the input text type of input control is obtained.
If the system is Android system, the input control is EditText controls, by obtaining Edi tText controls
InputType attributes are obtaining the input text type.EditText controls have individual attribute to set android:inputType
="" it is used for setting the type of text, is used to help input method and shows suitable keyboard type.Set EditText's
InputType attributes, the method for most simply saving trouble is exactly directly to be set in the xml for defining EditText.Therefore, when
When EditText controls are Password Input, the input text type of input control is password type.
If inputType=" textPassword " or inputType=" textVisiblePassword ", should
Input text type is password.As inputType=" textPassword ", then the password inputing will with similar " * " or
The form that " " etc. substitutes character shows;And when working as inputType=" textVisibl ePassword ", then the password inputing
It is visible password.
If inputType=" number ", then it represents that the attribute of input control is numeric type;If inpu tType="
TextPassword | number ", then it represents that the attribute of input control is both password type, is again numeric type, therefore input
Password can only be numerical ciphers, call the digital virtual keyboard of input method application (the input method application of i.e. following systemic presuppositions)
(such as numeric keypad of nine grids form).
If inputType=" text ", then it represents that the attribute of input control is general character type;If inp utType
=" textPassword | text ", then it represents that the attribute of input control is both password type, be again general character type (including
Numeral, letter, symbol), therefore the password of input is general character password, calls input method application (i.e. following systemic presupposition
Input method application) virtual full keyboard (such as full keyboard of QWERTY forms).
Step S300:If the input text type is password, the input method application of systemic presupposition, the systemic presupposition are enabled
Input method application be installed on the safe space.The implication for enabling, it can be understood as system recognizes this and is by input method ID
Unite after default input method application, the input method application of the systemic presupposition is tied into the input control, and (such as EditText is controlled
Part).
The input method of the systemic presupposition both can be the input method of system default, it is also possible to when being used exclusively for Password Input
The system input method called, namely system is provided with the system input method called during dedicated for Password Input.It is defeated in order to prevent
Enter method application by the attack on network and steal information, in the present embodiment, the input method application of the systemic presupposition is can not
Reach the input method application of external network (such as internet).The input method application of external network can not be reached, there can be two kinds
Implication.A kind of is that the input method application of the systemic presupposition has network savvy, but it is when password is input into be listened in system
Network savvy is disabled, i.e. the input method application of the systemic presupposition is arranged in offline to possess network savvy by system
The input method application of state, such as system disconnect the input method of the systemic presupposition and the communication of external network during Password Input
Connection, completes to recover the communication connection during Password Input;A kind of input method application for being the systemic presupposition is in itself and without connection
The input method application of net function, the i.e. systemic presupposition is the input method application without network savvy.
The input method application of the systemic presupposition is installed in the safe space, can be mounted to certain in the safe space
In individual independent memory space, the system application such as input method application of such as systemic presupposition is installed on certain specific file
In (such as FILE2 files), and other third-party applications under safe mode are then all installed on other file (for example
FILE1 files) in, third-party application cannot access the specific file.By this mounting means so that the input method
Using independently of other third-party applications, security is improved.Or, the system application such as input method application of the systemic presupposition
Identical file folder is all installed on third-party application, but the ephemeral data that the application of the system such as input method application is produced all is stored
In another independent file, other third-party applications do not have access rights, can also so improve input method application
Security.
Some traditional input method applications, the keyboard layout of dummy keyboard is random, and this random keyboard is in certain journey
Security is improve on degree, the keystroke activity for for example preventing some rogue programs from monitoring keyboard causes password to be revealed, or prevents
Other people spy on during input password.
However, in order to further improve security, in some embodiments of the invention, the input method of the systemic presupposition should
With being used for:Show the dummy keyboard of initialization after called;Then touched by thing in the keyboard for then listening to setting each time
During part, the keyboard layout of the dummy keyboard is changed at random.Namely user touches press dummy keyboard each time, input method application all can be with
Machine changes a keyboard layout, so can further improve security.And, in certain embodiments, the void of the initialization
What the keyboard layout of plan keyboard was also randomly generated.
Certain user may not simultaneously need this random keyboard, therefore can provide user setting function, so as to obtain user
Random keyboard can be on demand turned on and off.Therefore, in certain embodiments, the input method application of the systemic presupposition is used for:
Show the dummy keyboard of initialization after called;Receive the switching command (i.e. for opening the instruction of random keyboard) of setting;
When the keyboard for then listening to setting each time is touched by event, the keyboard layout of the dummy keyboard is changed at random.
The switching command of the setting is included by the instruction of the press event generation of setting physical keyboard, by fingerprint sensor
Touch the instruction of the event of pressing generation and by least one in the tactile instruction by event generation that key mapping is set on the dummy keyboard.Example
Such as after the dummy keyboard for opening initialization, user can subtract key by pressing the volume of mobile terminal and open random by key
Disk, or random keyboard can be opened by the fingerprint sensor of mobile terminal by touching, it is also possible to press dummy keyboard by touching
The special switching key for setting is gone up to open random keyboard.
Due to generally can also have some non-textual input buttons on dummy keyboard, such as return key, delete key, weight are defeated
Key, line feed key, in/English switch key etc., therefore user for convenience improves Consumer's Experience, and the keyboard of the setting is touched presses thing
Part can not include the event of pressing of touching of these non-textual input buttons, namely the keyboard that sets touch by event as figure case or
The tactile of letters case presses event.This equivalent to, user click on each time return key, delete key, the defeated key of weight, line feed key, in/English
After literary switch key these non-textual input buttons, input method application can't at random change the keyboard layout of dummy keyboard;And work as
After numerical key, letter key, symbolic key these text input buttons are clicked on each time, input method application changes once user at random
The keyboard layout of dummy keyboard, user is previous therewith to almost be can be appreciated that after the click each time of these text input buttons
Secondary different keyboard layout.
In certain embodiments, the random keyboard layout for changing dummy keyboard, possible not all key mapping can all change,
Namely the layout of certain a part of key mapping on dummy keyboard be it is changeless, such as delete key, the defeated key of weight, line feed key, in/English
Literary switch key these non-textual input buttons;The layout of the simply remaining part key mapping for changing, such as numeral on the dummy keyboard
The keyboard layout of key mapping or letters case.This is equivalent to when user clicks on numerical key, letter key, symbolic key each time, these are literary
After this input button, input method application changes once the keyboard layout of these text input buttons at random, and non-textual input is pressed
The keyboard layout of key then keeps constant.
Fig. 2 is the input unit module map under system protection pattern of one embodiment.
The above-mentioned input method under system protection pattern of correspondence, the present invention also provides one kind under system protection pattern
Input unit, it includes:Monitor module 100, acquisition module 200 and enable module 300.
Monitor module 100 be used for monitor under with the system protection pattern of domestic consumer's account identity logs trigger to defeated
Enter the behavior of calling of method interface, under system protection pattern, be configured with the peace that operation resource is provided for the operation to make a reservation for application
The total space, safe space inaccessible under system general mode;Acquisition module 200 is used for when input method interface is called
When, obtain the input text type of input control;If it is password to enable module 300 for the input text type, enables and be
Unite default input method application, the input method application of the systemic presupposition is installed on the safe space.
Monitor module 100 monitor under with the system protection pattern of domestic consumer's account identity logs trigger to input method
Interface calls behavior.Under system protection pattern, the safety sky that operation resource is provided for the operation to make a reservation for application is configured with
Between, safe space inaccessible under system general mode.
Under system protection pattern, predetermined application will carry out strict safety detection under running protection strategy, all
Transactional operation, delivery operation about fund all can be monitored strictly, and can tightly protect the personal information of user, be prevented
The user profile leakage of such as chat record, short message verification code etc..Wherein, making a reservation for application includes paying related application (example
Such as wechat APP, Alipay APP), (such as industry and commerce is silver-colored for the related application (such as Lu Jin institute APP) of the financing application related to bank
Row APP) in it is a kind of at least within, to protect fund security and the information security of user, certain predetermined application can also include
All applications for being installed on safe space under system protection pattern.
Here the operation resource being somebody's turn to do, both can be understood to the application program in itself, it is understood that be the application configuration
Data (configuration data of application program), it is also understood that for this applies user data (personal data of user), in these feelings
Under condition, the safe space being somebody's turn to do is it can be understood that be memory space.Certainly, operation resource is also understood that to be running protection strategy,
This safe space is it can be understood that be memory space and its corresponding running protection strategy configuration surroundings, running protection strategy is matched somebody with somebody
Putting environment is:Running the configuration surroundings of startup antivirus, checking and killing Trojan etc. safety precautions when this is applied.
In the conventional technology, system protection pattern can be realized with routine " sandbox " isolation technology.But in this reality
Apply in example, realized with multi-user mode.Multi-user mode is supported in Android system, the multi-user with WINDOWS systems
Pattern is similar to, and the user data that different user is logged in lower system is separate, mutual unaffected.Therefore, at system
It is system general mode when keeper's account (usual UID=0) is logged in, system is in domestic consumer's account (such as UID=
10) log in when be system protection pattern, system from system general mode into system protection pattern be equivalent to system from management
Member's pattern switching is to user EXEC.Because multi-user mode can realize certain data isolation between user, such that it is able to
Realize user in protected mode system safety (application install safety, transaction security, user information safety), realize safety every
From safer than " sandbox " isolation technology in any case.
Therefore, the process that the system is switched to protected mode from general mode switches equivalent to the system from keeper's account
To domestic consumer's account.In Android system, by call the switchUser () method in ActivityManager classes with
Domestic consumer's account is switched to from keeper's account.The corresponding domestic consumer's account of system protection pattern is in system to log in
During state, monitor module 100 monitor under with the system protection pattern of domestic consumer's account identity logs trigger to input method
Interface calls behavior.
If the system is Android system, the input method interface is InputMethodManager (input method manager).
Android platform has opened input method framework (Input Met hod Framework, IMF) from after 1.5 versions, and IMF is
The Characteristic Design of Android platform.Its appearance, for the equipment being born without physical keyboard provides possibility.Meanwhile, IMF is opened
The development interface of Android platform input method is put, for the input method of Android platform provides scalability.
The IMF of Android platform is divided into three main modulars according to function, respectively:Client control (including input control
Part), input method manager (IMM), and input method application (IME).Client control, refers to be with copy editor's function
System control (such as EditText controls), is the starting point of platform interior input method application man-machine interaction.Input method manager, be
One of underlying basis service of Android platform, is responsible for input method, including input method installation, registration, activation etc..It is defeated
Enter method application, then refer to preset or subsequent installation input method procedure in platform.
Client control, when client control receives focus, starts input method application and shows by taking EditText as an example
Show dummy keyboard;And when losing focus, then hide keyboard.This generic operation belongs to the friendship between client control and input method manager
Mutually.
Additionally, client control can also transmit text status, including cursor position, text selecting to input method application
Deng;Receive the input word of simultaneously display input method application feedback.This kind of interaction belongs to the friendship of client control and input method application
Mutually.
Client control, to input method service and the operation of input method application, is all by InputMe
ThodManager examples call to realize.InputMethodManager uses API more like one for client control
The set of operation, the sequence of operations that definition is serviced input method application and input method.
Can realize calling InputMethodManager by code below:
InputMethodManager m=(InputMethodManager) getSystemService (Co
ntext.INPUT_METHOD_SERVICE);// obtain InputMethodManager.
m.toggleSoftInput(0,InputMethodManager.HIDE_NOT_ALWAYS);// realize input method
On window switch display, if input method on window it has been shown that if hide, if hide, display input method to window
On mouth.
When input method interface is called, acquisition module 200 obtains the input text type of input control.
If the system is Android system, the input control is EditText controls, and acquisition module 200 is by obtaining
The inputType attributes of EditText controls are obtaining the input text type.EditTex t controls have individual attribute to set
android:InputType="" it is used for setting the type of text, is used to help input method and shows suitable keyboard type.If
The InputType attributes of EditText are put, the method for most simply saving trouble is exactly directly to be set in the xml for defining EditText.
Therefore, when EditText controls are Password Input, the input text type of input control is password type.
If inputType=" textPassword " or inputType=" textVisiblePassword ", should
Input text type is password.As inputType=" textPassword ", then the password inputing will with similar " * " or
The form that " " etc. substitutes character shows;And when working as inputType=" textVisibl ePassword ", then the password inputing
It is visible password.
If inputType=" number ", then it represents that the attribute of input control is numeric type;If inpu tType="
TextPassword | number ", then it represents that the attribute of input control is both password type, is again numeric type, therefore input
Password can only be numerical ciphers, call the digital virtual keyboard of input method application (the input method application of i.e. following systemic presuppositions)
(such as numeric keypad of nine grids form).
If inputType=" text ", then it represents that the attribute of input control is general character type;If inp utType
=" textPassword | text ", then it represents that the attribute of input control is both password type, be again general character type (including
Numeral, letter, symbol), therefore the password of input is general character password, calls input method application (i.e. following systemic presupposition
Input method application) virtual full keyboard (such as full keyboard of QWERTY forms).
If the input text type is password, the input method application that module 300 enables systemic presupposition is enabled, the system is pre-
If input method application be installed on the safe space.The implication for enabling, it can be understood as enable module 300 and known by input method ID
After being clipped to the input method application of the systemic presupposition, the input method application of the systemic presupposition is tied to the input control (for example
EditText controls).
The input method of the systemic presupposition both can be the input method of system default, it is also possible to when being used exclusively for Password Input
The system input method called, namely system is provided with the system input method called during dedicated for Password Input.It is defeated in order to prevent
Enter method application by the attack on network and steal information, in the present embodiment, the input method application of the systemic presupposition is can not
Reach the input method application of external network (such as internet).The input method application of external network can not be reached, there can be two kinds
Implication.A kind of is that the input method application of the systemic presupposition has network savvy, but it is when password is input into be listened in system
Network savvy is disabled, i.e. the input method application of the systemic presupposition is arranged in offline to possess network savvy by system
The input method application of state, enables input method and external network that module 300 disconnects the systemic presupposition during Password Input
Communication connection, completes to recover the communication connection during Password Input;A kind of is that the input method application of the systemic presupposition does not have in itself
The input method application for having network savvy, the i.e. systemic presupposition is the input method application without network savvy.
The input method application of the systemic presupposition is installed in the safe space, can be mounted to certain in the safe space
In individual independent memory space, the system application such as input method application of such as systemic presupposition is installed on certain specific file
In (such as FILE2 files), and other third-party applications under safe mode are then all installed on other file (for example
FILE1 files) in, third-party application cannot access the specific file.By this mounting means so that the input method
Using independently of other third-party applications, security is improved.Or, the system application such as input method application of the systemic presupposition
Identical file folder is all installed on third-party application, but the ephemeral data that the application of the system such as input method application is produced all is stored
In another independent file, other third-party applications do not have access rights, can also so improve input method application
Security.
Some traditional input method applications, the keyboard layout of dummy keyboard is random, and this random keyboard is in certain journey
Security is improve on degree, the keystroke activity for for example preventing some rogue programs from monitoring keyboard causes password to be revealed, or prevents
Other people spy on during input password.
However, in order to further improve security, in some embodiments of the invention, the input method of the systemic presupposition should
With being used for:Show the dummy keyboard of initialization after called;Then touched by thing in the keyboard for then listening to setting each time
During part, the keyboard layout of the dummy keyboard is changed at random.Namely user touches press dummy keyboard each time, input method application all can be with
Machine changes a keyboard layout, so can further improve security.And, in certain embodiments, the void of the initialization
What the keyboard layout of plan keyboard was also randomly generated.
Certain user may not simultaneously need this random keyboard, therefore can provide user setting function, so as to obtain user
Random keyboard can be on demand turned on and off.Therefore, in certain embodiments, the input method application of the systemic presupposition is used for:
Show the dummy keyboard of initialization after called;Receive the switching command (i.e. for opening the instruction of random keyboard) of setting;
When the keyboard for then listening to setting each time is touched by event, the keyboard layout of the dummy keyboard is changed at random.
The switching command of the setting is included by the instruction of the press event generation of setting physical keyboard, by fingerprint sensor
Touch the instruction of the event of pressing generation and by least one in the tactile instruction by event generation that key mapping is set on the dummy keyboard.Example
Such as after the dummy keyboard for opening initialization, user can subtract key by pressing the volume of mobile terminal and open random by key
Disk, or random keyboard can be opened by the fingerprint sensor of mobile terminal by touching, it is also possible to press dummy keyboard by touching
The special switching key for setting is gone up to open random keyboard.
Due to generally can also have some non-textual input buttons on dummy keyboard, such as return key, delete key, weight are defeated
Key, line feed key, in/English switch key etc., therefore user for convenience improves Consumer's Experience, and the keyboard of the setting is touched presses thing
Part can not include the event of pressing of touching of these non-textual input buttons, namely the keyboard that sets touch by event as figure case or
The tactile of letters case presses event.This equivalent to, user click on each time return key, delete key, the defeated key of weight, line feed key, in/English
After literary switch key these non-textual input buttons, input method application can't at random change the keyboard layout of dummy keyboard;And work as
After numerical key, letter key, symbolic key these text input buttons are clicked on each time, input method application changes once user at random
The keyboard layout of dummy keyboard, user is previous therewith to almost be can be appreciated that after the click each time of these text input buttons
Secondary different keyboard layout.
In certain embodiments, the random keyboard layout for changing dummy keyboard, possible not all key mapping can all change,
Namely the layout of certain a part of key mapping on dummy keyboard be it is changeless, such as delete key, the defeated key of weight, line feed key, in/English
Literary switch key these non-textual input buttons;The layout of the simply remaining part key mapping for changing, such as numeral on the dummy keyboard
The keyboard layout of key mapping or letters case.This is equivalent to when user clicks on numerical key, letter key, symbolic key each time, these are literary
After this input button, input method application changes once the keyboard layout of these text input buttons at random, and non-textual input is pressed
The keyboard layout of key then keeps constant.
The embodiment of the present invention additionally provides mobile terminal, as shown in figure 3, for convenience of description, illustrate only and the present invention
The related part of embodiment, particular technique details is not disclosed, and refer to present invention method part.The mobile terminal can
Think including mobile phone, panel computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point
Of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer, so that mobile terminal is as mobile phone as an example:
Fig. 3 is illustrated that the block diagram of the part-structure of the mobile phone related to mobile terminal provided in an embodiment of the present invention.Ginseng
Fig. 3 is examined, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 1510, memory 1520, input block 1530, display
Unit 1540, sensor 1550, voicefrequency circuit 1560, Wireless Fidelity (wireless-fidelity, Wi-Fi) module 1570, place
The reason part such as device 1580 and power supply 1590.It will be understood by those skilled in the art that the handset structure shown in Fig. 3 not structure
The restriction of paired mobile phone, can include part more more or less than diagram, or combine some parts, or different parts
Arrangement.
Each component parts of mobile phone is specifically introduced with reference to Fig. 3:
RF circuits 1510 can be used to receiving and sending messages or communication process in, the reception and transmission of signal, especially, by base station
After downlink information is received, processed to processor 1580;In addition, up data is activation will be designed to base station.Generally, RF circuits
1510 include but is not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise
Amplifier, LNA), duplexer etc..Additionally, RF circuits 1510 can also be led to by radio communication and network and other equipment
Letter.Above-mentioned radio communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global
System of Mobile communication, GSM), general packet radio service (General Packet Radio
Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA
(Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution,
LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 1520 can be used to store software program and module, and processor 1580 is by running storage in memory
1520 software program and module, so as to perform various function application and the data processing of mobile phone.Memory 1520 can be led
To include storing program area and storage data field, wherein, storing program area can be needed for storage program area, at least one function
Application program (such as sound-playing function, image player function etc.) etc.;Storage data field can store the use institute according to mobile phone
Data (such as voice data, phone directory etc.) of establishment etc..Additionally, memory 1520 can be stored including high random access
Device, can also include nonvolatile memory, and for example, at least one disk memory, flush memory device or other volatibility are consolidated
State memory device.
Input block 1530 can be used to receive the numeral or character information of input, and produce with the user of mobile phone set with
And the relevant key signals input of function control.Specifically, input block 1530 may include contact panel 1531 and other inputs
Equipment 1532.Contact panel 1531, also referred to as touch-screen, can collect user thereon or neighbouring touch operation (such as user
Use the behaviour of any suitable object such as finger, stylus or annex on contact panel 1531 or near contact panel 1531
Make), and corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 1531 may include touch detection
Two parts of device and touch controller.Wherein, touch detecting apparatus detect the touch orientation of user, and detect touch operation band
The signal for coming, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
Contact coordinate is converted into, then gives processor 1580, and the order sent of receiving processor 1580 and can be performed.Additionally,
Contact panel 1531 can be realized using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except touch surface
Plate 1531, input block 1530 can also include other input equipments 1532.Specifically, other input equipments 1532 can include
But it is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
One or more.
Display unit 1540 can be used for show by user input information or be supplied to user information and mobile phone it is each
Plant menu.Display unit 1540 may include display panel 1541, optionally, can use liquid crystal display (Liquid
Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED)
To configure display panel 1541.Further, contact panel 1531 can cover display panel 1541, when contact panel 1531 is detected
Arrive thereon or after neighbouring touch operation, processor 1580 is sent to determine the type of touch event, with preprocessor
1580 provide corresponding visual output according to the type of touch event on display panel 1541.Although in figure 3, contact panel
1531 is input and the input function that mobile phone is realized as two independent parts with display panel 1541, but in some realities
In applying example, can by contact panel 1531 and display panel 1541 be integrated input that realize mobile phone and output function.
Mobile phone may also include at least one sensor 1550, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel 1541, proximity transducer can close display panel when mobile phone is moved in one's ear
1541 and/or backlight.Used as one kind of motion sensor, (generally three axles) add in the detectable all directions of accelerometer sensor
The size of speed, can detect that size and the direction of gravity when static, can be used to recognize application (the such as horizontal/vertical screen of mobile phone attitude
Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;As for mobile phone also
The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Voicefrequency circuit 1560, loudspeaker 1561, microphone 1562 can provide the COBBAIF between user and mobile phone.Audio
Electric signal after the voice data conversion that circuit 1560 will can be received, is transferred to loudspeaker 1561, is changed by loudspeaker 1561
For voice signal is exported;On the other hand, the voice signal of collection is converted to electric signal by microphone 1562, by voicefrequency circuit 1560
Voice data is converted to after reception, then after voice data output processor 1580 is processed, through RF circuits 1510 being sent to ratio
Such as another mobile phone, or voice data is exported to memory 1520 so as to further treatment.
Wi-Fi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses by Wi-Fi module 1570
Mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 3 shows
Wi-Fi module 1570, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can exist as needed completely
Do not change in the essential scope of invention and omit.
Processor 1580 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone,
By running or performing software program and/or module of the storage in memory 1520, and storage is called in memory 1520
Interior data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor
1580 may include one or more processing units;Preferably, processor 1580 can integrated application processor and modulation /demodulation treatment
Device, wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor is mainly located
Reason radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1580.
Mobile phone also includes the power supply 1590 (such as battery) powered to all parts, it is preferred that power supply can be by power supply
Management system is logically contiguous with processor 1580, so as to realize management charging, electric discharge and power consumption pipe by power-supply management system
The functions such as reason.
Although not shown, mobile phone can also will not be repeated here including camera, bluetooth module etc..
In embodiments of the present invention, the processor 1580 included by the terminal also has following functions:Obtain encrypted instruction,
The urtext of output is sent to by server according to encrypted instruction.The reception server feedback ciphertext, ciphertext with
Urtext is associated.Urtext is substituted for ciphertext.Namely processor 1580 possesses to perform and above-mentioned is protected in system
The function of the input method under shield pattern.
Or, in embodiments of the present invention, the processor 1580 included by the terminal also has following functions:From third party
Ciphertext is obtained in application program;Receiving and deciphering is instructed, and ciphertext is sent into server according to decryption instructions;Receive clothes
The urtext of business device feedback, exports urtext;Urtext is associated with ciphertext.Namely processor 1580 possesses and holds
The function of the above-mentioned decryption input method of row.
Certainly, in actual realization, processor 1580 possesses the above-mentioned input side under system protection pattern of execution
The function of method, the function of also possessing the decryption input method for performing above-mentioned.Usual this mobile terminal can be computer, flat board electricity
Brain, mobile phone etc. are loaded with the intelligent terminal of Input Method Editor.
The above-mentioned input method under system protection pattern, device and mobile terminal, monitor with domestic consumer's account
The behavior of calling to input method interface triggered under the system protection pattern of identity logs, under system protection pattern, is configured with use
The safe space of operation resource, safe space inaccessible under system general mode are provided in the operation to make a reservation for application;
When input method interface is called, the input text type of input control is obtained;If the input text type is password, open
With the input method application of systemic presupposition, the input method application of the systemic presupposition is installed on the safe space.In system protection
Under pattern, if the behavior of calling to input method interface were listened to, and the input text type of input control would be password, then prove
User to be ready being input into password, and what the input method application no matter system default is called (put by user preset) is, now all can
The automatic input method application for enabling systemic presupposition.So, even if the input method application that system default is called is third-party application,
Password disclosure risk can be avoided, security is improve.
In the present invention, system protection pattern is realized by the multi-user mode of system.I.e. system is in keeper
It is system general mode when account is logged in, it is system protection pattern that system is in when domestic consumer account is logged in, system is from system
General mode is to be switched to user EXEC from administrator mode equivalent to system into system protection pattern.Due to multi-user
Pattern can realize certain data isolation between user, such that it is able to realize safe operation of the user under system protection pattern,
Realize security isolation.
The invention discloses following scheme:
A1, a kind of input method under system protection pattern, comprise the following steps:
What monitoring was triggered under with the system protection pattern of domestic consumer's account identity logs calls to input method interface
Behavior, under system protection pattern, is configured with the safe space that operation resource is provided for the operation to make a reservation for application, and the safety is empty
Between under system general mode inaccessible;
When input method interface is called, the input text type of input control is obtained;
If the input text type is password, enable the input method application of systemic presupposition, the systemic presupposition it is defeated
Enter method application and be installed on the safe space.
A2, the input method according to A1, the predetermined application include paying related application, the application of financing correlation
It is a kind of at least within the application related to bank.
A3, the input method according to A1, the operation resource include the application program in itself, the application configuration data
User data wherein at least one is applied with this, the safe space includes memory space.
A4, the input method according to A1, the operation resource include running protection strategy, and the safe space includes
Memory space and its corresponding running protection strategy configuration surroundings.
A5, the input method according to A1, the system are Android system, and the input method interface is
InputMethodManager。
A6, the input method according to A1, the system are Android system, and the input control is controlled for EditText
Part, the input text type is obtained by obtaining the inputType attributes of EditText controls;If inputType="
TextPassword " or inputType=" textVisiblePass word ", then the input text type is password.
A7, the input method according to A1, the input method application of the systemic presupposition are that can not reach external network
Input method application.
But A8, the input method according to A7, the input method application of the systemic presupposition are possess network savvy quilt
System is arranged in the input method application of off-line state.
A9, the input method according to A8, the input method application for enabling systemic presupposition include:
The input method of the systemic presupposition and the communication connection of external network are disconnected during Password Input, password is completed defeated
Fashionable recovery communication connection.
A10, the input method according to A7, the input method application of the systemic presupposition is the input without network savvy
Method application.
A11, the input method according to A1, the input method application of the systemic presupposition are used for:
Show the dummy keyboard of initialization after called;
When the keyboard for then listening to setting each time is touched by event, the key mapping cloth of the dummy keyboard is changed at random
Office.
A12, the input method according to A11, the keyboard layout of the dummy keyboard of the initialization is random generation.
A13, the input method according to A11, the input method application of the systemic presupposition are used for:
Show the dummy keyboard of initialization after called;
Receive the switching command of setting;
When the keyboard for then listening to setting each time is touched by event, the key mapping cloth of the dummy keyboard is changed at random
Office.
A14, the input method according to A13, the switching command of the setting are included by the pressing of setting physical keyboard
The instruction of event generation, touching by the instruction of event generation and by setting touching for key mapping on the dummy keyboard by fingerprint sensor
By at least one in the instruction that event is generated.
A15, the input method according to A11, the keyboard for setting are touched by event as figure case or letters case
Touch press event.
A16, the input method according to A11, it is described change the dummy keyboard at random keyboard layout be:Change at random
Become the keyboard layout of figure case or letters case on the dummy keyboard.
B17, a kind of input unit under system protection pattern, including:
Monitor module, for monitor under with the system protection pattern of domestic consumer's account identity logs trigger to input
Method interface calls behavior, under system protection pattern, is configured with and provides the safety for running resource for the operation to make a reservation for application
Space, safe space inaccessible under system general mode;
Acquisition module, for when input method interface is called, obtaining the input text type of input control;
Module is enabled, if being password for the input text type, the input method application of systemic presupposition is enabled, it is described
The input method application of systemic presupposition is installed on the safe space.
B18, the input unit according to B17, the predetermined application is including paying related application, related answering of managing money matters
With the one kind at least within the application related to bank.
B19, the input unit according to B17, the operation resource include the application program in itself, the application configuration number
User data wherein at least one is applied according to this, the safe space includes memory space.
B20, the input unit according to B17, the operation resource include running protection strategy, the safe space bag
Include memory space and its corresponding running protection strategy configuration surroundings.
B21, the input unit according to B17, the system are Android system, and the input method interface is
InputMethodManager。
B22, the input unit according to B17, the system are Android system, and the input control is controlled for EditText
Part, the acquisition module obtains the input text type by obtaining the inputType attributes of EditText controls;If
InputType=" textPassword " or inputType=" textVisiblePassword ", then it is described to be input into text class
Type is password.
B23, the input unit according to B17, the input method application of the systemic presupposition are that can not reach external network
Input method application.
B24, the input unit according to B23, the input method application of the systemic presupposition are possess network savvy still
The input method application of off-line state is arranged in by system.
B25, the input unit according to B24, the module that enables are used for:The system is disconnected during Password Input
Default input method and the communication connection of external network, complete to recover the communication connection during Password Input.
B26, the input unit according to B23, the input method application of the systemic presupposition is the defeated of no network savvy
Enter method application.
B27, the input unit according to B17, the input method application of the systemic presupposition are used for:
Show the dummy keyboard of initialization after called;
When the keyboard for then listening to setting each time is touched by event, the key mapping cloth of the dummy keyboard is changed at random
Office.
B28, the input unit according to B27, the keyboard layout of the dummy keyboard of the initialization is random generation.
B29, the input unit according to B27, the input method application of the systemic presupposition are used for:
Show the dummy keyboard of initialization after called;
Receive the switching command of setting;
When the keyboard for then listening to setting each time is touched by event, the key mapping cloth of the dummy keyboard is changed at random
Office.
B30, the input unit according to B29, the switching command of the setting are included by the pressing of setting physical keyboard
The instruction of event generation, touching by the instruction of event generation and by setting touching for key mapping on the dummy keyboard by fingerprint sensor
By at least one in the instruction that event is generated.
B31, the input unit according to B27, the keyboard for setting are touched by event as figure case or letters case
Touch press event.
B32, the input unit according to B27, it is described change the dummy keyboard at random keyboard layout be:Change at random
Become the keyboard layout of figure case or letters case on the dummy keyboard.
C33, a kind of mobile terminal, it includes:
Touch-sensitive display;
One or more processors;
Memory;
One or more application programs, wherein one or more of application programs are stored in the memory and quilt
It is configured to by one or more of computing devices, one or more of programs are configured to carry out any one of A1 to A16
The described input method under system protection pattern.
It should be understood that although each step in the flow chart of accompanying drawing shows successively according to the instruction of arrow,
These steps are not that the inevitable order indicated according to arrow is performed successively.Unless expressly stated otherwise herein, these steps
The strict order limitation of execution, it can be performed in the other order.And, at least a portion step in accompanying drawing
Many sub-steps or multiple stages can be included, these sub-steps or stage have been performed in synchronization
Into, and can be to be performed at different moment, its execution sequence is also not necessarily and carry out successively, and can be with other steps or
The sub-step or at least a portion in stage of person other steps are performed in turn or alternately.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art
For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (10)
1. a kind of input method under system protection pattern, it is characterised in that comprise the following steps:
What monitoring was triggered under with the system protection pattern of domestic consumer's account identity logs calls behavior to input method interface,
Under system protection pattern, the safe space that operation resource is provided for the operation to make a reservation for application is configured with, the safe space exists
Inaccessible under system general mode;
When input method interface is called, the input text type of input control is obtained;
If the input text type is password, the input method application of systemic presupposition, the input method of the systemic presupposition are enabled
Using being installed on the safe space.
2. input method according to claim 1, it is characterised in that the predetermined application include paying related application,
It is a kind of at least within the related application of the financing application related to bank.
3. input method according to claim 1, it is characterised in that the operation resource include the application program in itself,
The application configuration data apply user data wherein at least one with this, and the safe space includes memory space.
4. input method according to claim 1, it is characterised in that the operation resource includes running protection strategy, institute
Stating safe space includes memory space and its corresponding running protection strategy configuration surroundings.
5. input method according to claim 1, it is characterised in that the system is Android system, the input method connects
Mouth is InputMethodManager.
6. input method according to claim 1, it is characterised in that the system is Android system, the input control
It is EditText controls, the input text type is obtained by obtaining the inputType attributes of EditText controls;If
InputType=" textPassword " or inputType=" textVisiblePassword ", then it is described to be input into text class
Type is password.
7. input method according to claim 1, it is characterised in that the input method application of the systemic presupposition is can not to arrive
Up to the input method application of external network.
8. input method according to claim 7, it is characterised in that the input method application of the systemic presupposition is to possess connection
Net function is still arranged in the input method application of off-line state by system.
9. a kind of input unit under system protection pattern, it is characterised in that including:
Monitor module, for monitor under with the system protection pattern of domestic consumer's account identity logs trigger input method is connect
Mouthful call behavior, under system protection pattern, be configured with and provide the safe space for running resource for the operation for predetermined application,
Safe space inaccessible under system general mode;
Acquisition module, for when input method interface is called, obtaining the input text type of input control;
Module is enabled, if being password for the input text type, the input method application of systemic presupposition, the system is enabled
Default input method application is installed on the safe space.
10. a kind of mobile terminal, it is characterised in that it includes:
Touch-sensitive display;
One or more processors;
Memory;
One or more application programs, wherein one or more of application programs are stored in the memory and are configured
It is that, by one or more of computing devices, one or more of programs are configured to carry out any one of claim 1 to 8
The described input method under system protection pattern.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710025476.4A CN106874751A (en) | 2017-01-13 | 2017-01-13 | Input method, device and mobile terminal under system protection pattern |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710025476.4A CN106874751A (en) | 2017-01-13 | 2017-01-13 | Input method, device and mobile terminal under system protection pattern |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106874751A true CN106874751A (en) | 2017-06-20 |
Family
ID=59157356
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710025476.4A Pending CN106874751A (en) | 2017-01-13 | 2017-01-13 | Input method, device and mobile terminal under system protection pattern |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106874751A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107832105A (en) * | 2017-11-24 | 2018-03-23 | 南昌黑鲨科技有限公司 | A kind of application program launching method, starter and computer-readable recording medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103853993A (en) * | 2014-03-26 | 2014-06-11 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN105630592A (en) * | 2015-08-12 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Identity verification based space switching method and apparatus as well as terminal |
CN105809019A (en) * | 2016-03-15 | 2016-07-27 | 青岛海信移动通信技术股份有限公司 | Method and device for Android terminal to start input method keyboard |
CN105844180A (en) * | 2016-03-15 | 2016-08-10 | 青岛海信移动通信技术股份有限公司 | Starting method and device of input method keyboard |
CN106250743A (en) * | 2016-07-28 | 2016-12-21 | 北京小米移动软件有限公司 | Account changing method and device |
-
2017
- 2017-01-13 CN CN201710025476.4A patent/CN106874751A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103853993A (en) * | 2014-03-26 | 2014-06-11 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN105630592A (en) * | 2015-08-12 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Identity verification based space switching method and apparatus as well as terminal |
CN105809019A (en) * | 2016-03-15 | 2016-07-27 | 青岛海信移动通信技术股份有限公司 | Method and device for Android terminal to start input method keyboard |
CN105844180A (en) * | 2016-03-15 | 2016-08-10 | 青岛海信移动通信技术股份有限公司 | Starting method and device of input method keyboard |
CN106250743A (en) * | 2016-07-28 | 2016-12-21 | 北京小米移动软件有限公司 | Account changing method and device |
Non-Patent Citations (2)
Title |
---|
佚名: "值得你花时间一看:Android 5.0 Lollipop 安全特性详解", 《HTTPS://SSPAI.COM/POST/27285》 * |
刘超: "《深入解析Android5.0系统》", 30 April 2015 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107832105A (en) * | 2017-11-24 | 2018-03-23 | 南昌黑鲨科技有限公司 | A kind of application program launching method, starter and computer-readable recording medium |
CN107832105B (en) * | 2017-11-24 | 2022-02-15 | 南昌黑鲨科技有限公司 | Application program starting method, starting device and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11874903B2 (en) | User interface switching method and terminal | |
CN111107222B (en) | Interface sharing method and electronic equipment | |
US9703971B2 (en) | Sensitive operation verification method, terminal device, server, and verification system | |
CN106791168A (en) | Information of mobile terminal guard method, device and mobile terminal | |
WO2018045873A1 (en) | Message processing method for instant messaging application and related product | |
WO2021110053A1 (en) | File sending method and terminal device | |
CN108475304B (en) | Method and device for associating application program and biological characteristics and mobile terminal | |
WO2021004327A1 (en) | Method for setting application permission, and terminal device | |
CN107368518A (en) | The management method and terminal of a kind of notification message, computer-readable recording medium | |
WO2018214748A1 (en) | Method and apparatus for displaying application interface, terminal and storage medium | |
CN111880675B (en) | Interface display method and device and electronic equipment | |
CN106201484A (en) | The collocation method of application program, device and terminal unit | |
CN107480996A (en) | A kind of method of payment and terminal | |
CN111459358A (en) | Application program control method and electronic equipment | |
CN108153460A (en) | A kind of icon hiding method and terminal | |
CN106933633A (en) | Right management method, device and mobile terminal | |
CN106203015A (en) | The collocation method of application program, device and terminal unit | |
JP6974620B2 (en) | Notification message processing method and terminal | |
CN106909854A (en) | Picture management method, device and mobile terminal | |
WO2015101254A1 (en) | Information interaction method, apparatus and system | |
CN108319432A (en) | A kind of application operation method and terminal | |
CN107577933A (en) | Using login method and device, computer equipment, computer-readable recording medium | |
CN109992939B (en) | Login method and terminal equipment | |
CN107102913A (en) | Data back up method, device and computer equipment | |
CN106874751A (en) | Input method, device and mobile terminal under system protection pattern |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170720 Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801 Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD. Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park) Applicant before: Beijing Qihu Technology Co., Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170620 |