CN106874751A - Input method, device and mobile terminal under system protection pattern - Google Patents

Input method, device and mobile terminal under system protection pattern Download PDF

Info

Publication number
CN106874751A
CN106874751A CN201710025476.4A CN201710025476A CN106874751A CN 106874751 A CN106874751 A CN 106874751A CN 201710025476 A CN201710025476 A CN 201710025476A CN 106874751 A CN106874751 A CN 106874751A
Authority
CN
China
Prior art keywords
input method
input
application
protection pattern
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710025476.4A
Other languages
Chinese (zh)
Inventor
李翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anyun Century Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201710025476.4A priority Critical patent/CN106874751A/en
Publication of CN106874751A publication Critical patent/CN106874751A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1066Hiding content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

The present invention provides a kind of input method and device under system protection pattern; what monitoring was triggered under with the system protection pattern of domestic consumer's account identity logs calls behavior to input method interface; under system protection pattern; it is configured with the safe space that operation resource is provided for the operation to make a reservation for application, safe space inaccessible under system general mode;When input method interface is called, the input text type of input control is obtained;If the input text type is password, the input method application of systemic presupposition is enabled, the input method application of the systemic presupposition is installed on the safe space.Under system protection pattern, if the behavior of calling to input method interface were listened to, and the input text type of input control would be password; then prove that user to be ready being input into password; the input method application of systemic presupposition now all can be automatically enabled, password disclosure risk can be avoided, improve security.Additionally provide a kind of mobile terminal.

Description

Input method, device and mobile terminal under system protection pattern
Technical field
The present invention relates to input method technique field, specifically, the present invention relates to a kind of defeated under system protection pattern Enter method and apparatus, further relate to a kind of mobile terminal.
Background technology
Some mobile terminals are for security consideration, there is provided corresponding system protection pattern, to protect user to be handed on the net Easily, the safety of online payment, bank's inquiry etc. occasion.For example, the property shielding system of 360 mobile phones, the system is on the one hand logical Cross the mode in built-in security application shop to prevent from stealing the invasion of wooden horse, counterfeit application, coming for application is ensure that from source Source safety;On the other hand also by building ad-hoc networks passage, transmission is encrypted to data such as account passwords, it is ensured that data exist Safety in transmitting procedure.Meanwhile, the data such as finance and money management are also carried out into isolation of system, forbid malicious application illegally to read, from The safety of user's payment environment is fundamentally ensured.
If being mounted with input methods, when inputing password under system protection pattern, use may be directly invoked The default third party's input method in family, consequently, it is possible to there is the risk of password leakage, security has much room for improvement.
On the other hand, these safe modes are normally based on " sandbox " isolation technology, but because many applications are required The authority outside sandbox is obtained, when user downloads installation one to apply, may will be required that giving the application program breaks sand The authority of case.Because user wants to use the repertoire of the application, thus this applies associated rights to be directed imparting, causes sand The security isolation of case is not guaranteed, and security has much room for improvement.
The content of the invention
The purpose of the present invention is intended at least to solve one of above-mentioned technological deficiency, particularly security technology not high and lacks Fall into.
The present invention provides a kind of input method under system protection pattern, it is characterised in that comprise the following steps:
What monitoring was triggered under with the system protection pattern of domestic consumer's account identity logs calls to input method interface Behavior, under system protection pattern, is configured with the safe space that operation resource is provided for the operation to make a reservation for application, and the safety is empty Between under system general mode inaccessible;
When input method interface is called, the input text type of input control is obtained;
If the input text type is password, enable the input method application of systemic presupposition, the systemic presupposition it is defeated Enter method application and be installed on the safe space.
Wherein in one embodiment, the predetermined application includes paying related application, the application of financing correlation and silver It is a kind of at least within the related application of row.
Wherein in one embodiment, it is described operation resource include the application program in itself, the application configuration data and should Using user data wherein at least one, the safe space includes memory space.
Wherein in one embodiment, the operation resource includes running protection strategy, and the safe space includes storage Space and its corresponding running protection strategy configuration surroundings.
Wherein in one embodiment, the system is Android system, and the input method interface is Inp utMethodManager。
Wherein in one embodiment, the system is Android system, and the input control is EditTe xt controls, is led to The inputType attributes for obtaining EditText controls are crossed to obtain the input text type;If inputType=" TextPassword " or inputType=" textVisiblePassword ", then the input text type is password.
Wherein in one embodiment, the input method application of the systemic presupposition is the input method that can not reach external network Using.
Wherein in one embodiment, the input method application of the systemic presupposition is set to possess network savvy by system It is set to the input method application in off-line state.
Wherein in one embodiment, the input method application for enabling systemic presupposition includes:
The input method of the systemic presupposition and the communication connection of external network are disconnected during Password Input, password is completed defeated Fashionable recovery communication connection.
Wherein in one embodiment, the input method application of the systemic presupposition is that the input method without network savvy should With.
Wherein in one embodiment, the input method application of the systemic presupposition is used for:
Show the dummy keyboard of initialization after called;
When the keyboard for then listening to setting each time is touched by event, the key mapping cloth of the dummy keyboard is changed at random Office.
Wherein in one embodiment, the keyboard layout of the dummy keyboard of the initialization is random generation.
Wherein in one embodiment, the input method application of the systemic presupposition is used for:
Show the dummy keyboard of initialization after called;
Receive the switching command of setting;
When the keyboard for then listening to setting each time is touched by event, the key mapping cloth of the dummy keyboard is changed at random Office.
Wherein in one embodiment, the switching command of the setting includes being generated by the press event of setting physical keyboard Instruction, by fingerprint sensor touch by event generate instruction and by the dummy keyboard set key mapping touch by event give birth to Into instruction at least one.
Wherein in one embodiment, the keyboard for setting touches the touching by thing as figure case or letters case by event Part.
Wherein in one embodiment, it is described change the dummy keyboard at random keyboard layout be:It is random to change described The keyboard layout of figure case or letters case on dummy keyboard.
The present invention also provides a kind of input unit under system protection pattern, and it includes:
Monitor module, for monitor under with the system protection pattern of domestic consumer's account identity logs trigger to input Method interface calls behavior, under system protection pattern, is configured with and provides the safety for running resource for the operation to make a reservation for application Space, safe space inaccessible under system general mode;
Acquisition module, for when input method interface is called, obtaining the input text type of input control;
Module is enabled, if being password for the input text type, the input method application of systemic presupposition is enabled, it is described The input method application of systemic presupposition is installed on the safe space.
Wherein in one embodiment, the predetermined application includes paying related application, the application of financing correlation and silver It is a kind of at least within the related application of row.
Wherein in one embodiment, it is described operation resource include the application program in itself, the application configuration data and should Using user data wherein at least one, the safe space includes memory space.
Wherein in one embodiment, the operation resource includes running protection strategy, and the safe space includes storage Space and its corresponding running protection strategy configuration surroundings.
Wherein in one embodiment, the system is Android system, and the input method interface is Inp utMethodManager。
Wherein in one embodiment, the system is Android system, and the input control is EditTe xt controls, institute State acquisition module and obtain the input text type by obtaining the inputType attributes of EditText controls;If InputType=" textPassword " or inputType=" textVisibl ePassword ", then it is described to be input into text class Type is password.
Wherein in one embodiment, the input method application of the systemic presupposition is the input method that can not reach external network Using.
Wherein in one embodiment, the input method application of the systemic presupposition is set to possess network savvy by system It is set to the input method application in off-line state.
Wherein in one embodiment, the module that enables is used for:The systemic presupposition is disconnected during Password Input Input method and the communication connection of external network, complete to recover the communication connection during Password Input.
Wherein in one embodiment, the input method application of the systemic presupposition is that the input method without network savvy should With.
Wherein in one embodiment, the input method application of the systemic presupposition is used for:
Show the dummy keyboard of initialization after called;
When the keyboard for then listening to setting each time is touched by event, the key mapping cloth of the dummy keyboard is changed at random Office.
Wherein in one embodiment, the keyboard layout of the dummy keyboard of the initialization is random generation.
Wherein in one embodiment, the input method application of the systemic presupposition is used for:
Show the dummy keyboard of initialization after called;
Receive the switching command of setting;
When the keyboard for then listening to setting each time is touched by event, the key mapping cloth of the dummy keyboard is changed at random Office.
Wherein in one embodiment, the switching command of the setting includes being generated by the press event of setting physical keyboard Instruction, by fingerprint sensor touch by event generate instruction and by the dummy keyboard set key mapping touch by event give birth to Into instruction at least one.
Wherein in one embodiment, the keyboard for setting touches the touching by thing as figure case or letters case by event Part.
Wherein in one embodiment, it is described change the dummy keyboard at random keyboard layout be:It is random to change described The keyboard layout of figure case or letters case on dummy keyboard.
The present invention also provides a kind of mobile terminal, and it includes:
Touch-sensitive display;
One or more processors;
Memory;
One or more application programs, wherein one or more of application programs are stored in the memory and quilt It is configured to by one or more of computing devices, one or more of programs are configured to carry out any of the above-described embodiment The described input method under system protection pattern.
The above-mentioned input method under system protection pattern, device and mobile terminal, monitor with domestic consumer's account The behavior of calling to input method interface triggered under the system protection pattern of identity logs, under system protection pattern, is configured with use The safe space of operation resource, safe space inaccessible under system general mode are provided in the operation to make a reservation for application; When input method interface is called, the input text type of input control is obtained;If the input text type is password, open With the input method application of systemic presupposition, the input method application of the systemic presupposition is installed on the safe space.In system protection Under pattern, if the behavior of calling to input method interface were listened to, and the input text type of input control would be password, then prove User to be ready being input into password, and what the input method application no matter system default is called (put by user preset) is, now all can The automatic input method application for enabling systemic presupposition.So, even if the input method application that system default is called is third-party application, Password disclosure risk can be avoided, security is improve.
In the present invention, system protection pattern is realized by the multi-user mode of system.I.e. system is in keeper It is system general mode when account is logged in, it is system protection pattern that system is in when domestic consumer account is logged in, system is from system General mode is to be switched to user EXEC from administrator mode equivalent to system into system protection pattern.Due to multi-user Pattern can realize certain data isolation between user, such that it is able to realize safe operation of the user under system protection pattern, Realize security isolation.
The additional aspect of the present invention and advantage will be set forth in part in the description, and these will become from the following description Obtain substantially, or recognized by practice of the invention.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, below will be to that will make needed for embodiment description Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for For those skilled in the art, on the premise of not paying creative work, can also obtain other attached according to these accompanying drawings Figure.
Fig. 1 is the input method flow chart under system protection pattern of one embodiment;
Fig. 2 is the input unit module map under system protection pattern of one embodiment;
Fig. 3 is illustrated that the block diagram of the part-structure of the mobile phone related to mobile terminal provided in an embodiment of the present invention.
Specific embodiment
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention Accompanying drawing, is clearly and completely described to the technical scheme in the embodiment of the present invention.
In some flows of description in description and claims of this specification and above-mentioned accompanying drawing, contain according to Multiple operations of particular order appearance, but it should be clearly understood that these operations can not be according to the suitable of its appearance herein Sequence is performed or executed in parallel, the sequence number such as 101,102 etc. of operation, is only used for distinguishing each different operation, sequence number Any execution sequence is not represented for itself.In addition, these flows can include more or less operation, and these operations can To perform in order or executed in parallel.It should be noted that " first ", " second " herein etc. describes, it is for distinguishing not Same message, equipment, module etc., does not represent sequencing, and it is different types also not limit " first " and " second ".
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " " used herein, " one It is individual ", " described " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that what is used in specification of the invention arranges Diction " including " refer to the presence of the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition One or more other features, integer, step, operation, element, component and/or their group.It should be understood that when we claim unit Part is " connected " or during " coupled " to another element, and it can be directly connected or coupled to other elements, or can also exist Intermediary element.Additionally, " connection " used herein or " coupling " can include wireless connection or wireless coupling.It is used herein to arrange Diction "and/or" includes one or more associated wholes or any cell of listing item and all combines.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific terminology), with art of the present invention in those of ordinary skill general understanding identical meaning.Should also Understand, those terms defined in such as general dictionary, it should be understood that with the context with prior art The consistent meaning of meaning, and unless by specific definitions as here, will not otherwise use idealization or excessively formal implication To explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal device " both include wireless communication The equipment of number receiver, the equipment of its wireless signal receiver for only possessing non-emissive ability, and including receiving and transmitting hardware Equipment, its have can on bidirectional communication link, perform two-way communication reception and transmitting hardware equipment.This equipment Can include:Honeycomb or other communication equipments, it has single line display or multi-line display or is shown without multi-line The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), it can With combine voice, data processing, fax and/or its communication ability;PDA (Personal Digital Assistant, it is personal Digital assistants), it can include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day Go through and/or GPS (Global Positioning System, global positioning system) receiver;Conventional laptop and/or palm Type computer or other equipment, its have and/or conventional laptop and/or palmtop computer including radio frequency receiver or its His equipment." terminal " used herein above, " terminal device " they can be portable, can transport, installed in the vehicles (aviation, Sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in the earth And/or any other position operation in space." terminal " used herein above, " terminal device " can also be communication terminal, on Network termination, music/video playback terminal, for example, can be PDA, MID (Mobile Internet Device, mobile Internet Equipment) and/or the equipment such as mobile phone, or intelligent television, Set Top Box with music/video playing function.
Those skilled in the art of the present technique are appreciated that remote network devices used herein above, and it includes but is not limited to meter The cloud that calculation machine, network host, single network server, multiple webserver collection or multiple servers are constituted.Here, Yun Youji Constituted in a large amount of computers or the webserver of cloud computing (Cloud Computing), wherein, cloud computing is Distributed Calculation One kind, a super virtual computer being made up of the computer collection of a group loose couplings.In embodiments of the invention, distal end Can realize communicating by any communication mode between the network equipment, terminal device and WNS servers, including but not limited to, be based on The mobile communication of 3GPP, LTE, WIMAX, based on TCP/IP, the computer network communication of udp protocol and based on bluetooth, infrared The low coverage wireless transmission method of transmission standard.
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, the every other implementation that those skilled in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
In the following description, system is the operating system of mobile terminal, for example Android system, iOS Mobile operating systems Etc..In the following description, with Android system, property illustrates that mobile terminal can be the intelligence such as mobile phone, panel computer as an example Can terminal.
Fig. 1 is the input method flow chart under system protection pattern of one embodiment.
The present invention is provided in the embodiment of the present invention a kind of input method under system protection pattern is provided, its feature exists In comprising the following steps:
Step S100:What monitoring was triggered under with the system protection pattern of domestic consumer's account identity logs connects to input method Mouthful call behavior.Under system protection pattern, the safe space that operation resource is provided for the operation to make a reservation for application is configured with, Safe space inaccessible under system general mode.
Under system protection pattern, predetermined application will carry out strict safety detection under running protection strategy, all Transactional operation, delivery operation about fund all can be monitored strictly, and can tightly protect the personal information of user, be prevented The user profile leakage of such as chat record, short message verification code etc..Wherein, making a reservation for application includes paying related application (example Such as wechat APP, Alipay APP), (such as industry and commerce is silver-colored for the related application (such as Lu Jin institute APP) of the financing application related to bank Row APP) in it is a kind of at least within, to protect fund security and the information security of user, certain predetermined application can also include All applications for being installed on safe space under system protection pattern.
Here the operation resource being somebody's turn to do, both can be understood to the application program in itself, it is understood that be the application configuration Data (configuration data of application program), it is also understood that for this applies user data (personal data of user), in these feelings Under condition, the safe space being somebody's turn to do is it can be understood that be memory space.Certainly, operation resource is also understood that to be running protection strategy, This safe space is it can be understood that be memory space and its corresponding running protection strategy configuration surroundings, running protection strategy is matched somebody with somebody Putting environment is:Running the configuration surroundings of startup antivirus, checking and killing Trojan etc. safety precautions when this is applied.
In the conventional technology, system protection pattern can be realized with routine " sandbox " isolation technology.But in this reality Apply in example, realized with multi-user mode.Multi-user mode is supported in Android system, the multi-user with WINDOWS systems Pattern is similar to, and the user data that different user is logged in lower system is separate, mutual unaffected.Therefore, at system It is system general mode when keeper's account (usual UID=0) is logged in, system is in domestic consumer's account (such as UID= 10) log in when be system protection pattern, system from system general mode into system protection pattern be equivalent to system from management Member's pattern switching is to user EXEC.Because multi-user mode can realize certain data isolation between user, such that it is able to Realize user in protected mode system safety (application install safety, transaction security, user information safety), realize safety every From safer than " sandbox " isolation technology in any case.
Therefore, the process that the system is switched to protected mode from general mode switches equivalent to the system from keeper's account To domestic consumer's account.In Android system, by call the switchUser () method in ActivityManager classes with Domestic consumer's account is switched to from keeper's account.The corresponding domestic consumer's account of system protection pattern is in system to log in During state, what monitoring was triggered under with the system protection pattern of domestic consumer's account identity logs calls row to input method interface For.
If the system is Android system, the input method interface is InputMethodManager (input method manager). Android platform has opened input method framework (Input Met hod Framework, IMF) from after 1.5 versions, and IMF is The Characteristic Design of Android platform.Its appearance, for the equipment being born without physical keyboard provides possibility.Meanwhile, IMF is opened The development interface of Android platform input method is put, for the input method of Android platform provides scalability.
The IMF of Android platform is divided into three main modulars according to function, respectively:Client control (including input control Part), input method manager (IMM), and input method application (IME).Client control, refers to be with copy editor's function System control (such as EditText controls), is the starting point of platform interior input method application man-machine interaction.Input method manager, be One of underlying basis service of Android platform, is responsible for input method, including input method installation, registration, activation etc..It is defeated Enter method application, then refer to preset or subsequent installation input method procedure in platform.
Client control, when client control receives focus, starts input method application and shows by taking EditText as an example Show dummy keyboard;And when losing focus, then hide keyboard.This generic operation belongs to the friendship between client control and input method manager Mutually.
Additionally, client control can also transmit text status, including cursor position, text selecting to input method application Deng;Receive the input word of simultaneously display input method application feedback.This kind of interaction belongs to the friendship of client control and input method application Mutually.
Client control, to input method service and the operation of input method application, is all by InputMe ThodManager examples call to realize.InputMethodManager uses API more like one for client control The set of operation, the sequence of operations that definition is serviced input method application and input method.
Can realize calling InputMethodManager by code below:
InputMethodManager m=(InputMethodManager) getSystemService (Co ntext.INPUT_METHOD_SERVICE);// obtain InputMethodManager.
m.toggleSoftInput(0,InputMethodManager.HIDE_NOT_ALWAYS);// realize input method On window switch display, if input method on window it has been shown that if hide, if hide, display input method to window On mouth.
Step S200:When input method interface is called, the input text type of input control is obtained.
If the system is Android system, the input control is EditText controls, by obtaining Edi tText controls InputType attributes are obtaining the input text type.EditText controls have individual attribute to set android:inputType ="" it is used for setting the type of text, is used to help input method and shows suitable keyboard type.Set EditText's InputType attributes, the method for most simply saving trouble is exactly directly to be set in the xml for defining EditText.Therefore, when When EditText controls are Password Input, the input text type of input control is password type.
If inputType=" textPassword " or inputType=" textVisiblePassword ", should Input text type is password.As inputType=" textPassword ", then the password inputing will with similar " * " or The form that " " etc. substitutes character shows;And when working as inputType=" textVisibl ePassword ", then the password inputing It is visible password.
If inputType=" number ", then it represents that the attribute of input control is numeric type;If inpu tType=" TextPassword | number ", then it represents that the attribute of input control is both password type, is again numeric type, therefore input Password can only be numerical ciphers, call the digital virtual keyboard of input method application (the input method application of i.e. following systemic presuppositions) (such as numeric keypad of nine grids form).
If inputType=" text ", then it represents that the attribute of input control is general character type;If inp utType =" textPassword | text ", then it represents that the attribute of input control is both password type, be again general character type (including Numeral, letter, symbol), therefore the password of input is general character password, calls input method application (i.e. following systemic presupposition Input method application) virtual full keyboard (such as full keyboard of QWERTY forms).
Step S300:If the input text type is password, the input method application of systemic presupposition, the systemic presupposition are enabled Input method application be installed on the safe space.The implication for enabling, it can be understood as system recognizes this and is by input method ID Unite after default input method application, the input method application of the systemic presupposition is tied into the input control, and (such as EditText is controlled Part).
The input method of the systemic presupposition both can be the input method of system default, it is also possible to when being used exclusively for Password Input The system input method called, namely system is provided with the system input method called during dedicated for Password Input.It is defeated in order to prevent Enter method application by the attack on network and steal information, in the present embodiment, the input method application of the systemic presupposition is can not Reach the input method application of external network (such as internet).The input method application of external network can not be reached, there can be two kinds Implication.A kind of is that the input method application of the systemic presupposition has network savvy, but it is when password is input into be listened in system Network savvy is disabled, i.e. the input method application of the systemic presupposition is arranged in offline to possess network savvy by system The input method application of state, such as system disconnect the input method of the systemic presupposition and the communication of external network during Password Input Connection, completes to recover the communication connection during Password Input;A kind of input method application for being the systemic presupposition is in itself and without connection The input method application of net function, the i.e. systemic presupposition is the input method application without network savvy.
The input method application of the systemic presupposition is installed in the safe space, can be mounted to certain in the safe space In individual independent memory space, the system application such as input method application of such as systemic presupposition is installed on certain specific file In (such as FILE2 files), and other third-party applications under safe mode are then all installed on other file (for example FILE1 files) in, third-party application cannot access the specific file.By this mounting means so that the input method Using independently of other third-party applications, security is improved.Or, the system application such as input method application of the systemic presupposition Identical file folder is all installed on third-party application, but the ephemeral data that the application of the system such as input method application is produced all is stored In another independent file, other third-party applications do not have access rights, can also so improve input method application Security.
Some traditional input method applications, the keyboard layout of dummy keyboard is random, and this random keyboard is in certain journey Security is improve on degree, the keystroke activity for for example preventing some rogue programs from monitoring keyboard causes password to be revealed, or prevents Other people spy on during input password.
However, in order to further improve security, in some embodiments of the invention, the input method of the systemic presupposition should With being used for:Show the dummy keyboard of initialization after called;Then touched by thing in the keyboard for then listening to setting each time During part, the keyboard layout of the dummy keyboard is changed at random.Namely user touches press dummy keyboard each time, input method application all can be with Machine changes a keyboard layout, so can further improve security.And, in certain embodiments, the void of the initialization What the keyboard layout of plan keyboard was also randomly generated.
Certain user may not simultaneously need this random keyboard, therefore can provide user setting function, so as to obtain user Random keyboard can be on demand turned on and off.Therefore, in certain embodiments, the input method application of the systemic presupposition is used for: Show the dummy keyboard of initialization after called;Receive the switching command (i.e. for opening the instruction of random keyboard) of setting; When the keyboard for then listening to setting each time is touched by event, the keyboard layout of the dummy keyboard is changed at random.
The switching command of the setting is included by the instruction of the press event generation of setting physical keyboard, by fingerprint sensor Touch the instruction of the event of pressing generation and by least one in the tactile instruction by event generation that key mapping is set on the dummy keyboard.Example Such as after the dummy keyboard for opening initialization, user can subtract key by pressing the volume of mobile terminal and open random by key Disk, or random keyboard can be opened by the fingerprint sensor of mobile terminal by touching, it is also possible to press dummy keyboard by touching The special switching key for setting is gone up to open random keyboard.
Due to generally can also have some non-textual input buttons on dummy keyboard, such as return key, delete key, weight are defeated Key, line feed key, in/English switch key etc., therefore user for convenience improves Consumer's Experience, and the keyboard of the setting is touched presses thing Part can not include the event of pressing of touching of these non-textual input buttons, namely the keyboard that sets touch by event as figure case or The tactile of letters case presses event.This equivalent to, user click on each time return key, delete key, the defeated key of weight, line feed key, in/English After literary switch key these non-textual input buttons, input method application can't at random change the keyboard layout of dummy keyboard;And work as After numerical key, letter key, symbolic key these text input buttons are clicked on each time, input method application changes once user at random The keyboard layout of dummy keyboard, user is previous therewith to almost be can be appreciated that after the click each time of these text input buttons Secondary different keyboard layout.
In certain embodiments, the random keyboard layout for changing dummy keyboard, possible not all key mapping can all change, Namely the layout of certain a part of key mapping on dummy keyboard be it is changeless, such as delete key, the defeated key of weight, line feed key, in/English Literary switch key these non-textual input buttons;The layout of the simply remaining part key mapping for changing, such as numeral on the dummy keyboard The keyboard layout of key mapping or letters case.This is equivalent to when user clicks on numerical key, letter key, symbolic key each time, these are literary After this input button, input method application changes once the keyboard layout of these text input buttons at random, and non-textual input is pressed The keyboard layout of key then keeps constant.
Fig. 2 is the input unit module map under system protection pattern of one embodiment.
The above-mentioned input method under system protection pattern of correspondence, the present invention also provides one kind under system protection pattern Input unit, it includes:Monitor module 100, acquisition module 200 and enable module 300.
Monitor module 100 be used for monitor under with the system protection pattern of domestic consumer's account identity logs trigger to defeated Enter the behavior of calling of method interface, under system protection pattern, be configured with the peace that operation resource is provided for the operation to make a reservation for application The total space, safe space inaccessible under system general mode;Acquisition module 200 is used for when input method interface is called When, obtain the input text type of input control;If it is password to enable module 300 for the input text type, enables and be Unite default input method application, the input method application of the systemic presupposition is installed on the safe space.
Monitor module 100 monitor under with the system protection pattern of domestic consumer's account identity logs trigger to input method Interface calls behavior.Under system protection pattern, the safety sky that operation resource is provided for the operation to make a reservation for application is configured with Between, safe space inaccessible under system general mode.
Under system protection pattern, predetermined application will carry out strict safety detection under running protection strategy, all Transactional operation, delivery operation about fund all can be monitored strictly, and can tightly protect the personal information of user, be prevented The user profile leakage of such as chat record, short message verification code etc..Wherein, making a reservation for application includes paying related application (example Such as wechat APP, Alipay APP), (such as industry and commerce is silver-colored for the related application (such as Lu Jin institute APP) of the financing application related to bank Row APP) in it is a kind of at least within, to protect fund security and the information security of user, certain predetermined application can also include All applications for being installed on safe space under system protection pattern.
Here the operation resource being somebody's turn to do, both can be understood to the application program in itself, it is understood that be the application configuration Data (configuration data of application program), it is also understood that for this applies user data (personal data of user), in these feelings Under condition, the safe space being somebody's turn to do is it can be understood that be memory space.Certainly, operation resource is also understood that to be running protection strategy, This safe space is it can be understood that be memory space and its corresponding running protection strategy configuration surroundings, running protection strategy is matched somebody with somebody Putting environment is:Running the configuration surroundings of startup antivirus, checking and killing Trojan etc. safety precautions when this is applied.
In the conventional technology, system protection pattern can be realized with routine " sandbox " isolation technology.But in this reality Apply in example, realized with multi-user mode.Multi-user mode is supported in Android system, the multi-user with WINDOWS systems Pattern is similar to, and the user data that different user is logged in lower system is separate, mutual unaffected.Therefore, at system It is system general mode when keeper's account (usual UID=0) is logged in, system is in domestic consumer's account (such as UID= 10) log in when be system protection pattern, system from system general mode into system protection pattern be equivalent to system from management Member's pattern switching is to user EXEC.Because multi-user mode can realize certain data isolation between user, such that it is able to Realize user in protected mode system safety (application install safety, transaction security, user information safety), realize safety every From safer than " sandbox " isolation technology in any case.
Therefore, the process that the system is switched to protected mode from general mode switches equivalent to the system from keeper's account To domestic consumer's account.In Android system, by call the switchUser () method in ActivityManager classes with Domestic consumer's account is switched to from keeper's account.The corresponding domestic consumer's account of system protection pattern is in system to log in During state, monitor module 100 monitor under with the system protection pattern of domestic consumer's account identity logs trigger to input method Interface calls behavior.
If the system is Android system, the input method interface is InputMethodManager (input method manager). Android platform has opened input method framework (Input Met hod Framework, IMF) from after 1.5 versions, and IMF is The Characteristic Design of Android platform.Its appearance, for the equipment being born without physical keyboard provides possibility.Meanwhile, IMF is opened The development interface of Android platform input method is put, for the input method of Android platform provides scalability.
The IMF of Android platform is divided into three main modulars according to function, respectively:Client control (including input control Part), input method manager (IMM), and input method application (IME).Client control, refers to be with copy editor's function System control (such as EditText controls), is the starting point of platform interior input method application man-machine interaction.Input method manager, be One of underlying basis service of Android platform, is responsible for input method, including input method installation, registration, activation etc..It is defeated Enter method application, then refer to preset or subsequent installation input method procedure in platform.
Client control, when client control receives focus, starts input method application and shows by taking EditText as an example Show dummy keyboard;And when losing focus, then hide keyboard.This generic operation belongs to the friendship between client control and input method manager Mutually.
Additionally, client control can also transmit text status, including cursor position, text selecting to input method application Deng;Receive the input word of simultaneously display input method application feedback.This kind of interaction belongs to the friendship of client control and input method application Mutually.
Client control, to input method service and the operation of input method application, is all by InputMe ThodManager examples call to realize.InputMethodManager uses API more like one for client control The set of operation, the sequence of operations that definition is serviced input method application and input method.
Can realize calling InputMethodManager by code below:
InputMethodManager m=(InputMethodManager) getSystemService (Co ntext.INPUT_METHOD_SERVICE);// obtain InputMethodManager.
m.toggleSoftInput(0,InputMethodManager.HIDE_NOT_ALWAYS);// realize input method On window switch display, if input method on window it has been shown that if hide, if hide, display input method to window On mouth.
When input method interface is called, acquisition module 200 obtains the input text type of input control.
If the system is Android system, the input control is EditText controls, and acquisition module 200 is by obtaining The inputType attributes of EditText controls are obtaining the input text type.EditTex t controls have individual attribute to set android:InputType="" it is used for setting the type of text, is used to help input method and shows suitable keyboard type.If The InputType attributes of EditText are put, the method for most simply saving trouble is exactly directly to be set in the xml for defining EditText. Therefore, when EditText controls are Password Input, the input text type of input control is password type.
If inputType=" textPassword " or inputType=" textVisiblePassword ", should Input text type is password.As inputType=" textPassword ", then the password inputing will with similar " * " or The form that " " etc. substitutes character shows;And when working as inputType=" textVisibl ePassword ", then the password inputing It is visible password.
If inputType=" number ", then it represents that the attribute of input control is numeric type;If inpu tType=" TextPassword | number ", then it represents that the attribute of input control is both password type, is again numeric type, therefore input Password can only be numerical ciphers, call the digital virtual keyboard of input method application (the input method application of i.e. following systemic presuppositions) (such as numeric keypad of nine grids form).
If inputType=" text ", then it represents that the attribute of input control is general character type;If inp utType =" textPassword | text ", then it represents that the attribute of input control is both password type, be again general character type (including Numeral, letter, symbol), therefore the password of input is general character password, calls input method application (i.e. following systemic presupposition Input method application) virtual full keyboard (such as full keyboard of QWERTY forms).
If the input text type is password, the input method application that module 300 enables systemic presupposition is enabled, the system is pre- If input method application be installed on the safe space.The implication for enabling, it can be understood as enable module 300 and known by input method ID After being clipped to the input method application of the systemic presupposition, the input method application of the systemic presupposition is tied to the input control (for example EditText controls).
The input method of the systemic presupposition both can be the input method of system default, it is also possible to when being used exclusively for Password Input The system input method called, namely system is provided with the system input method called during dedicated for Password Input.It is defeated in order to prevent Enter method application by the attack on network and steal information, in the present embodiment, the input method application of the systemic presupposition is can not Reach the input method application of external network (such as internet).The input method application of external network can not be reached, there can be two kinds Implication.A kind of is that the input method application of the systemic presupposition has network savvy, but it is when password is input into be listened in system Network savvy is disabled, i.e. the input method application of the systemic presupposition is arranged in offline to possess network savvy by system The input method application of state, enables input method and external network that module 300 disconnects the systemic presupposition during Password Input Communication connection, completes to recover the communication connection during Password Input;A kind of is that the input method application of the systemic presupposition does not have in itself The input method application for having network savvy, the i.e. systemic presupposition is the input method application without network savvy.
The input method application of the systemic presupposition is installed in the safe space, can be mounted to certain in the safe space In individual independent memory space, the system application such as input method application of such as systemic presupposition is installed on certain specific file In (such as FILE2 files), and other third-party applications under safe mode are then all installed on other file (for example FILE1 files) in, third-party application cannot access the specific file.By this mounting means so that the input method Using independently of other third-party applications, security is improved.Or, the system application such as input method application of the systemic presupposition Identical file folder is all installed on third-party application, but the ephemeral data that the application of the system such as input method application is produced all is stored In another independent file, other third-party applications do not have access rights, can also so improve input method application Security.
Some traditional input method applications, the keyboard layout of dummy keyboard is random, and this random keyboard is in certain journey Security is improve on degree, the keystroke activity for for example preventing some rogue programs from monitoring keyboard causes password to be revealed, or prevents Other people spy on during input password.
However, in order to further improve security, in some embodiments of the invention, the input method of the systemic presupposition should With being used for:Show the dummy keyboard of initialization after called;Then touched by thing in the keyboard for then listening to setting each time During part, the keyboard layout of the dummy keyboard is changed at random.Namely user touches press dummy keyboard each time, input method application all can be with Machine changes a keyboard layout, so can further improve security.And, in certain embodiments, the void of the initialization What the keyboard layout of plan keyboard was also randomly generated.
Certain user may not simultaneously need this random keyboard, therefore can provide user setting function, so as to obtain user Random keyboard can be on demand turned on and off.Therefore, in certain embodiments, the input method application of the systemic presupposition is used for: Show the dummy keyboard of initialization after called;Receive the switching command (i.e. for opening the instruction of random keyboard) of setting; When the keyboard for then listening to setting each time is touched by event, the keyboard layout of the dummy keyboard is changed at random.
The switching command of the setting is included by the instruction of the press event generation of setting physical keyboard, by fingerprint sensor Touch the instruction of the event of pressing generation and by least one in the tactile instruction by event generation that key mapping is set on the dummy keyboard.Example Such as after the dummy keyboard for opening initialization, user can subtract key by pressing the volume of mobile terminal and open random by key Disk, or random keyboard can be opened by the fingerprint sensor of mobile terminal by touching, it is also possible to press dummy keyboard by touching The special switching key for setting is gone up to open random keyboard.
Due to generally can also have some non-textual input buttons on dummy keyboard, such as return key, delete key, weight are defeated Key, line feed key, in/English switch key etc., therefore user for convenience improves Consumer's Experience, and the keyboard of the setting is touched presses thing Part can not include the event of pressing of touching of these non-textual input buttons, namely the keyboard that sets touch by event as figure case or The tactile of letters case presses event.This equivalent to, user click on each time return key, delete key, the defeated key of weight, line feed key, in/English After literary switch key these non-textual input buttons, input method application can't at random change the keyboard layout of dummy keyboard;And work as After numerical key, letter key, symbolic key these text input buttons are clicked on each time, input method application changes once user at random The keyboard layout of dummy keyboard, user is previous therewith to almost be can be appreciated that after the click each time of these text input buttons Secondary different keyboard layout.
In certain embodiments, the random keyboard layout for changing dummy keyboard, possible not all key mapping can all change, Namely the layout of certain a part of key mapping on dummy keyboard be it is changeless, such as delete key, the defeated key of weight, line feed key, in/English Literary switch key these non-textual input buttons;The layout of the simply remaining part key mapping for changing, such as numeral on the dummy keyboard The keyboard layout of key mapping or letters case.This is equivalent to when user clicks on numerical key, letter key, symbolic key each time, these are literary After this input button, input method application changes once the keyboard layout of these text input buttons at random, and non-textual input is pressed The keyboard layout of key then keeps constant.
The embodiment of the present invention additionally provides mobile terminal, as shown in figure 3, for convenience of description, illustrate only and the present invention The related part of embodiment, particular technique details is not disclosed, and refer to present invention method part.The mobile terminal can Think including mobile phone, panel computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point Of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer, so that mobile terminal is as mobile phone as an example:
Fig. 3 is illustrated that the block diagram of the part-structure of the mobile phone related to mobile terminal provided in an embodiment of the present invention.Ginseng Fig. 3 is examined, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 1510, memory 1520, input block 1530, display Unit 1540, sensor 1550, voicefrequency circuit 1560, Wireless Fidelity (wireless-fidelity, Wi-Fi) module 1570, place The reason part such as device 1580 and power supply 1590.It will be understood by those skilled in the art that the handset structure shown in Fig. 3 not structure The restriction of paired mobile phone, can include part more more or less than diagram, or combine some parts, or different parts Arrangement.
Each component parts of mobile phone is specifically introduced with reference to Fig. 3:
RF circuits 1510 can be used to receiving and sending messages or communication process in, the reception and transmission of signal, especially, by base station After downlink information is received, processed to processor 1580;In addition, up data is activation will be designed to base station.Generally, RF circuits 1510 include but is not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..Additionally, RF circuits 1510 can also be led to by radio communication and network and other equipment Letter.Above-mentioned radio communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 1520 can be used to store software program and module, and processor 1580 is by running storage in memory 1520 software program and module, so as to perform various function application and the data processing of mobile phone.Memory 1520 can be led To include storing program area and storage data field, wherein, storing program area can be needed for storage program area, at least one function Application program (such as sound-playing function, image player function etc.) etc.;Storage data field can store the use institute according to mobile phone Data (such as voice data, phone directory etc.) of establishment etc..Additionally, memory 1520 can be stored including high random access Device, can also include nonvolatile memory, and for example, at least one disk memory, flush memory device or other volatibility are consolidated State memory device.
Input block 1530 can be used to receive the numeral or character information of input, and produce with the user of mobile phone set with And the relevant key signals input of function control.Specifically, input block 1530 may include contact panel 1531 and other inputs Equipment 1532.Contact panel 1531, also referred to as touch-screen, can collect user thereon or neighbouring touch operation (such as user Use the behaviour of any suitable object such as finger, stylus or annex on contact panel 1531 or near contact panel 1531 Make), and corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 1531 may include touch detection Two parts of device and touch controller.Wherein, touch detecting apparatus detect the touch orientation of user, and detect touch operation band The signal for coming, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it Contact coordinate is converted into, then gives processor 1580, and the order sent of receiving processor 1580 and can be performed.Additionally, Contact panel 1531 can be realized using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except touch surface Plate 1531, input block 1530 can also include other input equipments 1532.Specifically, other input equipments 1532 can include But it is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more.
Display unit 1540 can be used for show by user input information or be supplied to user information and mobile phone it is each Plant menu.Display unit 1540 may include display panel 1541, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) To configure display panel 1541.Further, contact panel 1531 can cover display panel 1541, when contact panel 1531 is detected Arrive thereon or after neighbouring touch operation, processor 1580 is sent to determine the type of touch event, with preprocessor 1580 provide corresponding visual output according to the type of touch event on display panel 1541.Although in figure 3, contact panel 1531 is input and the input function that mobile phone is realized as two independent parts with display panel 1541, but in some realities In applying example, can by contact panel 1531 and display panel 1541 be integrated input that realize mobile phone and output function.
Mobile phone may also include at least one sensor 1550, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 1541, proximity transducer can close display panel when mobile phone is moved in one's ear 1541 and/or backlight.Used as one kind of motion sensor, (generally three axles) add in the detectable all directions of accelerometer sensor The size of speed, can detect that size and the direction of gravity when static, can be used to recognize application (the such as horizontal/vertical screen of mobile phone attitude Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;As for mobile phone also The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Voicefrequency circuit 1560, loudspeaker 1561, microphone 1562 can provide the COBBAIF between user and mobile phone.Audio Electric signal after the voice data conversion that circuit 1560 will can be received, is transferred to loudspeaker 1561, is changed by loudspeaker 1561 For voice signal is exported;On the other hand, the voice signal of collection is converted to electric signal by microphone 1562, by voicefrequency circuit 1560 Voice data is converted to after reception, then after voice data output processor 1580 is processed, through RF circuits 1510 being sent to ratio Such as another mobile phone, or voice data is exported to memory 1520 so as to further treatment.
Wi-Fi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses by Wi-Fi module 1570 Mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 3 shows Wi-Fi module 1570, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can exist as needed completely Do not change in the essential scope of invention and omit.
Processor 1580 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, By running or performing software program and/or module of the storage in memory 1520, and storage is called in memory 1520 Interior data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 1580 may include one or more processing units;Preferably, processor 1580 can integrated application processor and modulation /demodulation treatment Device, wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor is mainly located Reason radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1580.
Mobile phone also includes the power supply 1590 (such as battery) powered to all parts, it is preferred that power supply can be by power supply Management system is logically contiguous with processor 1580, so as to realize management charging, electric discharge and power consumption pipe by power-supply management system The functions such as reason.
Although not shown, mobile phone can also will not be repeated here including camera, bluetooth module etc..
In embodiments of the present invention, the processor 1580 included by the terminal also has following functions:Obtain encrypted instruction, The urtext of output is sent to by server according to encrypted instruction.The reception server feedback ciphertext, ciphertext with Urtext is associated.Urtext is substituted for ciphertext.Namely processor 1580 possesses to perform and above-mentioned is protected in system The function of the input method under shield pattern.
Or, in embodiments of the present invention, the processor 1580 included by the terminal also has following functions:From third party Ciphertext is obtained in application program;Receiving and deciphering is instructed, and ciphertext is sent into server according to decryption instructions;Receive clothes The urtext of business device feedback, exports urtext;Urtext is associated with ciphertext.Namely processor 1580 possesses and holds The function of the above-mentioned decryption input method of row.
Certainly, in actual realization, processor 1580 possesses the above-mentioned input side under system protection pattern of execution The function of method, the function of also possessing the decryption input method for performing above-mentioned.Usual this mobile terminal can be computer, flat board electricity Brain, mobile phone etc. are loaded with the intelligent terminal of Input Method Editor.
The above-mentioned input method under system protection pattern, device and mobile terminal, monitor with domestic consumer's account The behavior of calling to input method interface triggered under the system protection pattern of identity logs, under system protection pattern, is configured with use The safe space of operation resource, safe space inaccessible under system general mode are provided in the operation to make a reservation for application; When input method interface is called, the input text type of input control is obtained;If the input text type is password, open With the input method application of systemic presupposition, the input method application of the systemic presupposition is installed on the safe space.In system protection Under pattern, if the behavior of calling to input method interface were listened to, and the input text type of input control would be password, then prove User to be ready being input into password, and what the input method application no matter system default is called (put by user preset) is, now all can The automatic input method application for enabling systemic presupposition.So, even if the input method application that system default is called is third-party application, Password disclosure risk can be avoided, security is improve.
In the present invention, system protection pattern is realized by the multi-user mode of system.I.e. system is in keeper It is system general mode when account is logged in, it is system protection pattern that system is in when domestic consumer account is logged in, system is from system General mode is to be switched to user EXEC from administrator mode equivalent to system into system protection pattern.Due to multi-user Pattern can realize certain data isolation between user, such that it is able to realize safe operation of the user under system protection pattern, Realize security isolation.
The invention discloses following scheme:
A1, a kind of input method under system protection pattern, comprise the following steps:
What monitoring was triggered under with the system protection pattern of domestic consumer's account identity logs calls to input method interface Behavior, under system protection pattern, is configured with the safe space that operation resource is provided for the operation to make a reservation for application, and the safety is empty Between under system general mode inaccessible;
When input method interface is called, the input text type of input control is obtained;
If the input text type is password, enable the input method application of systemic presupposition, the systemic presupposition it is defeated Enter method application and be installed on the safe space.
A2, the input method according to A1, the predetermined application include paying related application, the application of financing correlation It is a kind of at least within the application related to bank.
A3, the input method according to A1, the operation resource include the application program in itself, the application configuration data User data wherein at least one is applied with this, the safe space includes memory space.
A4, the input method according to A1, the operation resource include running protection strategy, and the safe space includes Memory space and its corresponding running protection strategy configuration surroundings.
A5, the input method according to A1, the system are Android system, and the input method interface is InputMethodManager。
A6, the input method according to A1, the system are Android system, and the input control is controlled for EditText Part, the input text type is obtained by obtaining the inputType attributes of EditText controls;If inputType=" TextPassword " or inputType=" textVisiblePass word ", then the input text type is password.
A7, the input method according to A1, the input method application of the systemic presupposition are that can not reach external network Input method application.
But A8, the input method according to A7, the input method application of the systemic presupposition are possess network savvy quilt System is arranged in the input method application of off-line state.
A9, the input method according to A8, the input method application for enabling systemic presupposition include:
The input method of the systemic presupposition and the communication connection of external network are disconnected during Password Input, password is completed defeated Fashionable recovery communication connection.
A10, the input method according to A7, the input method application of the systemic presupposition is the input without network savvy Method application.
A11, the input method according to A1, the input method application of the systemic presupposition are used for:
Show the dummy keyboard of initialization after called;
When the keyboard for then listening to setting each time is touched by event, the key mapping cloth of the dummy keyboard is changed at random Office.
A12, the input method according to A11, the keyboard layout of the dummy keyboard of the initialization is random generation.
A13, the input method according to A11, the input method application of the systemic presupposition are used for:
Show the dummy keyboard of initialization after called;
Receive the switching command of setting;
When the keyboard for then listening to setting each time is touched by event, the key mapping cloth of the dummy keyboard is changed at random Office.
A14, the input method according to A13, the switching command of the setting are included by the pressing of setting physical keyboard The instruction of event generation, touching by the instruction of event generation and by setting touching for key mapping on the dummy keyboard by fingerprint sensor By at least one in the instruction that event is generated.
A15, the input method according to A11, the keyboard for setting are touched by event as figure case or letters case Touch press event.
A16, the input method according to A11, it is described change the dummy keyboard at random keyboard layout be:Change at random Become the keyboard layout of figure case or letters case on the dummy keyboard.
B17, a kind of input unit under system protection pattern, including:
Monitor module, for monitor under with the system protection pattern of domestic consumer's account identity logs trigger to input Method interface calls behavior, under system protection pattern, is configured with and provides the safety for running resource for the operation to make a reservation for application Space, safe space inaccessible under system general mode;
Acquisition module, for when input method interface is called, obtaining the input text type of input control;
Module is enabled, if being password for the input text type, the input method application of systemic presupposition is enabled, it is described The input method application of systemic presupposition is installed on the safe space.
B18, the input unit according to B17, the predetermined application is including paying related application, related answering of managing money matters With the one kind at least within the application related to bank.
B19, the input unit according to B17, the operation resource include the application program in itself, the application configuration number User data wherein at least one is applied according to this, the safe space includes memory space.
B20, the input unit according to B17, the operation resource include running protection strategy, the safe space bag Include memory space and its corresponding running protection strategy configuration surroundings.
B21, the input unit according to B17, the system are Android system, and the input method interface is InputMethodManager。
B22, the input unit according to B17, the system are Android system, and the input control is controlled for EditText Part, the acquisition module obtains the input text type by obtaining the inputType attributes of EditText controls;If InputType=" textPassword " or inputType=" textVisiblePassword ", then it is described to be input into text class Type is password.
B23, the input unit according to B17, the input method application of the systemic presupposition are that can not reach external network Input method application.
B24, the input unit according to B23, the input method application of the systemic presupposition are possess network savvy still The input method application of off-line state is arranged in by system.
B25, the input unit according to B24, the module that enables are used for:The system is disconnected during Password Input Default input method and the communication connection of external network, complete to recover the communication connection during Password Input.
B26, the input unit according to B23, the input method application of the systemic presupposition is the defeated of no network savvy Enter method application.
B27, the input unit according to B17, the input method application of the systemic presupposition are used for:
Show the dummy keyboard of initialization after called;
When the keyboard for then listening to setting each time is touched by event, the key mapping cloth of the dummy keyboard is changed at random Office.
B28, the input unit according to B27, the keyboard layout of the dummy keyboard of the initialization is random generation.
B29, the input unit according to B27, the input method application of the systemic presupposition are used for:
Show the dummy keyboard of initialization after called;
Receive the switching command of setting;
When the keyboard for then listening to setting each time is touched by event, the key mapping cloth of the dummy keyboard is changed at random Office.
B30, the input unit according to B29, the switching command of the setting are included by the pressing of setting physical keyboard The instruction of event generation, touching by the instruction of event generation and by setting touching for key mapping on the dummy keyboard by fingerprint sensor By at least one in the instruction that event is generated.
B31, the input unit according to B27, the keyboard for setting are touched by event as figure case or letters case Touch press event.
B32, the input unit according to B27, it is described change the dummy keyboard at random keyboard layout be:Change at random Become the keyboard layout of figure case or letters case on the dummy keyboard.
C33, a kind of mobile terminal, it includes:
Touch-sensitive display;
One or more processors;
Memory;
One or more application programs, wherein one or more of application programs are stored in the memory and quilt It is configured to by one or more of computing devices, one or more of programs are configured to carry out any one of A1 to A16 The described input method under system protection pattern.
It should be understood that although each step in the flow chart of accompanying drawing shows successively according to the instruction of arrow, These steps are not that the inevitable order indicated according to arrow is performed successively.Unless expressly stated otherwise herein, these steps The strict order limitation of execution, it can be performed in the other order.And, at least a portion step in accompanying drawing Many sub-steps or multiple stages can be included, these sub-steps or stage have been performed in synchronization Into, and can be to be performed at different moment, its execution sequence is also not necessarily and carry out successively, and can be with other steps or The sub-step or at least a portion in stage of person other steps are performed in turn or alternately.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (10)

1. a kind of input method under system protection pattern, it is characterised in that comprise the following steps:
What monitoring was triggered under with the system protection pattern of domestic consumer's account identity logs calls behavior to input method interface, Under system protection pattern, the safe space that operation resource is provided for the operation to make a reservation for application is configured with, the safe space exists Inaccessible under system general mode;
When input method interface is called, the input text type of input control is obtained;
If the input text type is password, the input method application of systemic presupposition, the input method of the systemic presupposition are enabled Using being installed on the safe space.
2. input method according to claim 1, it is characterised in that the predetermined application include paying related application, It is a kind of at least within the related application of the financing application related to bank.
3. input method according to claim 1, it is characterised in that the operation resource include the application program in itself, The application configuration data apply user data wherein at least one with this, and the safe space includes memory space.
4. input method according to claim 1, it is characterised in that the operation resource includes running protection strategy, institute Stating safe space includes memory space and its corresponding running protection strategy configuration surroundings.
5. input method according to claim 1, it is characterised in that the system is Android system, the input method connects Mouth is InputMethodManager.
6. input method according to claim 1, it is characterised in that the system is Android system, the input control It is EditText controls, the input text type is obtained by obtaining the inputType attributes of EditText controls;If InputType=" textPassword " or inputType=" textVisiblePassword ", then it is described to be input into text class Type is password.
7. input method according to claim 1, it is characterised in that the input method application of the systemic presupposition is can not to arrive Up to the input method application of external network.
8. input method according to claim 7, it is characterised in that the input method application of the systemic presupposition is to possess connection Net function is still arranged in the input method application of off-line state by system.
9. a kind of input unit under system protection pattern, it is characterised in that including:
Monitor module, for monitor under with the system protection pattern of domestic consumer's account identity logs trigger input method is connect Mouthful call behavior, under system protection pattern, be configured with and provide the safe space for running resource for the operation for predetermined application, Safe space inaccessible under system general mode;
Acquisition module, for when input method interface is called, obtaining the input text type of input control;
Module is enabled, if being password for the input text type, the input method application of systemic presupposition, the system is enabled Default input method application is installed on the safe space.
10. a kind of mobile terminal, it is characterised in that it includes:
Touch-sensitive display;
One or more processors;
Memory;
One or more application programs, wherein one or more of application programs are stored in the memory and are configured It is that, by one or more of computing devices, one or more of programs are configured to carry out any one of claim 1 to 8 The described input method under system protection pattern.
CN201710025476.4A 2017-01-13 2017-01-13 Input method, device and mobile terminal under system protection pattern Pending CN106874751A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710025476.4A CN106874751A (en) 2017-01-13 2017-01-13 Input method, device and mobile terminal under system protection pattern

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710025476.4A CN106874751A (en) 2017-01-13 2017-01-13 Input method, device and mobile terminal under system protection pattern

Publications (1)

Publication Number Publication Date
CN106874751A true CN106874751A (en) 2017-06-20

Family

ID=59157356

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710025476.4A Pending CN106874751A (en) 2017-01-13 2017-01-13 Input method, device and mobile terminal under system protection pattern

Country Status (1)

Country Link
CN (1) CN106874751A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107832105A (en) * 2017-11-24 2018-03-23 南昌黑鲨科技有限公司 A kind of application program launching method, starter and computer-readable recording medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103853993A (en) * 2014-03-26 2014-06-11 联想(北京)有限公司 Information processing method and electronic equipment
CN105630592A (en) * 2015-08-12 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Identity verification based space switching method and apparatus as well as terminal
CN105809019A (en) * 2016-03-15 2016-07-27 青岛海信移动通信技术股份有限公司 Method and device for Android terminal to start input method keyboard
CN105844180A (en) * 2016-03-15 2016-08-10 青岛海信移动通信技术股份有限公司 Starting method and device of input method keyboard
CN106250743A (en) * 2016-07-28 2016-12-21 北京小米移动软件有限公司 Account changing method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103853993A (en) * 2014-03-26 2014-06-11 联想(北京)有限公司 Information processing method and electronic equipment
CN105630592A (en) * 2015-08-12 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Identity verification based space switching method and apparatus as well as terminal
CN105809019A (en) * 2016-03-15 2016-07-27 青岛海信移动通信技术股份有限公司 Method and device for Android terminal to start input method keyboard
CN105844180A (en) * 2016-03-15 2016-08-10 青岛海信移动通信技术股份有限公司 Starting method and device of input method keyboard
CN106250743A (en) * 2016-07-28 2016-12-21 北京小米移动软件有限公司 Account changing method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
佚名: "值得你花时间一看:Android 5.0 Lollipop 安全特性详解", 《HTTPS://SSPAI.COM/POST/27285》 *
刘超: "《深入解析Android5.0系统》", 30 April 2015 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107832105A (en) * 2017-11-24 2018-03-23 南昌黑鲨科技有限公司 A kind of application program launching method, starter and computer-readable recording medium
CN107832105B (en) * 2017-11-24 2022-02-15 南昌黑鲨科技有限公司 Application program starting method, starting device and computer readable storage medium

Similar Documents

Publication Publication Date Title
US11874903B2 (en) User interface switching method and terminal
CN111107222B (en) Interface sharing method and electronic equipment
US9703971B2 (en) Sensitive operation verification method, terminal device, server, and verification system
CN106791168A (en) Information of mobile terminal guard method, device and mobile terminal
WO2018045873A1 (en) Message processing method for instant messaging application and related product
WO2021110053A1 (en) File sending method and terminal device
CN108475304B (en) Method and device for associating application program and biological characteristics and mobile terminal
WO2021004327A1 (en) Method for setting application permission, and terminal device
CN107368518A (en) The management method and terminal of a kind of notification message, computer-readable recording medium
WO2018214748A1 (en) Method and apparatus for displaying application interface, terminal and storage medium
CN111880675B (en) Interface display method and device and electronic equipment
CN106201484A (en) The collocation method of application program, device and terminal unit
CN107480996A (en) A kind of method of payment and terminal
CN111459358A (en) Application program control method and electronic equipment
CN108153460A (en) A kind of icon hiding method and terminal
CN106933633A (en) Right management method, device and mobile terminal
CN106203015A (en) The collocation method of application program, device and terminal unit
JP6974620B2 (en) Notification message processing method and terminal
CN106909854A (en) Picture management method, device and mobile terminal
WO2015101254A1 (en) Information interaction method, apparatus and system
CN108319432A (en) A kind of application operation method and terminal
CN107577933A (en) Using login method and device, computer equipment, computer-readable recording medium
CN109992939B (en) Login method and terminal equipment
CN107102913A (en) Data back up method, device and computer equipment
CN106874751A (en) Input method, device and mobile terminal under system protection pattern

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20170720

Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801

Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: Beijing Qihu Technology Co., Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170620