CN107633174A - A kind of user inputs management method and device, terminal - Google Patents

A kind of user inputs management method and device, terminal Download PDF

Info

Publication number
CN107633174A
CN107633174A CN201610570352.XA CN201610570352A CN107633174A CN 107633174 A CN107633174 A CN 107633174A CN 201610570352 A CN201610570352 A CN 201610570352A CN 107633174 A CN107633174 A CN 107633174A
Authority
CN
China
Prior art keywords
interference
byte
input method
character
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610570352.XA
Other languages
Chinese (zh)
Other versions
CN107633174B (en
Inventor
姚均营
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing ZTE New Software Co Ltd
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610570352.XA priority Critical patent/CN107633174B/en
Priority to PCT/CN2016/095340 priority patent/WO2018014400A1/en
Publication of CN107633174A publication Critical patent/CN107633174A/en
Application granted granted Critical
Publication of CN107633174B publication Critical patent/CN107633174B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Input From Keyboards Or The Like (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiments of the invention provide a kind of user to input management method and device, terminal;This method includes:When input method is called by intended application, detect clicking operation of the user in input method inputting interface, after clicking operation is detected, generation interference is operated and transmitted to input method, interference operation is used to generate interference byte by input method, receives the byte to be entered that input method operates generation according to clicking operation and interference, deletes the interference byte that the input method in byte to be entered operates generation according to interference, target byte is generated, target byte is inputted to the inputting interface of intended application.Pass through the implementation of the embodiment of the present invention, because clicking operation and interference operation all generate corresponding byte by input method, the input record obtained by input method includes clicking operation and interference operation, can not be by the record of input method come illegal, accurately acquisition user clicking operation, and then the privacy information of user can not be calculated.

Description

A kind of user inputs management method and device, terminal
Technical field
The present invention relates to user to input field, more particularly to a kind of user inputs management method and device, terminal.
Background technology
Rapid growth is obtained in the service of mobile phone terminal with the business such as quick popularization, mobile payment of smart mobile phone, Thing followed customer information is stolen and monetary losses are but as a big security threat of domestic consumer.For example a kind of privacy is stolen Viroid --- " keyboard evil backstage manipulator ", once popular in overseas, the virus is packaged into well-known cellphone inputting method SwiftKey In KeyBoard, can direct monitoring users input through keyboard, upload leakage user account password information, in addition including credit card, Net silver etc. pays data, and the viral harm is extremely serious., can be because input when i.e. user is using input method input privacy information Method is invaded, and causes the leakage of user privacy information.
The content of the invention
The embodiments of the invention provide a kind of user to input management method and device, terminal, to solve prior art presence Because input method invaded cause user privacy information compromised the problem of.
On the one hand, there is provided a kind of user inputs management method, including:
When input method is called by intended application, clicking operation of the detection user in input method inputting interface;
After clicking operation is detected, generation interference, which is operated and transmitted to input method, interference operation, to be used to pass through input method Generation interference byte;
Receive the byte to be entered that input method operates generation according to clicking operation and interference;
The interference byte that the input method in byte to be entered operates generation according to interference is deleted, generates target byte;
By the inputting interface of target byte input intended application.
On the one hand, there is provided a kind of user inputs managing device, including:Detection module, interference module and interference module is gone, Wherein,
Detection module is used for when input method is called by intended application, and detection user grasps in the click of input method inputting interface Make;
Interference module is used for after clicking operation is detected, generation interference is operated and transmitted to input method, interference operation and uses Byte is disturbed in being generated by input method;
Interference module is gone to be used to receive the byte to be entered that input method operates generation according to clicking operation and interference, deletion is treated The input method inputted in byte operates the interference byte of generation according to interference, generates target byte, target byte is inputted into target The inputting interface of application.
On the one hand, there is provided a kind of terminal, including:Input module, application target, input method module and processor, wherein,
Input module is used to receive user's operation, generates clicking operation;
Application module, which is used to be operated according to user, starts intended application, and calls input in the inputting interface of intended application Method;
Input method module includes at least one input method, for calling input method to generate byte according to input operation, and it is defeated Go out, input operation includes clicking operation and interference operation;
Processor is used for when input method is called by intended application, and detection user grasps in the click of input method inputting interface Make, after clicking operation is detected, generation interference operation is simultaneously transmitted to input method, and interference operation, which is used to generate by input method, to be done Byte is disturbed, the byte to be entered that input method operates generation according to clicking operation and interference is received, deletes defeated in byte to be entered Enter the interference byte that method operates generation according to interference, generate target byte, target byte is inputted to the inputting interface of intended application.
On the other hand, there is provided a kind of computer-readable storage medium, be stored with computer in computer-readable storage medium and can perform Instruction, computer executable instructions are used to perform foregoing user's input management method.
The beneficial effect of the embodiment of the present invention:
The embodiments of the invention provide a kind of user to input management method, and this method is detecting one click of user's input After operation, an interference operation is generated, interference byte corresponding to interference operation is deleted at intended application interface;Due to clicking operation And interference operation all generates corresponding byte by input method, therefore, the input record obtained by input method includes clicking operation And interference operation, even if so input method is invaded, it can not obtain user's by the record of input method come illegal, accurate Clicking operation, and then the input content of user can not be calculated according to clicking operation, it can not illegally obtain user and pass through input The privacy information of method input, it is existing because input method is invaded asking of causing user privacy information compromised to solve prior art Topic, enhance the usage experience of user.
Brief description of the drawings
Fig. 1 is the flow chart that the user that first embodiment of the invention provides inputs management method;
Fig. 2 is the structural representation that the user that second embodiment of the invention provides inputs managing device;
Fig. 3 is the structural representation for the terminal that third embodiment of the invention provides;
Fig. 4 is the input method block schematic illustration that fourth embodiment of the invention is related to;
Fig. 5 is the implementation process figure of existing input method;
Fig. 6 is the input method workflow diagram that fourth embodiment of the invention provides;
Fig. 7 is the schematic diagram for the target program inputting interface that fourth embodiment of the invention is related to.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is part of the embodiment in the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
Further annotation explanation is now made to the present invention by way of embodiment combination accompanying drawing.
First embodiment:
Fig. 1 is the flow chart that the user that first embodiment of the invention provides inputs management method, as shown in Figure 1, this implementation The user that example provides, which inputs management method, to be included:
S101:When input method is called by intended application, clicking operation of the detection user in input method inputting interface;
In actual applications, input method inputting interface can be direct using terminal button to realize or touch Touch in screen terminal, realized by way of virtual key;Clicking operation includes the button operation of user and/or in dummy keyboard On pressing, the operation such as touching.
S102:After clicking operation is detected, generation interference, which is operated and transmitted to input method, interference operation, to be used for by defeated Enter method generation interference byte;
Interference operation is independently triggered by terminal, and non-user click, for protecting user to actually enter purpose not Method record can be transfused to.
S103:Receive the byte to be entered that input method operates generation according to clicking operation and interference;
For input method when receiving input operation, meeting byte according to corresponding to generating preset relation, this is not this implementation The emphasis of example concern, is repeated no more;In the present embodiment, input operation just including user clicking operation and terminal generation The intention that actually enters of user cannot be known/be recorded to interference operation, such input method, and especially bank account password etc. is related to The privacy information of fund security.
S104:The interference byte that the input method in byte to be entered operates generation according to interference is deleted, generates target byte;
After deleting interference byte, the target byte of generation is the content that user is actually subjected to input, thus will not be because of dry Disturb the problem of operation causes user's input error.
S105:By the inputting interface of target byte input intended application.
In certain embodiments, in above-described embodiment after clicking operation is detected, generation interference operate and transmit to Input method includes:
Obtain the position coordinates of each character on input method inputting interface;
After clicking operation is detected, according to default interference rule, interference character to be triggered is selected, character will be disturbed Position as interference operation position coordinates;
According to the position coordinates of interference operation, generation interference operation, and transmit to input method.
In actual applications, it can be any regular to disturb rule, appointed such as from all characters of input method inputting interface Meaning selects one or more characters to correspond to the character late conduct of character as interference character, or selection user's clicking operation Disturb character etc. mode;In certain embodiments, if interference rule is to be selected in the adjacent character for correspond to character from clicking operation It is regular according to default interference in above-described embodiment when selecting at least one character as interference character, select to be triggered do Disturbing character includes:
Obtain the position coordinates that clicking operation corresponds to character;
The position coordinates of character is corresponded to according to the position coordinates of each character and clicking operation on input method inputting interface, Determine that clicking operation corresponds to the adjacent character of character;
At least one character of selection from adjacent character is as interference character.
In certain embodiments, in above-described embodiment after clicking operation is detected, generation interference operation include:
After clicking operation is detected, before input method generates byte according to clicking operation, generation interference operation;And/or
Detect clicking operation and input method according to clicking operation generate byte after, generation interference operation.
In certain embodiments, the user in above-described embodiment inputs management method, defeated in byte to be entered is deleted Before entering the interference byte that method operates generation according to interference, in addition to:
The mapping relations of byte are generated according to operation according to input method, it is determined that interference byte corresponding to interference operation;
Interference byte is identified display;
The input method deleted in byte to be entered includes according to the interference byte of interference operation generation:Delete and be identified display Byte.
In certain embodiments, the input method in the deletion byte to be entered in above-described embodiment is according to interference operation generation Interference byte include:
After detecting input method according to interference operation generation interference byte, interference byte is deleted immediately;And/or
After detecting that user closes the completion input of input method inputting interface, grasped in input method according to clicking operation and interference In all bytes to be entered that work generates, all interference bytes are deleted.
Second embodiment:
Fig. 2 is the structural representation that the user that second embodiment of the invention provides inputs managing device, as shown in Figure 2, this The user that embodiment provides, which inputs managing device, to be included:Detection module 21, interference module 22 and interference module 23 is gone, wherein,
Detection module 21 is used for when input method is called by intended application, click of the detection user in input method inputting interface Operation;
Interference module 22 is used for after clicking operation is detected, generation interference is operated and transmitted to input method, interference operation For generating interference byte by input method;
Go interference module 23 to be used to receive the byte to be entered that input method operates generation according to clicking operation and interference, delete Input method in byte to be entered operates the interference byte of generation according to interference, generates target byte, target byte is inputted into mesh Mark the inputting interface of application.
In certain embodiments, the interference module 22 in above-described embodiment is used to obtain each character on input method inputting interface Position coordinates;After clicking operation is detected, the position coordinates that clicking operation corresponds to character is obtained, boundary is inputted according to input method The position coordinates of each character and clicking operation correspond to the position coordinates of character on face, determine that clicking operation corresponds to the phase of character Adjacent character, at least one character of selection from adjacent character operate the position for disturbing character as interference as interference character Position coordinates, according to the position coordinates of interference operation, generation interference operation, and transmit to input method.
In certain embodiments, the interference module 22 in above-described embodiment is used to generate byte according to operation according to input method Mapping relations, it is determined that interference operation corresponding to interference byte, will interference byte be identified display;Interference module is gone to be used to delete Except the byte of identified display.
In certain embodiments, interference module 23 is gone to be used to detect input method according to interference behaviour in above-described embodiment After making generation interference byte, interference byte is deleted immediately;And/or detecting that it is defeated that user closes the completion of input method inputting interface After entering, in input method operates all bytes to be entered of generation according to clicking operation and interference, all interference bytes are deleted.
In actual applications, all functional modules in embodiment illustrated in fig. 2, processor, editorial logic can be used The modes such as device are realized.
3rd embodiment:
Fig. 3 is the structural representation for the terminal that third embodiment of the invention provides, from the figure 3, it may be seen that what the present embodiment provided Terminal includes:Input module 31, application module 32, input method module 33 and processor 34, wherein,
Input module 31 is used to receive user's operation, generates clicking operation;It can be physical button in terminal, touch Shield the virtual key of display, can also be button that external accessory provides etc.;
Application module 32, which is used to be operated according to user, starts intended application, and calls input in the inputting interface of intended application Method;After input method is called, a triggering message can be sent to processor 34;
Input method module 33 includes at least one input method, for calling input method to generate byte according to input operation, and Output, input operation include clicking operation and interference operation;
Processor 34 is used to receive triggering message, it is believed that when input method is called by intended application, user is defeated for detection Enter the clicking operation of method inputting interface, after clicking operation is detected, generation interference is operated and transmitted to input method, interference operation For generating interference byte by input method, the byte to be entered that input method operates generation according to clicking operation and interference is received, The interference byte that the input method in byte to be entered operates generation according to interference is deleted, generates target byte, target byte is defeated Enter the inputting interface of intended application.
In certain embodiments, the processor 34 in above-described embodiment is used to obtain each character on input method inputting interface Position coordinates;After clicking operation is detected, according to default interference rule, interference character to be triggered is selected, by noise word Position coordinates of the position of symbol as interference operation;According to the position coordinates of interference operation, generation interference operation, and transmit to defeated Enter method.
In certain embodiments, if upper interference rule is to select at least one in the adjacent character for correspond to character from clicking operation When individual character is as interference character, states the processor 34 in embodiment and be used to obtain the position coordinates that clicking operation corresponds to character; The position coordinates of character is corresponded to according to the position coordinates of each character and clicking operation on input method inputting interface, it is determined that clicking on The adjacent character of the corresponding character of operation;At least one character of selection from adjacent character is as interference character.
In certain embodiments, the processor 34 in above-described embodiment is used for after clicking operation is detected, input method root Before byte being generated according to clicking operation, generation interference operation;And/or detect clicking operation and input method according to click on grasp After making generation byte, generation interference operation.
In certain embodiments, the processor 34 in above-described embodiment is used to generate byte according to operation according to input method Mapping relations, it is determined that interference byte corresponding to interference operation;Interference byte is identified display;Delete the word for being identified display Section.
In certain embodiments, the processor 34 in above-described embodiment is used to detect input method according to interference operation life Into after interference byte, interference byte is deleted immediately;And/or after detecting that user closes the completion input of input method inputting interface, In input method operates all bytes to be entered of generation according to clicking operation and interference, all interference bytes are deleted.
Fourth embodiment:
Further annotation explanation is done to the present invention in conjunction with concrete application scene.
For the present embodiment when user is by input method inputting character information, terminal system is automatically in the character letter of user's input Scrambler, and the scrambler that deletion system is automatically added in the target program of input content are added in breath, can so not influenceed For user normally in the case of input, input method procedure can not be accurately obtained the real content of user's input, realize the peace of content Full input.
Terminal system adds scrambler in the character information of user's input automatically, refers to click on enter key on screen in user Some character in disk, when producing input coordinate, system in coordinate queue, adds other coordinates, for generating scrambler automatically.
In detail, user click on screen when, system input device file can record user input coordinate value, such as In intelligence system based on Linux, the coordinate information of touch screen can be recorded in input equipment file/dev/input/event* In.Under the method for safety input, system can click on the coordinate of generation as standard using user, single according to certain rule, generation Or multiple interference coordinates, and be written in input equipment file/dev/input/event*.When input method procedure, to respond these defeated When entering coordinate, multiple characters can be sequentially generated, the normal character of user's input and doing for system addition are contained in these characters Character is disturbed, these characters of input method generation can all be sent to target program.
The target program of input content refers to a series of software applications installed in terminal system, such as social software, hand Machine banking software etc..
When input method procedure generates character, and character is sent into target program, terminal system is by character queue Character deletion is disturbed, only retains the normal character of user's input.
Terminal system delete interference character method be by parsing target program interface control, obtaining the character of control, Then by the interference character deletion on control.
In detail, the specific method for parsing target program interface control information is to obtain current interface control by function interface Part information, such as control information can be obtained by dumpWindowHierarchy interfaces in Android platform terminal, or Control information is obtained by UiAutomator dump orders.
Further, the word content of control can be changed by function interface after interface control information is got.Example The text envelope of control can be set such as in Android platform terminal by the settext methods in UiAutomator class libraries Breath, so as to complete to disturb character deletion in control text.
Based on above-mentioned technical proposal, in the case where input method procedure is by malicious intrusions, rogue program also can not be received accurately Collect the real content of user's input, so as to reach the purpose inputted safely.
Specifically, by taking the mobile phone of android system as an example, as shown in figure 4, intelligent terminal input method system framework includes Target program, system process, input method process three parts;Work as target program, as social software, Mobile banking's software need to input During character content, input method procedure is opened to system process application first, when system process receives application, binding input frame is simultaneously Display input method.Such as respectively in target program, system process and input method process in the system terminal based on Android It is middle to be carried out respectively by InputMethodManager, InputMethodManagerService, InputMethodService Collaborative interactive.When binding input frame and after display input method, user's point touching screen, input method process generation character, and by word Symbol sends target program to, after target program receives character, is shown on corresponding control.
As shown in figure 5, user's point touching screen, input the general flow of character is included such as existing input method workflow Under several steps:
S502, user click on some character on screen entering method keyboard, such as alphabetical a.
S504, touch-screen driver response click action, generates the coordinate of click location, and co-ordinate content is reported Terminal input subsystem.
S506, terminal input subsystem will drive the content reported to write in input equipment file, such as based on linux Intelligence system in, input equipment file is under/dev/input/ catalogues.
S508, terminal input subsystem monitors the content change in input equipment file, and original coordinates information is carried out Encapsulation, is sent to upper level applications (i.e. in a manner of incoming event:Input method procedure).
S510, input method procedure response incoming event, generates character, such as alphabetical a.
S512, target program receive the character that sends over of input program, and by the currently displayed focus that obtains of character On control.
Above process step completes the input of character, and in this flow, user it is expected that all characters of input pass through Input method procedure generates, so, when input method procedure is invaded, when input method procedure is insincere, all the elements of user's input Can directly it be stolen, security risk is very high.Safety input flow proposed by the present invention can solve this problem.
The method of work for the input method that the present embodiment provides is as shown in fig. 6, character safety input flow comprises the following steps:
S602, user click on some character on screen entering method keyboard, such as alphabetical a.
S604, touch-screen driver response click action, generates the coordinate of click location, and co-ordinate content is reported Terminal input subsystem.
S606, terminal input subsystem will drive the content reported to write in input equipment file, such as based on linux Intelligence system in, input equipment file is under/dev/input/ catalogues.
S608, terminal input subsystem monitors the content change in input equipment file, and original coordinates information is carried out Encapsulation, is sent to upper level applications (i.e. in a manner of incoming event:Input method procedure).
S610, input method procedure response incoming event, generates character, such as alphabetical a.
S612, target program receive the character that sends over of input program, and by the currently displayed focus that obtains of character On control.
S614, system process record the character that user has inputted in target program, such as alphabetical a, on this basis, system Generation interference coordinate, be written to/dev/input input equipment files in.
In detail, the rule of system generation interference coordinate is the layout information by parsing current interface, obtains each word The centre coordinate position of female control, some alphabetic coordinates therein are then taken out at random as interference coordinate.
S616, system monitor the interference coordinate information of the insertion in input equipment file, and are packaged, and it is defeated to send interference Incoming event is to input method procedure.
S618, input method procedure response incoming event, generation interference character, such as alphabetical b.
S620, target program receives and shows all characters, such as ab.
S622, terminal system process obtain the character content of edit box in target program, and with record in step S614 Character content is compared, and is the character content recorded in step S614 by the content modification of target program edit box, so as to reach To the purpose for deleting interference character.
In detail, step S620 and S622 is to complete in a short time, is automatically performed in real time by program, inputs character and deletes Except the time shared by character can not the operation that is carried out of sensory perceptual system process all in Millisecond, the normal input process of user.
Above process step completes the safety input of character, in this flow, when user completes the input of a character Afterwards, system quickly automatically generates interference coordinate, and generates interference character by input method, and then system process is by target program In contain the input content of interference character and recover the character of user's input, the schematic diagram of this process is as shown in Figure 7.
In the figure 7, user clicks on screen and inputs alphabetical a schematic diagram as shown in S702;System automatically generates interference character Target program inputs schematic diagram as shown in S704 afterwards, the character that can input user in S704 and the interference of system insertion Character is shown with different font styles, is given user and is illustrated with the prompting of close friend, as the alphabetical b in schematic diagram is aobvious with colour Show;In S706, interference character b is deleted, and only retains the content of user's input.
The present embodiment proposes a kind of secured inputting method, and this method can be on the existing input system basis of mobile terminal On, security improvement is done in the input to common input method procedure, reduces the security risk brought in itself by input method procedure, larger journey The safety coefficient of the lifting product of degree.
In summary, by the implementation of the embodiment of the present invention, following beneficial effect at least be present:
The embodiments of the invention provide a kind of user to input management method, and this method is detecting one click of user's input After operation, an interference operation is generated, interference byte corresponding to interference operation is deleted at intended application interface;Due to clicking operation And interference operation all generates corresponding byte by input method, therefore, the input record obtained by input method includes clicking operation And interference operation, even if so input method is invaded, it can not obtain user's by the record of input method come illegal, accurate Clicking operation, and then the input content of user can not be calculated according to clicking operation, it can not illegally obtain user and pass through input The privacy information of method input, it is existing because input method is invaded asking of causing user privacy information compromised to solve prior art Topic, enhance the usage experience of user.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the shape of the embodiment in terms of the present invention can use hardware embodiment, software implementation or combination software and hardware Formula.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more to use storage The form for the computer program product that medium is implemented on (including but is not limited to magnetic disk storage and optical memory etc.).
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
It the above is only the embodiment of the present invention, any formal limitation not done to the present invention, it is every Any simple modification, equivalent variations, combination or the modification that technical spirit according to the present invention is made to embodiment of above, still Belong to the protection domain of technical solution of the present invention.

Claims (16)

1. a kind of user inputs management method, including:
When input method is called by intended application, clicking operation of the detection user in input method inputting interface;
After clicking operation is detected, generation interference, which is operated and transmitted to the input method, the interference operation, to be used to pass through institute State input method generation interference byte;
Receive the byte to be entered that the input method operates generation according to the clicking operation and the interference;
The interference byte that the input method in byte to be entered operates generation according to the interference is deleted, generates target byte;
The target byte is inputted to the inputting interface of the intended application.
2. user as claimed in claim 1 inputs management method, it is characterised in that it is described after clicking operation is detected, it is raw Operating and transmit to the input method into interference includes:
Obtain the position coordinates of each character on the input method inputting interface;
After clicking operation is detected, according to default interference rule, interference character to be triggered is selected, the position of character will be disturbed Put the position coordinates as the interference operation;
According to the position coordinates of the interference operation, generation interference operation, and transmit to the input method.
3. user as claimed in claim 2 inputs management method, it is characterised in that if the interference rule is from clicking operation It is described according to default interference rule, choosing when at least one character is selected in the adjacent character of corresponding character as interference character Selecting interference character to be triggered includes:
Obtain the position coordinates that the clicking operation corresponds to character;
The position that character is corresponded to according to the position coordinates of each character and the clicking operation on the input method inputting interface is sat Mark, determines that the clicking operation corresponds to the adjacent character of character;
At least one character of selection from the adjacent character is as interference character.
4. user as claimed in claim 1 inputs management method, it is characterised in that it is described after clicking operation is detected, it is raw Include into interference operation:
After clicking operation is detected, before the input method generates byte according to clicking operation, the interference operation is generated; And/or
Detect clicking operation and the input method according to clicking operation generate byte after, generate it is described interference operation.
5. user as claimed in claim 1 inputs management method, it is characterised in that described defeated in byte to be entered is deleted Before entering interference byte of the method according to the interference operation generation, in addition to:
The mapping relations of byte are generated according to operation according to the input method, determine interference byte corresponding to the interference operation;
The interference byte is identified display;
The interference byte that the input method deleted in byte to be entered operates generation according to the interference includes:Delete quilt Identify the byte of display.
6. the user as described in any one of claim 1 to 5 inputs management method, it is characterised in that described to delete word to be entered The interference byte that the input method in section operates generation according to the interference includes:
After detecting the input method according to interference operation generation interference byte, the interference byte is deleted immediately;And/or
After detecting that user closes the input method inputting interface completion input, in the input method according to the clicking operation And in all bytes to be entered of the interference operation generation, delete all interference bytes.
7. a kind of user inputs managing device, including:Detection module, interference module and interference module is gone, wherein,
The detection module is used for when input method is called by intended application, and detection user grasps in the click of input method inputting interface Make;
The interference module is used for after clicking operation is detected, generation interference is operated and transmitted to the input method, described dry Operation is disturbed to be used to generate interference byte by the input method;
It is described go interference module be used for receive the input method according to the clicking operation and it is described interference operate generation treat it is defeated Enter byte, delete the interference byte that the input method in byte to be entered operates generation according to the interference, generate target word Section, the target byte is inputted to the inputting interface of the intended application.
8. user as claimed in claim 7 inputs managing device, it is characterised in that the interference module is described defeated for obtaining Enter the position coordinates of each character on method inputting interface;After clicking operation is detected, obtain the clicking operation and correspond to character Position coordinates, character is corresponded to according to the position coordinates of each character and the clicking operation on the input method inputting interface Position coordinates, determine that the clicking operation corresponds to the adjacent character of character, at least one character of the selection from the adjacent character As interference character, the position of character will be disturbed as the position coordinates of the interference operation, according to the position of the interference operation Coordinate, generation interference operation are put, and is transmitted to the input method.
9. user as claimed in claim 7 inputs managing device, it is characterised in that the interference module is used for according to described defeated Enter the mapping relations that method generates byte according to operation, interference byte corresponding to the interference operation is determined, by the interference byte It is identified display;It is described to go interference module to be used to delete the byte for being identified display.
10. the user as described in any one of claim 7 to 9 inputs managing device, it is characterised in that described to go interference module to use In after detecting the input method according to interference operation generation interference byte, the interference byte is deleted immediately;And/or Detect that user is closed after the input method inputting interface completes input, in the input method according to the clicking operation and described In all bytes to be entered of interference operation generation, all interference bytes are deleted.
11. a kind of terminal, including:Input module, application module, input method module and processor, wherein,
The input module is used to receive user's operation, generates clicking operation;
The application module, which is used to be operated according to user, starts intended application, and calls input in the inputting interface of intended application Method;
The input method module includes at least one input method, for calling input method to generate byte according to input operation, and it is defeated Go out, the input operation includes clicking operation and interference operation;
The processor is used for when input method is called by intended application, and detection user grasps in the click of input method inputting interface Make, after clicking operation is detected, generation interference, which is operated and transmitted to the input method, the interference operation, to be used for by described Input method generation interference byte, receives the word to be entered that the input method operates generation according to the clicking operation and the interference Section, the interference byte that the input method in byte to be entered operates generation according to the interference is deleted, generates target byte, will The target byte inputs the inputting interface of the intended application.
12. terminal as claimed in claim 11, it is characterised in that the processor is used to obtain the input method inputting interface The position coordinates of upper each character;After clicking operation is detected, according to default interference rule, noise word to be triggered is selected Symbol, the position of character will be disturbed as the position coordinates of the interference operation;According to the position coordinates of the interference operation, generation Interference operation, and transmit to the input method.
13. terminal as claimed in claim 12, it is characterised in that if the interference rule is to correspond to character from clicking operation When at least one character is selected in adjacent character as interference character, the processor corresponds to word for obtaining the clicking operation The position coordinates of symbol;Word is corresponded to according to the position coordinates of each character and the clicking operation on the input method inputting interface The position coordinates of symbol, determine that the clicking operation corresponds to the adjacent character of character;Selection from the adjacent character is at least one Character is as interference character.
14. terminal as claimed in claim 11, it is characterised in that the processor is used for after clicking operation is detected, institute Before input method is stated according to clicking operation generation byte, the interference operation is generated;And/or detecting clicking operation and institute After input method is stated according to clicking operation generation byte, the interference operation is generated.
15. terminal as claimed in claim 11, it is characterised in that the processor is used for according to the input method according to operation The mapping relations of byte are generated, determine interference byte corresponding to the interference operation;The interference byte is identified display; Delete the byte for being identified display.
16. the terminal as described in any one of claim 11 to 15, it is characterised in that the processor be used for detect it is described After input method operates generation interference byte according to interference, the interference byte is deleted immediately;And/or detecting user's closing After the input method inputting interface completes input, generation is operated according to the clicking operation and the interference in the input method In all bytes to be entered, all interference bytes are deleted.
CN201610570352.XA 2016-07-18 2016-07-18 User input management method and device and terminal Active CN107633174B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610570352.XA CN107633174B (en) 2016-07-18 2016-07-18 User input management method and device and terminal
PCT/CN2016/095340 WO2018014400A1 (en) 2016-07-18 2016-08-15 User input managing method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610570352.XA CN107633174B (en) 2016-07-18 2016-07-18 User input management method and device and terminal

Publications (2)

Publication Number Publication Date
CN107633174A true CN107633174A (en) 2018-01-26
CN107633174B CN107633174B (en) 2020-07-31

Family

ID=60991664

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610570352.XA Active CN107633174B (en) 2016-07-18 2016-07-18 User input management method and device and terminal

Country Status (2)

Country Link
CN (1) CN107633174B (en)
WO (1) WO2018014400A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110188532A (en) * 2019-05-05 2019-08-30 珠海格力电器股份有限公司 A kind of cipher code protection method and device
CN110598489A (en) * 2018-06-13 2019-12-20 北京搜狗科技发展有限公司 Privacy protection method for inputting prompt information and related device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101101625A (en) * 2007-08-07 2008-01-09 江雨 Input data safe treatment method and device
CN104143068A (en) * 2014-07-16 2014-11-12 宇龙计算机通信科技(深圳)有限公司 Password authentication method and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309260A (en) * 2008-06-05 2008-11-19 周红伟 Network authentication method on the basis of cryptoguard
CN101808077B (en) * 2009-02-13 2013-05-08 普天信息技术研究院有限公司 Information security input processing system and method and smart card
US9652440B2 (en) * 2010-05-27 2017-05-16 Microsoft Technology Licensing, Llc Concurrent utilization of a document by multiple threads

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101101625A (en) * 2007-08-07 2008-01-09 江雨 Input data safe treatment method and device
CN104143068A (en) * 2014-07-16 2014-11-12 宇龙计算机通信科技(深圳)有限公司 Password authentication method and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110598489A (en) * 2018-06-13 2019-12-20 北京搜狗科技发展有限公司 Privacy protection method for inputting prompt information and related device
CN110188532A (en) * 2019-05-05 2019-08-30 珠海格力电器股份有限公司 A kind of cipher code protection method and device
CN110188532B (en) * 2019-05-05 2020-12-15 珠海格力电器股份有限公司 Password protection method and device

Also Published As

Publication number Publication date
CN107633174B (en) 2020-07-31
WO2018014400A1 (en) 2018-01-25

Similar Documents

Publication Publication Date Title
US9038166B2 (en) Method and apparatus for authenticating password of user terminal
US9760707B2 (en) Unlocking electronic devices using touchscreen input gestures
CN105335633B (en) A kind of mobile terminal glance prevention method and mobile terminal
CN105519038A (en) Data protection based on user input during device boot-up, user login, and device shut-down states
CN103810414A (en) Password Presentation Management
CN106650441A (en) Screen recording method and device
CN106355059A (en) Password input method and terminal
CN104184900A (en) Data processing method, system and mobile terminal
CN105809000A (en) Information processing method and electronic device
CN106936999A (en) Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently
CN111783055A (en) Account information management method and device and electronic equipment
CN107483704A (en) A kind of private space method to set up and terminal device
CN106529235A (en) Unlocking method and terminal
CN103745150A (en) Creation method of picture password account and application method of picture password account
CN105868625B (en) Method and device for intercepting restart deletion of file
CN107633174A (en) A kind of user inputs management method and device, terminal
CN104966017B (en) A kind of Password Input protects system and method
CN107370872A (en) Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
AU2016367092A1 (en) Interception of touch pad events for handling in a secure environment
WO2022247866A1 (en) Application icon management method and apparatus, and electronic device
CN105207979B (en) A kind of user authentication method and device based on user's input feature vector
CN107391988A (en) Message treatment method, device, terminal and storage medium
CN106778219A (en) A kind of cipher code protection method and terminal
WO2018053988A1 (en) Secure input system and method, intelligent terminal, and storage medium
US20130340091A1 (en) Method of creating ui layouts with desired level of entropy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200706

Address after: 210012 Nanjing, Yuhuatai District, South Street, Bauhinia Road, No. 68

Applicant after: Nanjing Zhongxing Software Co.,Ltd.

Address before: 518057 Nanshan District science and Technology Industrial Park, Guangdong high tech Industrial Park, ZTE building

Applicant before: ZTE Corp.

GR01 Patent grant
GR01 Patent grant