CN110007823B - Information input method and device - Google Patents

Information input method and device Download PDF

Info

Publication number
CN110007823B
CN110007823B CN201910258539.XA CN201910258539A CN110007823B CN 110007823 B CN110007823 B CN 110007823B CN 201910258539 A CN201910258539 A CN 201910258539A CN 110007823 B CN110007823 B CN 110007823B
Authority
CN
China
Prior art keywords
information
acquisition
preset
information input
preset time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910258539.XA
Other languages
Chinese (zh)
Other versions
CN110007823A (en
Inventor
张岩
金智伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qianxiansheng Beijing Network Technology Co ltd
Original Assignee
Qianxiansheng Beijing Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qianxiansheng Beijing Network Technology Co ltd filed Critical Qianxiansheng Beijing Network Technology Co ltd
Priority to CN201910258539.XA priority Critical patent/CN110007823B/en
Publication of CN110007823A publication Critical patent/CN110007823A/en
Application granted granted Critical
Publication of CN110007823B publication Critical patent/CN110007823B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Human Computer Interaction (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Game Theory and Decision Science (AREA)
  • Technology Law (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Operations Research (AREA)
  • Computer Security & Cryptography (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses an information input method and device, which can monitor a trigger instruction for triggering a collection entrance for collecting target information; before responding to the trigger instruction, calling a preset information input tool to operate after preset time; responding to the trigger instruction, and displaying a popped mask layer of the collection inlet and the collection inlet; and after the preset time is over, inputting the pre-stored target information into the acquisition inlet through the preset information input tool. According to the method and the device, the preset information input tool can be called to run after the preset time before the mask layer of the acquisition inlet of the target information pops up, so that the pre-stored target information is automatically input into the acquisition inlet through the preset information input tool after the preset time is over, and therefore the technical problem that the existing scheme cannot meet the requirement that a user wants to automatically input information to be acquired in some scenes can be solved.

Description

Information input method and device
Technical Field
The present application relates to the field of computer technologies, and in particular, to an information input method and apparatus.
Background
At present, in many application scenarios, a user manually inputs information to be acquired in various types of popped-up information acquisition entries, for example, when the user wants to access the online bank, the user is required to input a user name and a password in a login information acquisition entry popped up by the online bank; when a user wants to purchase a financial product by using funds in the online bank, the user is required to select a payment authentication mode, and if the user selects the U shield as the payment authentication mode, the user is required to input a U shield password in a U shield password input box popped up by the online bank.
The mode of manually inputting the information to be acquired in the information acquisition inlet by the user is very inconvenient for the user, and cannot meet the requirement that the user wants to automatically input the information to be acquired in some scenes so as to automatically complete some services, for example, cannot meet the service requirement that the user automatically purchases financial products through an internet bank or a third-party client. Particularly, in a scene that a screen mask layer is popped up before some information collection entries are popped up, since the screen mask layer can shield the operation of any window under the mask layer, the user can only manually input the information to be collected, and therefore improvement is needed.
Disclosure of Invention
The embodiment of the application provides an information input method and device, and aims to solve the technical problem that an existing scheme cannot meet the requirement that a user wants to automatically input information to be acquired in some scenes.
In a first aspect, an embodiment of the present application provides an information input method, where the method includes:
monitoring a trigger instruction for triggering a collection entrance for collecting target information;
before responding to the trigger instruction, calling a preset information input tool to operate after preset time;
responding to the trigger instruction, and displaying a popped mask layer of the collection inlet and the collection inlet;
and after the preset time is over, inputting the pre-stored target information into the acquisition inlet through the preset information input tool.
In a second aspect, an embodiment of the present application further provides an information input device, where the device includes:
the first monitoring module is used for monitoring a trigger instruction for triggering an acquisition entrance for acquiring target information;
the first calling module is used for calling a preset information input tool to operate after preset time before responding to the trigger instruction;
the first display module is used for responding to the trigger instruction and displaying the popped mask layer of the collection inlet and the collection inlet;
and the first input module is used for inputting the pre-stored target information into the acquisition inlet through the preset information input tool after the preset time is finished.
In a third aspect, an embodiment of the present application further provides an electronic device, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the method according to the first aspect.
In a fourth aspect, the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the method according to the first aspect.
According to the at least one technical scheme adopted by the embodiment of the application, the preset information input tool is called to run after the preset time before the mask layer of the acquisition inlet of the target information is popped up, so that after the preset time is finished, the pre-stored target information is automatically input into the acquisition inlet through the preset information input tool, and therefore the technical problem that the existing scheme cannot meet the requirement that a user wants to automatically input information to be acquired in some scenes can be solved, and certain services can be automatically completed.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flowchart of an information input method according to an embodiment of the present application.
Fig. 2 is a schematic diagram of a mask layer of a collection inlet and a collection inlet according to an embodiment of the present disclosure.
Fig. 3 is a flowchart illustrating a method for automatically purchasing a financial product according to an embodiment of the present disclosure.
Fig. 4 is a schematic structural diagram of an information input device according to an embodiment of the present application.
Fig. 5 is a schematic structural diagram of an apparatus for automatically purchasing a financial product according to an embodiment of the present disclosure.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In order to solve the technical problem that the existing scheme cannot meet the requirement that a user wants to automatically input information to be acquired in some scenes, embodiments of the present application provide an information input method and apparatus, which are described below.
An information input method provided in the embodiments of the present application is first described below.
As shown in fig. 1, an information input method provided in an embodiment of the present application may include the following steps:
step 101, monitoring a trigger instruction for triggering a collection entry for collecting target information.
When the target information to be acquired is different, the trigger instructions for triggering the acquisition entries for acquiring the target information are different. In an example, the target information to be collected may be authentication information, for example, authentication information such as a verification code, a user name, a login password, a payment password, and the like, and accordingly, the collection entry of the target information may be an input box of the authentication information, and the trigger instruction may be a selection instruction for selecting an authentication method corresponding to the authentication information.
In other examples, when the target information to be acquired is a user name and a login password of a user, the acquisition entry is a user name and password input interface, and the trigger instruction for triggering the acquisition entry may be a selection instruction for selecting a password login mode; when the target information to be acquired is a payment password of a user, the acquisition entry is a popped password input box, and the trigger instruction for triggering the acquisition entry can be a selection instruction for selecting the password as a security authentication mode; when the target information to be acquired is the verification code, the acquisition entry is a verification code information input box, and the trigger instruction for triggering the acquisition entry may be a selection instruction for selecting the verification code as a security authentication mode, and the like.
Since in practical applications, there are many scenarios in which a mask layer is popped up before a capture entry for capturing target information is popped up, although the target information, the capture entry, and the trigger instruction are described by way of three examples, other possible scenarios are not excluded.
And 102, calling a preset information input tool to operate after preset time before responding to the trigger instruction.
The preset information input tool may include, but is not limited to, an application program capable of inputting target information using an input tool such as a keyboard, a virtual keyboard, or the like.
And 103, responding to the trigger instruction, and displaying the popped mask layer of the acquisition entry and the acquisition entry.
It can be understood that, since the mask layer of the acquisition entry of the target information is popped up after responding to the trigger instruction, the preset information input tool is called before responding to the trigger instruction, so that the defect that the target information cannot be automatically input in the acquisition entry popped up subsequently due to the fact that the preset information input tool cannot be called after the mask layer is popped up can be avoided, and the purpose of automatically inputting the target information in the acquisition entry by automatically calling the preset information input tool can be achieved.
The preset time may be determined based on the pop-up time of the mask layer and the capture entry, and specifically, the preset time is a time that can ensure that the mask layer and the capture entry can pop up during the preset time, that is, the mask layer and the capture entry pop up during the preset time. Therefore, the preset information input tool which is called in advance and runs after the preset time can automatically run and input the pre-stored target information into the acquisition inlet of the target information after the preset time is finished.
In order to more intuitively understand the mask layer and the harvesting inlet of the harvesting inlet, fig. 2 shows a schematic view of the mask layer and the harvesting inlet of one type of harvesting inlet. As can be seen from fig. 2, the user clicks a "financing purchase" button in the internet bank of the XXXX bank, writes the purchase amount in the displayed product information and clicks a "submit" button to pay, during the payment, the internet bank pops up a mask layer 21 first and then pops up a popup window 22 of "require your electronic signature device password now", and a collection entry "password input box" is displayed in the popup window 22. It will be appreciated that in practice the mask layer will generally cover the display interface similar to a solid coloured translucent film, but in figure 2 the mask layer 21 is shown as a reticulated translucent film in order to enable a more intuitive presentation of the mask layer.
And 104, after the preset time is finished, inputting the pre-stored target information into the acquisition entry through the preset information input tool.
The target information can be stored locally in advance, and can also be stored in the cloud.
According to the information input method provided by the embodiment of the application, the preset information input tool can be called to run after the preset time before the mask layer of the acquisition inlet of the target information is popped up, and after the preset time is finished, the pre-stored target information is automatically input into the acquisition inlet through the preset information input tool, so that the technical problem that the existing scheme cannot meet the requirement that a user wants to automatically input information to be acquired in some scenes can be solved, and certain services can be automatically completed.
Optionally, on the basis of the embodiment shown in fig. 1, the information input method provided in the embodiment of the present application may further include: and after the pre-stored target information is input into the acquisition entry through the preset information input tool, triggering a confirmation button of the acquisition entry.
That is, as shown in fig. 2, after the pre-stored electronic signature device password is input into the password input box in the pop-up window 22 through the preset information input tool, the confirmation button in the pop-up window 22 may be further triggered to submit the input electronic signature device password for the internet bank to perform security authentication.
According to the embodiment, the submission confirmation of the target information input in the acquisition inlet can be further automatically realized, so that the requirement that a user wants to automatically complete certain services can be further met.
A more detailed embodiment will be described below, which provides a method for automatically purchasing a financial product, in which an information input method provided by an embodiment of the present application is applied to input authentication information at the time of payment authentication.
As shown in fig. 3, an embodiment of the present Application provides a method for automatically purchasing a financial product, an execution subject of the method may be a third party client (which may be an Application (APP) for automatically purchasing financial products of banks or other financial institutions) for purchasing financial products of banks or other financial institutions, financial products issued by a plurality of banks or financial institutions may be purchased through the third party client, and when a financial product of a certain bank is automatically purchased, the third party client may access an internet bank of the bank through a browser built by the third party client, and the method may include:
step 301, receiving a purchase instruction for automatically purchasing the target financial product.
In one example, the purchase instruction may be triggered by a consignment contract for the user to purchase the target financial product when the user has previously committed in the third-party client described above due to expiration or meets a preset condition (for example, when the unit price of the financial product is a preset price), or by a timing task set in the third-party client described above by the user.
Step 302, judging whether the internet bank corresponding to the target financial product is in a login state, if so, executing step 304, otherwise, executing step 303.
And step 303, logging in the internet bank by using preset login information, and then switching to step 304.
As an example, the preset login information may include a user name and a login password of the user. Certainly, other preset login information (for example, face information) may also be used for login, which is not limited in the present application.
Step 304, responding to the purchase instruction, and triggering a payment instruction.
As an example, in step 304, the user may automatically navigate to the list page of the financial product, automatically locate the target financial product (in the case of a large number of financial products, page-turning location may be required), automatically click on the purchase button, automatically input the amount and/or share of the user's commitment, and then click on the agreement to purchase and submit a purchase request to trigger the payment instruction.
Step 305, monitoring a selection instruction for selecting the payment authentication mode, wherein the selection instruction is used for triggering a collection entrance for collecting authentication information of the payment authentication mode.
And step 306, calling a preset information input tool to operate after a preset time before responding to the selection instruction.
Step 307, responding to the selection instruction, displaying the popped mask layer of the collection entry and the collection entry.
For example, a U-shield authentication method may be automatically selected as a payment authentication method, and a mask layer and an input box of a U-shield password may be popped up. For another example, a payment password may be selected as a payment authentication means, and a mask layer of an input box of the payment password and the input box may be popped up.
Step 308, after the preset time is over, inputting the pre-stored authentication information into the acquisition entry through the preset information input tool.
For example, after the preset time is over, the U-shield password or the payment password is input into the password input box through the preset information input tool.
Step 309, trigger the confirmation button of the acquisition entry.
For example, as shown in FIG. 2, a confirmation button in the pop-up window 22 is triggered.
It can be seen that, in this embodiment, steps 305 to 308 are more specific implementations of an information input method provided in this embodiment of the present application.
It is understood that, according to the method for automatically purchasing a financial product provided by the embodiment of the application, due to the application of the information input method provided by the embodiment of the application, the automatic input of the authentication information corresponding to the payment authentication mode in the scene with the pop-up mask layer is realized, and therefore, the business requirement of a user for automatically purchasing the financial product can be met.
Specifically, in the embodiment of the application, before the third-party client responds to the selection instruction for selecting the U shield as the payment authentication mode, the delayed running function (running after the preset time) of the U shield password input tool is called, and after the mask layer of the U shield password input frame and the U shield password input frame appear, the password can be automatically input after the delay of the U shield password input tool called in advance is finished, so that the process of automatically purchasing financial products is smoothly completed.
Optionally, on the basis of the embodiment shown in fig. 3, the method for automatically purchasing a financial product provided by the embodiment of the present application may further include, after step 309: judging whether the target financing product is purchased successfully or not; if yes, continuing navigating to a purchase receipt display page and storing the screenshot for the user to view; otherwise, sending a notice of purchase failure to the user so that the user can know the purchase condition of the financial product in time.
The above is a description of method embodiments provided in embodiments of the present application, and the following is a description of apparatuses provided in embodiments of the present application.
As shown in fig. 4, corresponding to the information input method, the embodiment of the present application further provides an information input apparatus 400, where the apparatus 400 may include: the system comprises a first monitoring module 401, a first calling module 402, a first responding module 403 and a first input module 404.
The first monitoring module 401 is configured to monitor a trigger instruction for triggering a collection entry for collecting target information.
When the target information to be acquired is different, the trigger instructions for triggering the acquisition entries for acquiring the target information are different. In an example, the target information to be collected may be authentication information, for example, authentication information such as a verification code, a user name, a login password, a payment password, and the like, and accordingly, the collection entry of the target information may be an input box of the authentication information, and the trigger instruction may be a selection instruction for selecting an authentication method corresponding to the authentication information.
In other examples, when the target information to be acquired is a user name and a login password of a user, the acquisition entry is a user name and password input interface, and the trigger instruction for triggering the acquisition entry may be a selection instruction for selecting a password login mode; when the target information to be acquired is a payment password of a user, the acquisition entry is a popped password input box, and the trigger instruction for triggering the acquisition entry can be a selection instruction for selecting the password as a security authentication mode; when the target information to be acquired is the verification code, the acquisition entry is a verification code information input box, and the trigger instruction for triggering the acquisition entry may be a selection instruction for selecting the verification code as a security authentication mode, and the like.
Since in practical applications, there are many scenarios in which a mask layer is popped up before a capture entry for capturing target information is popped up, although the target information, the capture entry, and the trigger instruction are described by way of three examples, other possible scenarios are not excluded.
A first calling module 402, configured to call the preset information input tool to run after a preset time before responding to the trigger instruction.
The preset information input tool may include, but is not limited to, an application program capable of inputting target information using an input tool such as a keyboard, a virtual keyboard, or the like.
A first displaying module 403, configured to display the popped mask layer of the collection entry and the collection entry in response to the triggering instruction.
It can be understood that, since the mask layer of the acquisition entry of the target information is popped up after responding to the trigger instruction, the preset information input tool is called before responding to the trigger instruction, so that the defect that the target information cannot be automatically input in the acquisition entry popped up subsequently due to the fact that the preset information input tool cannot be called after the mask layer is popped up can be avoided, and the purpose of automatically inputting the target information in the acquisition entry by automatically calling the preset information input tool can be achieved.
The preset time may be determined based on the pop-up time of the mask layer and the capture entry, and specifically, the preset time is a time that can ensure that the mask layer and the capture entry can pop up during the preset time, that is, the mask layer and the capture entry pop up during the preset time. Therefore, the preset information input tool which is called in advance and runs after the preset time can automatically run and input the pre-stored target information into the acquisition inlet of the target information after the preset time is finished.
A first input module 404, configured to input the pre-stored target information into the collection entry through the preset information input tool after the preset time is over.
The target information can be stored locally in advance, and can also be stored in the cloud.
According to the information input device provided by the embodiment of the application, the preset information input tool is called to run after the preset time before the mask layer of the acquisition inlet of the target information pops up, so that after the preset time is finished, the preset information input tool automatically inputs the pre-stored target information into the acquisition inlet, and therefore the technical problem that the existing scheme cannot meet the requirement that a user wants to automatically input information needing to be acquired in some scenes can be solved, and certain services can be automatically completed.
Optionally, on the basis of the embodiment shown in fig. 3, an information input apparatus 400 provided in the embodiment of the present application may further include: and the triggering module is used for triggering a confirmation button of the acquisition entry after the preset information input tool inputs the pre-stored target information into the acquisition entry.
That is, as shown in fig. 2, after the pre-stored electronic signature device password is input into the password input box in the pop-up window 22 through the preset information input tool, the confirmation button in the pop-up window 22 may be further triggered to submit the input electronic signature device password for the internet bank to perform security authentication.
According to the embodiment, the submission confirmation of the target information input in the acquisition inlet can be further automatically realized, so that the requirement that a user wants to automatically complete certain services can be further satisfied.
A more detailed embodiment will be described below, which provides an apparatus 500 for automatically purchasing a financial product, in which apparatus 500 for automatically purchasing a financial product, authentication information at the time of payment authentication is input using an information input apparatus 400 provided by an embodiment of the present application.
As shown in fig. 5, an embodiment of the present application provides an apparatus 500 for automatically purchasing a financial product, an execution subject of the apparatus 500 may be a third-party client for purchasing a financial product of a bank or other financial institution (may be an APP for automatically purchasing a financial product of a bank or other financial institution), a financial product issued by multiple banks or financial institutions may be purchased through the client, and when a financial product of a certain bank is automatically purchased, the third-party client may access an internet bank of the bank through a browser built by the third-party client, and the apparatus 500 may include: the system comprises a receiving module 501, a judging module 502, a login module 503, a first triggering module 504, a second monitoring module 505, a second calling module 506, a second responding module 507, a second input module 508 and a second triggering module 509.
The receiving module 501 is configured to receive a purchase instruction for automatically purchasing a target financial product.
In one example, the purchase instruction may be triggered by a consignment contract for the user to purchase the target financial product when the user has previously committed in the third-party client described above due to expiration or meets a preset condition (for example, when the unit price of the financial product is a preset price), or by a timing task set in the third-party client described above by the user.
The judging module 502 is configured to judge whether the internet bank corresponding to the target financial product is in a login state, if so, trigger the first triggering module 504, and otherwise, trigger the login module 503.
And a login module 503, configured to log in the online bank using preset login information.
As an example, the preset login information may include a user name and a login password of the user. Certainly, other preset login information (for example, face information) may also be used for login, which is not limited in the present application.
A first triggering module 504, configured to trigger a payment instruction in response to the purchase instruction.
As an example, in the first triggering module 504, the user may automatically navigate to the list page of the financial product, automatically locate the target financial product (in the case of a large number of financial products, page turning may be needed for location), automatically click the purchase button, automatically input the amount and/or share entrusted by the user, click the agreement to purchase, and submit a purchase request to trigger the payment instruction.
A second monitoring module 505, configured to monitor a selection instruction for selecting a payment authentication method, where the selection instruction is used to trigger a collection entry for collecting authentication information of the payment authentication method.
And a second calling module 506, configured to call the preset information input tool to operate after a preset time before responding to the selection instruction.
A second response module 507, configured to respond to the selection instruction, and display the popped mask layer of the collection entry and the collection entry.
For example, a U-shield authentication method may be automatically selected as a payment authentication method, and a mask layer of an input box of a U-shield password and the input box may be popped up. For another example, a payment password may be selected as a payment authentication means, and a mask layer of an input box of the payment password and the input box may be popped up.
A second input module 508, configured to input, by using the preset information input tool, the pre-stored authentication information into the acquisition entry after the preset time is over.
For example, after the preset time is over, the U-shield password or the payment password is input into the password input box through the preset information input tool.
A second triggering module 509, configured to trigger a confirmation button of the acquisition portal.
For example, as shown in FIG. 2, a confirmation button in the pop-up window 22 is triggered.
It can be seen that, in the present embodiment, the second monitoring module 505 to the second input module 508 respectively correspond to a more specific implementation manner of the first monitoring module 405 to the first input module 408 in the information input device 400 provided in the present embodiment.
It is understood that, according to the device 500 for automatically purchasing financial products provided by the embodiment of the present application, since the information input device 400 provided by the embodiment of the present application is applied, the automatic input of the authentication information corresponding to the payment authentication mode in the scene with the pop-up mask layer is realized, and thus, the business requirement of the user for automatically purchasing financial products can be satisfied.
Specifically, in the embodiment of the application, before the third-party client responds to the selection instruction for selecting the U shield as the payment authentication mode, the delayed running function (running after the preset time) of the U shield password input tool is called, and after the mask layer of the U shield password input frame and the U shield password input frame appear, the password can be automatically input after the delay of the U shield password input tool called in advance is finished, so that the process of automatically purchasing financial products is smoothly completed.
It should be noted that, since the device embodiments are executed in a manner similar to the method embodiments, the device embodiments are described in a simplified manner, and reference is made to the method embodiments for relevant points.
Fig. 6 shows a schematic structural diagram of an electronic device provided in an embodiment of the present application. Referring to fig. 6, at a hardware level, the electronic device includes a processor, and optionally further includes an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory, such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be connected to each other via an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 6, but that does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads the corresponding computer program from the nonvolatile memory into the memory and then runs the computer program to form the information input device on the logic level. And the processor is used for executing the program stored in the memory and is specifically used for executing the information input method provided by the embodiment of the application.
The method performed by the information input device according to the embodiment shown in fig. 6 of the present application can be applied to or implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
The embodiment of the present application also provides a computer-readable storage medium, which stores one or more programs, where the one or more programs include instructions, which when executed by an electronic device including a plurality of application programs, can cause the electronic device to execute the method performed by the information input apparatus in the embodiment shown in fig. 6, and is specifically used for executing the information input method provided in the embodiment of the present application.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be noted that all the embodiments in the present application are described in a related manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, as for the apparatus embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (6)

1. An information input method, characterized in that the method comprises:
monitoring a trigger instruction for triggering a collection entrance for collecting target information;
before responding to the trigger instruction, calling a preset information input tool to operate after preset time;
responding to the trigger instruction, and displaying a mask layer of the popped acquisition inlet and the popped acquisition inlet, wherein the mask layer and the popped acquisition inlet pop up within the preset time;
after the preset time is over, inputting the pre-stored target information into the acquisition inlet through the preset information input tool;
and after the pre-stored target information is input into the acquisition entry through the preset information input tool, triggering a confirmation button of the acquisition entry.
2. The method of claim 1, wherein the first and second light sources are selected from the group consisting of,
the target information is authentication information, the acquisition entry is an input frame of the authentication information, and the trigger instruction is a selection instruction for selecting an authentication mode corresponding to the authentication information.
3. The method of claim 2, wherein the first and second light sources are selected from the group consisting of,
the authentication information is a password of the electronic signature device, and the authentication mode is an electronic signature device authentication mode.
4. An information input apparatus, characterized in that the apparatus comprises:
the first monitoring module is used for monitoring a trigger instruction for triggering an acquisition entrance for acquiring target information;
the first calling module is used for calling a preset information input tool to operate after preset time before responding to the trigger instruction;
a first display module, configured to display a mask layer of the popped collection entry and the popped collection entry in response to the trigger instruction, where the mask layer and the popped collection entry pop up within the preset time;
the first input module is used for inputting the pre-stored target information into the acquisition inlet through the preset information input tool after the preset time is finished;
and the first confirmation module is used for triggering a confirmation button of the acquisition entrance after the preset information input tool inputs the pre-stored target information into the acquisition entrance.
5. An electronic device, comprising: memory, processor and computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the method according to any one of claims 1 to 3.
6. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 3.
CN201910258539.XA 2019-04-01 2019-04-01 Information input method and device Active CN110007823B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910258539.XA CN110007823B (en) 2019-04-01 2019-04-01 Information input method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910258539.XA CN110007823B (en) 2019-04-01 2019-04-01 Information input method and device

Publications (2)

Publication Number Publication Date
CN110007823A CN110007823A (en) 2019-07-12
CN110007823B true CN110007823B (en) 2020-12-04

Family

ID=67169341

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910258539.XA Active CN110007823B (en) 2019-04-01 2019-04-01 Information input method and device

Country Status (1)

Country Link
CN (1) CN110007823B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107168972A (en) * 2016-03-07 2017-09-15 广州市动景计算机科技有限公司 The instant storage method of filling content and equipment of cuit in a kind of webpage
CN107908399A (en) * 2017-11-14 2018-04-13 山东浪潮通软信息科技有限公司 A kind of page development method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9251538B1 (en) * 2009-09-23 2016-02-02 Verient Inc System and method for automatically filling webpage fields
CN104516624B (en) * 2013-09-29 2018-12-28 腾讯科技(深圳)有限公司 A kind of method and device inputting account information
CN113452678A (en) * 2015-09-21 2021-09-28 华为终端有限公司 Login information input method, login information storage method and related device
CN108173875B (en) * 2018-01-30 2021-07-23 云深互联(北京)科技有限公司 Page login method and device, electronic equipment and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107168972A (en) * 2016-03-07 2017-09-15 广州市动景计算机科技有限公司 The instant storage method of filling content and equipment of cuit in a kind of webpage
CN107908399A (en) * 2017-11-14 2018-04-13 山东浪潮通软信息科技有限公司 A kind of page development method and device

Also Published As

Publication number Publication date
CN110007823A (en) 2019-07-12

Similar Documents

Publication Publication Date Title
CN109598515B (en) Payment method, payment device and terminal equipment
WO2019147591A1 (en) Website creation system for creating websites having at least one series of directional webpages and related methods
EP2413278A1 (en) Plug-in system and method for consumer credit acquisition
WO2019147593A1 (en) Website creation system for creating websites having at least one series of directional webpages and related methods
US20170024228A1 (en) Method and apparatus for recommending a solution based on a user operation behavior
CN109298926B (en) Method and device for entering resource transfer party into resource transfer platform and electronic equipment
CN111143739A (en) Page jump method, computing device and computer storage medium
CN111813629A (en) Method, device and equipment for generating monitoring data of Web page
US11915211B1 (en) Systems, methods, and storage media for pre-approving onboarding to a payment platform
CN110007823B (en) Information input method and device
CN107623696B (en) User identity verification method and device based on user behavior characteristics
CN116643827A (en) Information acquisition method, device, electronic equipment and medium
CN115454400A (en) Interface parameter processing method, device, equipment, medium and program product
US20150106303A1 (en) Finite state machine forming
CN115221442A (en) Webpage loading method and device, computer equipment and computer readable storage medium
CN111381862B (en) Multi-scene data adaptive display method and device, electronic equipment and storage medium
TWI732139B (en) Digital object unique identification code (DOI) display and transaction information verification method, device and equipment
US20150113501A1 (en) Mobile computing program slicing
US9477448B2 (en) Screen-oriented computing program refactoring
CN112596781A (en) Service execution and service configuration method and device
CN112632391A (en) Data processing method, device and storage medium
CN112925813A (en) Data processing method, device and system based on mixed arrangement and storage medium
US20140258048A1 (en) Information matching system
CN111105304A (en) Data processing method and device, storage medium and electronic terminal
US11968104B2 (en) Automated manipulation and monitoring of embeddable browsers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant