CN110750162B - Input method and device - Google Patents

Input method and device Download PDF

Info

Publication number
CN110750162B
CN110750162B CN201910875111.XA CN201910875111A CN110750162B CN 110750162 B CN110750162 B CN 110750162B CN 201910875111 A CN201910875111 A CN 201910875111A CN 110750162 B CN110750162 B CN 110750162B
Authority
CN
China
Prior art keywords
candidate
privacy
input
user
entries
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910875111.XA
Other languages
Chinese (zh)
Other versions
CN110750162A (en
Inventor
梁文昭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhangmen Science and Technology Co Ltd
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co Ltd filed Critical Shanghai Zhangmen Science and Technology Co Ltd
Priority to CN201910875111.XA priority Critical patent/CN110750162B/en
Publication of CN110750162A publication Critical patent/CN110750162A/en
Application granted granted Critical
Publication of CN110750162B publication Critical patent/CN110750162B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
    • G06F3/0233Character input methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
    • G06F3/0233Character input methods
    • G06F3/0236Character input methods using selection techniques to select from displayed items

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The purpose of the application is to provide an input method and equipment, wherein the input method comprises the following steps: responding to input operation of a user in an input box of user equipment, and according to character strings input through the input operation, matching and inquiring in an input method database to obtain one or more first candidate entries matched with the character strings; if the user equipment meets the triggering condition for protecting the input privacy, determining one or more corresponding second candidate entries by carrying out privacy protection processing on one or more first candidate entries, and presenting at least one of the one or more second candidate entries in an interface of an input box; otherwise, at least one of the one or more first candidate entries is presented in an interface of the input box. When the user equipment meets the triggering condition for protecting the input privacy, the input privacy protection is started to ensure that the input privacy of the user cannot be revealed when the user equipment is used by other people or in public places, so that the input privacy of the user is ensured anytime and anywhere.

Description

Input method and device
Technical Field
The present application relates to the field of communications, and in particular, to a technique for input methods.
Background
The input method refers to a coding method adopted for inputting various symbols into electronic information equipment (such as a computer and a mobile phone). The existing input method mainly comprises a common input method and a personalized input method, wherein the personalized input method is used for outputting common characters or symbols of a user according to the use habit of the user; the common input method refers to outputting characters or symbols by the electronic information equipment randomly or based on a preset instruction method and the like according to symbol input.
Disclosure of Invention
An object of the present application is to provide an input method and apparatus.
According to one aspect of the present application, there is provided an input method comprising:
responding to input operation of a user in an input box of user equipment, and matching and inquiring in an input method database according to a character string input through the input operation so as to obtain one or more first candidate entries matched with the character string;
if the user equipment meets the triggering condition for protecting the input privacy, determining one or more corresponding second candidate entries by performing privacy protection processing on the one or more first candidate entries, and presenting at least one of the one or more second candidate entries in an interface of the input box; otherwise the first set of parameters is selected,
At least one of the one or more first candidate entries is presented in an interface of the input box.
According to another aspect of the present application, there is provided an input device comprising:
the input method comprises a one-to-one module, a first candidate entry and a second candidate entry, wherein the one-to-one module is used for responding to input operation of a user in an input box of user equipment, and matching and inquiring in an input method database according to a character string input through the input operation so as to obtain one or more first candidate entries matched with the character string;
a second module, configured to determine one or more second candidate entries corresponding to the one or more first candidate entries by performing privacy protection processing on the one or more first candidate entries if the user equipment meets a triggering condition for protecting input privacy, and present at least one of the one or more second candidate entries in an interface of the input box; otherwise the first set of parameters is selected,
and a three-module for presenting at least one of the one or more first candidate entries in an interface of the input box.
According to one aspect of the present application, there is provided an input device comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the operations of any of the methods described above.
According to another aspect of the present application, there is provided a computer readable medium storing instructions that, when executed, cause a system to perform the operations of any of the methods described above.
Compared with the prior art, when the user equipment meets the triggering condition for protecting the input privacy, privacy protection processing is carried out on one or more first candidate entries to determine one or more corresponding second candidate entries, and the one or more second candidate entries are presented in an interface of an input box; and if the triggering condition for protecting the input privacy is not met, presenting the one or more first candidate entries in the interface of the input box. When the user equipment meets the triggering condition for protecting the input privacy, the input privacy protection is started to ensure that the input privacy of the user cannot be revealed when the user equipment is used by other people or in public places, so that the input privacy of the user is ensured anytime and anywhere.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the following drawings, in which:
FIG. 1 illustrates a method flow diagram of an input method according to one embodiment of the present application;
FIG. 2 illustrates a device block diagram of an input device according to another embodiment of the present application;
FIG. 3 illustrates functional modules of an exemplary system that may be used with embodiments of the present application.
The same or similar reference numbers in the drawings refer to the same or similar parts.
Detailed Description
The present application is described in further detail below with reference to the accompanying drawings.
In one typical configuration of the present application, the terminal, the devices of the services network, and the trusted party each include one or more processors (e.g., central processing units (Central Processing Unit, CPU)), input/output interfaces, network interfaces, and memory.
The Memory may include non-volatile Memory in a computer readable medium, random access Memory (Random Access Memory, RAM) and/or non-volatile Memory, etc., such as Read Only Memory (ROM) or Flash Memory (Flash Memory). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase-Change Memory (PCM), programmable Random Access Memory (Programmable Random Access Memory, PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (Dynamic Random Access Memory, DRAM), other types of Random Access Memory (RAM), read-Only Memory (ROM), electrically erasable programmable read-Only Memory (EEPROM), flash Memory or other Memory technology, read-Only Memory (Compact Disc Read-Only Memory, CD-ROM), digital versatile disks (Digital Versatile Disc, DVD) or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by the computing device.
The device referred to in the present application includes, but is not limited to, a user device, a network device, or a device formed by integrating a user device and a network device through a network. The user equipment includes, but is not limited to, any mobile electronic product which can perform man-machine interaction with a user (such as man-machine interaction through a touch pad), for example, a smart phone, a tablet computer and the like, and the mobile electronic product can adopt any operating system, for example, an android operating system, an iOS operating system and the like. The network device includes an electronic device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a programmable logic device (Programmable Logic Device, PLD), a field programmable gate array (Field Programmable Gate Array, FPGA), a digital signal processor (Digital Signal Processor, DSP), an embedded device, and the like. The network device includes, but is not limited to, a computer, a network host, a single network server, a plurality of network server sets, or a cloud of servers; here, the Cloud is composed of a large number of computers or network servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, a virtual supercomputer composed of a group of loosely coupled computer sets. Including but not limited to the internet, wide area networks, metropolitan area networks, local area networks, VPN networks, wireless Ad Hoc networks (Ad Hoc networks), and the like. Preferably, the device may be a program running on the user device, the network device, or a device formed by integrating the user device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the above-described devices are merely examples, and that other devices now known or hereafter may be present as appropriate for the application, are intended to be within the scope of the present application and are incorporated herein by reference.
In the description of the present application, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
Here, it should be understood by those skilled in the art that, in some embodiments, the "input device" described herein includes a functional module of a user device or a functional module of an application installed in the user device; in other embodiments, the "input device" described herein includes a network device, for example, a user device sends an input event to the network device, and the network device performs operations such as matching/triggering conditions of candidate terms, privacy protection processing, and the like.
Fig. 1 shows an input method according to an aspect of the present application, the method comprising step S101, step S102 and step S103.
Specifically, in step S101, the input device is configured to, in response to an input operation of a user in an input box of the user device, match a query in an input method database according to a character string input through the input operation, so as to obtain one or more first candidate terms matched with the character string. In some embodiments, an input box is provided in the user device, through which the user performs an input operation of a character string (e.g., a symbol such as pinyin). In some embodiments, the input method database is provided with a query table, in which a plurality of character strings (e.g. pinyin) and one or more candidate terms corresponding to each character string are recorded, and the input device queries the query table for obtaining a first candidate term corresponding to the character string according to the character string input by the input operation. In some embodiments, the input method database is provided with a mapping relation between the character string and the candidate entry, and the input device queries the input method database for a first candidate entry matched with the character string according to the character string input by the input operation. Of course, it should be understood by those skilled in the art that the above-described query matching operation of the first candidate entry through the input method database is merely exemplary, and other operations that may be present or may occur in the future are included in the scope of the present application and are incorporated herein by reference.
In step S102, if the user equipment meets a triggering condition for protecting input privacy, the input equipment determines one or more corresponding second candidate terms by performing privacy protection processing on the one or more first candidate terms, and presents at least one of the one or more second candidate terms in an interface of the input box. In some embodiments, the input device automatically triggers the protection of the input privacy of the corresponding user of the user device by detecting whether the user device is currently required to protect the input privacy, so as to achieve the purpose of ensuring the input privacy of the user at any time and any place. For example, the trigger condition includes, but is not limited to, the user device being used by others; the user equipment is in public places etc. In some embodiments, the privacy-preserving method includes, but is not limited to, deleting or replacing at least one of the one or more first candidate entries to obtain a second candidate entry after privacy-preserving.
In step S103, if the user equipment does not meet the triggering condition for protecting input privacy, the input device presents at least one of the one or more first candidate terms in the interface of the input box. In some embodiments, if the user device does not meet the triggering condition for protecting the input privacy, the input privacy protection function does not need to be started, and one or more first candidate entries are presented based on the first candidate entries which are matched according to the character string query by the input device. For example, the first candidate term may be determined based on the input habit of the user corresponding to the user device, for example, the frequency or the number of times of selecting the determined candidate term at ordinary times of the user is statistically recorded in an input method database, and when the user inputs a character string, the first candidate term corresponding to the character string frequently used by the user is presented to the user.
For example, user b uses user a's user device, where user a is the corresponding user of the user device. The input device, in response to an input operation of the user b in the input box, queries the input method database for a first candidate term (e.g., completion/maintenance/horizontal slot … …) corresponding to a character string (e.g., wc) input according to the input operation. If the user a uses the "lying groove" frequently in normal use, the user device presents the user b with the possibility of being arranged in the first position as the "lying groove" based on the input method in the prior art, thereby causing embarrassment. Thus, the existing input method may inadvertently expose a lot of information such as word habit/privacy information of the owner of the user equipment. In this embodiment, the input device protects the input privacy of the user device owner by detecting whether the user device satisfies a trigger condition that protects the input privacy. For example, a face image of a currently used user (user b) is obtained, the face image is matched with a face image of a user a stored in the user equipment, if the matching is unsuccessful, the user equipment is determined to be used by other people, and a triggering condition for protecting input privacy is met. The input device performs privacy-preserving processing on the first candidate term (e.g., completion/maintenance/horizontal slot … …) to obtain a processed second candidate term and presents the second candidate term to the user b. In some embodiments, the privacy-preserving processing is performed on the second candidate term, so that the privacy of the user a is not revealed.
In some embodiments, the trigger condition includes any one of:
(1) The user device is being used by others. For example, when a user device is used by a host that is not the user device, a privacy preserving process needs to be initiated to avoid revealing the host's input privacy.
(2) The user equipment is in a public place. For example, when the user device is used in public, to avoid revealing the input privacy of the owner of the user device, a privacy preserving process needs to be initiated.
(3) And triggering configuration information which is preset in the user equipment and protects privacy in the input process. In some embodiments, the configuration information is used to detect whether the user equipment satisfies a condition triggering privacy protection. For example, a start button is provided in the user equipment, the user starts the function of triggering privacy protection by switching on and off the start button, when the start button is started, and when an input operation is detected, a triggering condition for protecting the input privacy is determined to be met; for another example, the user equipment is preset to perform privacy protection processing on the user equipment within a certain time period, or the corresponding user of the user equipment sets the user equipment to perform privacy protection processing on the user equipment within a certain time period, the user equipment detects whether the setting of the time period is met currently, and if so, the triggering condition for protecting the input privacy is determined to be met.
Of course, those skilled in the art will appreciate that the above-described triggering conditions are merely examples, and that other triggering conditions that may occur in the present application, if applicable, are also included within the scope of the present application and are incorporated herein by reference.
In some embodiments, the method further comprises step S104 (not shown), in which step S104 the input device detects whether the user device fulfils a trigger condition protecting input privacy. In some embodiments, protection of input privacy is enabled only when the user device is in use by others or in public. In case the trigger condition is not met, the user device is indicated as being used by the owner of the user device, so that no protection of input privacy need be enabled. Therefore, the input device needs to detect whether the user device satisfies a trigger condition for protecting input privacy, and timely protect the input privacy of the user.
In some embodiments, the step S104 includes: an input device responds to the triggering operation of the input box started by the user or responds to the input operation, and whether the user device meets the triggering condition for protecting input privacy is detected. In order to protect the user's input privacy in a timely manner. In some embodiments, it is detected whether the user device satisfies a trigger condition for protecting input privacy when the user enables the input box, for example, whether the user is a corresponding user of the user device is confirmed through face recognition when the user places input focus on the input box, so as to enable protecting input privacy in time. In some embodiments, the input device detects whether the user device satisfies a trigger condition that protects input privacy in response to a user enabling a trigger operation of the input box, e.g., begins detecting whether the user device satisfies a trigger condition that protects input privacy when an input focus is detected to be placed in the input box. In some embodiments, the input device is configured to detect, in response to an input operation, whether the user device satisfies a trigger condition for protecting input privacy, e.g., during execution of the input operation by the user or when the user begins to perform the input operation, whether the user device satisfies the trigger condition for protecting input privacy. Of course, it should be understood by those skilled in the art that the above case of triggering detection of whether the user equipment satisfies the triggering condition for protecting the input privacy is merely an example, and other privacy protection processes that may exist in the present application or may occur in the future are included in the scope of the present application and are incorporated herein by reference. For example, detecting whether the user device satisfies a trigger condition that protects input privacy may be performed before presenting the first candidate term or the second candidate term.
In some embodiments, the triggering condition includes that the user equipment is being used by others, and the detecting whether the user equipment meets the triggering condition for protecting input privacy includes: acquiring characteristic information of the user; matching the characteristic information of the user with the characteristic information of the user corresponding to the user equipment; if the matching fails, determining that the user equipment meets the triggering condition for protecting the input privacy. In some embodiments, the triggering condition to protect input privacy includes the user device being used by another person. In some embodiments, the characteristic information of the user includes, but is not limited to, facial image information/fingerprint information of the user, and the like. For example, in response to a triggering operation of a user enabling an input box, acquiring fingerprint information of the user, and matching the acquired fingerprint information with fingerprint information stored in the user equipment (for example, fingerprint information of a user corresponding to the user equipment), if the matching is successful, the user equipment is not used by others currently, and no enabling protection of input privacy is required; if the matching is unsuccessful, the user equipment is used by other people currently, and the triggering condition for starting the protection of the input privacy is met. By acquiring the characteristic information of the user, the input privacy of the user corresponding to the user equipment can be ensured to be protected when the user equipment is used by other people.
In some embodiments, the triggering condition includes that the user equipment is in public place, and the detecting whether the user equipment meets the triggering condition for protecting input privacy includes: detecting whether the user equipment is currently connected with a public wireless access point or not; and if the user equipment is currently connected with the public wireless access point, determining that the user equipment meets the triggering condition for protecting the input privacy. In some embodiments, the ue may be used in public places, and to avoid revealing the input privacy of the corresponding user of the ue in public places, the information of the place where the ue is currently located is determined by detecting whether the ue is currently linked to a public wireless access point. For example, if the user device is currently connected to a wireless access point of a cafe, a trigger condition for protecting input privacy is determined to be met, so as to protect the input privacy of the user in a public place. In some embodiments, determining whether the wireless access point is a public wireless access point by location information of the wireless access point or location area information (e.g., belonging to a business circle) to which the wireless access point belongs; in some embodiments, it is detected by the identification information of the wireless access point (e.g., XX cafe WIFI) whether the wireless access point is a public wireless access point. In this embodiment, by detecting whether the wireless access point to which the user equipment is currently connected is a public wireless access point, whether the user equipment is currently in a public occasion is detected, so as to ensure the input privacy of the user corresponding to the user equipment in the public occasion.
In some embodiments, the triggering condition includes that the user equipment is in public place, and the detecting whether the user equipment meets the triggering condition for protecting input privacy includes: detecting whether the user equipment is accessed to external equipment currently; and if the user equipment is currently accessed to the external equipment, determining that the user equipment meets the triggering condition for protecting the input privacy. In some embodiments, the external device includes, but is not limited to, a projector, a printer, and the like. For example, the user equipment detects whether the user equipment is currently connected to the external device by acquiring the access information of an interface (for example, a physical external interface or a bluetooth external interface), and if the external device is currently connected, privacy protection processing is required to be performed on the input of the user equipment so as to ensure the input privacy of the user equipment corresponding to the user.
In some embodiments, the triggering condition includes configuration information preset in the user equipment to protect privacy during input, and the detecting whether the user equipment meets the triggering condition to protect input privacy includes: detecting whether the user equipment meets the configuration information; and if the user equipment meets the configuration information, determining that the user equipment meets a triggering condition for protecting input privacy. In some embodiments, the configuration information is configuration information preset by the user equipment; in other embodiments, the configuration information is set by the user device corresponding to the user. For example, the configuration information includes, but is not limited to, time period information (e.g., 6:00 a. To 23:00 a. Later), turn on information (e.g., by a button to activate or deactivate the input privacy preserving function). Under the condition that the configuration information is met, determining that the user equipment meets a triggering condition for protecting input privacy, for example, privacy protection is carried out on the input of the user equipment in a time period of 6:00 a night 23:00 a; for another example, privacy protection is provided for the user device input when the button is actuated by the user. The input privacy protection of the user equipment is realized through the configuration information, the input privacy protection can be performed based on the user setting while the automatic triggering protection is ensured, and the user experience is improved.
In some embodiments, the privacy-preserving processing of the one or more first candidate terms determines corresponding one or more second candidate terms, including any one of the following:
(1) And deleting the privacy candidate entries in the one or more first candidate entries, and determining the one or more first candidate entries after deleting the privacy candidate entries as corresponding one or more second candidate entries. For example, the input device identifies whether the one or more first candidate terms include privacy candidate terms, which in some embodiments include, but are not limited to, name/wordlet, etc. For example, a two-component network is used to determine whether the first candidate term is a name, or an expert system is used to find a sensitive term, and detect whether the first candidate term contains the sensitive term. And deleting the privacy candidate entry after the privacy candidate entry is included in the first candidate entry is identified, and presenting the first candidate entry after the privacy candidate entry is deleted as a second candidate entry to the user. To ensure that the second candidate term presented after the privacy preserving process is free of terms that relate to the privacy of the user.
(2) Replacing the privacy candidate entries in the one or more first candidate entries, and determining the replaced one or more first candidate entries as corresponding one or more second candidate entries. For example, the input device identifies whether the one or more first candidate terms include privacy candidate terms, which in some embodiments include, but are not limited to, name/wordlet, etc. For example, a two-component network is used to determine whether the first candidate term is a name, or an expert system is used to find a sensitive term, and detect whether the first candidate term contains the sensitive term. And after the privacy candidate entry is identified to be included in the first candidate entry, replacing the privacy candidate entry, and presenting the first candidate entry after replacing the privacy candidate entry as a second candidate entry to the user. To ensure that the second candidate term presented after the privacy preserving process is free of terms that relate to the privacy of the user. In some embodiments, the replacing the privacy candidate term in the first candidate term includes, but is not limited to, replacing the privacy candidate term with other first candidate terms that do not contain privacy information.
(3) And randomly sorting the one or more first candidate entries, and determining the one or more first candidate entries after random sorting as corresponding one or more second candidate entries. For example, one or more first candidate entries are randomly ordered such that the randomly ordered first candidate entries do not expose the user's private information (e.g., commonly used first candidate entries may be ranked later).
(4) Hiding the privacy candidate entries in the one or more first candidate entries, and determining the one or more hidden first candidate entries as corresponding one or more second candidate entries. For example, the privacy candidate term in the first candidate term is ranked later so that the privacy candidate term is not presented.
Of course, it will be appreciated by those skilled in the art that the privacy preserving process described above is by way of example only, and that other privacy preserving processes, as may be present or hereafter presented, are intended to be within the scope of the present application and are incorporated herein by reference.
In some embodiments, the method further includes step S105 (not shown), in which the input device obtains one or more third candidate terms matching the string in response to a trigger operation of the user to view more candidate terms; determining one or more corresponding fourth candidate entries by privacy protection processing on the one or more third candidate entries, and presenting at least one of the one or more fourth candidate entries in an interface of the input box; otherwise, at least one of the one or more third candidate entries is presented in an interface of the input box. In some embodiments, the first candidate entry corresponding to the character string input by the user may not be presented to the user at one time, the first candidate entry of the next page needs to be loaded by "page turning", and in order to ensure that the third candidate entry loaded subsequently does not reveal the input privacy of the user, privacy protection processing needs to be performed on the one or more third candidate entries to determine that the fourth candidate entry loaded and presented subsequently does not reveal the input privacy of the user. For the privacy-preserving process of the one or more third candidate entries, reference is made to the above description of the privacy-preserving process of the first candidate entry, which is not described herein.
In some embodiments, the privacy-preserving processing of the one or more third candidate terms determines one or more fourth candidate terms, including any one of the following:
(1) And deleting the privacy candidate entries in the one or more third candidate entries, and determining the one or more third candidate entries after deleting the privacy candidate entries as corresponding one or more fourth candidate entries. For example, the input device identifies whether the one or more third candidate terms include privacy candidate terms, which in some embodiments include, but are not limited to, name/wordlet, etc. For example, a two-component network is used to determine whether the third candidate term is a name, or an expert system is used to find a sensitive term, and detect whether the third candidate term contains the sensitive term. And deleting the privacy candidate entry after the privacy candidate entry is included in the third candidate entry is identified, and presenting the third candidate entry after the privacy candidate entry is deleted as a fourth candidate entry to the user. To ensure that the fourth candidate term presented after the privacy preserving process has no term relating to the privacy of the user.
(2) Replacing the privacy candidate entries in the one or more third candidate entries, and determining the replaced one or more third candidate entries as corresponding one or more fourth candidate entries. For example, the input device identifies whether the one or more third candidate terms include privacy candidate terms, which in some embodiments include, but are not limited to, name/wordlet, etc. For example, a two-component network is used to determine whether the third candidate term is a name, or an expert system is used to find a sensitive term, and detect whether the third candidate term contains the sensitive term. And after the privacy candidate entry is identified to be included in the third candidate entry, replacing the privacy candidate entry, and presenting the third candidate entry after the privacy candidate entry is replaced as a fourth candidate entry to the user. To ensure that the fourth candidate term presented after the privacy preserving process has no term relating to the privacy of the user. In some embodiments, the replacing the privacy candidate term in the third candidate term includes, but is not limited to, replacing the privacy candidate term with other third candidate terms that do not contain privacy information.
(3) And randomly sorting the one or more third candidate entries, and determining the one or more randomly sorted third candidate entries as corresponding one or more fourth candidate entries. For example, one or more first candidate entries are randomly ordered such that the randomly ordered first candidate entries do not expose the user's private information (e.g., commonly used first candidate entries may be ranked later).
(4) Hiding the privacy candidate entries in the one or more third candidate entries, and determining the one or more hidden third candidate entries as corresponding one or more fourth candidate entries. For example, the privacy candidate term in the first candidate term is ranked later so that the privacy candidate term is not presented.
Of course, it will be appreciated by those skilled in the art that the privacy preserving process described above is by way of example only, and that other privacy preserving processes, as may be present or hereafter presented, are intended to be within the scope of the present application and are incorporated herein by reference.
Fig. 2 illustrates an input device according to an aspect of the present application, the device comprising a one-to-one/two module and a three module.
Specifically, a module is used for responding to the input operation of a user in an input box of user equipment, and matching and inquiring in an input method database according to a character string input through the input operation so as to obtain one or more first candidate entries matched with the character string. In some embodiments, an input box is provided in the user device, through which the user performs an input operation of a character string (e.g., a symbol such as pinyin). In some embodiments, the input method database is provided with a query table, in which a plurality of character strings (e.g. pinyin) and one or more candidate terms corresponding to each character string are recorded, and the input device queries the query table for obtaining a first candidate term corresponding to the character string according to the character string input by the input operation. In some embodiments, the input method database is provided with a mapping relation between the character string and the candidate entry, and the input device queries the input method database for a first candidate entry matched with the character string according to the character string input by the input operation. Of course, it should be understood by those skilled in the art that the above-described query matching operation of the first candidate entry through the input method database is merely exemplary, and other operations that may be present or may occur in the future are included in the scope of the present application and are incorporated herein by reference.
And the second module is used for determining one or more corresponding second candidate entries by performing privacy protection processing on the one or more first candidate entries by the input equipment if the user equipment meets the triggering condition for protecting the input privacy, and presenting at least one of the one or more second candidate entries in the interface of the input frame. In some embodiments, the input device automatically triggers the protection of the input privacy of the corresponding user of the user device by detecting whether the user device is currently required to protect the input privacy, so as to achieve the purpose of ensuring the input privacy of the user at any time and any place. For example, the trigger condition includes, but is not limited to, the user device being used by others; the user equipment is in public places etc. In some embodiments, the privacy-preserving method includes, but is not limited to, deleting or replacing at least one of the one or more first candidate entries to obtain a second candidate entry after privacy-preserving.
And the three modules are used for presenting at least one of the one or more first candidate entries in the interface of the input box by the input equipment if the user equipment does not meet the triggering condition for protecting the input privacy. In some embodiments, if the user device does not meet the triggering condition for protecting the input privacy, the input privacy protection function does not need to be started, and one or more first candidate entries are presented based on the first candidate entries which are matched according to the character string query by the input device. For example, the first candidate term may be determined based on the input habit of the user corresponding to the user device, for example, the frequency or the number of times of selecting the determined candidate term at ordinary times of the user is statistically recorded in an input method database, and when the user inputs a character string, the first candidate term corresponding to the character string frequently used by the user is presented to the user.
For example, user b uses user a's user device, where user a is the corresponding user of the user device. The input device, in response to an input operation of the user b in the input box, queries the input method database for a first candidate term (e.g., completion/maintenance/horizontal slot … …) corresponding to a character string (e.g., wc) input according to the input operation. If the user a uses the "lying groove" frequently in normal use, the user device presents the user b with the possibility of being arranged in the first position as the "lying groove" based on the input method in the prior art, thereby causing embarrassment. Thus, the existing input method may inadvertently expose a lot of information such as word habit/privacy information of the owner of the user equipment. In this embodiment, the input device protects the input privacy of the user device owner by detecting whether the user device satisfies a trigger condition that protects the input privacy. For example, a face image of a currently used user (user b) is obtained, the face image is matched with a face image of a user a stored in the user equipment, if the matching is unsuccessful, the user equipment is determined to be used by other people, and a triggering condition for protecting input privacy is met. The input device performs privacy-preserving processing on the first candidate term (e.g., completion/maintenance/horizontal slot … …) to obtain a processed second candidate term and presents the second candidate term to the user b. In some embodiments, the privacy-preserving processing is performed on the second candidate term, so that the privacy of the user a is not revealed.
In some embodiments, the trigger condition includes any one of:
(1) The user device is being used by others. For example, when a user device is used by a host that is not the user device, a privacy preserving process needs to be initiated to avoid revealing the host's input privacy.
(2) The user equipment is in a public place. For example, when the user device is used in public, to avoid revealing the input privacy of the owner of the user device, a privacy preserving process needs to be initiated.
(3) And triggering configuration information which is preset in the user equipment and protects privacy in the input process. For example, a start button is provided in the user equipment, the user starts the function of triggering privacy protection by switching on and off the start button, when the start button is started, and when an input operation is detected, a triggering condition for protecting the input privacy is determined to be met; for another example, the user equipment is preset to perform privacy protection processing on the user equipment within a certain time period, or the corresponding user of the user equipment sets the user equipment to perform privacy protection processing on the user equipment within a certain time period, the user equipment detects whether the setting of the time period is met currently, and if so, the triggering condition for protecting the input privacy is determined to be met.
Of course, those skilled in the art will appreciate that the above-described triggering conditions are merely examples, and that other triggering conditions that may occur in the present application, if applicable, are also included within the scope of the present application and are incorporated herein by reference.
In some embodiments, the device further comprises a four-module (not shown), a four-module for detecting whether the user device satisfies a trigger condition for protecting input privacy. In some embodiments, protection of input privacy is enabled only when the user device is in use by others or in public. In case the trigger condition is not met, the user device is indicated as being used by the owner of the user device, so that no protection of input privacy need be enabled. Therefore, the input device needs to detect whether the user device satisfies a trigger condition for protecting input privacy, and timely protect the input privacy of the user.
In some embodiments, the fourth module is configured to detect whether the user equipment meets a trigger condition for protecting input privacy in response to the user enabling a trigger operation of the input box or in response to the input operation. In order to protect the user's input privacy in a timely manner. In some embodiments, it is detected whether the user device satisfies a trigger condition for protecting input privacy when the user enables the input box, for example, whether the user is a corresponding user of the user device is confirmed through face recognition when the user places input focus on the input box, so as to enable protecting input privacy in time. In some embodiments, the input device detects whether the user device satisfies a trigger condition that protects input privacy in response to a user enabling a trigger operation of the input box, e.g., begins detecting whether the user device satisfies a trigger condition that protects input privacy when an input focus is detected to be placed in the input box. In some embodiments, the input device is configured to detect, in response to an input operation, whether the user device satisfies a trigger condition for protecting input privacy, e.g., during execution of the input operation by the user or when the user begins to perform the input operation, whether the user device satisfies the trigger condition for protecting input privacy. Of course, it should be understood by those skilled in the art that the above case of triggering detection of whether the user equipment satisfies the triggering condition for protecting the input privacy is merely an example, and other privacy protection processes that may exist in the present application or may occur in the future are included in the scope of the present application and are incorporated herein by reference. For example, detecting whether the user device satisfies a trigger condition that protects input privacy may be performed before presenting the first candidate term or the second candidate term.
In some embodiments, the triggering condition includes that the user equipment is being used by others, and the detecting whether the user equipment meets the triggering condition for protecting input privacy includes: acquiring characteristic information of the user; matching the characteristic information of the user with the characteristic information of the user corresponding to the user equipment; if the matching fails, determining that the user equipment meets the triggering condition for protecting the input privacy. In some embodiments, the triggering condition to protect input privacy includes the user device being used by another person. In some embodiments, the characteristic information of the user includes, but is not limited to, facial image information/fingerprint information of the user, and the like. For example, in response to a triggering operation of a user enabling an input box, acquiring fingerprint information of the user, and matching the acquired fingerprint information with fingerprint information stored in the user equipment (for example, fingerprint information of a user corresponding to the user equipment), if the matching is successful, the user equipment is not used by others currently, and no enabling protection of input privacy is required; if the matching is unsuccessful, the user equipment is used by other people currently, and the triggering condition for starting the protection of the input privacy is met. By acquiring the characteristic information of the user, the input privacy of the user corresponding to the user equipment can be ensured to be protected when the user equipment is used by other people.
In some embodiments, the triggering condition includes that the user equipment is in public place, and the detecting whether the user equipment meets the triggering condition for protecting input privacy includes: detecting whether the user equipment is currently connected with a public wireless access point or not; and if the user equipment is currently connected with the public wireless access point, determining that the user equipment meets the triggering condition for protecting the input privacy. In some embodiments, the ue may be used in public places, and to avoid revealing the input privacy of the corresponding user of the ue in public places, the information of the place where the ue is currently located is determined by detecting whether the ue is currently linked to a public wireless access point. For example, if the user device is currently connected to a wireless access point of a cafe, a trigger condition for protecting input privacy is determined to be met, so as to protect the input privacy of the user in a public place. In some embodiments, determining whether the wireless access point is a public wireless access point by location information of the wireless access point or location area information (e.g., belonging to a business circle) to which the wireless access point belongs; in some embodiments, it is detected by the identification information of the wireless access point (e.g., XX cafe WIFI) whether the wireless access point is a public wireless access point. In this embodiment, by detecting whether the wireless access point to which the user equipment is currently connected is a public wireless access point, whether the user equipment is currently in a public occasion is detected, so as to ensure the input privacy of the user corresponding to the user equipment in the public occasion.
In some embodiments, the triggering condition includes that the user equipment is in public place, and the detecting whether the user equipment meets the triggering condition for protecting input privacy includes: detecting whether the user equipment is accessed to external equipment currently; and if the user equipment is currently accessed to the external equipment, determining that the user equipment meets the triggering condition for protecting the input privacy. In some embodiments, the external device includes, but is not limited to, a projector, a printer, and the like. For example, the user equipment detects whether the user equipment is currently connected to the external device by acquiring the access information of an interface (for example, a physical external interface or a bluetooth external interface), and if the external device is currently connected, privacy protection processing is required to be performed on the input of the user equipment so as to ensure the input privacy of the user equipment corresponding to the user.
In some embodiments, the triggering condition includes configuration information preset in the user equipment to protect privacy during input, and the detecting whether the user equipment meets the triggering condition to protect input privacy includes: detecting whether the user equipment meets the configuration information; and if the user equipment meets the configuration information, determining that the user equipment meets a triggering condition for protecting input privacy. In some embodiments, the configuration information is configuration information preset by the user equipment; in other embodiments, the configuration information is set by the user device corresponding to the user. For example, the configuration information includes, but is not limited to, time period information (e.g., 6:00 a. To 23:00 a. Later), turn on information (e.g., by a button to activate or deactivate the input privacy preserving function). Under the condition that the configuration information is met, determining that the user equipment meets a triggering condition for protecting input privacy, for example, privacy protection is carried out on the input of the user equipment in a time period of 6:00 a night 23:00 a; for another example, privacy protection is provided for the user device input when the button is actuated by the user. The input privacy protection of the user equipment is realized through the configuration information, the input privacy protection can be performed based on the user setting while the automatic triggering protection is ensured, and the user experience is improved.
In some embodiments, the privacy-preserving processing of the one or more first candidate terms determines corresponding one or more second candidate terms, including any one of the following:
(1) And deleting the privacy candidate entries in the one or more first candidate entries, and determining the one or more first candidate entries after deleting the privacy candidate entries as corresponding one or more second candidate entries. For example, the input device identifies whether the one or more first candidate terms include privacy candidate terms, which in some embodiments include, but are not limited to, name/wordlet, etc. For example, a two-component network is used to determine whether the first candidate term is a name, or an expert system is used to find a sensitive term, and detect whether the first candidate term contains the sensitive term. And deleting the privacy candidate entry after the privacy candidate entry is included in the first candidate entry is identified, and presenting the first candidate entry after the privacy candidate entry is deleted as a second candidate entry to the user. To ensure that the second candidate term presented after the privacy preserving process is free of terms that relate to the privacy of the user.
(2) Replacing the privacy candidate entries in the one or more first candidate entries, and determining the replaced one or more first candidate entries as corresponding one or more second candidate entries. For example, the input device identifies whether the one or more first candidate terms include privacy candidate terms, which in some embodiments include, but are not limited to, name/wordlet, etc. For example, a two-component network is used to determine whether the first candidate term is a name, or an expert system is used to find a sensitive term, and detect whether the first candidate term contains the sensitive term. And after the privacy candidate entry is identified to be included in the first candidate entry, replacing the privacy candidate entry, and presenting the first candidate entry after replacing the privacy candidate entry as a second candidate entry to the user. To ensure that the second candidate term presented after the privacy preserving process is free of terms that relate to the privacy of the user. In some embodiments, the replacing the privacy candidate term in the first candidate term includes, but is not limited to, replacing the privacy candidate term with other first candidate terms that do not contain privacy information.
(3) And randomly sorting the one or more first candidate entries, and determining the one or more first candidate entries after random sorting as corresponding one or more second candidate entries. For example, one or more first candidate entries are randomly ordered such that the randomly ordered first candidate entries do not expose the user's private information (e.g., commonly used first candidate entries may be ranked later).
(4) Hiding the privacy candidate entries in the one or more first candidate entries, and determining the one or more hidden first candidate entries as corresponding one or more second candidate entries. For example, the privacy candidate term in the first candidate term is ranked later so that the privacy candidate term is not presented.
Of course, it will be appreciated by those skilled in the art that the privacy preserving process described above is by way of example only, and that other privacy preserving processes, as may be present or hereafter presented, are intended to be within the scope of the present application and are incorporated herein by reference.
In some embodiments, the apparatus further comprises a five module (not shown) for obtaining one or more third candidate terms matching the string in response to a trigger operation by the user to view more candidate terms; determining one or more corresponding fourth candidate entries by privacy protection processing on the one or more third candidate entries, and presenting at least one of the one or more fourth candidate entries in an interface of the input box; otherwise, at least one of the one or more third candidate entries is presented in an interface of the input box. In some embodiments, the first candidate entry corresponding to the character string input by the user may not be presented to the user at one time, the first candidate entry of the next page needs to be loaded by "page turning", and in order to ensure that the third candidate entry loaded subsequently does not reveal the input privacy of the user, privacy protection processing needs to be performed on the one or more third candidate entries to determine that the fourth candidate entry loaded and presented subsequently does not reveal the input privacy of the user. For the privacy-preserving process of the one or more third candidate entries, reference is made to the above description of the privacy-preserving process of the first candidate entry, which is not described herein.
In some embodiments, the privacy-preserving processing of the one or more third candidate terms determines one or more fourth candidate terms, including any one of the following:
(1) And deleting the privacy candidate entries in the one or more third candidate entries, and determining the one or more third candidate entries after deleting the privacy candidate entries as corresponding one or more fourth candidate entries. For example, the input device identifies whether the one or more third candidate terms include privacy candidate terms, which in some embodiments include, but are not limited to, name/wordlet, etc. For example, a two-component network is used to determine whether the third candidate term is a name, or an expert system is used to find a sensitive term, and detect whether the third candidate term contains the sensitive term. And deleting the privacy candidate entry after the privacy candidate entry is included in the third candidate entry is identified, and presenting the third candidate entry after the privacy candidate entry is deleted as a fourth candidate entry to the user. To ensure that the fourth candidate term presented after the privacy preserving process has no term relating to the privacy of the user.
(2) Replacing the privacy candidate entries in the one or more third candidate entries, and determining the replaced one or more third candidate entries as corresponding one or more fourth candidate entries. For example, the input device identifies whether the one or more third candidate terms include privacy candidate terms, which in some embodiments include, but are not limited to, name/wordlet, etc. For example, a two-component network is used to determine whether the third candidate term is a name, or an expert system is used to find a sensitive term, and detect whether the third candidate term contains the sensitive term. And after the privacy candidate entry is identified to be included in the third candidate entry, replacing the privacy candidate entry, and presenting the third candidate entry after the privacy candidate entry is replaced as a fourth candidate entry to the user. To ensure that the fourth candidate term presented after the privacy preserving process has no term relating to the privacy of the user. In some embodiments, the replacing the privacy candidate term in the third candidate term includes, but is not limited to, replacing the privacy candidate term with other third candidate terms that do not contain privacy information.
(3) And randomly sorting the one or more third candidate entries, and determining the one or more randomly sorted third candidate entries as corresponding one or more fourth candidate entries. For example, one or more first candidate entries are randomly ordered such that the randomly ordered first candidate entries do not expose the user's private information (e.g., commonly used first candidate entries may be ranked later).
(4) Hiding the privacy candidate entries in the one or more third candidate entries, and determining the one or more hidden third candidate entries as corresponding one or more fourth candidate entries. For example, the privacy candidate term in the first candidate term is ranked later so that the privacy candidate term is not presented.
Of course, it will be appreciated by those skilled in the art that the privacy preserving process described above is by way of example only, and that other privacy preserving processes, as may be present or hereafter presented, are intended to be within the scope of the present application and are incorporated herein by reference.
The present application also provides a computer readable storage medium storing computer code which, when executed, performs a method as claimed in any preceding claim.
The present application also provides a computer program product which, when executed by a computer device, performs a method as claimed in any preceding claim.
The present application also provides a computer device comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any preceding claim.
FIG. 3 illustrates an exemplary system that may be used to implement various embodiments described herein;
in some embodiments, as shown in fig. 3, the system 1000 can be implemented as any one of the network devices, first user device, or second user device of the various described embodiments. In some embodiments, system 1000 can include one or more computer-readable media (e.g., system memory or NVM/storage 1020) having instructions and one or more processors (e.g., processor(s) 1005) coupled with the one or more computer-readable media and configured to execute the instructions to implement the modules to perform the actions described herein.
For one embodiment, the system control module 1010 may include any suitable interface controller to provide any suitable interface to at least one of the processor(s) 1005 and/or any suitable device or component in communication with the system control module 1010.
The system control module 1010 may include a memory controller module 1030 to provide an interface to the system memory 1015. The memory controller module 1030 may be a hardware module, a software module, and/or a firmware module.
System memory 1015 may be used, for example, to load and store data and/or instructions for system 1000. For one embodiment, system memory 1015 may comprise any suitable volatile memory, such as, for example, suitable DRAM. In some embodiments, the system memory 1015 may comprise double data rate type four synchronous dynamic random access memory (DDR 4 SDRAM).
For one embodiment, the system control module 1010 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 1020 and communication interface(s) 1025.
For example, NVM/storage 1020 may be used to store data and/or instructions. NVM/storage 1020 may include any suitable nonvolatile memory (e.g., flash memory) and/or may include any suitable nonvolatile storage device(s) (e.g., hard Disk drive(s) (HDD), compact Disk drive(s) (CD) and/or digital versatile Disk drive (s)).
NVM/storage 1020 may include storage resources that are physically part of the device on which system 1000 is installed or which may be accessed by the device without being part of the device. For example, NVM/storage 1020 may be accessed over a network via communication interface(s) 1025.
Communication interface(s) 1025 may provide an interface for system 1000 to communicate over one or more networks and/or with any other suitable device. The system 1000 may wirelessly communicate with one or more components of a wireless network in accordance with any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 1005 may be packaged together with logic of one or more controllers (e.g., memory controller module 1030) of the system control module 1010. For one embodiment, at least one of the processor(s) 1005 may be packaged together with logic of one or more controllers of the system control module 1010 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 1005 may be integrated on the same die with logic of one or more controllers of the system control module 1010. For one embodiment, at least one of the processor(s) 1005 may be integrated on the same die with logic of one or more controllers of the system control module 1010 to form a system on chip (SoC).
In various embodiments, system 1000 may be, but is not limited to being: a server, workstation, desktop computing device, or mobile computing device (e.g., laptop computing device, handheld computing device, tablet, netbook, etc.). In various embodiments, system 1000 may have more or fewer components and/or different architectures. For example, in some embodiments, system 1000 includes one or more cameras, keyboards, liquid Crystal Display (LCD) screens (including touch screen displays), non-volatile memory ports, multiple antennas, graphics chips, application Specific Integrated Circuits (ASICs), and speakers.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, using Application Specific Integrated Circuits (ASIC), a general purpose computer or any other similar hardware device. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions as described above. Likewise, the software programs of the present application (including associated data structures) may be stored on a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. In addition, some steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
Furthermore, portions of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application by way of operation of the computer. Those skilled in the art will appreciate that the form of computer program instructions present in a computer readable medium includes, but is not limited to, source files, executable files, installation package files, etc., and accordingly, the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Herein, a computer-readable medium may be any available computer-readable storage medium or communication medium that can be accessed by a computer.
Communication media includes media whereby a communication signal containing, for example, computer readable instructions, data structures, program modules, or other data, is transferred from one system to another. Communication media may include conductive transmission media such as electrical cables and wires (e.g., optical fibers, coaxial, etc.) and wireless (non-conductive transmission) media capable of transmitting energy waves, such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied as a modulated data signal, for example, in a wireless medium, such as a carrier wave or similar mechanism, such as that embodied as part of spread spectrum technology. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory, such as random access memory (RAM, DRAM, SRAM); and nonvolatile memory such as flash memory, various read only memory (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memory (MRAM, feRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed computer-readable information/data that can be stored for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to operate a method and/or a solution according to the embodiments of the present application as described above.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. A plurality of units or means recited in the apparatus claims can also be implemented by means of one unit or means in software or hardware. The terms first, second, etc. are used to denote a name, but not any particular order.

Claims (10)

1. An input method, the method comprising:
responding to input operation of a user in an input box of user equipment, and matching and inquiring in an input method database according to a character string input through the input operation so as to obtain one or more first candidate entries matched with the character string;
if the user equipment meets the triggering condition for protecting the input privacy, determining one or more corresponding second candidate entries by performing privacy protection processing on the one or more first candidate entries, and presenting at least one of the one or more second candidate entries in an interface of the input box; otherwise the first set of parameters is selected,
presenting at least one of the one or more first candidate terms in an interface of the input box, wherein the trigger condition includes the user device being used by another person, the another person including a host that is not the user device;
wherein the method further comprises:
detecting whether the user equipment meets a triggering condition for protecting input privacy or not in response to triggering operation of enabling the input box by the user, wherein the triggering operation comprises that the user places an input focus on the input box;
Wherein the detecting whether the user equipment meets a triggering condition for protecting input privacy comprises:
acquiring the characteristic information of the user, wherein the characteristic information of the user comprises face image information or fingerprint information of the user;
matching the characteristic information of the user with the characteristic information of the user corresponding to the user equipment, and determining whether the user is the user corresponding to the user equipment;
if the matching fails, determining that the user equipment meets the triggering condition for protecting the input privacy.
2. The method of claim 1, wherein the trigger condition comprises any one of:
the user equipment is used by others;
the user equipment is in public places;
and triggering configuration information which is preset in the user equipment and protects privacy in the input process.
3. The method of claim 1, wherein the trigger condition includes the user device being in a public place, and wherein the detecting whether the user device satisfies the trigger condition for protecting input privacy comprises:
detecting whether the user equipment is currently connected with a public wireless access point or not;
and if the user equipment is currently connected with the public wireless access point, determining that the user equipment meets the triggering condition for protecting the input privacy.
4. The method of claim 1, wherein the trigger condition includes the user device being in a public place, and wherein the detecting whether the user device satisfies the trigger condition for protecting input privacy comprises:
detecting whether the user equipment is accessed to external equipment currently;
and if the user equipment is currently accessed to the external equipment, determining that the user equipment meets the triggering condition for protecting the input privacy.
5. The method according to claim 1, wherein the trigger condition includes configuration information preset in the user equipment to protect privacy during input, and the detecting whether the user equipment meets the trigger condition to protect input privacy includes:
detecting whether the user equipment meets the configuration information;
and if the user equipment meets the configuration information, determining that the user equipment meets a triggering condition for protecting input privacy.
6. The method of any one of claims 1 to 5, wherein the privacy-preserving processing of the one or more first candidate terms determines corresponding one or more second candidate terms, comprising any one of:
Deleting the privacy candidate vocabulary entries in the one or more first candidate vocabulary entries, and determining the one or more first candidate vocabulary entries after deleting the privacy candidate vocabulary entries as one or more corresponding second candidate vocabulary entries;
replacing privacy candidate entries in the one or more first candidate entries, and determining the replaced one or more first candidate entries as corresponding one or more second candidate entries;
randomly sorting the one or more first candidate entries, and determining the one or more randomly sorted first candidate entries as corresponding one or more second candidate entries;
hiding the privacy candidate entries in the one or more first candidate entries, and determining the one or more hidden first candidate entries as corresponding one or more second candidate entries.
7. The method according to any one of claims 1 to 5, further comprising:
responding to the triggering operation of the user for checking more candidate entries, and obtaining one or more third candidate entries matched with the character string;
determining one or more corresponding fourth candidate entries by privacy protection processing on the one or more third candidate entries, and presenting at least one of the one or more fourth candidate entries in an interface of the input box; otherwise the first set of parameters is selected,
At least one of the one or more third candidate terms is presented in an interface of the input box.
8. The method of claim 7, wherein the privacy-preserving processing of the one or more third candidate terms determines corresponding one or more fourth candidate terms, comprising any one of:
deleting the privacy candidate vocabulary entries in the one or more third candidate vocabulary entries, and determining the one or more third candidate vocabulary entries after deleting the privacy candidate vocabulary entries as corresponding one or more fourth candidate vocabulary entries;
replacing privacy candidate entries in the one or more third candidate entries, and determining the replaced one or more third candidate entries as corresponding one or more fourth candidate entries;
randomly sorting the one or more third candidate entries, and determining the one or more randomly sorted third candidate entries as corresponding one or more fourth candidate entries;
hiding the privacy candidate entries in the one or more third candidate entries, and determining the one or more hidden third candidate entries as corresponding one or more fourth candidate entries.
9. An input device, the device comprising:
a processor; and
a memory arranged to store computer executable instructions which, when executed, cause the processor to perform the operations of the method of any one of claims 1 to 8.
10. A computer readable medium storing instructions that, when executed, cause a system to perform the operations of the method of any one of claims 1 to 8.
CN201910875111.XA 2019-09-17 2019-09-17 Input method and device Active CN110750162B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910875111.XA CN110750162B (en) 2019-09-17 2019-09-17 Input method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910875111.XA CN110750162B (en) 2019-09-17 2019-09-17 Input method and device

Publications (2)

Publication Number Publication Date
CN110750162A CN110750162A (en) 2020-02-04
CN110750162B true CN110750162B (en) 2024-04-05

Family

ID=69276512

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910875111.XA Active CN110750162B (en) 2019-09-17 2019-09-17 Input method and device

Country Status (1)

Country Link
CN (1) CN110750162B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112162646A (en) * 2020-10-19 2021-01-01 珠海格力电器股份有限公司 Input method association method, system, storage medium and electronic device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105511638A (en) * 2015-12-03 2016-04-20 魅族科技(中国)有限公司 Application method and device for input method
CN106445189A (en) * 2016-12-16 2017-02-22 北京小米移动软件有限公司 Candidate word display method and device
CN108563965A (en) * 2018-03-29 2018-09-21 广东欧珀移动通信有限公司 Character input method and device, computer readable storage medium, terminal
CN110113246A (en) * 2019-04-11 2019-08-09 上海掌门科技有限公司 A method of protection session privacy

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105511638A (en) * 2015-12-03 2016-04-20 魅族科技(中国)有限公司 Application method and device for input method
CN106445189A (en) * 2016-12-16 2017-02-22 北京小米移动软件有限公司 Candidate word display method and device
CN108563965A (en) * 2018-03-29 2018-09-21 广东欧珀移动通信有限公司 Character input method and device, computer readable storage medium, terminal
CN110113246A (en) * 2019-04-11 2019-08-09 上海掌门科技有限公司 A method of protection session privacy

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
中国自动识别协会.《自动识别技术导论》.武汉:武汉大学出版社,2007,第37-39页. *
石瑞生.《网络空间安全专业规划教材 大数据安全与隐私保护》.北京:北京邮电大学出版社,2019,第163-167页. *

Also Published As

Publication number Publication date
CN110750162A (en) 2020-02-04

Similar Documents

Publication Publication Date Title
US11429439B2 (en) Task scheduling based on performance control conditions for multiple processing units
EP3161645B1 (en) Fast data protection using dual file systems
US20190318089A1 (en) System security method and apparatus
US20170116987A1 (en) Electronic device and method for executing function using speech recognition thereof
US10542017B1 (en) Systems and methods for personalizing security incident reports
CN108984234B (en) Calling prompt method for mobile terminal and camera device
CN110780955B (en) Method and equipment for processing expression message
JP2019504566A (en) Information image display method and apparatus
US20160140350A1 (en) Method of securing image data and electronic device adapted to the same
KR102071530B1 (en) Apparatas and method for proposing a response manual of occurring denial in an electronic device
CN109992489B (en) Method and device for monitoring execution behavior of application in user equipment
CN110750162B (en) Input method and device
CN112241461B (en) Method and equipment for generating character relation graph of book
US9646157B1 (en) Systems and methods for identifying repackaged files
CN111796731B (en) Method and equipment for automatically arranging icons
JP6018344B2 (en) Dynamic reading code analysis apparatus, dynamic reading code analysis method, and dynamic reading code analysis program
US20200081597A1 (en) Application program management method and apparatus
CN110941437A (en) Method and equipment for installing application
CN110765390A (en) Method and equipment for publishing shared information in social space
CN111079039B (en) Method and equipment for collecting books
CN113852962A (en) Network connection control method, device, storage medium and software program product
CN114296651A (en) Method and equipment for storing user-defined data information
CN110958315A (en) Method and equipment for presenting message notification
CN110781513B (en) Information display method and equipment
CN111552906B (en) Method and equipment for responding to page access request in reading application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant