CN111597592B - Input method, input device and mobile terminal - Google Patents

Input method, input device and mobile terminal Download PDF

Info

Publication number
CN111597592B
CN111597592B CN202010344038.6A CN202010344038A CN111597592B CN 111597592 B CN111597592 B CN 111597592B CN 202010344038 A CN202010344038 A CN 202010344038A CN 111597592 B CN111597592 B CN 111597592B
Authority
CN
China
Prior art keywords
key
character
characters
input
prompt
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010344038.6A
Other languages
Chinese (zh)
Other versions
CN111597592A (en
Inventor
熊刘冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202010344038.6A priority Critical patent/CN111597592B/en
Publication of CN111597592A publication Critical patent/CN111597592A/en
Priority to PCT/CN2021/080534 priority patent/WO2021218452A1/en
Application granted granted Critical
Publication of CN111597592B publication Critical patent/CN111597592B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the application provides an input method, an input device and a mobile terminal, wherein the input method comprises the following steps: displaying a keyboard comprising at least one input key, wherein each of the at least one input key shows at least two characters thereon, both of which are characters that can be input through the keyboard; indicating a first character of the at least two characters; receiving a user selection of any one of the at least one input key; and acquiring the first character on the selected input key as input information of the user. The input method ensures that other people are difficult to know the input information of the user when the user inputs characters, and improves the safety.

Description

Input method, input device and mobile terminal
Technical Field
The application relates to the technical field of mobile terminals, in particular to an input method, an input device and a mobile terminal.
Background
At present, mobile terminals such as smart phones and tablet computers are very popular, and the screens of these mobile terminals tend to be larger and larger. In this case, for example, when a user inputs a bank card payment password, an App login password in a crowded place such as a bus, a subway, or the like, a person nearby may see the password; when a user inputs a password in a scene of chatting with friends, the password may be leaked to the friends nearby; when the user inputs the password in the camera monitoring area, the password information is easy to be shot. Once the password information is mastered by others, a great risk of property loss or privacy disclosure may be brought to the user, and therefore how to provide a secure input method is a problem to be solved.
Disclosure of Invention
The embodiment of the application aims to provide a more effective anti-peeping input method for a mobile terminal so as to solve the defects in the prior art.
To achieve the above object, an aspect of the present application provides an input method, including: displaying a keyboard comprising at least one input key, wherein each of the at least one input key shows at least two characters thereon, the at least two characters both being characters that can be input through the keyboard; indicating a first character of the at least two characters; receiving a user selection of any one of the at least one input key; and acquiring the first character on the selected input key as input information of a user. It is to be understood that the at least one input key described herein is an input key of the keyboard having features according to the present application, i.e., at least two characters are shown on the input key to provide a peep-proof effect, and the at least one input key is not limited to all input keys included on the keyboard, i.e., the keyboard according to the present application may include other input keys in addition to the at least one input key. Input is carried out through the peep-proof keyboard based on this application for other people hardly know user's input information, thereby play the effect of peep-proof.
In one embodiment, the keyboard further includes a prompt key, the prompt key has a predetermined number of prompt items preset by a user for selecting to be shown, the predetermined number of prompt items have a corresponding relationship with the at least two characters, and indicating a first character of the at least two characters includes indicating the first character of the at least two characters through the prompt item corresponding to the first character shown on the prompt key.
In one embodiment, the at least two characters are shown with different first attributes, and the predetermined number of prompt items have a corresponding relationship with the respective first attributes of the at least two characters, wherein indicating a first character of the at least two characters by the prompt item shown on the prompt key corresponding to the first character comprises: and indicating a first character of the at least two characters through a prompt item which is shown on the prompt key and corresponds to a first attribute of the first character.
In one embodiment, the first attribute is any one of: : position, color, size, font, language.
By distinguishing the plurality of characters on one key by the different first attributes and corresponding the prompt item of the prompt key with the respective first attributes of the plurality of characters on the input key, the user can determine which character on the input key is the character which can be input by the input key through the prompt of the prompt key, and can input based on the prompt. And others cannot deduce which character the user inputs only by clicking the screen, so that the peeping prevention function is realized.
In one embodiment, after receiving a user click on an input key in the keyboard, the prompt item shown on the prompt key is replaced. By replacing the prompt item (such as the character) on the prompt key, the characters which can be input on the input key are changed, and the difficulty of peeping is increased.
In one embodiment, the method further comprises, after displaying the keyboard, receiving a predetermined operation of the prompt key by a user, and replacing the prompt item shown on the prompt key based on the predetermined operation.
In one embodiment, the at least two characters are shown with different recognition difficulties, wherein indicating a first character of the at least two characters comprises indicating a first character of the at least two characters by showing the first character with a greater recognition difficulty. In one embodiment, the different identification difficulties are obtained based on at least one of: character size, character color, character font. In one embodiment, the security enhancement modes such as font size, color shade, hollow or not can be combined to display the first character. The first character which can be input on the input key is displayed in a mode which is difficult to recognize, such as a small size or a light color, so that other people cannot recognize the first character on the keyboard, and the peeping prevention function is achieved.
In one embodiment, the mobile phone may automatically enlarge the small characters on the input keys or deepen the color of the small characters when the screen brightness decreases. In one embodiment, the mobile phone may set an adjustment key in the keyboard or may preset a gesture for adjusting the size, color shade, etc. of the small characters on the input key by the user.
In one embodiment, the method is performed based on a touch screen, and the method further includes, before displaying the keyboard, determining a distance between the user's input execution body and any one of the input keys based on the touch screen, wherein displaying the keyboard includes, in a case where the distance between the user's input execution body and any one of the input keys is equal to or less than a first predetermined threshold, displaying at least two characters on the input key. The difficulty of peeping is further increased by displaying the characters inputtable on the input keys near the relative position of the user's fingers only when the fingers are close to the keyboard.
In one embodiment, the indicating a first character of the at least two characters includes displaying a prompt information box in a preset time length, the prompt information box having a preset number of prompt items preset by a user for selecting to be shown, the preset number of prompt items having a corresponding relationship with the at least two characters, and indicating the first character of the at least two characters through the prompt item corresponding to the first character shown in the prompt information box.
In one embodiment, the distance between the position of any of the at least one input key and the normal display position of the first character shown on that input key is less than or equal to a second predetermined threshold. By so doing, the display position of the scrambled character is made to be located near its regular display position, so that the user can quickly find the key for inputting the character with the regular display position of the character as a reference position, thereby facilitating the user's input. In one embodiment, the at least two characters shown on each of the at least one input key include a conventionally displayed character of the input key. In one embodiment, the regular display characters are displayed in a highlighted form.
In one embodiment, the method further comprises, after receiving a user click on an input key in the keyboard, replacing a first character shown on each input key with another character or replacing each character shown on each input key. Through this method, the peep degree of difficulty has further been increased.
In an implementation mode, the mobile phone can continuously start the camera to determine the number of faces around the mobile phone in the whole process of inputting the password by the user, when the number of the faces around the mobile phone is determined to be only 1 before the user starts inputting the password, the anti-peeping keyboard can not be displayed, only the conventional keyboard is displayed, and when the mobile phone finds that more than 2 faces around the mobile phone in the process of inputting the password by the user, the keyboard can be automatically switched to the anti-peeping keyboard, so that the conventional keyboard can be provided in an unnecessary scene, and unnecessary inconvenience brought to the password input of the user is avoided. Optionally, keys, key combinations, gestures, voice controls, etc. for closing the keyboard may be preset in the peep-proof keyboard so that the user may actively switch to a conventional keyboard in a scene deemed unnecessary. Optionally, a key combination, a gesture, voice control and the like for starting the peep-proof keyboard can be preset in the conventional keyboard or the input page, so that the user can actively switch to the peep-proof keyboard in a scene deemed to be needed by the user.
Another aspect of the present application provides a mobile terminal, including a display screen, a processor, and a memory, where the memory stores program instructions; the processor is configured to perform any of the above methods based on the display screen according to program instructions stored in the memory. In one embodiment, the display screen is a touch screen.
Another aspect of the present application provides an input device, including: a display unit for displaying a keyboard comprising at least one input key, wherein each of the at least one input key shows at least two characters thereon, the at least two characters being characters that can be input through the keyboard; the indicating unit is used for indicating a first character in the at least two characters; a receiving unit for receiving a user selection of any one of the at least one input key; and the acquisition unit is used for acquiring the first character on the selected input key as the input information of the user.
In one embodiment, the keyboard further includes a prompt key, the prompt key has a predetermined number of prompt items, the predetermined number of prompt items have a corresponding relationship with the at least two characters, and the indication unit is further configured to indicate a first character of the at least two characters through a prompt item shown on the prompt key and corresponding to the first character.
In one embodiment, the at least two characters are shown with different first attributes, and the predetermined number of prompt items have a corresponding relationship with the respective first attributes of the at least two characters, wherein the indicating unit is further configured to: and indicating a first character of the at least two characters through a prompt item which is shown on the prompt key and corresponds to a first attribute of the first character.
In one embodiment, the first attribute is any one of: position, color, size, font, language.
In one embodiment, the apparatus further includes a first replacing unit configured to replace the reminder item shown on the reminder key after receiving a user selection of any one of the at least one input key.
In one embodiment, the apparatus further includes a second replacement unit configured to receive a predetermined operation of the prompt key by a user after the keyboard is displayed, and replace the prompt item shown on the prompt key based on the predetermined operation.
In one embodiment, the at least two characters are shown with different recognition difficulties, wherein the indicating unit is further configured to indicate a first character of the at least two characters by showing the first character with a greater recognition difficulty.
In one embodiment, the different identification difficulties are obtained based on at least one of: character size, character color, character font.
In one embodiment, the device is deployed on the basis of a touch screen, the device further comprises a determining unit, which is used for determining the distance between the input execution body of the user and any input key on the basis of the touch screen before the keyboard is displayed, wherein the display unit is further used for displaying at least two characters on the input key in the case that the distance between the input execution body of the user and any input key is smaller than or equal to a first preset threshold value.
In one embodiment, the indication unit is further configured to display a prompt information box with a predetermined number of prompt items in a preset time length, where the predetermined number of prompt items have a corresponding relationship with the at least two characters, and indicate a first character of the at least two characters through a prompt item corresponding to the first character shown in the prompt information box.
In one embodiment, the distance between the position of each of the at least one input key and the normal display position of the first character shown on that input key is less than or equal to a second predetermined threshold.
In one embodiment, the at least two characters shown on each of the at least one input key include a conventionally displayed character of the input key.
In one embodiment, the regular display characters are displayed in a highlighted form.
In one embodiment, the apparatus further includes a third replacement unit configured to replace a first character shown on each of the input keys with another character after receiving a user selection of any one of the at least one input key.
Drawings
The embodiments of the present application can be made more clear by describing the embodiments with reference to the attached drawings:
fig. 1 shows a schematic structural diagram of a handset 100;
fig. 2 shows a block diagram of a software structure of a terminal device according to an embodiment of the present application;
FIG. 3 shows a flow diagram of an input method according to an embodiment of the application;
FIG. 4 illustrates a privacy protecting keyboard according to one embodiment of the present application;
FIG. 5 illustrates a privacy protecting keyboard according to another embodiment;
FIG. 6 is a diagram illustrating a prompt information box, according to another embodiment;
FIG. 7 illustrates a privacy protecting keyboard according to another embodiment;
FIG. 8 illustrates a privacy protecting keyboard according to another embodiment;
FIG. 9 illustrates a privacy protecting keypad according to another embodiment of the present application;
FIG. 10 illustrates a privacy protecting keyboard according to another embodiment;
FIG. 11 illustrates a privacy protecting keyboard according to another embodiment;
FIG. 12 illustrates an input device 1200 according to an embodiment of the present application;
fig. 13 shows a mobile terminal 1300 according to the application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings.
The terminal Device described in the embodiment of the present invention may be, for example, a mobile phone, a computer, a tablet computer, a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a wearable Device, and the like. In order to prevent peeping when a user inputs privacy information such as a password and the like in terminal equipment, a specific peeping-preventing soft keyboard is designed in the application, and a preset input key on the keyboard comprises a true character (a character which can be input through the input key) and at least one false character, so that when the user inputs through the keyboard, a person beside the keyboard cannot know the true character input by the user, and the peeping-preventing effect is achieved.
The following description will be given taking a terminal device as a mobile phone, and fig. 1 shows a schematic structural diagram of a mobile phone 100.
The mobile phone 100 may include a processor 110, an external memory interface 120, an internal memory 121, a usb interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 151, a wireless communication module 152, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, keys 190, a motor 191, an indicator 192, a camera 193, a display 194, a SIM card interface 195, and the like. The sensor module 180 may include a gyroscope sensor 180A, an acceleration sensor 180B, a proximity light sensor 180G, a fingerprint sensor 180H, and a touch sensor 180K (of course, the mobile phone 100 may further include other sensors, such as a temperature sensor, a pressure sensor, a distance sensor, a magnetic sensor, an ambient light sensor, an air pressure sensor, a bone conduction sensor, and the like, which are not shown in the figure).
It is to be understood that the illustrated structure of the embodiment of the present invention does not specifically limit the mobile phone 100. In other embodiments of the present application, the handset 100 may include more or fewer components than shown, or combine certain components, or split certain components, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
Processor 110 may include one or more processing units, such as: the processor 110 may include an Application Processor (AP), a modem processor, a Graphics Processing Unit (GPU), an Image Signal Processor (ISP), a controller, a memory, a video codec, a Digital Signal Processor (DSP), a baseband processor, and/or a Neural-Network Processing Unit (NPU), etc. The different processing units may be separate devices or may be integrated into one or more processors. The controller may be a neural center and a command center of the cell phone 100, among others. The controller can generate an operation control signal according to the instruction operation code and the timing signal to complete the control of instruction fetching and instruction execution.
A memory may also be provided in the processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that have just been used or recycled by the processor 110. If the processor 110 needs to use the instruction or data again, it can be called directly from the memory. Avoiding repeated accesses reduces the latency of the processor 110, thereby increasing the efficiency of the system.
The processor 110 may operate the audio output method provided by the embodiment of the present application, so as to reduce the operation complexity of the user, improve the intelligent degree of the terminal device, and improve the user experience. When the processor 110 may include different devices, for example, a CPU and a GPU are integrated, the CPU and the GPU may cooperate to execute the audio output method provided by the embodiment of the present disclosure, for example, part of the algorithm in the audio output method is executed by the CPU, and another part of the algorithm is executed by the GPU, so as to obtain faster processing efficiency.
The display screen 194 is used to display images, video, and the like. The display screen 194 includes a display panel. The display panel may adopt a Liquid Crystal Display (LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (active-matrix organic light-emitting diode, AMOLED), a flexible light-emitting diode (FLED), a miniature, a Micro-oeld, a quantum dot light-emitting diode (QLED), and the like. In some embodiments, the cell phone 100 may include 1 or N display screens 194, N being a positive integer greater than 1. The display screen 194 may be used to display information input by or provided to the user as well as various Graphical User Interfaces (GUIs). For example, display 194 may display a privacy protecting keypad according to embodiments of the present description. As another example, display 194 may display a photograph, video, web page, or file, among others. When processor 110 detects a touch event of a user's finger (or stylus, etc.) with respect to an application icon, in response to the touch event, the user interface of the application corresponding to the application icon is opened and displayed on display 194.
In this embodiment, the display screen 194 may be an integrated flexible display screen, or may be a spliced display screen formed by two rigid screens and a flexible screen located between the two rigid screens.
The camera 193 (front camera or rear camera, or one camera may be both front camera and rear camera) is used to capture still images or video. In general, the camera 193 may include a photosensitive element such as a lens group including a plurality of lenses (convex or concave lenses) for collecting an optical signal reflected by an object to be photographed and transferring the collected optical signal to an image sensor, and an image sensor. And the image sensor generates an original image of the object to be shot according to the optical signal.
The internal memory 121 may be used to store computer-executable program code, which includes instructions. The processor 110 executes various functional applications and data processing of the cellular phone 100 by executing instructions stored in the internal memory 121. The internal memory 121 may include a program storage area and a data storage area. The storage program area may store an operating system, codes of application programs (such as a camera application, a WeChat application, and the like), and the like. The storage data area can store data created during the use of the mobile phone 100 (such as images, videos and the like acquired by a camera application), and the like.
The internal memory 121 may further store one or more computer programs corresponding to the anti-peeping input algorithm according to the embodiment of the present application. The one or more computer programs stored in the memory 121 and configured to be executed by the one or more processors 110 include instructions that can be used to perform the steps in the embodiments of the present application, and may include a display module 1211, an indication module 1212, a receiving module 1213, and an acquisition module 1214. The display module 1211 is configured to display a keyboard, where the keyboard includes at least one input key, where each of the at least one input key shows at least two characters, and the at least two characters are both characters that can be input through the keyboard; the indicating module 1212 is configured to indicate a first character of the at least two characters; the receiving module 1213 is configured to receive a selection of any one of the at least one input key by a user; the obtaining module 1214 is configured to obtain the first character on the selected input key as input information of the user.
In addition, the internal memory 121 may include a high speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, a Universal Flash Storage (UFS), and the like.
Of course, the code of the anti-peeping input algorithm provided by the embodiment of the present application may also be stored in the external memory. In this case, the processor 110 may run the code of the anti-peep input algorithm stored in the external memory through the external memory interface 120.
The function of the sensor module 180 is described below.
The gyro sensor 180A may be used to determine the motion attitude of the cellular phone 100. In some embodiments, the angular velocity of the handpiece 100 about three axes (i.e., the x, y, and z axes) may be determined by the gyro sensor 180A. I.e., the gyro sensor 180A may be used to detect the current motion state of the cellular phone 100, such as shaking or standing still.
When the display screen in the embodiment of the present application is a foldable screen, the gyro sensor 180A may be used to detect a folding or unfolding operation applied to the display screen 194. The gyro sensor 180A may report the detected folding operation or unfolding operation as an event to the processor 110 to determine the folded state or unfolded state of the display screen 194.
The acceleration sensor 180B can detect the magnitude of acceleration of the cellular phone 100 in various directions (generally, three axes). I.e., the gyro sensor 180A may be used to detect the current state of motion of the handset 100, such as shaking or standing still. When the display screen in the embodiment of the present application is a foldable screen, the acceleration sensor 180B may be used to detect a folding or unfolding operation applied to the display screen 194. The acceleration sensor 180B may report the detected folding operation or unfolding operation as an event to the processor 110 to determine the folded state or unfolded state of the display screen 194.
The proximity light sensor 180G may include, for example, a Light Emitting Diode (LED) and a light detector, such as a photodiode. The light emitting diode may be an infrared light emitting diode. The mobile phone emits infrared light outwards through the light emitting diode. The handset uses a photodiode to detect infrared reflected light from nearby objects. When sufficient reflected light is detected, it can be determined that there is an object near the handset. When insufficient reflected light is detected, the handset can determine that there are no objects near the handset. When the display screen in this embodiment of the application is a foldable screen, the proximity optical sensor 180G may be disposed on the first screen of the foldable display screen 194, and the proximity optical sensor 180G may detect a folding angle or an unfolding angle of the first screen and the second screen according to an optical path difference of the infrared signal.
The gyro sensor 180A (or the acceleration sensor 180B) may transmit the detected motion state information (such as an angular velocity) to the processor 110. The processor 110 determines whether the mobile phone is currently in the hand-held state or the tripod state (for example, when the angular velocity is not 0, it indicates that the mobile phone 100 is in the hand-held state) based on the motion state information.
The fingerprint sensor 180H is used to collect a fingerprint. The mobile phone 100 can utilize the collected fingerprint characteristics to unlock the fingerprint, access the application lock, take a photograph of the fingerprint, answer an incoming call with the fingerprint, and the like.
The touch sensor 180K is also referred to as a "touch panel". The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is used to detect a touch operation acting thereon or nearby. The touch sensor can communicate the detected touch operation to the application processor to determine the touch event type. Visual output associated with the touch operation may be provided via the display screen 194. In other embodiments, the touch sensor 180K may be disposed on the surface of the mobile phone 100, different from the position of the display screen 194.
Illustratively, the display screen 194 of the handset 100 displays a main interface that includes icons for a plurality of applications (e.g., a camera application, a WeChat application, etc.). The user clicks an icon of the camera application in the home interface through the touch sensor 180K, and the trigger processor 110 starts the camera application and opens the camera 193. The display screen 194 displays an interface, such as a viewfinder interface, for the camera application.
The wireless communication function of the mobile phone 100 can be realized by the antenna 1, the antenna 2, the mobile communication module 151, the wireless communication module 152, the modem processor, the baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the handset 100 may be used to cover a single or multiple communication bands. Different antennas can also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed as a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 151 may provide a solution including 2G/3G/4G/5G wireless communication applied to the handset 100. The mobile communication module 151 may include at least one filter, a switch, a power amplifier, a Low Noise Amplifier (LNA), and the like. The mobile communication module 151 may receive electromagnetic waves from the antenna 1, filter, amplify, etc. the received electromagnetic waves, and transmit the electromagnetic waves to the modem processor for demodulation. The mobile communication module 151 may also amplify the signal modulated by the modem processor, and convert the signal into electromagnetic wave through the antenna 1 to radiate the electromagnetic wave. In some embodiments, at least some of the functional modules of the mobile communication module 151 may be provided in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 151 may be provided in the same device as at least some of the modules of the processor 110. In this embodiment, the mobile communication module 151 may be further configured to perform information interaction with other terminal devices, that is, send an audio output request to other terminal devices, or the mobile communication module 151 may be configured to receive the audio output request and encapsulate the received audio output request into a message in a specified format.
The modem processor may include a modulator and a demodulator. The modulator is used for modulating a low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used for demodulating the received electromagnetic wave signal into a low-frequency baseband signal. The demodulator then passes the demodulated low frequency baseband signal to a baseband processor for processing. The low frequency baseband signal is processed by the baseband processor and then transferred to the application processor. The application processor outputs a sound signal through an audio device (not limited to the speaker 170A, the receiver 170B, etc.) or displays an image or video through the display screen 194. In some embodiments, the modem processor may be a stand-alone device. In other embodiments, the modem processor may be provided in the same device as the mobile communication module 151 or other functional modules, independent of the processor 110.
The wireless communication module 152 may provide solutions for wireless communication applied to the mobile phone 100, including Wireless Local Area Networks (WLANs) (e.g., wireless fidelity (Wi-Fi) networks), bluetooth (BT), global Navigation Satellite System (GNSS), frequency Modulation (FM), near Field Communication (NFC), infrared (IR), and the like. The wireless communication module 152 may be one or more devices integrating at least one communication processing module. The wireless communication module 152 receives electromagnetic waves via the antenna 2, performs frequency modulation and filtering processing on electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 152 may also receive a signal to be transmitted from the processor 110, frequency modulate it, amplify it, and convert it into electromagnetic waves via the antenna 2 to radiate it.
In addition, the mobile phone 100 can implement an audio function through the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the earphone interface 170D, and the application processor. Such as music playing, recording, etc. The handset 100 may receive key 190 inputs, generating key signal inputs relating to user settings and function controls of the handset 100. The handset 100 can generate a vibration alert (e.g., an incoming call vibration alert) using the motor 191. The indicator 192 in the mobile phone 100 may be an indicator light, which may be used to indicate a charging status, a change in power, or an indication message, a missed call, a notification, etc. The SIM card interface 195 in the handset 100 is used to connect a SIM card. The SIM card can be attached to and detached from the cellular phone 100 by being inserted into the SIM card interface 195 or being pulled out from the SIM card interface 195.
It should be understood that in practical applications, the mobile phone 100 may include more or less components than those shown in fig. 1, and the embodiment of the present application is not limited thereto. The illustrated handset 100 is merely an example, and the handset 100 may have more or fewer components than shown in the figures, may combine two or more components, or may have a different configuration of components. The various components shown in the figures may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
The software system of the terminal device may adopt a hierarchical architecture, an event-driven architecture, a micro-core architecture, a micro-service architecture, or a cloud architecture. The embodiment of the invention takes an Android system with a layered architecture as an example, and exemplarily illustrates a software structure of a terminal device. Fig. 2 shows a software configuration block diagram of a terminal device according to an embodiment of the present application.
The layered architecture divides the software into several layers, each layer having a clear role and division of labor. The layers communicate with each other through a software interface. In some embodiments, the Android (Android) system is divided into four layers, an application layer, an application framework layer, an Android runtime (Android runtime) and system library, and a kernel layer from top to bottom.
The application layer may include a series of application packages.
As shown in fig. 2, the application package may include applications such as camera, gallery, calendar, phone call, map, navigation, WLAN, bluetooth, music, video, short message, etc.
The application framework layer provides an Application Programming Interface (API) and a programming framework for the application program of the application layer. The application framework layer includes a number of predefined functions.
As shown in FIG. 2, the application framework layers may include a window manager, content provider, view system, phone manager, resource manager, notification manager, and the like.
The window manager is used for managing window programs. The window manager can obtain the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The content provider is used to store and retrieve data and make it accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phone books, etc.
The view system includes visual controls such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, the display interface including the short message notification icon may include a view for displaying text and a view for displaying pictures.
The telephone manager is used for providing a communication function of the terminal equipment. Such as management of call status (including on, off, etc.).
The resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and the like.
The notification manager enables the application to display notification information in the status bar, can be used to convey notification-type messages, can disappear automatically after a short dwell, and does not require user interaction. Such as a notification manager used to inform download completion, message alerts, etc. The notification manager may also be a notification that appears in the form of a chart or scrollbar text in a status bar at the top of the system, such as a notification of a running application in the background, or a notification that appears on the screen in the form of a dialog window. For example, text information is prompted in the status bar, a prompt tone is given, the terminal device vibrates, an indicator light flickers, and the like.
The android runtime includes a core library and a virtual machine. And the android runtime is responsible for scheduling and managing the android system.
The core library comprises two parts: one part is a function which needs to be called by java language, and the other part is a core library of android.
The application layer and the application framework layer run in a virtual machine. And executing java files of the application program layer and the application program framework layer into a binary file by the virtual machine. The virtual machine is used for performing the functions of object life cycle management, stack management, thread management, safety and exception management, garbage collection and the like.
The system library may include a plurality of functional modules. For example: surface managers (surface managers), media Libraries (Media Libraries), three-dimensional graphics processing Libraries (e.g., openGL ES), two-dimensional (2D) graphics engines (e.g., SGL), and the like.
The surface manager is used to manage the display subsystem and provide fusion of 2D and 3D layers for multiple applications.
The media library supports a variety of commonly used audio, video format playback and recording, and still image files, among others. The media library may support a variety of audio-video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like.
The 2D graphics engine is a drawing engine for 2D drawing.
The kernel layer is a layer between hardware and software. The inner core layer at least comprises a display driver, a camera driver, an audio driver and a sensor driver.
An anti-peeping input scheme according to an embodiment of the present application is described below.
Fig. 3 shows a flow chart of an input method according to an embodiment of the application, comprising the steps of:
step S302, displaying an anti-peeping keyboard, wherein the keyboard comprises at least one input key;
step S304, indicating inputtable characters in the characters shown by the keyboard input keys;
step S306, receiving the click of the user on the input key in the keyboard;
step S308, acquiring the input information of the user based on the click of the user.
The method is used for a terminal device, and the method shown in fig. 3 will be described in detail below by taking a mobile phone as an example.
First, in step S302, a peep-proof keyboard including at least one input key is displayed.
In one embodiment, the user indicates to the mobile phone that the password is to be input by clicking a password input box, or the user indicates to the mobile phone that the password is to be input by clicking a predetermined button, by a predetermined gesture, by voice, or the like. Here, the password input request of the user is taken as an example for explanation, in the present application, the method is not limited to the privacy protection of the password of the user, but any privacy information of the user, such as the identification number, the account and the like of the user, may be protected from privacy protection, and is not limited herein. After receiving a password input request of a user, generating an anti-peeping keyboard in the mobile phone, and displaying the generated anti-peeping keyboard on a screen of the mobile phone.
In another embodiment, after the user indicates to the mobile phone that the password is to be input, the mobile phone turns on the camera to determine the number of faces around the mobile phone, and in the case that the mobile phone determines that the number of faces around the mobile phone is only 1, a conventional keyboard may be displayed. In the whole process of inputting the password by the user, the mobile phone continuously starts the camera to monitor the number of faces around the mobile phone, when the mobile phone finds that the number of faces around the mobile phone is more than 2 in the process of inputting the password by the user, the anti-peeping keyboard is automatically generated, and the conventional keyboard displayed on the screen of the mobile phone is switched into the anti-peeping keyboard.
An anti-peeping keyboard according to an embodiment of the present application includes, for example, n input keys, where n is a natural number greater than or equal to 1, where each input key shows at least two characters, and the at least two characters are both characters of predetermined n characters that can be input through the keyboard. The mobile phone prompts the user after displaying the keyboard which character of the at least two characters shown on each input key is the character which can be input through the input key.
Fig. 4 shows a schematic view of a peep-proof keyboard according to one embodiment of the present application. Assume that the password corresponding to the password input box is a numeric password, and thus, as shown in fig. 4, the anti-peeping keyboard includes, for example, 10 numeric keys. To generate the keypad of fig. 4, first, the processor in the handset determines, for each numeric key, the 3 numbers that will be shown on that key. For these 3 numbers, for example, the middle number on each key may be made the number at the corresponding position in the ordinary numeric keypad, and the left number and the right number on the key may be randomly determined. For example, for ten numbers 0-9, it may be determined randomly first which of the ten numeric keys in the keypad corresponds to, respectively, to determine the number to the left of each key, and then again to determine randomly which of the ten keys corresponds to, respectively, to determine the number to the right of each key. That is, the middle number on each key is a number arranged in a normal order, and the left and right numbers on each key are numbers arranged in a disordered order. It will be appreciated that the 3 digits on the numeric keys are not limited to including a normal sequence of digits, but may all be out of order. After determining the left, middle and right 3 numbers on each numeric key, the processor stores the corresponding left, middle and right 3 numbers of each numeric key in the memory, for example, in a table form.
As shown in fig. 4, the peep-proof keyboard further includes a prompt key for prompting a user which number on the number key is a number that can be input through the number key. For example, three prompt characters may be preset in the keyboard setting menu by the user with respect to the prompt key for showing one of the prompt characters on the prompt key. The three hinting characters can be a common phrase, for example, the three characters are "New year good". The user may also preset the correspondence of the three characters to the 3 numbers on each key in a setting, for example, it may be set that the leftmost character of the three characters corresponds to the left number on each key, the middle character corresponds to the middle number on each key, and the right character corresponds to the right number on each key. So that the user can be prompted by the prompt key which number on each key is the number that can be entered by the key. After determining the displayed number for each numeric key as described above, the processor may randomly determine which word of "New year" is displayed on the prompt key, e.g., determined to be "New", i.e., will show "New" on the prompt key of the keyboard, to prompt the user that the left-most digit on each key is the input digit. After determining that the prompt item shown on the prompt key is "new", the processor stores the current prompt item "new" of the prompt key in the memory.
Through the steps, a peep-proof keyboard as shown in fig. 4 is generated through the processor, and the keyboard is displayed on the touch screen of the mobile phone. As shown in fig. 4, the keypad includes a plurality of number keys, each of which includes 3 numbers, and among the 3 numbers on each key, the middle numbers are arranged in a normal order, and the left and right numbers are arranged in a scrambled order. In addition, the keyboard also comprises a prompt key, the prompt key is arranged at the lower left corner of the keyboard, and the prompt key displays the Chinese character 'New'.
It is to be understood that although the keyboard shown in fig. 4 is taken as an example to describe the peep-proof keyboard according to the embodiment of the present application, the peep-proof keyboard that can be provided by the embodiment of the present application is not limited to the keyboard shown in fig. 4. In one implementation, the peep-proof keyboard provided by the embodiment of the application can comprise a prompt key and at least one input key, wherein each input key of the at least one input key comprises at least two characters. In one implementation, the peep-proof keyboard provided by the embodiment of the present application may include a prompt key and a plurality of input keys, and at least two characters are displayed on at least one of the plurality of input keys, that is, the prompt key is only used for indicating the at least one of the plurality of input keys.
In step S304, an inputtable character among the characters shown by the keyboard input keys is instructed.
After displaying the keyboard as shown in fig. 4, "new" is displayed in the hint keys of the keyboard, and since the user previously set "new" to correspond to the left digit on each key, the user is instructed through the hint keys in the keyboard after displaying the keyboard, that is, the left digit in each key is the digit that can be input through the key.
It is to be understood that, although the description has been made above by way of example to show on the prompt key the content (e.g., "new") corresponding to the position of the first character inputtable by the input key to indicate the first character on the input key, the setting of the prompt key in the embodiment of the present application is not limited thereto as long as the content shown on the prompt key corresponds to the first character on the input key so as to indicate that the first character on the input key is a character inputtable by the input key. For example, in one embodiment, when the mobile phone touch screen detects that the user's finger is above an input key, the first character that can be input on the input key can be shown on the prompt key, thereby indicating to the user that the first character on the input key is an inputtable character.
Step S306, receiving the click of the user on the input key in the keyboard.
In one embodiment, the display screen of the mobile phone is a touch screen, and after the anti-peeping keyboard shown in fig. 4 is displayed on the touch screen, the user can determine the corresponding number key according to the password to be input, so as to directly click the number key on the touch screen. For example, the 1 st digit of the user password is 5, and the user searches for "5" on the left side of each key according to the indication of the prompt key, so that the key on the right side of the 1 st row in the keyboard can be determined to be the corresponding numeric key, and the user clicks the numeric key. After the user clicks, the mobile phone receives the click of the user on the right key in the row 1 through the touch screen.
Step S308, acquiring the input information of the user based on the click of the user.
The touch screen sends the signal to the processor after receiving a user click on the right key of row 1. The processor determines the left digit of the key as the real input information of the user based on the pre-stored prompt item 'new' of the prompt key, and determines the digit input by the user as '5' based on the pre-stored left, middle and right 3 digits 5, 3 and 9 of the key.
Thus, the user can receive the user's full password and perform subsequent processing by sequentially clicking on subsequent digits of their password similar to the above.
The above detailed description of the steps of the method shown in fig. 3 and the anti-peeping keyboard shown in fig. 4 are only one specific implementation of this embodiment, and are not intended to limit the scope of this embodiment, which may have many different implementations.
In one embodiment, a processor in the handset, when determining the ordinal number on each numeric key in order to generate the anti-peeping keyboard, causes the spacing between the position of each number and its regular display position to be less than or equal to a threshold spacing, for example, less than or equal to the spacing of one numeric key. Thus, when a user searches for a key for inputting a specific character, the user can quickly find the key for inputting the specific character with reference to the normal position of the specific character, that is, the key shows at least two characters including the specific character, and the specific character is a character that can be input through the key. Fig. 5 shows a peep-proof keyboard according to another embodiment. As shown in fig. 5, in the keypad, the middle numerals of each numeric key are arranged in a normal order, and the numerals on the right and left sides of each numeric key are sequentially scrambled, but the scrambled number is located at a distance equal to or less than the interval of one key from its regular position. For example, when the user finds a key for inputting "1" in the keyboard (at which time "new" is displayed on the hint key, for example), the user only needs to search among the regular position of "1" and the keys adjacent to the regular position, so that the key on the left side of the second row is quickly found as the key currently used for inputting "1". In one embodiment, when the peep-proof keyboard is generated in the mobile phone, the characters on the prompt keys can be randomly determined firstly, and then the numbers on the number keys can be determined. For example, after the character shown on the cue key is determined to be "new", that is, the left character on each numeric key is determined to be a character that can be input through the key, so that it is only necessary to make the interval between the position of each number and its regular display position equal to or less than the threshold interval when determining the left number on each numeric key, and it is not necessary to make the right number on each numeric key satisfy the definition.
In one embodiment, the number of the middle position of each number key may be highlighted by a size, color, thickness, etc., for example, the middle number is displayed to be larger, so that when a user finds a key for inputting a specific number with the number of the middle position as a reference position, the reference position may be determined more quickly, thereby finding a key for inputting a specific number more quickly. It will be appreciated that depending on the prompt shown on the prompt key, the number in the middle position on the input key may also be the number entered when the input key is clicked, i.e. the number in the middle position on the input key may also be the character that can be entered through the key.
In an embodiment, the peep-proof keyboard may not include a prompt key, and after receiving a password input request from a user, the mobile phone may prompt which number on the numeric key is the number that can be input through the numeric key by displaying a prompt information box, where the prompt information box usually disappears after displaying a preset time (generally a short time) on a screen, so as to achieve an effect of peep-proof. Similarly, three prompt characters may be preset in the setting by the user with respect to the prompt information box, for example, the three characters are "new year good". The user may also preset the correspondence of the three characters to the 3 numbers on each key in a setting, for example, it may be set that the leftmost character of the three characters corresponds to the left number on each key, the middle character corresponds to the middle number on each key, and the right character corresponds to the right number on each key. FIG. 6 shows a schematic diagram of a prompt information box according to another embodiment. As shown in fig. 6, unlike the keyboard shown in fig. 4, a keyboard including a prompt key is not displayed on the screen of the cellular phone, but a keyboard not including a prompt key is displayed on the screen, and then a prompt information box in which a character "new" is shown is popped up (as shown in the left side in fig. 6), which disappears after displaying, for example, 1 second, so that a complete numeric keypad is displayed on the screen (as shown in the right side in fig. 6). After seeing the prompt information box, the user determines the left number of each numeric key as the input number, so that the numeric keypad can be clicked accordingly as described in step S306 above.
In one embodiment, the 3 digits on the numeric keys are not differentiated by location as described above, but may be differentiated by other attributes, such as color, language, font, size, and the like. For example, 3 numbers on the numeric keys may be shown as greek, arabic, and roman numbers, respectively. Correspondingly, when setting the prompt key, the corresponding relationship between the three prompt characters of the prompt key and the respective attributes of the 3 numbers on each key can be preset. Fig. 7 shows a privacy protecting keypad according to another embodiment. In the keyboard, three numbers on each numeric key have three sizes of large, medium and small, and a prompt key is set in advance, new corresponds to the large number, year corresponds to the medium number, and good corresponds to the small number, so that a user can determine the corresponding key according to the characters displayed by the prompt key. It is to be understood that in the case where the numeric keys and the prompt keys are provided in this manner, the three numbers in the numeric keys are not necessarily arranged in the positional relationship of left, middle, and right, and the three numbers on the numeric keys may have an arbitrary positional relationship.
In one embodiment, the keyboard is not limited to a numeric keypad, but may be an alphanumeric keyboard, and each key on the keyboard is also not limited to displaying three characters, but may be 2 or 4, etc. Fig. 8 illustrates a privacy protecting keypad according to another embodiment. In the keyboard, 26 letter keys and a prompt key are included, wherein each letter key comprises 2 letters, one letter is a letter which can be input through the letter key, and the other letter is a letter which cannot be input through the letter key and is used for confusion. The keyboard may further include other keys that may be required for inputting a password, such as a number conversion key, a case conversion key, a delete key, etc., which may be provided as in a conventional keyboard and will not be described in detail herein. In this case, two optional characters such as "new year" may be preset for the tip key, and "new" may be preset to correspond to the left character and "year" to correspond to the right character. Thus, similarly, the user may determine the corresponding key based on the hint key when entering their password. That is, the number of selectable characters preset for the prompt key may be the same as the number of characters shown on the input key (letter key or numeric key), so that the prompt key includes selectable characters corresponding to the characters on the input key one to one.
In one embodiment, the display content on the cue key is not limited to three preset continuous characters, but other display content with relevance can be preset. For example, characters with different sizes (such as large, medium and small), different colors (such as red, yellow and blue), different patterns, different symbols and the like can be preset on the prompting key, and the user can be prompted by corresponding the content shown on the prompting key and the attribute of the character shown on the input key in the setting. For example, the red color shown on the prompt key corresponds to the number on the left side of the number key, the yellow color shown on the prompt key corresponds to the middle number of the number key, and the blue color shown on the prompt key corresponds to the number on the right side of the number key, so that when the blue color is displayed on the prompt key, for example, the user can know that the number on the right side of the number key is the input number. For another example, the large number characters shown on the prompt key correspond to the numbers on the left side of the numeric keys, the medium number characters shown on the prompt key correspond to the middle numbers of the numeric keys, and the small number characters shown on the prompt key correspond to the numbers on the right side of the numeric keys, so that when any characters of a small number are displayed on the prompt key, for example, a user can know that the numbers on the right side of the numeric keys are input numbers.
In one embodiment, a plurality of sets of reminder items may be preset for the reminder key, for example, "new year good" and red yellow blue may be preset, where the preset "new" and red color both correspond to the number on the left side of the numeric key, "year" and yellow color both correspond to the number in the middle of the numeric key, and "good" and blue color both correspond to the number on the right side of the numeric key. Therefore, when the user inputs for the first time, the mobile phone can prompt the user that the left number on the input key is the number which can be input through the input key by displaying 'new' in the prompt key, and after the user inputs for the first time, the mobile phone can change the display on the prompt key into yellow, so that the user is prompted that the middle number on the input key is the number which can be input through the input key. And a plurality of groups of prompt items are preset for the prompt keys, so that the peeping difficulty is further increased.
In one embodiment, the prompt key may also indicate the user using a combination of display attributes. For example, "new year is good" may be displayed on the tip key, and one of the characters (e.g., "year") may be displayed with a different attribute, such as "year" being displayed in a different color than "new" and "good", or "year" being displayed in a different character size than "new" and "good", or the like, thereby indicating to the user that the middle character on the input key is a character that can be input through the input key.
In one embodiment, the user may manually switch the content shown on the prompt key by clicking, long pressing, or applying a predetermined gesture (e.g., a left or right stroke) to the prompt key. For example, after clicking a hint key as shown in fig. 4, the user switches "new" on the hint key to "year" so that the middle number among the number keys becomes a number that can be input through the number key.
In one embodiment, after each click is performed in the process of inputting the password by the user, the mobile phone can replace characters on the prompt key so as to increase the password peeping difficulty. For example, after the user clicks the right key of row 1 to input "5" as described in step S306 above, the cellular phone changes the prompt key randomly to display "good" to indicate that the right number of the current numeric key is a number that can be input through the numeric key. The user for example wishes to enter the number "3" which finds the right-hand number "3" key as the middle key of the second row in the keyboard shown in fig. 4, and clicks this key to enter the number "3".
In one embodiment, after each click is performed in the process of inputting the password by the user, the mobile phone can replace 3 numbers on each number key so as to increase the password peeping difficulty.
In one implementation mode, the mobile phone can continuously open the camera to determine the number of faces around the mobile phone in the whole process of inputting the password by the user, when the number of the faces around the mobile phone is determined to be only 1 before the user starts inputting the password, the anti-peeping keyboard can not be displayed, only the conventional keyboard is displayed, and when the mobile phone finds that the number of the faces around the mobile phone is more than 2 in the process of inputting the password by the user, the keyboard can be automatically switched to the anti-peeping keyboard, so that the conventional keyboard can be provided in an unnecessary scene, and unnecessary inconvenience is avoided for the user to input the password. Optionally, keys, key combinations, gestures, voice controls, etc. for closing the keyboard may be preset in the peep-proof keyboard so that the user may actively switch to a conventional keyboard in a scene deemed unnecessary. Optionally, a key combination, a gesture, voice control and the like for starting the peep-proof keyboard can be preset in the conventional keyboard or the input page, so that the user can actively switch to the peep-proof keyboard in a scene deemed to be needed by the user.
In one embodiment, the method is used for a terminal device such as a notebook computer whose display screen is not a touch screen, in which case, after displaying a peep-proof keyboard on the screen, a user can click a corresponding key displayed on the screen through the keyboard of the notebook computer to input a password.
Fig. 9 illustrates a privacy protecting keypad according to another embodiment of the present application. As shown in fig. 9, the keyboard includes 26 letter keys, each of which shows two characters, the larger of which is the character in the normal order (i.e., qwerty 8230;), and the smaller of which is the character in the shuffle order. The mobile phone can inform the user in advance in its internal setting, for example, that the small characters on the letter keys are characters that can be input through the letter keys, so that when the keyboard shown in fig. 9 is displayed on the mobile phone screen, two characters of different sizes shown on each letter key indicate the user: the smaller characters on the letter keys are the characters that can be entered through the letter keys. Or, the mobile phone can flash any small character through the prompt information box after the keyboard is displayed so as to prompt that the current input character is a small character. The smaller character is sized so that it can only be seen by the owner in close proximity, and cannot or is difficult for a person nearby to recognize the smaller character. Thereby playing the effect of peeping prevention. For example, the size of the small word may be set to be 1/2, 1/3, etc. of the size of the large word.
In another implementation of this embodiment, the keyboard is a numeric keypad. Fig. 10 illustrates a privacy protecting keypad according to another embodiment. As shown in fig. 10, the keypad includes 10 numeric keys, each numeric key showing two numbers, the larger of which being the numbers arranged in a normal order and the smaller of which being the numbers arranged in a scrambled order. Similarly as in fig. 9, the smaller number is sized so that it is only seen by the owner in close proximity and cannot or is difficult for a nearby person to identify. Thereby playing the effect of peeping prevention. The keypad shown in fig. 10 includes a return key and a delete key in addition to the numeric keypad, and these keys may be provided as in the conventional numeric keypad and will not be described in detail herein.
In one embodiment, the letters that can be input through the letter key among the at least two letters shown on the letter key may be set in other ways, so that a person in the neighborhood cannot or hardly recognize the input letters. For example, letters or the like that can be input by the letter keys are displayed in a light color or a hollow font on the letter keys, and the above-described various modes may be used in combination. If the letters which can be input on the letter keys can be displayed to be small, light in color, hollowed out and the like, the peeping difficulty of others is further increased. Optionally, an adjusting button may be set in the peep-proof keyboard or an adjusting gesture for the keyboard may be preset by the mobile phone, so that the user can adjust the size, color, etc. of the small characters. For example, a gesture similar to zooming a picture can be set on the keyboard in the mobile phone, namely, sliding the keyboard out of the two fingers or sliding the keyboard in the two fingers, so that the user can zoom in or out of the small characters in the keyboard through the gesture. Optionally, the mobile phone may monitor the brightness of the screen, and automatically put characters in size, darken colors, and the like when the brightness of the screen is low, so that the user can find the corresponding key. Optionally, there is a setting option in the keyboard setting, so that the user can preset the font size, color shade, etc. on the keyboard.
In one embodiment, such as the keyboard shown in fig. 9 or 10, the small words on the input keys may disappear after being displayed multiple times periodically. Therefore, after the user reads the small characters, the small characters are not displayed any more, and the peeping difficulty is increased.
In one embodiment, such as in the keyboard shown in fig. 9, when determining out-of-order small words on each letter key when generating a peep-proof keyboard in a mobile phone, the interval between the position of each small word and its regular display position is less than or equal to a threshold interval, for example, less than or equal to an interval of 2 letter keys. Thus, the user can quickly find a key for inputting a specific character with reference to the regular position of the specific character when determining the key for inputting the specific character. For example, as shown in FIG. 9, the letters in the disorder order are all distributed around their regular display positions so that they can be found with reference to their regular display positions, e.g., if the user wishes to enter the letter "e", a search for the small word e is made from the larger "e" position and its vicinity on the keyboard so that the key where the small e is located (i.e., the adjacent key to the left of the key where the large e is located) can be found quickly.
In one embodiment, optionally, the mobile phone displays the small words in the position opposite to the finger and the position around the position (for example, the position of 2 letter keys or less apart from the position) on the screen without displaying other small words only when the screen senses the approach of the finger of the user, for example, when the vertical distance from the finger of the user to the screen is sensed to be 1cm or less. Fig. 11 illustrates a privacy protecting keypad according to another embodiment. When the user wishes to input the letter e, the user can point to the regular position of the letter e with a finger, i.e. the letter key including the characters e and q is pointed by the finger in the figure, and when the mobile phone senses that the finger is close to the letter key, the keyboard as shown in fig. 11 is displayed. In this keyboard, only the smaller letters and the larger letters are displayed in the eq letter keys and the letter keys that are spaced from the eq letter keys by a distance of 2 or less, and only the larger letters are displayed in the other letter keys. Thus, the user can find the letter key (i.e., the letter key including e and w) that can be used to input the letter e among the displayed small characters, and click the key to input the letter e. When the mobile phone detects that the fingers of the user leave the screen, the small characters displayed on the screen can disappear, and therefore the peeping prevention effect is achieved. It is to be understood that the detection of the user's finger is not limited herein, but may be performed on any input execution body used by the user to input characters, for example, an input device such as a stylus of the user. This embodiment is not limited to use with the keypad shown in fig. 11, for example, the keypad shown in fig. 5 may be similarly modified in that the numbers on the left side of all the number keys are no longer displayed as shown in fig. 5, but only when a finger of the user approaches a number key, the number key and the numbers on the left side of the number keys around it are displayed to further increase the difficulty of peeping.
In one embodiment, such as the keyboard shown in fig. 9, 10 or 11, the location layout of the small characters in the keyboard may be changed after each click is made during the password input process by the user, thereby increasing the difficulty of password peeking.
In an embodiment, the mobile phone may continuously turn on the camera to determine the number of faces around the mobile phone during the whole process of inputting the password by the user, when the mobile phone determines that the number of faces around the mobile phone is only 1 before the user starts inputting the password, the anti-peeping keyboard may not be displayed, but only the conventional keyboard is displayed, and when the mobile phone finds that more than 2 faces around the mobile phone during the process of inputting the password by the user, the keyboard may be automatically switched to the anti-peeping keyboard shown in fig. 9, 10 or 11, so that the conventional keyboard may be provided in an unnecessary scene, and unnecessary inconvenience for inputting the password by the user is avoided. Optionally, keys, key combinations, gestures, voice controls, etc. for closing the keyboard may be preset in the peep-proof keyboard so that the user may actively switch to a conventional keyboard in a scene deemed unnecessary. Optionally, a key combination, a gesture, a voice control and the like for starting the peep-proof keyboard can be preset in the conventional keyboard or the input page, so that the user can actively switch to the peep-proof keyboard in a scene deemed to be needed by the user.
Fig. 12 shows an input device 1200 according to an embodiment of the application, comprising:
a display unit 121 for displaying a keyboard including at least one input key, wherein each of the at least one input key shows at least two characters, which are both characters that can be input through the keyboard;
an indicating unit 122, configured to indicate a first character of the at least two characters;
a receiving unit 123 configured to receive a selection of any one of the at least one input key by a user;
an obtaining unit 124, configured to obtain the first character on the selected input key as input information of the user.
In an embodiment, the keyboard further includes a prompt key, the prompt key has a predetermined number of prompt items, the predetermined number of prompt items has a corresponding relationship with the at least two characters, and the indication unit 122 is further configured to indicate a first character of the at least two characters through a prompt item corresponding to the first character shown on the prompt key.
In one embodiment, the at least two characters are shown with different first attributes, and the predetermined number of prompt items have a corresponding relationship with the respective first attributes of the at least two characters, wherein the indicating unit 122 is further configured to: and indicating a first character of the at least two characters through a prompt item which is shown on the prompt key and corresponds to a first attribute of the first character.
In one embodiment, the first attribute is any one of: position, color, size, font, language.
In one embodiment, the apparatus 1200 further includes a first replacing unit 125 configured to replace the reminder item shown on the reminder key after receiving a user selection of any one of the at least one input key.
In one embodiment, the apparatus 1200 further includes a second replacing unit 126, configured to receive a predetermined operation of the prompt key by a user after the keyboard is displayed, and replace the prompt item shown on the prompt key based on the predetermined operation.
In an embodiment, the at least two characters are shown with different recognition difficulties, wherein the indicating unit 122 is further configured to indicate a first character of the at least two characters by showing the first character with a greater recognition difficulty.
In one embodiment, the different identification difficulties are obtained based on at least one of: character size, character color, character font.
In one embodiment, the apparatus 1200 is disposed based on a touch screen, the apparatus 1200 further includes a determining unit 127 configured to determine a distance between the input execution body of the user and any of the input keys based on the touch screen before displaying the keyboard, wherein the display unit 121 is further configured to display at least two characters on any of the input keys in a case that the distance between the input execution body of the user and any of the input keys is less than or equal to a first predetermined threshold.
In one embodiment, the indicating unit 122 is further configured to display a prompt information box with a predetermined number of prompt items, where the predetermined number of prompt items have a corresponding relationship with the at least two characters, and indicate a first character of the at least two characters through a prompt item corresponding to the first character shown in the prompt information box.
In one embodiment, the distance between the position of each of the at least one input key and the normal display position of the first character shown on that input key is less than or equal to a second predetermined threshold.
In one embodiment, the at least two characters shown on each of the at least one input key include a conventionally displayed character of the input key.
In one embodiment, the regular display characters are displayed in a highlighted form.
In one embodiment, the apparatus 1200 further includes a third replacing unit 128, configured to replace the first character shown on each of the input keys with another character after receiving a user selection of any one of the at least one input key.
Fig. 13 shows a mobile terminal 1300 according to the present application, comprising a display 131, a processor 132 and a memory 133,
wherein the memory 132 has stored therein program instructions;
the processor 133 is configured to execute the method of fig. 3 based on the display screen 131 according to program instructions stored in the memory 132.
The processor 132 is a control center of the mobile terminal, connects various parts of the entire mobile terminal by using various interfaces and lines, and executes the anti-peeping input method by running or executing software programs and/or modules stored in the memory 133 and calling data stored in the memory 133. Optionally, processor 132 may include one or more processing units. Preferably, the processor 132 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 132.
Memory 133 may be a volatile memory (RAM), such as a random-access memory (RAM); the memory 133 may also be a non-volatile memory (non-volatile memory), such as a read-only memory (ROM), a flash memory (flash memory), a hard disk (HDD) or a solid-state drive (SSD); the memory 133 may also comprise a combination of the above kinds of memories.
Although not shown, the mobile terminal may further include an input unit, a power supply, a sensor, a camera, a bluetooth module, an audio circuit, a USB module, and the like, which are not described herein again. In one embodiment, the display screen is a touch screen, i.e. the touch screen is an input unit even if the display unit is an input unit.
It is to be understood that the terms "first," "second," and the like, herein are used for ease of description only to distinguish similar concepts, and are not otherwise limited.
It will be further appreciated by those of ordinary skill in the art that the elements and algorithm steps of the various examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the various examples have been described in a functional generic sense in the foregoing description for the purpose of clearly illustrating the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (21)

1. An input method, the method being performed based on a touch screen, the method comprising:
displaying a keyboard, wherein the keyboard comprises at least one input key, each input key of the at least one input key corresponds to at least two characters, and the at least two characters are characters which can be input through the keyboard; wherein the at least one input key comprises a first input key and a second input key, wherein before the keyboard is displayed, the distance between the input execution body of the user and any one input key is determined based on the touch screen, when the distance between the input execution body of the user and the first input key is less than or equal to a first preset threshold value, and the distance between the input execution body of the user and the second input key is greater than the first preset threshold value, at least two characters are displayed on the first input key, and at least one character is not displayed on the second input key;
indicating a first character of the at least two characters;
receiving a user selection of any one of the at least one input key;
and acquiring the first character on the selected input key as input information of the user.
2. The method of claim 1, wherein the keyboard further comprises a prompt key, the prompt key has a predetermined number of prompt items, the predetermined number of prompt items have a corresponding relationship with the at least two characters, and wherein indicating a first character of the at least two characters comprises indicating the first character of the at least two characters through a prompt item shown on the prompt key corresponding to the first character.
3. The method of claim 2, wherein the at least two characters are shown with different first attributes, the predetermined number of prompt items have a corresponding relationship with the respective first attributes of the at least two characters, wherein indicating a first character of the at least two characters by the prompt item shown on the prompt key corresponding to the first character comprises: and indicating a first character of the at least two characters through a prompt item which is shown on the prompt key and corresponds to a first attribute of the first character.
4. The method of claim 3, wherein the first attribute is any one of: position, color, size, font, language.
5. The method of claim 2, further comprising, after receiving a user selection of any of the at least one input key, replacing a reminder item shown on the reminder key.
6. The method according to claim 2, further comprising, after displaying the keyboard, receiving a predetermined operation of the prompt key by a user, and replacing the prompt item shown on the prompt key based on the predetermined operation.
7. The method of claim 1, wherein the at least two characters are shown with different difficulty of recognition, wherein indicating a first character of the at least two characters comprises indicating a first character of the at least two characters by showing the first character with a greater difficulty of recognition.
8. The method of claim 7, the different identification difficulty being obtained based on at least one of: character size, character color, character font.
9. The method of claim 1, wherein indicating a first character of the at least two characters comprises displaying a prompt information box with a predetermined number of prompt items corresponding to the at least two characters for a preset time length, and indicating the first character of the at least two characters through the prompt item corresponding to the first character shown in the prompt information box.
10. The method of claim 1, wherein a distance between a position of each of the at least one input key and a normal display position of the first character shown on the input key is less than or equal to a second predetermined threshold.
11. The method of claim 10, wherein the at least two characters shown on each of the at least one input key include a conventionally displayed character of the input key.
12. The method of claim 11, wherein the regular display characters are displayed in a highlighted form.
13. The method of claim 1, further comprising, after receiving a user selection of any of the at least one input key, replacing a first character shown on the respective input key with another character.
14. A mobile terminal comprises a display screen, a processor and a memory, wherein the display screen is a touch screen;
wherein the memory has stored therein program instructions;
the processor is configured to perform the method according to any one of claims 1-13 according to program instructions stored in the memory.
15. An input device, comprising:
the display unit is used for displaying a keyboard, and the keyboard comprises at least one input key, wherein each input key of the at least one input key corresponds to at least two characters which are characters capable of being input through the keyboard; the at least one input key comprises a first input key and a second input key, wherein before the keyboard is displayed, the distance between an input execution body of a user and any input key is determined based on the touch screen, when the distance between the input execution body of the user and the first input key is smaller than or equal to a first preset threshold value, and the distance between the input execution body of the user and the second input key is larger than the first preset threshold value, at least two characters are displayed on the first input key, and at least one character is not displayed on the second input key;
the indicating unit is used for indicating a first character in the at least two characters;
a receiving unit for receiving a user selection of any one of the at least one input key;
and the acquisition unit is used for acquiring the first character on the selected input key as the input information of the user.
16. The apparatus according to claim 15, wherein the keyboard further comprises a prompt key, the prompt key has a predetermined number of prompt items, the predetermined number of prompt items have a corresponding relationship with the at least two characters, and the indicating unit is further configured to indicate a first character of the at least two characters through a prompt item shown on the prompt key corresponding to the first character.
17. The apparatus according to claim 16, wherein the at least two characters are shown with different first attributes, the predetermined number of prompts have a corresponding relationship with the respective first attributes of the at least two characters, and wherein the indicating unit is further configured to: and indicating a first character of the at least two characters through a prompt item which is shown on the prompt key and corresponds to a first attribute of the first character.
18. The apparatus of claim 15, wherein the at least two characters are shown with different recognition difficulties, and wherein the indicating unit is further configured to indicate a first character of the at least two characters by showing the first character with a greater recognition difficulty.
19. The apparatus according to claim 15, wherein the indicating unit is further configured to display a prompt information box in a preset time length, the prompt information box has a predetermined number of prompt items, the predetermined number of prompt items have a corresponding relationship with the at least two characters, and a first character of the at least two characters is indicated by a prompt item shown in the prompt information box and corresponding to the first character.
20. The apparatus of claim 15, wherein a distance between a position of each of the at least one input key and a normal display position of the first character shown on the input key is less than or equal to a second predetermined threshold.
21. The apparatus of claim 20, wherein the at least two characters shown on each of the at least one input key include a conventionally displayed character of the input key.
CN202010344038.6A 2020-04-27 2020-04-27 Input method, input device and mobile terminal Active CN111597592B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010344038.6A CN111597592B (en) 2020-04-27 2020-04-27 Input method, input device and mobile terminal
PCT/CN2021/080534 WO2021218452A1 (en) 2020-04-27 2021-03-12 Input method, input device and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010344038.6A CN111597592B (en) 2020-04-27 2020-04-27 Input method, input device and mobile terminal

Publications (2)

Publication Number Publication Date
CN111597592A CN111597592A (en) 2020-08-28
CN111597592B true CN111597592B (en) 2022-10-04

Family

ID=72190763

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010344038.6A Active CN111597592B (en) 2020-04-27 2020-04-27 Input method, input device and mobile terminal

Country Status (2)

Country Link
CN (1) CN111597592B (en)
WO (1) WO2021218452A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111597592B (en) * 2020-04-27 2022-10-04 华为技术有限公司 Input method, input device and mobile terminal
CN113703592A (en) * 2021-08-31 2021-11-26 维沃移动通信有限公司 Secure input method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103870154A (en) * 2014-02-10 2014-06-18 广东欧珀移动通信有限公司 Dialogue input and display device
CN104834449A (en) * 2015-05-28 2015-08-12 广东欧珀移动通信有限公司 Mobile terminal icon managing method and device
CN107145272A (en) * 2017-04-27 2017-09-08 努比亚技术有限公司 A kind of icon hiding display terminal and method
WO2019026722A1 (en) * 2017-08-01 2019-02-07 シャープ株式会社 Image processing device and control program

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070096946A1 (en) * 2003-04-14 2007-05-03 Jun-Sik Kim Information inputting system with a variable arrangement of keypad, and control method thereof
JP2008077159A (en) * 2006-09-19 2008-04-03 Sharp Corp Input device and electronic apparatus having the same
CN201773387U (en) * 2009-10-19 2011-03-23 华为终端有限公司 Mobile terminal
CN103186944A (en) * 2012-01-02 2013-07-03 杜建钢 Peeping-proof password input method
CN108229217A (en) * 2017-11-24 2018-06-29 西安电子科技大学 A kind of anti-peeping key input system and method
CN110532759A (en) * 2019-08-05 2019-12-03 西安电子科技大学 A kind of key input method that mobile phone is anti-peeping
CN111597592B (en) * 2020-04-27 2022-10-04 华为技术有限公司 Input method, input device and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103870154A (en) * 2014-02-10 2014-06-18 广东欧珀移动通信有限公司 Dialogue input and display device
CN104834449A (en) * 2015-05-28 2015-08-12 广东欧珀移动通信有限公司 Mobile terminal icon managing method and device
CN107145272A (en) * 2017-04-27 2017-09-08 努比亚技术有限公司 A kind of icon hiding display terminal and method
WO2019026722A1 (en) * 2017-08-01 2019-02-07 シャープ株式会社 Image processing device and control program

Also Published As

Publication number Publication date
WO2021218452A1 (en) 2021-11-04
CN111597592A (en) 2020-08-28

Similar Documents

Publication Publication Date Title
CN111399789B (en) Interface layout method, device and system
CN110839096B (en) Touch method of equipment with folding screen and folding screen equipment
CN112269527B (en) Application interface generation method and related device
KR102309296B1 (en) Mobile terminal and method for controlling the same
KR101659032B1 (en) Mobile terminal and control method thereof
CN111176504B (en) Interface element display method and electronic equipment
KR20220110314A (en) Card display method, electronic device and computer readable storage medium
CN113766064B (en) Schedule processing method and electronic equipment
CN112882777A (en) Split-screen display method and electronic equipment
CN110795007B (en) Method and device for acquiring screenshot information
CN111597592B (en) Input method, input device and mobile terminal
CN114065706A (en) Multi-device data cooperation method and electronic device
US20240086580A1 (en) Unlocking method and electronic device
CN114065312A (en) Component display method and electronic equipment
CN116028148B (en) Interface processing method and device and electronic equipment
EP4163774A1 (en) Prompting method and terminal device
CN112306314B (en) Interface display method and electronic equipment
US12008211B2 (en) Prompt method and terminal device
CN114173165B (en) Display method and electronic equipment
CN116841446A (en) Display method and foldable electronic device
CN113986406A (en) Method and device for generating scribble pattern, electronic equipment and storage medium
CN117170534A (en) Application information transfer method and terminal
CN116257201A (en) Content collaboration method, electronic device, and computer-readable storage medium
CN117762309A (en) Split screen display method and electronic equipment
CN117931332A (en) Folding screen display method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant