CN112035901B - Information input method, device, electronic equipment and medium - Google Patents

Information input method, device, electronic equipment and medium Download PDF

Info

Publication number
CN112035901B
CN112035901B CN202010916463.8A CN202010916463A CN112035901B CN 112035901 B CN112035901 B CN 112035901B CN 202010916463 A CN202010916463 A CN 202010916463A CN 112035901 B CN112035901 B CN 112035901B
Authority
CN
China
Prior art keywords
information
screen
input
virtual keyboard
type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010916463.8A
Other languages
Chinese (zh)
Other versions
CN112035901A (en
Inventor
宋征
邹仕洪
衣春雷
张广伟
黄浩东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuanxin Technology
Original Assignee
Yuanxin Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yuanxin Technology filed Critical Yuanxin Technology
Priority to CN202010916463.8A priority Critical patent/CN112035901B/en
Publication of CN112035901A publication Critical patent/CN112035901A/en
Application granted granted Critical
Publication of CN112035901B publication Critical patent/CN112035901B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04886Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus

Abstract

The embodiment of the application provides an information input method, an information input device, electronic equipment and a medium. The method comprises the following steps: when a trigger operation of an information input area for an application program is received in a first screen, determining an information type of information to be input currently in the information input area; if the information type is the first type, a first virtual keyboard is generated and displayed in a second screen, all keys of the first virtual keyboard are distributed in a random arrangement mode, and the first screen is in communication connection with the second screen; and acquiring first input information through the first virtual keyboard. The embodiment of the application realizes that the information input by the user is prevented from being acquired by decoding the coordinates and the sequence of the key of the user on the keyboard, thereby protecting the safety of the information.

Description

Information input method, device, electronic equipment and medium
Technical Field
The application relates to the technical field of mobile internet, in particular to an information input method, an information input device, electronic equipment and a medium.
Background
With the continuous development of mobile internet technology, electronic devices such as mobile terminals have become an indispensable tool in daily life and work of people. The user can input information into the electronic equipment, and the user can also receive information displayed by the electronic equipment, so that man-machine interaction is realized.
In the prior art, when a user inputs information into an electronic device, the user can input information into the electronic device by using a keyboard. When a user inputs information into the electronic device by using the keyboard, the user often needs to input important information such as account name, password information and the like, and lawless persons can acquire the important information input by the user by decoding the coordinates and the sequence of keys on the keyboard.
Therefore, how to protect the information input by the user from being obtained by lawbreakers becomes a critical issue.
Disclosure of Invention
The application provides an information input method, an information input device, electronic equipment and a medium, which can solve at least one technical problem.
In a first aspect, there is provided an information input method, the method comprising:
when a trigger operation of an information input area for an application program is received in a first screen, determining an information type of information to be input currently in the information input area;
if the information type is the first type, a first virtual keyboard is generated and displayed in a second screen, all keys of the first virtual keyboard are distributed in a random arrangement mode, and the first screen is in communication connection with the second screen;
and acquiring first input information through the first virtual keyboard.
In a second aspect, there is provided an information input apparatus comprising:
the determining module is used for determining the information type of the information to be input currently in the information input area when a trigger operation of the information input area of the application program is received in the first screen;
the generation display module is used for generating and displaying a first virtual keyboard in the second screen when the information type is the first type, wherein all keys of the first virtual keyboard are distributed in a random arrangement mode, and the first screen is in communication connection with the second screen;
the acquisition module is used for acquiring the first input information through the first virtual keyboard.
In a third aspect, an electronic device is provided, the electronic device comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more applications configured to: the operations corresponding to the information input method according to the first aspect are performed.
In a fourth aspect, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the information input method shown in the first aspect.
The technical scheme provided by the application has the beneficial effects that:
compared with the prior art, when the triggering operation of the information input area aiming at the application program is received in the first screen, the information type of the information to be input currently in the information input area is determined, if the information type is the first type, a first virtual keyboard is generated and displayed in the second screen, all keys of the first virtual keyboard are distributed in a random arrangement mode, the first screen is in communication connection with the second screen, and the first input information is acquired through the first virtual keyboard. When information is input in one screen, a virtual keyboard with keys arranged randomly and distributed is generated in the other screen, and the information is input through the virtual keyboard. Because the screen of the virtual keyboard is different from the screen for inputting information, and all keys in the virtual keyboard are arranged and distributed randomly, the information input by the user can be prevented from being acquired by decoding the coordinates and the sequence of the keys on the keyboard, so that the safety of the information is protected.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings that are required to be used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a schematic flow chart of an information input method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an information input area according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a virtual keyboard according to an embodiment of the present application;
FIG. 4 is a schematic diagram of another virtual keyboard according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an information input device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the application.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless expressly stated otherwise, as understood by those skilled in the art. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. The term "and/or" as used herein includes all or any element and all combination of one or more of the associated listed items.
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the embodiments of the present application will be described in further detail with reference to the accompanying drawings.
The following describes the technical scheme of the present application and how the technical scheme of the present application solves the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
The embodiment of the application provides an information input method which can be executed by a double-screen or multi-screen electronic device (which can be simply called as electronic device in the following embodiment), wherein the double-screen electronic device comprises two screens, and the multi-screen electronic device comprises at least three screens. The electronic device with two or more screens is provided with at least one processor, after the information received by any one screen can be processed by the at least one processor, the processing result is displayed in the screen or other screens, namely, each screen in the electronic device with two or more screens is connected through communication, and the physical distance between any two screens is not limited. For example, the electronic device may be a device having a folding screen, where the folding screen of the device corresponds to two screens after folding, in which case the two screens are physically separated by a short distance, or two screens of the electronic device may be two independent screens connected by wireless, in which case the two screens may be physically separated by a very long distance.
Fig. 1 to 3 show a schematic flow chart of an information input method provided by the embodiment of the present application, fig. 2 is a schematic diagram of an information input area provided by the embodiment of the present application, fig. 3 is a schematic diagram of a display virtual keyboard provided by the embodiment of the present application, and virtual arrows in fig. 2 and 3 indicate that a first screen and a second screen are connected through communication. The information input method includes steps S101 to S103.
Step S101 of determining an information type of information currently to be input in the information input area when a trigger operation for the information input area of the application is received in the first screen.
In the embodiment of the present application, the triggering mode of the triggering operation is not limited, for example, the triggering mode of the triggering operation may be a click operation, a long-press operation, a voice command, or the like.
In the embodiment of the present application, as shown in fig. 2, a first screen of an electronic device may display an information input area of an application program, and a user may trigger an operation for the information input area displayed on the first screen, where no virtual keyboard is present on both the first screen and the second screen. When the electronic device receives a trigger operation for the information input area in the first screen, the information type of the information to be input currently in the information input area can be determined.
The information input area is an area in which a user is prompted to input information, for example, an information input box of an instant messaging application, a search box of a browser application, or the like.
Step S102, if the information type is the first type, a first virtual keyboard is generated and displayed in the second screen.
Wherein, each button of first virtual keyboard is the random arrangement distribution, and first screen and second screen communication connection.
In the embodiment of the present application, as shown in fig. 3, if the information type is the first type, a first virtual keyboard is generated and displayed in the second screen. The first virtual keyboard may include at least one key of letter keys, number keys, symbol keys, text keys, expression keys, and the like, and each key may include at least one key, such as the first virtual keyboard in fig. 3, where the virtual keyboard includes letter keys and number keys.
The size of each key in the first virtual keyboard is set randomly, and the size of a certain type of key can be set to be the same, the size of each key can be set to be the same, and the size of each key can be set to be different, which is not limited herein. The keys in the first virtual keyboard are randomly arranged and distributed, such as the first virtual keyboard in fig. 3, and the letter keys and the number keys are randomly distributed.
The size of each key of the first virtual keyboard is set randomly, and the keys are distributed in a random arrangement mode, so that the information input by a user can be obtained by decoding the coordinates and the sequence of the keys of the user on the keyboard, and the safety of the information is protected.
In another possible implementation, the first type includes any of the following:
user account information, password information corresponding to the user account, and contact information of the user.
The user account information may be a login account when the application program is logged in, etc.; the password information corresponding to the user account number can be a login password when logging in the application program, a payment password when paying a bill, and the like; the contact information of the user can be an identity card number, a mobile phone number, a mailbox address and the like.
And aiming at the application program in the first screen, if the information type of the information to be input currently in the information input area of the application program is the first type, generating and displaying a first virtual keyboard in the second screen.
For example, for a video class application in a first screen, the display interface of the video class application is as shown in fig. 2, and the information input area is displayed only in the first screen, and no display content is displayed in the second screen. When a trigger operation for the information input area is received in the first screen and the information type of the information to be input currently in the information input area is determined to be a login account, a first virtual keyboard may be generated and displayed in the second screen as shown in fig. 3, so that a login account is input through the first virtual keyboard.
It should be noted that the information type may be an information type configured according to actual application requirements, and in the embodiment of the present application, the information type or a division manner of the first type is not limited, for example, the first type may not include any one or any several of user account information, password information corresponding to the user account, and contact information of the user, and/or the first type may also include other information types.
Step S103, obtaining first input information through a first virtual keyboard.
In the embodiment of the application, the user can input information through the first virtual keyboard in the second screen, namely, the user inputs the first input information through the first virtual keyboard in the second screen.
After the electronic device obtains the first input information, the first input information may be directly displayed in the information input area of the first screen.
After the electronic equipment acquires the first input information, the electronic equipment can also detect whether the first input information is accurate, and if the first input information is accurate, the next operation is executed; if the first input information is inaccurate, generating prompt information, and displaying the prompt information on the first screen or the second screen or any other screen except the first screen and the second screen.
Compared with the prior art, when the triggering operation of the information input area aiming at the application program is received in the first screen, the information type of the information to be input currently in the information input area is determined, if the information type is the first type, a first virtual keyboard is generated and displayed in the second screen, all keys of the first virtual keyboard are distributed in a random arrangement mode, the first screen is in communication connection with the second screen, and the first input information is acquired through the first virtual keyboard. When information is input in one screen, a virtual keyboard with keys arranged randomly and distributed is generated in the other screen, and the information is input through the virtual keyboard. Because the screen of the virtual keyboard is different from the screen for inputting information, and all keys in the virtual keyboard are arranged and distributed randomly, the information input by the user can be prevented from being acquired by decoding the coordinates and the sequence of the keys on the keyboard, so that the safety of the information is protected.
Another possible implementation manner of the embodiment of the present application, the method further includes step S104 to step S105. Wherein, step S104-step S105 may be performed after step S101.
Step S104, if the information type is the second type, a second virtual keyboard is generated and displayed in the first screen or the second screen.
Wherein, each button of the second virtual keyboard is distributed according to a preset button arrangement mode.
In the embodiment of the present application, if the information type of the information to be input currently in the information input area in the first screen is the second type, as shown in fig. 4, a second virtual keyboard may be generated and displayed in the first screen, and fig. 4 is a schematic diagram of another virtual keyboard displayed in the embodiment of the present application, or a second virtual keyboard may be generated and displayed in the second screen. Wherein the virtual arrow in fig. 4 indicates that the first screen and the second screen are connected by communication.
Wherein the second type may be other types than the first type.
For example, for a video-type application in the first screen, when the information type of the information currently to be input in the information input area is search video information or movie and comment information, at this time, a second virtual keyboard may be generated and displayed in the first screen or the second screen to input the video information or the movie and comment information through the second virtual keyboard.
It should be noted that the second virtual keyboard may include at least one key of letter keys, number keys, symbol keys, text keys, expression keys, etc., and each key may include at least one key, such as the second virtual keyboard in fig. 4, where the virtual keyboard includes letter keys and number keys.
The size of each key in the second virtual keyboard is set randomly, and the size of a certain type of key can be set to be the same, the size of each key can be set to be the same, and the size of each key can be set to be different, which is not limited herein.
Each key in the second virtual keyboard is distributed according to a preset key arrangement mode, so that convenience in inputting information by a user is ensured. The preset key arrangement manner may include arrangement of the number keys according to a size sequence, arrangement of the letter keys according to a sequence in an alphabet, and the like, or the preset key arrangement manner may be arrangement of numbers and letters in the physical keyboard, such as the second virtual keyboard in fig. 4, where arrangement of each letter key and each number key is consistent with arrangement of the physical keyboard.
When the electronic device is provided with the physical keyboard, if the information type is the second type, the second virtual keyboard may not be generated, and the user may input information by using the physical keyboard; when the electronic device is provided with at least three screens, the second virtual keyboard may be displayed in the first screen, or the second screen, or any other screen other than the first screen and the second screen.
Step S105, obtaining second input information through the second virtual keyboard.
In the embodiment of the application, the user can input information through the second virtual keyboard in the first screen or the second screen, namely, the user can input the second input information through the second virtual keyboard in the first screen or the second screen, or the user can input information through the physical keyboard, namely, the user can input the second input information through the physical keyboard.
After the electronic device obtains the second input information, the second input information may be directly displayed in the information input area of the first screen.
After the electronic equipment acquires the second input information, the electronic equipment can also detect whether the second input information is accurate, and if the second input information is accurate, the next operation is executed; if the second input information is inaccurate, generating prompt information, and displaying the prompt information on the first screen or the second screen or any other screen except the first screen and the second screen.
In another possible implementation manner of the embodiment of the present application, in step S102, if the information type is the first type, generating and displaying the first virtual keyboard in the second screen may include:
and if the information type is the first type and the application program is the application program in the preset white list, generating and displaying a first virtual keyboard in the second screen.
In the embodiment of the application, the first virtual keyboard and the second virtual keyboard can be virtual keyboards in an input method application program respectively, and when a user triggers the operation for the information input area in the application program, the application program can determine the information type of the information to be input currently in the information input area. If the information type is the first type, the application program calls an input method type application program of the first virtual keyboard, and the first virtual keyboard is generated and displayed in the second screen; and if the information type is the second type, the application program calls an input method type application program of the second virtual keyboard, and the first virtual keyboard is generated and displayed in the first screen or the second screen.
In this case, the user may control, by means of the whitelist, whether the application program may call the input method application program of the first virtual keyboard, if the whitelist includes the application program, the application program may call the input method application program of the first virtual keyboard, and if the whitelist does not include the application program, the application program may not call the input method application program of the first virtual keyboard. The method has the advantages that the application programs in the white list can call the input method application programs of the first virtual keyboard, the first virtual keyboard is generated and displayed in the second screen, and therefore the malicious application programs are prevented from acquiring and decoding the coordinates and the sequence of the user when the user presses keys on the first virtual keyboard.
The first virtual keyboard and the second virtual keyboard may also be two virtual keyboards in the input method class application program. When a user triggers an operation for an information input area in an application program, the application program calls an input method type application program, and the input method type application program determines the information type of the information to be input currently in the information input area. If the information type is the first type, generating a first virtual keyboard in the second screen and displaying the first virtual keyboard; and if the information type is the second type, generating and displaying a second virtual keyboard in the first screen or the second screen.
In this case, the user may control whether the application may call the input method class application by means of a white list. If the white list comprises an application program, the application program can call the input method application program; if the white list does not include the application program, the application program can not call the input method type application program. Therefore, the application program in the white list can call the input method type application program, and when the input method type application program determines that the information type is the first type, a first virtual keyboard is generated and displayed in the second screen, so that the malicious program can be effectively prevented from acquiring and decoding the coordinates and the sequence of a user when the user presses a key on the first virtual keyboard.
In actual situations, besides the above two situations, the first virtual keyboard and the second virtual keyboard may also be two virtual keyboards of an application program of the information input area, which is not limited in this embodiment of the present application.
In another possible implementation manner of the embodiment of the present application, in step S102, if the information type is the first type, before generating and displaying the first virtual keyboard in the second screen, the method may further include:
displaying a verification input area in response to a trigger operation; authentication information input for the authentication input area is received.
In the embodiment of the application, when a trigger operation for an information input area of an application program is received in a first screen, a verification input area is generated and displayed in the first screen or a second screen in response to the trigger operation. If the electronic device has at least three screens, the verification input area may be displayed in any one of the other screens except the first screen and the second screen.
The authentication input area may be an area in which authentication information is input, and the authentication information may be fingerprint information, face information, symbol information, track information, digital information, or the like.
Correspondingly, in step S102, if the information type is the first type, a first virtual keyboard is generated and displayed in the second screen, which may include:
if the information type is the first type and the input verification information is consistent with the preset verification information, a first virtual keyboard is generated and displayed in the second screen.
In the embodiment of the application, at least one piece of verification information is preset in the electronic equipment. If the information type is the first type and the input verification information is consistent with one of the preset at least one verification information, generating a virtual keyboard in the second screen and displaying the virtual keyboard; if the information type is the first type and the input verification information is inconsistent with each preset verification information, the first virtual keyboard is not generated and displayed in the second screen. The method and the device have the advantages that the user with preset verification information uses the first virtual keyboard, and illegal users are prevented from inputting information such as login accounts, login passwords and the like through the first virtual keyboard, so that the illegal users are prevented from acquiring relevant data of the application program.
In another possible implementation manner of the embodiment of the present application, in step S103, the obtaining, by the first virtual keyboard, the first input information may specifically include:
recording the association relation between the screen coordinates of each key on the first virtual keyboard and the corresponding character information; receiving the operation of a user on a key on a second screen through the second screen, acquiring screen coordinate data of the key aimed by the operation, and encrypting the screen coordinate data; acquiring encrypted screen coordinate data and decrypting; determining input character information by using the decrypted screen coordinate data and the association relation; the first input information is determined using the entered character information.
In the embodiment of the application, for any key in the first virtual keyboard, the association relationship between the screen coordinates of the key and the character information corresponding to the key is recorded in the electronic device, wherein the key can be rectangular or circular. When the key is rectangular, the screen coordinates of the key can be two vertex coordinates of opposite angles of the rectangle, or three vertex coordinates, or four vertex coordinates, or one vertex coordinate, two-side length data and the like; when the key is round, the screen coordinates can be center coordinates, radius data and the like.
For example, when the letter key a in the electronic device is a rectangle, and the screen coordinates of the letter key a are two vertex coordinates (90, 90), (100 ) opposite to the rectangle, the electronic device may record the association relationship between the letter key a and the screen coordinates (90, 90), (100 ) of the letter key.
When a user operates a key on a first virtual keyboard in a second screen, screen coordinate data of the key aimed at by the operation is obtained in real time, for example, when the user clicks a key a, a key 1 and a key b on the first virtual keyboard in the second screen in sequence, the screen coordinate data of the key a, the screen coordinate data of the key 1 and the screen coordinate data of the key b are obtained in real time, that is, the electronic device can obtain three screen coordinate data in real time.
The electronic device may encrypt any screen coordinate data acquired, for example, when the electronic device acquires the screen coordinate data (95, 95), the screen coordinate data (95, 95) is encrypted as (20, 20). By encrypting the screen coordinate data, a malicious application program can be prevented from acquiring and decoding the original screen coordinate data to obtain information input by a user, so that information security is protected.
The encrypted screen coordinate data may be stored in a preset storage space, and when the encrypted screen coordinate data needs to be processed, for example, when the first input information is displayed, the encrypted screen coordinate data needs to be processed, the encrypted screen coordinate data is obtained from the preset storage space and decrypted, and the input character information is determined by using the decrypted screen coordinate data and the association relationship between the screen coordinates recorded with each key and the corresponding character information.
For example, the encrypted (20, 20) may be stored in a memory, when the encrypted screen coordinate data needs to be processed, the encrypted screen coordinate data is obtained (20, 20) from the memory and decrypted into (95, 95), and the electronic device may determine (95, 95) that the electronic device is located in a rectangular area formed by the screen coordinates (90, 90), (100 ) by using (95, 95) and the association relationship between the screen coordinates of each key and the corresponding character information, wherein the association relationship includes the association relationship between the letter key a and the screen coordinates (90, 90), (100 ), so that the input character information may be determined to be a.
Further, when the first input information is determined using the input character information, the input character information may be used as the first input information, for example, when the input character information is a1b, a1b may be used as the first input information, or information obtained by performing code conversion on the input character information may be used as the first input information, for example, when the input character information is wen, information "text" obtained by performing code conversion on wen may be used as the first input information.
In another possible implementation manner of the embodiment of the present application, step S103, that is, obtaining the first input information through the first virtual keyboard, may further include:
encrypting the first input information; the encrypted first input information is displayed in the information input area.
In the embodiment of the application, the first input information can be encrypted, and the encrypted first input information is displayed in the information input area in the first screen, so that peepers are prevented from peeping the information displayed in the first screen, or lawbreakers are prevented from acquiring the information input by a user by intercepting the information displayed in the first screen, and the information security is effectively protected.
In the embodiment of the application, the first input information before encryption can be displayed in the second screen, so that a user can conveniently check the information input by the user, and the accuracy of the input information is verified.
The above-mentioned method steps specifically illustrate the information input method, and the information input device is described below from the viewpoint of the virtual module, specifically as follows:
an embodiment of the present application provides an information input device, as shown in fig. 5, the information input device 50 may include: a determination module 501, a generation display module 502, and an acquisition module 503, wherein,
a determining module 501, configured to determine, when a trigger operation for an information input area of an application program is received in a first screen, an information type of information to be currently input in the information input area.
And the generation display module 502 is configured to generate and display a first virtual keyboard on the second screen when the information type is the first type, where each key of the first virtual keyboard is distributed in a random arrangement, and the first screen is communicatively connected with the second screen.
The obtaining module 503 is configured to obtain first input information through the first virtual keyboard.
In another possible implementation manner of the embodiment of the present application, the generating display module 502 is further configured to generate and display a second virtual keyboard on the first screen or the second screen when the information type is the second type, where each key of the second virtual keyboard is distributed according to a preset key arrangement manner.
The obtaining module 503 is further configured to obtain second input information through a second virtual keyboard.
In another possible implementation manner of the embodiment of the present application, when the information type is the first type, the generating display module 502 is specifically configured to, when generating and displaying the first virtual keyboard in the second screen:
and when the information type is the first type and the application program is the application program in the preset white list, generating and displaying a first virtual keyboard in the second screen.
In another possible implementation manner of the embodiment of the present application, the information input device 50 may further include:
and the response module is used for responding to the triggering operation to display the verification input area.
And the receiving module is used for receiving the verification information input for the verification input area.
The generation display module 502 is specifically configured to, when the information type is the first type, generate and display the first virtual keyboard in the second screen:
and when the information type is the first type and the input verification information is consistent with the preset verification information, generating and displaying a first virtual keyboard in the second screen.
In another possible implementation manner of the embodiment of the present application, when the obtaining module 503 obtains the first input information through the first virtual keyboard, the obtaining module is specifically configured to:
recording the association relation between the screen coordinates of each key on the first virtual keyboard and the corresponding character information;
receiving the operation of a user on a key on a second screen through the second screen, acquiring screen coordinate data of the key aimed by the operation, and encrypting the screen coordinate data;
acquiring encrypted screen coordinate data and decrypting;
determining input character information by using the decrypted screen coordinate data and the association relation;
the first input information is determined using the entered character information.
In another possible implementation of the embodiment of the present application, the information input device 50 may include an encryption display module, wherein,
the encryption display module is used for encrypting the first input information; the encrypted first input information is displayed in the information input area.
Another possible implementation of an embodiment of the present application, the first type includes any of the following:
user account information, password information corresponding to the user account, and contact information of the user.
The information input device of this embodiment may execute the information input method according to any of the above embodiments of the present application, and its implementation principle is similar, and will not be described here again.
Compared with the prior art, when the triggering operation of the information input area aiming at the application program is received in the first screen, the information type of the information to be input currently in the information input area is determined, if the information type is the first type, a first virtual keyboard is generated and displayed in the second screen, all keys of the first virtual keyboard are distributed in a random arrangement mode, the first screen is in communication connection with the second screen, and the first input information is acquired through the first virtual keyboard. When information is input in one screen, a virtual keyboard with keys arranged randomly and distributed is generated in the other screen, and the information is input through the virtual keyboard. Because the screen of the virtual keyboard is different from the screen for inputting information, and all keys in the virtual keyboard are arranged and distributed randomly, the information input by the user can be prevented from being acquired by decoding the coordinates and the sequence of the keys on the keyboard, so that the safety of the information is protected.
The information input device of the present application is described above in terms of a virtual module, and the electronic apparatus of the present application is described below in terms of a physical device.
An embodiment of the present application provides an electronic device, as shown in fig. 6, an electronic device 4000 shown in fig. 6 includes: a processor 4001 and a memory 4003. Wherein the processor 4001 is coupled to the memory 4003, such as via a bus 4002. Optionally, the electronic device 4000 may also include a transceiver 4004. It should be noted that, in practical applications, the transceiver 4004 is not limited to one, and the structure of the electronic device 4000 is not limited to the embodiment of the present application.
The processor 4001 may be a CPU, general purpose processor, DSP, ASIC, FPGA or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various exemplary logic blocks, modules and circuits described in connection with this disclosure. The processor 4001 may also be a combination that implements computing functionality, e.g., comprising one or more microprocessor combinations, a combination of a DSP and a microprocessor, etc.
Bus 4002 may include a path to transfer information between the aforementioned components. Bus 4002 may be a PCI bus or an EISA bus, or the like. The bus 4002 can be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in fig. 6, but not only one bus or one type of bus.
The memory 4003 may be, but is not limited to, ROM or other type of static storage device that can store static information and instructions, RAM or other type of dynamic storage device that can store information and instructions, EEPROM, CD-ROM or other optical disk storage, optical disk storage (including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.), magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
The memory 4003 is used for storing application program codes for executing the inventive arrangements, and is controlled to be executed by the processor 4001. The processor 4001 is configured to execute application program codes stored in the memory 4003 to realize what is shown in any of the foregoing method embodiments.
The embodiment of the application provides an electronic device, which comprises: a memory and a processor; at least one program stored in the memory for execution by the processor, which when executed by the processor, performs: when a triggering operation of an information input area aiming at an application program is received in a first screen, determining the information type of information to be input currently in the information input area, if the information type is a first type, generating a first virtual keyboard in a second screen and displaying the first virtual keyboard, wherein all keys of the first virtual keyboard are distributed in a random arrangement mode, the first screen is in communication connection with the second screen, and the first input information is acquired through the first virtual keyboard. When information is input in one screen, a virtual keyboard with keys arranged randomly and distributed is generated in the other screen, and the information is input through the virtual keyboard. Because the screen of the virtual keyboard is different from the screen for inputting information, and all keys in the virtual keyboard are arranged and distributed randomly, the information input by the user can be prevented from being acquired by decoding the coordinates and the sequence of the keys on the keyboard, so that the safety of the information is protected.
The electronic apparatus of the present application is described above in terms of a physical device, and the computer-readable storage medium of the present application is described below in terms of a storage medium.
Embodiments of the present application provide a computer-readable storage medium having a computer program stored thereon, which when run on a computer, causes the computer to perform the corresponding method embodiments described above. Compared with the prior art, when the triggering operation of the information input area aiming at the application program is received in the first screen, the information type of the information to be input currently in the information input area is determined, if the information type is the first type, a first virtual keyboard is generated and displayed in the second screen, all keys of the first virtual keyboard are distributed in a random arrangement mode, the first screen is in communication connection with the second screen, and the first input information is acquired through the first virtual keyboard. When information is input in one screen, a virtual keyboard with keys arranged randomly and distributed is generated in the other screen, and the information is input through the virtual keyboard. Because the screen of the virtual keyboard is different from the screen for inputting information, and all keys in the virtual keyboard are arranged and distributed randomly, the information input by the user can be prevented from being acquired by decoding the coordinates and the sequence of the keys on the keyboard, so that the safety of the information is protected.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
The foregoing is only a partial embodiment of the present application, and it should be noted that it will be apparent to those skilled in the art that modifications and adaptations can be made without departing from the principles of the present application, and such modifications and adaptations are intended to be comprehended within the scope of the present application.

Claims (10)

1. An information input method, characterized by comprising:
when a trigger operation of an information input area aiming at an application program is received in a first screen, determining the information type of information to be input currently in the information input area;
if the information type is the first type, a first virtual keyboard is generated and displayed in a second screen, all keys of the first virtual keyboard are distributed in a random arrangement mode, the sizes of all keys in the first virtual keyboard are set randomly, and the first screen is in communication connection with the second screen;
acquiring first input information through the first virtual keyboard;
the obtaining, by the first virtual keyboard, the first input information specifically includes:
receiving key operation of a user on a first virtual keyboard in the second screen through the second screen, acquiring screen coordinate data of keys aimed by the operation, and encrypting the screen coordinate data;
acquiring encrypted screen coordinate data and decrypting;
and determining the first input information according to the decrypted screen coordinate data.
2. The method as recited in claim 1, further comprising:
if the information type is the second type, generating and displaying a second virtual keyboard in the first screen or the second screen, wherein all keys of the second virtual keyboard are distributed according to a preset key arrangement mode;
and acquiring second input information through the second virtual keyboard.
3. The method of claim 1, wherein if the information type is a first type, generating and displaying a first virtual keyboard in a second screen comprises:
and if the information type is the first type and the application program is the application program in the preset white list, generating and displaying a first virtual keyboard in the second screen.
4. A method according to any one of claims 1 to 3, wherein if the information type is a first type, generating and displaying a first virtual keyboard in a second screen, further comprising:
displaying a verification input area in response to the triggering operation;
receiving verification information input for the verification input area;
and if the information type is the first type, generating and displaying a first virtual keyboard in a second screen, wherein the method comprises the following steps of:
if the information type is the first type and the input verification information is consistent with the preset verification information, a first virtual keyboard is generated and displayed in the second screen.
5. The method of claim 1, wherein said determining said first input information from decrypted screen coordinate data comprises:
recording the association relation between the screen coordinates of each key on the first virtual keyboard and the corresponding character information;
determining input character information by using the decrypted screen coordinate data and the association relation;
and determining the first input information by using the input character information.
6. The method of claim 1, wherein the obtaining, by the first virtual keyboard, the first input information further comprises:
encrypting the first input information;
and displaying the encrypted first input information in the information input area.
7. The method of claim 1, wherein the first type comprises any one of:
user account information, password information corresponding to the user account, and contact information of the user.
8. An information input device, comprising:
the information input module is used for receiving a trigger operation of an information input area of an application program in a first screen and determining the information type of information to be input currently in the information input area;
the generation display module is used for generating and displaying a first virtual keyboard in a second screen when the information type is a first type, wherein all keys of the first virtual keyboard are distributed in a random arrangement mode, the sizes of all keys in the first virtual keyboard are set randomly, and the first screen is in communication connection with the second screen;
the acquisition module is used for acquiring first input information through the first virtual keyboard;
the obtaining, by the first virtual keyboard, the first input information specifically includes:
receiving key operation of a user on a first virtual keyboard in the second screen through the second screen, acquiring screen coordinate data of keys aimed by the operation, and encrypting the screen coordinate data;
acquiring encrypted screen coordinate data and decrypting;
and determining the first input information according to the decrypted screen coordinate data.
9. An electronic device, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more applications configured to: the information input method according to any one of claims 1 to 7 is performed.
10. A computer-readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the information input method of any one of claims 1 to 7.
CN202010916463.8A 2020-09-03 2020-09-03 Information input method, device, electronic equipment and medium Active CN112035901B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010916463.8A CN112035901B (en) 2020-09-03 2020-09-03 Information input method, device, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010916463.8A CN112035901B (en) 2020-09-03 2020-09-03 Information input method, device, electronic equipment and medium

Publications (2)

Publication Number Publication Date
CN112035901A CN112035901A (en) 2020-12-04
CN112035901B true CN112035901B (en) 2023-09-12

Family

ID=73591913

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010916463.8A Active CN112035901B (en) 2020-09-03 2020-09-03 Information input method, device, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN112035901B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101374149A (en) * 2008-09-19 2009-02-25 中国民生银行股份有限公司 Method and system for preventing cipher from being stolen
KR101122197B1 (en) * 2011-06-03 2012-03-20 목포대학교산학협력단 Method of displaying virtual keypad for preventing the leaking of information
CN102629164A (en) * 2012-02-28 2012-08-08 中兴通讯股份有限公司 Multi-point touch equipment, information display method and application processing device
CN202443525U (en) * 2012-03-07 2012-09-19 山东大学 Password stealing preventive system for automatic teller machine of bank
CN103403647A (en) * 2010-10-01 2013-11-20 Flex Electronics ID Co.,Ltd. Keyboard filling one screen or spanning multiple screens of a multiple screen device
CN103679448A (en) * 2013-11-29 2014-03-26 天地融科技股份有限公司 Password inputting method and password inputting system
CN107479822A (en) * 2017-09-08 2017-12-15 维沃移动通信有限公司 A kind of data inputting method and terminal
CN111338555A (en) * 2020-02-19 2020-06-26 上海闻泰电子科技有限公司 Method, device, equipment and storage medium for realizing input through virtual keyboard

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5584802B2 (en) * 2012-07-06 2014-09-03 シャープ株式会社 Information processing apparatus, information processing apparatus control method, control program, and computer-readable recording medium
US11199965B2 (en) * 2016-12-29 2021-12-14 Verizon Patent And Licensing Inc. Virtual keyboard

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101374149A (en) * 2008-09-19 2009-02-25 中国民生银行股份有限公司 Method and system for preventing cipher from being stolen
CN103403647A (en) * 2010-10-01 2013-11-20 Flex Electronics ID Co.,Ltd. Keyboard filling one screen or spanning multiple screens of a multiple screen device
KR101122197B1 (en) * 2011-06-03 2012-03-20 목포대학교산학협력단 Method of displaying virtual keypad for preventing the leaking of information
CN102629164A (en) * 2012-02-28 2012-08-08 中兴通讯股份有限公司 Multi-point touch equipment, information display method and application processing device
CN202443525U (en) * 2012-03-07 2012-09-19 山东大学 Password stealing preventive system for automatic teller machine of bank
CN103679448A (en) * 2013-11-29 2014-03-26 天地融科技股份有限公司 Password inputting method and password inputting system
CN107479822A (en) * 2017-09-08 2017-12-15 维沃移动通信有限公司 A kind of data inputting method and terminal
CN111338555A (en) * 2020-02-19 2020-06-26 上海闻泰电子科技有限公司 Method, device, equipment and storage medium for realizing input through virtual keyboard

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Research on Interaction Technologies in Desktop Virtual Maintenance System of Certain Weapon;Liu Pengyuan等;《2011 International Conference on Virtual Reality and Visualization》;第267-270页 *

Also Published As

Publication number Publication date
CN112035901A (en) 2020-12-04

Similar Documents

Publication Publication Date Title
US11194892B2 (en) Authentication method and system
EP3183681B1 (en) Accessing a secured software application
KR101878149B1 (en) Device, system, and method of secure entry and handling of passwords
CN108769027B (en) Secure communication method, device, mobile terminal and storage medium
US20160127134A1 (en) User authentication system and method
US20140098141A1 (en) Method and Apparatus for Securing Input of Information via Software Keyboards
CN104239804A (en) Data protecting method and device
JP2009514077A (en) Method and apparatus for securely entering password or PIN by scrolling mouse wheel
US20190377863A1 (en) Password input method, computer device and storage medium
EP2936277B1 (en) Method and apparatus for information verification
CN108880791A (en) Cryptographic key protection method, terminal and computer readable storage medium
AU2016269267A1 (en) Encoding methods and systems
US20210044558A1 (en) Methods and systems for email verification
CN111709007A (en) User authentication method, device and equipment
CN115277143A (en) Data secure transmission method, device, equipment and storage medium
CN112199661A (en) Privacy protection-based equipment identity processing method, device and equipment
CN106685945B (en) Service request processing method, service handling number verification method and terminal thereof
KR101267229B1 (en) Method and system for authenticating using input pattern
Gandhi et al. Advanced online banking authentication system using one time passwords embedded in QR code
CN113032753B (en) Identity verification method and device
CN110336669B (en) Information encryption method and device and electronic equipment
US10845990B2 (en) Method for executing of security keyboard, apparatus and system for executing the method
CN112035901B (en) Information input method, device, electronic equipment and medium
US20140143858A1 (en) Processing arrangement and a method for processing information in a machine-to-human communications interface
KR101648779B1 (en) Method for secure text input in information terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant