CN112230813A - Information input method and device, storage medium and electronic equipment - Google Patents

Information input method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN112230813A
CN112230813A CN202011114809.9A CN202011114809A CN112230813A CN 112230813 A CN112230813 A CN 112230813A CN 202011114809 A CN202011114809 A CN 202011114809A CN 112230813 A CN112230813 A CN 112230813A
Authority
CN
China
Prior art keywords
scale
user
selector
character
mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011114809.9A
Other languages
Chinese (zh)
Inventor
刘振超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Original Assignee
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Topsec Technology Co Ltd, Beijing Topsec Network Security Technology Co Ltd, Beijing Topsec Software Co Ltd filed Critical Beijing Topsec Technology Co Ltd
Priority to CN202011114809.9A priority Critical patent/CN112230813A/en
Publication of CN112230813A publication Critical patent/CN112230813A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/0485Scrolling or panning

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application relates to the technical field of information security, and provides an information input method, an information input device, a storage medium and electronic equipment. The information input method comprises the following steps: when a trigger instruction is detected, generating a character selection interface, wherein the character selection interface comprises a scale mark and a scale selector symbol, a plurality of scales are distributed on the scale mark, and each scale corresponds to one character; and responding to the operation of a user to enable the scale selector to select one scale, and inputting characters corresponding to the selected scale in the information input box. This application is through arranging each character in on each scale of scale mark to utilize a scale selector symbol to select the scale on the scale mark, adopt the mode of selecting the scale to realize the selection to the character, this kind of scheme need not use the keyboard can input information, thereby effectively avoids the problem that keyboard input information is monitored.

Description

Information input method and device, storage medium and electronic equipment
Technical Field
The invention relates to the technical field of information security, in particular to an information input method, an information input device, a storage medium and electronic equipment.
Background
With the development of internet technology, the importance of information security is increasingly highlighted. Identity authentication is a prerequisite for the use of asset devices, and generally requires inputting credentials of a user identity, such as a username and password, through a keyboard to achieve authentication of the user identity and access authorization of services, and the credentials are often targets of attack of attackers. At present, a keyboard monitoring and information stealing technology becomes a main security threat faced by current internet users, and an attacker can easily intercept and intercept messages input through a keyboard through malicious codes such as a keyboard recorder and a trojan horse program.
In order to prevent an attacker from stealing a password input by a user, the current adopted method is as follows: (1) input information is transmitted in a disordered or encrypted mode through a computer security keyboard suite, but the mode has high requirements on hardware conditions of equipment, security keyboard suite hardware needs to be configured for each piece of equipment independently, security keyboard software needs to be installed, and enterprise cost is increased; (2) the complete password is input for multiple times, so that the keyboard recorder cannot acquire the complete password content at one time, but an attacker still has the possibility of acquiring the complete password after monitoring for multiple times, and the security is low.
Disclosure of Invention
An object of the embodiments of the present application is to provide an information input method, an information input apparatus, a storage medium, and an electronic device, so as to solve the above technical problems.
In order to achieve the above purpose, the present application provides the following technical solutions:
in a first aspect, an embodiment of the present application provides an information input method, including: when a trigger instruction is detected, generating a character selection interface, wherein the character selection interface comprises a scale mark and a scale selector symbol, a plurality of scales are distributed on the scale mark, and each scale corresponds to one character; and responding to the operation of a user to enable the scale selector to select one scale, and inputting characters corresponding to the selected scale in the information input box.
According to the technical scheme, each character is associated with one scale on the scale mark, the scales on the scale mark are selected by using the scale selector, the character is selected by adopting a scale selection mode, the keyboard is not needed to be used for inputting information, and therefore the problem that the keyboard is monitored when the information is input is effectively avoided. Moreover, a series of hardware configurations are not required to be additionally arranged, and the cost is controllable.
In an alternative embodiment, said causing said scale selector to select said scale in response to user manipulation comprises: and responding to the first dragging operation of the user to control the scale mark to move correspondingly, so that one scale on the scale mark is selected by the scale selector.
In the scheme, the position of the scale selector is fixed, the scale mark is movable, a user can drag the scale mark to move the scale mark, and an attacker can not acquire the semantics of the path information even if the attacker intercepts the path information because the dragged path information is input by the user, so that the safety of the input information is enhanced to a great extent.
In an optional embodiment, the responding to the first drag operation of the user to control the scale mark to perform corresponding movement includes: acquiring fingerprint information of a user; and comparing the fingerprint information with a plurality of fingerprints in a fingerprint database, if the comparison is passed, acquiring a first dragging operation of a user, and responding to the first dragging operation to control the scale mark to move correspondingly.
In the scheme, by comparing the fingerprint information of the user with a plurality of fingerprints preset in the fingerprint library, the input of information by irrelevant personnel can be avoided, and particularly for the operation and maintenance of network equipment, non-operation and maintenance personnel can be prevented from logging in asset equipment after learning a password through other ways.
In an alternative embodiment, said causing said scale selector to select said scale in response to user manipulation comprises: and responding to a second dragging operation of the user to control the scale selector symbol to move correspondingly, so that the scale selector symbol selects one scale on the scale mark.
In an alternative embodiment, said causing said scale selector to select said scale in response to user manipulation comprises: and responding to the clicking operation of the user on any scale on the scale mark to control the clicked scale on the scale mark to move towards the direction of the scale selector, so that the clicked scale on the scale mark is selected by the scale selector.
In an optional embodiment, the method further comprises: when an operation and maintenance instruction of a device to be operated and maintained is received, judging whether the operation and maintenance mode of the device to be operated and maintained belongs to semi-automatic operation and maintenance or manual operation and maintenance; and if the operation and maintenance mode of the equipment to be operated and maintained is semi-automatic operation and maintenance or manual operation and maintenance, determining that the trigger instruction is detected.
When a certain operation and maintenance person operates and maintains a certain asset device, the account and the password of the asset device can be input by the information input method in the application for the semi-automatic operation and maintenance or manual operation and maintenance device, so that the safety of the account and the password is guaranteed.
In an alternative embodiment, after the information input box inputs the character corresponding to the selected scale, the method further includes: and disordering the characters corresponding to each scale on the scale mark.
Because the position of each character on the scale mark is changed after one character is input every time, the position of each character on the character selection interface is changed, an attacker cannot compare multiple input operations of the user to obtain a complete password, and the safety of input information can be further enhanced.
In a second aspect, an embodiment of the present application provides an information input device, including: the interface generating module is used for generating a character selecting interface when a triggering instruction is detected, wherein the character selecting interface comprises a scale mark and a scale selector symbol, a plurality of scales are distributed on the scale mark, and each scale corresponds to one character; and the character selection module is used for responding to the operation of a user to enable the scale selector to select one scale, and inputting characters corresponding to the selected scale in the information input box.
In a third aspect, an embodiment of the present application provides a storage medium, where a computer program is stored on the storage medium, and when the computer program is executed by a processor, the method according to any one of the first aspect and the optional implementation manner of the first aspect is performed.
In a fourth aspect, an embodiment of the present application provides an electronic device, including: a processor; a memory coupled to the processor and storing machine readable instructions executable by the processor; when the electronic device is running, the processor executes the machine-readable instructions to implement the method according to any one of the first aspect and the optional implementation manner of the first aspect.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and that those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
Fig. 1 is a flowchart illustrating an information input method provided by an embodiment of the present application;
FIG. 2 is a simplified diagram of a character selection interface in an embodiment of the present application;
FIG. 3 shows a map before and after a first drag operation on the scale of FIG. 2;
FIG. 4 shows a map before and after a second drag operation on the scale selector in FIG. 2;
FIG. 5 is a schematic diagram of an information input device provided by an embodiment of the present application;
fig. 6 shows a schematic diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element. The terms "first," "second," "third," and the like are used solely to distinguish one from another and are not to be construed as indicating or implying relative importance.
The embodiment of the application provides an information input method, and the method is characterized in that each character is placed on each scale of a scale mark, the scales on the scale mark are selected by using a scale selector, and the selection of the character is realized by adopting a scale selection mode. Specifically, referring to fig. 1, the information input method includes:
step 110: when a trigger instruction is detected, a character selection interface is generated and comprises a scale mark and a scale selector symbol, wherein a plurality of scales are distributed on the scale mark, and each scale corresponds to one character.
When a trigger instruction is detected, a character selection interface is generated, so that a user can input information such as an account number, a password and the like through the character selection interface. The character selection interface comprises a scale mark and a scale selector symbol, a plurality of scales are distributed on the scale mark, each scale corresponds to one character, and the scale selector symbol is used for selecting each scale on the scale mark and further selecting the characters on the scales. Fig. 2 is a simple schematic diagram of a character selection interface in the embodiment of the present application, and for convenience of illustration, only a part of characters are shown in fig. 2, it should be understood that, in practical applications, scales on a scale mark of the character selection interface will be more, and correspondingly, corresponding characters will also be more, and characters corresponding to the scale mark on the scale mark include, but are not limited to, common characters, special characters, and numbers. In this embodiment, the scale selector symbol may be an arrow symbol, a triangle symbol, or any other symbol.
Step 120: and responding to the operation of the user to enable the scale selector to select one scale on the scale mark, and inputting characters corresponding to the selected scale in the information input box.
In one embodiment, the scale selector has a fixed position and the scale is movable, and the user can operate the scale to move the scale, and the plurality of scales on the scale move along with the scale during the movement of the scale, so that the scales above the scale selector are changed continuously. Specifically, in this embodiment, step 120 includes: and responding to the first dragging operation of the user to control the scale mark to move correspondingly, so that one scale on the scale mark is selected by the scale selector symbol. Fig. 3 shows a comparison between before and after the first drag operation is performed on the scale in fig. 2, and referring to fig. 3, the character initially located by the scale selector is "J", and then, in response to the first drag operation performed on the scale by the user, the scale moves in the direction of the first drag operation, for example, if the first drag operation by the user is a right drag operation, the scales on the scale move together to the right, and the right character moves to the leftmost side after moving to the rightmost side. As can be seen in FIG. 3, in response to a first drag operation by the user on the scale, the scale selector symbol selects the scale corresponding to the character "S". Then, the character "S" is input into the information input box.
The user inputs each character in the password code into the information input box in sequence by performing the first dragging operation for a plurality of times.
In a specific implementation manner, a user may complete a first dragging operation through a mouse, for example, the user clicks a scale through the mouse, the mouse starts dragging while keeping a click state, the scale moves along with the direction of dragging the mouse, until the mouse is released, the scale stops moving, and the currently pointed scale is selected by the scale selector. The user can also finish the first dragging operation on the touch display screen, the character selection interface is displayed on the touch display screen, the user finger touches the touch display screen to select the scale mark, the finger keeps a touch state to start dragging, the scale mark moves along with the direction dragged by the finger, the scale mark stops moving until the finger is released, and the scale mark selected by the scale selector selects the currently indicated scale.
In addition, the user can complete the first dragging operation in an operation area, and the operation area can sense the operations of the user such as touch, movement and the like and acquire the fingerprint information of the user when the user touches the operation area. Specifically, the step of responding to the first dragging operation of the user to control the scale mark to move correspondingly includes: acquiring fingerprint information of a user, comparing the fingerprint information with a plurality of fingerprints in a fingerprint library, if the comparison is passed, acquiring a first dragging operation of the user, and responding to the first dragging operation to control a scale mark to move correspondingly.
When a finger of a user touches a certain position of the operation area, fingerprint information of the user is obtained, whether the user belongs to a legal user allowed to input information or not is judged according to the obtained fingerprint information, if the same fingerprint is found in the fingerprint library, the user is a legal user, and the user is allowed to perform first dragging operation. The user can use the touched position as an initial position, the finger moves towards a certain direction, the first dragging operation is started, after the first dragging operation of the user is obtained, the scale mark moves along the direction of the first dragging operation until the finger of the user releases, the response of the first dragging operation is completed, the scale selected at the moment of the scale selector is determined, and the corresponding character is obtained. Optionally, if the comparison fails, that is, the same fingerprint is not found in the fingerprint library, the user is an illegal user, and the user is not allowed to perform the first dragging operation.
It is understood that the above steps of acquiring the fingerprint information of the user and comparing the fingerprint information with the fingerprint database may be performed only when the user inputs a first character, and if at least one character is already input in the information input box, the first dragging operation of the user may be directly responded.
In the above embodiment, by comparing the fingerprint information of the user with a plurality of fingerprints preset in the fingerprint library, it is possible to avoid inputting information by irrelevant personnel, and especially for operation and maintenance of network equipment, it is possible to prevent non-operation and maintenance personnel from logging in asset equipment after learning a password through other ways.
For each large enterprise, the security of the network device is crucial, in order to manage large-scale network devices, many enterprises begin to introduce an operation and maintenance security management system, generally, the operation and maintenance security management system provides a single sign-on function to facilitate operation and maintenance of multiple devices by operation and maintenance personnel, and the operation and maintenance personnel can log in the asset device for operation and maintenance only by inputting an account and a password of the asset device on a page, but if password information is acquired by an attacker, unexpected loss may be caused. Through the technical scheme, an attacker cannot capture the password input by the operation and maintenance personnel through the keyboard recorder, so that the problems can be avoided to the greatest extent.
Further, when a certain operation and maintenance person operates and maintains a certain asset device (the asset device is referred to as a device to be operated and maintained), the operation and maintenance person gives an operation and maintenance instruction for the device to be operated and maintained, for example, clicks an operation and maintenance button, and after the operation and maintenance instruction is obtained, whether the operation and maintenance mode of the device to be operated and maintained belongs to semi-automatic operation and maintenance or manual operation and maintenance is judged; and if the operation and maintenance mode of the equipment to be operated and maintained is semi-automatic operation and maintenance or manual operation and maintenance, determining that a trigger instruction is detected, and then generating a character selection interface so that an operation and maintenance person can input an account and a password corresponding to the equipment to be operated and maintained in an information input box. For semi-automatic operation and maintenance equipment, an operation and maintenance worker operates the scale marks or the scale selector symbols to enable the scale selector symbols to sequentially select different scales so as to input corresponding characters until the input of the password is completed. For the manual operation and maintenance equipment, the operation and maintenance personnel sequentially complete the input of the account number and the password by operating the scale marks or the scale selector symbols.
After a password input by a user or an account and the password are obtained, the input information is encrypted by using an encryption technology to obtain encrypted data, the encrypted data is transmitted to a background server, the background server receives the encrypted data and then decrypts the encrypted data, and a corresponding login script is called to log in corresponding equipment. If the login is successful, the operation and maintenance personnel can operate and maintain the equipment, if the login is unsuccessful, the operation and maintenance personnel return to the login interface, and a character selection interface is popped up, so that the user can input information again.
After judging whether the operation and maintenance mode of the device to be operated and maintained belongs to semi-automatic operation and maintenance or manual operation and maintenance, if the operation and maintenance mode of the device to be operated and maintained does not belong to semi-automatic operation and maintenance or manual operation and maintenance but belongs to automatic operation and maintenance, the operation and maintenance personnel do not need to input a password, single sign-on can be directly carried out according to a preset account number and the password, the problem that the password is intercepted and intercepted does not exist, and the embodiment does not discuss the situation.
Further to step 120, in another embodiment, the position of the scale marker is fixed, the scale selector is movable, and the user can operate the scale selector to move the scale selector, wherein the scale pointed above the scale selector is changed continuously during the movement of the scale selector. Specifically, in this embodiment, step 120 includes: and responding to the second dragging operation of the user to control the scale selector symbol to move correspondingly, so that the scale selector symbol selects one scale on the scale mark. Fig. 4 shows a comparison between before and after the second drag operation is performed on the scale selector in fig. 2, and referring to fig. 4, the character at which the scale selector is initially positioned is "J", and then, in response to the second drag operation performed on the scale selector by the user, the scale selector is moved in the direction of the second drag operation, for example, if the second drag operation by the user is a left drag, the scale selector will also be moved to the left. As can be seen from fig. 4, after responding to the second drag operation of the scale selector by the user, the scale selector selects the scale corresponding to the character "a". Thus, the character "a" is input into the information input box.
Optionally, after step 120, that is, after inputting the character corresponding to the scale selected by the scale selector into the information input box, the method further includes: and (4) disordering the characters corresponding to each scale on the scale mark. In the process of sequentially inputting each character in the password code to the information input box, after responding to the operation of the scale mark or the scale selector and inputting one selected character each time, the position of each character on the scale mark is randomly changed, and when a user operates the scale mark or the scale selector next time, the scale mark or the scale selector is operated according to the new position of the character.
In the technical scheme, a user inputs information by dragging the scale marks or the scale selector symbols, and an attacker cannot acquire the semantics even if detecting the input action because the input information is mouse information or touch information and the like, so that the safety of the input information is enhanced to a great extent. Moreover, the positions of the characters on the scale marks are changed after one character is input every time, so that the positions of the characters on the character selection interface are changed, an attacker cannot compare multiple input operations of the user to obtain a complete password, and the safety of input information can be further enhanced.
Further to step 120, in another embodiment, the scale is movable and the position of the scale selector is fixed. Specifically, step 120 includes: and responding to the clicking operation of the user on any scale on the scale mark to control the scale mark to move towards the direction of the scale selector, so that the clicked scale on the scale mark is selected by the scale selector. The user can click a certain scale on the scale mark to complete the clicking operation, in the process of responding to the clicking operation, the clicked scale on the scale mark automatically moves towards the direction of the scale selector symbol, all scales on the whole scale mark move together, the clicked scale finally stops at the position pointed by the scale selector symbol, and the clicked scale is selected by the scale selector symbol.
Further to step 120, in another embodiment, the position of the scale is fixed and the scale selector is movable. Specifically, step 120 includes: and responding to the clicking operation of the user on any scale on the scale mark to control the scale selector symbol to move towards the clicked scale, so that the scale selector symbol selects the scale mark clicked on the scale mark. The user can click a certain scale on the scale mark to complete the clicking operation, and in the process of responding to the clicking operation, the scale selector symbol automatically moves to the clicked scale on the scale mark and stops at the position pointing to the clicked scale, so that the clicked scale is selected.
It is understood that, in some embodiments, both the scale mark and the scale selector symbol are active, and the user may drag the scale mark and the scale selector symbol at will, and after obtaining a confirmation indication from the user, determine the scale currently selected by the scale selector symbol on the scale mark. The confirmation instruction is used for indicating that the operation on the scale mark and the scale selector is completed at this time.
In summary, the information input method provided by the embodiment of the application can be used for preventing information monitoring when a user inputs information, and a series of hardware configurations are not required to be additionally added, so that the usability of software can be enhanced, and the operation cost of enterprises can be reduced. Moreover, the scale selector symbol or the scale mark is operated, so that the scale selector symbol selects the scale on the scale mark, the character is input, the operation complexity is improved, and the information input mode is safer compared with the prior art.
Based on the same inventive concept, an embodiment of the present application provides an information input device, please refer to fig. 5, the device includes: an interface generation module 210 and a character selection module 220.
The interface generating module 210 is configured to generate a character selection interface when a trigger instruction is detected, where the character selection interface includes a scale mark and a scale selector, where the scale mark is distributed with multiple scales, and each scale corresponds to one character.
The character selection module 220 is configured to select one of the scales in response to a user operation, and input a character corresponding to the selected scale in the information input box.
Optionally, the character selection module 220 is specifically configured to: and responding to the first dragging operation of the user to control the scale mark to move correspondingly, so that one scale on the scale mark is selected by the scale selector.
Optionally, the character selection module 220 is specifically configured to: acquiring fingerprint information of a user; and comparing the fingerprint information with a plurality of fingerprints in a fingerprint database, if the comparison is passed, acquiring a first dragging operation of a user, and responding to the first dragging operation to control the scale mark to move correspondingly.
Optionally, the character selection module 220 is specifically configured to: and responding to a second dragging operation of the user to control the scale selector symbol to move correspondingly, so that the scale selector symbol selects one scale on the scale mark.
Optionally, the character selection module 220 is specifically configured to: and responding to the clicking operation of the user on any scale on the scale mark to control the clicked scale on the scale mark to move towards the direction of the scale selector, so that the clicked scale on the scale mark is selected by the scale selector.
Optionally, the apparatus further comprises: the operation and maintenance mode judging module is used for judging whether the operation and maintenance mode of the equipment to be operated and maintained belongs to semi-automatic operation and maintenance or manual operation and maintenance or not when receiving the operation and maintenance instruction of the equipment to be operated and maintained; and if the operation and maintenance mode of the equipment to be operated and maintained is semi-automatic operation and maintenance or manual operation and maintenance, determining that the trigger instruction is detected.
Optionally, the apparatus further comprises: and the character position scrambling module is used for scrambling the characters corresponding to each scale on the scale mark.
The information input device provided by the embodiment of the present application, the implementation principle and the generated technical effects thereof have been introduced in the foregoing method embodiments, and for the sake of brief description, portions of the device embodiments that are not mentioned may refer to corresponding contents in the method embodiments.
Fig. 6 shows a possible structure of an electronic device 300 provided in an embodiment of the present application. Referring to fig. 6, the electronic device 300 includes: a processor 310, a memory 320, and a communication interface 330, which are interconnected and in communication with each other via a communication bus 340 and/or other form of connection mechanism (not shown).
The Memory 320 includes one or more (Only one is shown in the figure), which may be, but not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), an electrically Erasable Programmable Read-Only Memory (EEPROM), and the like. The processor 310, as well as possibly other components, may access, read, and/or write data to the memory 320.
The processor 310 includes one or more (only one shown) which may be an integrated circuit chip having signal processing capabilities. The processor 310 may be a general-purpose processor, and includes a Central Processing Unit (CPU), a Micro Control Unit (MCU), a Network Processor (NP), or other conventional processors; or a special-purpose processor, including a Graphics Processing Unit (GPU), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, and a discrete hardware component. Also, when there are a plurality of processors 310, some of them may be general-purpose processors, and the other may be special-purpose processors.
Communication interface 330 includes one or more (only one shown) that may be used to communicate directly or indirectly with other devices for the purpose of data interaction. Communication interface 330 may include an interface to communicate wired and/or wireless. Communication interface 330 may be used to send encrypted data to a backend server.
One or more computer program instructions may be stored in memory 320 and read and executed by processor 310 to implement the information input methods provided by the embodiments of the present application, as well as other desired functions.
It will be appreciated that the configuration shown in fig. 6 is merely illustrative and that electronic device 300 may include more or fewer components than shown in fig. 6 or have a different configuration than shown in fig. 6. The components shown in fig. 6 may be implemented in hardware, software, or a combination thereof. The electronic device 300 may be a physical device, such as a PC, a laptop, a tablet, a mobile phone, a server, an embedded device, etc., or may be a virtual device, such as a virtual machine, a virtualized container, etc. The electronic device 300 is not limited to a single device, and may be a combination of a plurality of devices or a cluster including a large number of devices.
The embodiment of the present application further provides a computer-readable storage medium, where computer program instructions are stored on the computer-readable storage medium, and when the computer program instructions are read and executed by a processor of a computer, the information input method provided in the embodiment of the present application is executed. The computer-readable storage medium may be implemented as, for example, memory 320 in electronic device 300 in FIG. 6.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the unit is only a logical division, and other divisions may be realized in practice. Furthermore, the functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The above description is only an example of the present application and is not intended to limit the scope of the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. An information input method, comprising:
when a trigger instruction is detected, generating a character selection interface, wherein the character selection interface comprises a scale mark and a scale selector symbol, a plurality of scales are distributed on the scale mark, and each scale corresponds to one character;
and responding to the operation of a user to enable the scale selector to select one scale, and inputting characters corresponding to the selected scale in the information input box.
2. The method of claim 1, wherein said causing the scale selector to select one of the scales in response to user manipulation comprises:
and responding to the first dragging operation of the user to control the scale mark to move correspondingly, so that one scale on the scale mark is selected by the scale selector.
3. The method of claim 2, wherein said responding to a first drag operation by a user to control a corresponding movement of said scale mark comprises:
acquiring fingerprint information of a user;
and comparing the fingerprint information with a plurality of fingerprints in a fingerprint database, if the comparison is passed, acquiring a first dragging operation of a user, and responding to the first dragging operation to control the scale mark to move correspondingly.
4. The method of claim 1, wherein said causing the scale selector to select one of the scales in response to user manipulation comprises:
and responding to a second dragging operation of the user to control the scale selector symbol to move correspondingly, so that the scale selector symbol selects one scale on the scale mark.
5. The method of claim 1, wherein said causing the scale selector to select one of the scales in response to user manipulation comprises:
and responding to the clicking operation of the user on any scale on the scale mark to control the clicked scale on the scale mark to move towards the direction of the scale selector, so that the clicked scale on the scale mark is selected by the scale selector.
6. The method of claim 1, further comprising:
when an operation and maintenance instruction of a device to be operated and maintained is received, judging whether the operation and maintenance mode of the device to be operated and maintained belongs to semi-automatic operation and maintenance or manual operation and maintenance;
and if the operation and maintenance mode of the equipment to be operated and maintained is semi-automatic operation and maintenance or manual operation and maintenance, determining that the trigger instruction is detected.
7. The method according to any one of claims 1-6, wherein after the information input box enters a character corresponding to the selected scale, the method further comprises:
and disordering the characters corresponding to each scale on the scale mark.
8. An information input device, comprising:
the interface generating module is used for generating a character selecting interface when a triggering instruction is detected, wherein the character selecting interface comprises a scale mark and a scale selector symbol, a plurality of scales are distributed on the scale mark, and each scale corresponds to one character;
and the character selection module is used for responding to the operation of a user to enable the scale selector to select one scale, and inputting characters corresponding to the selected scale in the information input box.
9. A storage medium, having stored thereon a computer program which, when executed by a processor, performs the method according to any one of claims 1-7.
10. An electronic device, comprising:
a processor;
a memory coupled to the processor and storing machine readable instructions executable by the processor;
the processor executes the machine-readable instructions when the electronic device is running to implement the method of any of claims 1-7.
CN202011114809.9A 2020-10-16 2020-10-16 Information input method and device, storage medium and electronic equipment Pending CN112230813A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011114809.9A CN112230813A (en) 2020-10-16 2020-10-16 Information input method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011114809.9A CN112230813A (en) 2020-10-16 2020-10-16 Information input method and device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN112230813A true CN112230813A (en) 2021-01-15

Family

ID=74118729

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011114809.9A Pending CN112230813A (en) 2020-10-16 2020-10-16 Information input method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN112230813A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008059173A (en) * 2006-08-30 2008-03-13 Fujitsu Ltd Authentication method
US20090322692A1 (en) * 2008-06-25 2009-12-31 Samsung Electronics Co., Ltd. Character input apparatus and character input method
US20110221685A1 (en) * 2010-03-11 2011-09-15 Jeffery Theodore Lee Device, Method, and Graphical User Interface for Performing Character Entry
CN103425944A (en) * 2013-07-16 2013-12-04 深圳市文鼎创数据科技有限公司 Information safety input method and information safety device
KR101388843B1 (en) * 2012-10-25 2014-04-23 인하대학교 산학협력단 User authentication method using vibration indicator
CN104020944A (en) * 2014-05-27 2014-09-03 广州视源电子科技股份有限公司 Data input method based on sliding block
CN104463037A (en) * 2014-09-26 2015-03-25 湖南科技大学 Password input method and device
TW201635130A (en) * 2015-03-27 2016-10-01 和丞數碼資訊有限公司 Password entry method, portable electronic device, and nonstationary storage medium
CN107368206A (en) * 2017-07-28 2017-11-21 深圳增强现实技术有限公司 A kind of method and mobile intelligent terminal for inputting information
CN110489977A (en) * 2019-07-01 2019-11-22 维沃移动通信有限公司 A kind of method of controlling operation thereof and terminal

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008059173A (en) * 2006-08-30 2008-03-13 Fujitsu Ltd Authentication method
US20090322692A1 (en) * 2008-06-25 2009-12-31 Samsung Electronics Co., Ltd. Character input apparatus and character input method
US20110221685A1 (en) * 2010-03-11 2011-09-15 Jeffery Theodore Lee Device, Method, and Graphical User Interface for Performing Character Entry
KR101388843B1 (en) * 2012-10-25 2014-04-23 인하대학교 산학협력단 User authentication method using vibration indicator
CN103425944A (en) * 2013-07-16 2013-12-04 深圳市文鼎创数据科技有限公司 Information safety input method and information safety device
CN104020944A (en) * 2014-05-27 2014-09-03 广州视源电子科技股份有限公司 Data input method based on sliding block
CN104463037A (en) * 2014-09-26 2015-03-25 湖南科技大学 Password input method and device
TW201635130A (en) * 2015-03-27 2016-10-01 和丞數碼資訊有限公司 Password entry method, portable electronic device, and nonstationary storage medium
CN107368206A (en) * 2017-07-28 2017-11-21 深圳增强现实技术有限公司 A kind of method and mobile intelligent terminal for inputting information
CN110489977A (en) * 2019-07-01 2019-11-22 维沃移动通信有限公司 A kind of method of controlling operation thereof and terminal

Similar Documents

Publication Publication Date Title
EP2082315B1 (en) Method for secure data entry in an application
US10904286B1 (en) Detection of phishing attacks using similarity analysis
US20180276369A1 (en) OS Security Filter
CN106656944B (en) Method and device for sliding verification of handheld mobile equipment
WO2015179286A1 (en) Polymorphic treatment of data entered at clients
CN103038726A (en) Method and device for secured entry of personal data
US20170034314A1 (en) Validation associated with a form
CN106709382B (en) Keyboard display method and device
Malisa et al. Mobile application impersonation detection using dynamic user interface extraction
Solomos et al. The dangers of human touch: fingerprinting browser extensions through user actions
JP2004102460A (en) Personal authentication method and program therefor
Yang et al. Eavesdropping user credentials via GPU side channels on smartphones
CN113326539B (en) Method, device and system for private data leakage detection aiming at applet
CN111679781A (en) Verification processing method, device, equipment and medium
CN112230813A (en) Information input method and device, storage medium and electronic equipment
US11860998B2 (en) Emulator detection through user interactions
US11356481B1 (en) Preventing phishing attempts of one-time passwords
US20230177142A1 (en) Detecting sharing of passwords
CN107633174B (en) User input management method and device and terminal
KR20150100130A (en) System and method for providing security keyboard
CN109522699B (en) Security verification method, device, terminal, server and storage medium
CN111752398A (en) Verification code input method and device, electronic equipment and readable storage medium
CN112041840A (en) Authentication device
EP3043584B1 (en) User determination device and method
CN114139137A (en) Verification method, verification device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210115