CN113608627A - Control method, device and equipment of input method application program and storage medium - Google Patents

Control method, device and equipment of input method application program and storage medium Download PDF

Info

Publication number
CN113608627A
CN113608627A CN202110921162.9A CN202110921162A CN113608627A CN 113608627 A CN113608627 A CN 113608627A CN 202110921162 A CN202110921162 A CN 202110921162A CN 113608627 A CN113608627 A CN 113608627A
Authority
CN
China
Prior art keywords
input
application program
input box
user
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110921162.9A
Other languages
Chinese (zh)
Inventor
洪洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202110921162.9A priority Critical patent/CN113608627A/en
Publication of CN113608627A publication Critical patent/CN113608627A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
    • G06F3/0233Character input methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0489Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using dedicated keyboard keys or combinations thereof
    • G06F3/04897Special input arrangements or commands for improving display capability

Abstract

The application relates to a control method, a control device, control equipment and a storage medium of an input method application program, wherein the method comprises the following steps: when the input operation of the target input box is monitored, acquiring biological characteristic information of a user; determining identity indicating information of the user based on the biometric information; the identity indication information is used for indicating the legality of the user identity; and controlling the operation of the input method application program based on the identity indication information. The method and the device are used for solving the problem that in the prior art, the personal information safety of a user cannot be guaranteed due to the memory function of the input method application program.

Description

Control method, device and equipment of input method application program and storage medium
Technical Field
The present application relates to the field of application program control, and in particular, to a method, an apparatus, a device, and a storage medium for controlling an input method application program.
Background
The input method application program is also called an input method editor or input method software and the like, and is used for realizing character or symbol input on the electronic equipment by a user. With the continuous development of the input method technology, the functions of the input method application program are more and more powerful, and great convenience is brought to the input of the user, for example: after the user inputs the content, the user has a memory function, and when the user inputs the content next time, the user can associate the content to be input by the user according to the input characters, and the alternative words are displayed in the character input area, so that the convenience of the user input is improved.
However, if the password or the personal privacy information input by the user is memorized by the input method application program, the password or the personal privacy information can be easily guessed by others, the security of the personal information of the user cannot be guaranteed, and unpredictable results and losses can be brought to the user seriously.
Disclosure of Invention
The application provides a control method, a control device, control equipment and a storage medium of an input method application program, which are used for solving the problem that in the prior art, the personal information safety of a user cannot be guaranteed due to the memory function of the input method application program.
In a first aspect, an embodiment of the present application provides a method for controlling an input method application, including:
when the input operation of the target input box is monitored, acquiring biological characteristic information of a user;
determining identity indicating information of the user based on the biometric information; the identity indication information is used for indicating the legality of the user identity;
and controlling the operation of the input method application program based on the identity indication information.
Optionally, the controlling the operation of the input method application based on the identity indication information includes:
generating a control instruction corresponding to the identity indication information; when the identity indication information indicates that the identity of the user is legal, the control instruction is used for indicating to pop up the input method application program; when the identity indication information indicates that the identity of the user is illegal, the control instruction is used for indicating to prevent the input method application program from being popped up;
and controlling the operation of the input method application program according to the control instruction.
Optionally, the monitoring of the input operation to the target input box includes:
when the input operation of an input box is acquired, acquiring attribute information of the input box;
and determining that the input box is the target input box based on the attribute information, and judging that the input operation on the target input box is monitored.
Optionally, the determining, based on the attribute information, that the input box is the target input box includes:
and determining that the input box is the target input box if the attribute information indicates that the type of the input box is a password input box.
Optionally, the determining, based on the attribute information, that the input box is the target input box includes:
acquiring a target input box list; the target input box list is stored with at least one target input box, corresponding attribute information and corresponding relation between the target input box and the corresponding application program in advance;
acquiring a target application program to which the input box belongs;
and determining that a target input box matched with the target application program and the attribute information exists in the target input box list, and judging that the input box is the target input box.
Optionally, the obtaining of the target application program to which the input box belongs includes:
acquiring a view object of a current focus to which the input frame belongs;
and acquiring a target application program corresponding to the view object.
Optionally, after the target application program to which the input box belongs is obtained, the method further includes:
and if the target input box which is matched with the target application program and the attribute information is not determined in the target input box list, allowing the input method application program to be popped up in response to the input operation.
In a second aspect, an embodiment of the present application provides a control device for an input method application, including:
the acquisition module is used for acquiring the biological characteristic information of the user when the input operation of the target input box is monitored;
a determination module for determining identity indicating information of the user based on the biometric information; the identity indication information is used for indicating the legality of the user identity;
and the control module is used for controlling the operation of the input method application program based on the identity indication information.
In a third aspect, an embodiment of the present application provides an electronic device, including: the system comprises a processor, a memory and a communication bus, wherein the processor and the memory are communicated with each other through the communication bus;
the memory for storing a computer program;
the processor is configured to execute the program stored in the memory, and implement the control method of the input method application program according to the first aspect.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, which stores a computer program, and the computer program, when executed by a processor, implements the control method for the input method application program according to the first aspect.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages: according to the method provided by the embodiment of the application, when the user clicks the target input box, the biological characteristic information of the user is obtained, the identity indication information of the user is determined through the biological characteristic information so as to determine whether the identity of the user is legal or not, and the operation of the input method application program is controlled according to the legality of the identity of the user. In the embodiment of the application, the operation of the input method application program can be controlled according to the legality of the user identity, the use safety of the input method application program is improved, illegal input is avoided, unnecessary loss is brought to the user, and the privacy and property safety of the user are guaranteed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a schematic flowchart of a control method of an input method application according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a control method of an input method application program for a password input box according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a control device of an input method application according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In order to solve the problem that in the prior art, the memory function of an input method application program causes that the personal information security of a user cannot be guaranteed, an embodiment of the present application provides a control method for an input method application program, where the control method may be applied to any electronic device installed with the input method application program, for example: the mobile phone, the tablet personal computer, the computer or the operation terminal of financial business and the like prevent illegal user input, improve the safety of the application program of the input method and ensure the personal information and property safety of the user.
As shown in fig. 1, an embodiment of the present application provides a method for controlling an input method application program, which specifically includes the following steps:
step 101, when monitoring the input operation of a target input box, acquiring the biological characteristic information of a user;
when the target input box is input, the input box needs to be safely controlled for the input method application, for example: a password input box of an application program, a payment password of payment software, and the like. During specific implementation, when the input operation of the input box is acquired, firstly, whether the input box of the content to be input is the input box needing safety control is judged, if yes, safety control is needed to be carried out, so that personal information of a user is prevented from being leaked and loss is prevented; and if not, normally popping up the input method application program for the user to normally input the content.
Specifically, when the input operation on the input box is acquired, the attribute information of the input box is acquired; and determining that the input box is the target input box based on the attribute information, and judging that the input operation on the target input box is monitored.
When a user clicks an input box, it is described that an input operation is to be performed, where the input operation is a trigger condition for starting an input method application program, and at this time, attribute information of the input box transmitted through an interface for starting the input method application program is obtained, where the attribute information is used to characterize a type of the input box, for example: the type of the input box is a user name input box, a password input box or a short message input box and the like. Among other things, the content that is typically entered by a user in a password entry box has a significant impact on the privacy and property security of the user. Therefore, security control is performed on the password input box, specifically, if the attribute information indicates that the type of the input box is the password input box, the input box is determined to be the target input box, and for the input box of which the type is the password input box, the input box is used as the target input box needing security control in order to ensure personal information security and avoid personal property loss of a user.
In addition, during specific implementation, one or more input boxes of one application program can be configured in advance as target input boxes to realize safety control.
Specifically, a preset target input box list is obtained; the target input box list is stored with at least one target input box, corresponding attribute information and corresponding relation between the target input box and the corresponding application program in advance; acquiring a target application program to which an input box belongs; and determining that the target input box matched with the target application program and the attribute information exists in the target input box list, and judging that the input box is the target input box.
Taking an electronic device as an example of a mobile phone, a password input box of some application programs on the mobile phone is set as a target input box requiring security control in advance, for example: and setting a payment password input box of the payment treasure, a payment password input box of the WeChat, a user name input box and a password input box of the WeChat as target input boxes to obtain a target input box list, so as to perform safety control in a targeted manner.
Specifically, the input operation may be a click operation; and when the clicking operation on the target input box is monitored, triggering the safety control. When a user clicks one input box, the input method application program acquires a view object of a focus to which the clicked input box belongs. When an application program is developed, a view object is called view, for an android system, a view of a current focus can be obtained by using a requestFocus () function, and the view object of the focus to which an input box belongs can be understood as the view object of the currently displayed input box. Each application program has an associated application program window, and each application program window internally comprises a view object for describing the application program window view which is really used for realizing the UI (interface) content and layout. And acquiring the package name of the application program through the acquired view object, and judging which application program the clicked window belongs to according to the package name of the application program.
For the target input box list, after the user configuration is finished, the target input box list can be stored in a list form or a database form. When a user clicks an input box, based on a target application program to which the input box belongs and attribute information of the input box, searching from a target input box list to determine whether a matched target input box exists, if so, indicating that the clicked input box is the target input box, and when the user inputs content in the input box, performing safety control on the use of an input method application program. And if the target input box which is matched with the target application program and the attribute information is not found in the target input box list, indicating that the input box does not need to be subjected to safety control, allowing the input operation to be responded, and popping up the input method application program for the user to normally use the input method application program to realize normal input.
In the embodiment of the application, when a user clicks an input box to input some content, if the input box belongs to a password input box or is in a preset target input box list, security control needs to be performed on an input method application program, so that the use security of the input method application program is improved, and illegal input is avoided.
The biometric information of the user may be face information of the user, for example: the face image can also be fingerprint information, iris information or finger vein distribution map. In a specific implementation, if an input operation to the target input box is monitored, according to different types of the biometric information, the biometric information may be directly collected, for example: when the input operation of the target input box is monitored, a camera on the electronic equipment is automatically called to collect a face image so as to subsequently determine the legality of the user identity; prompt information may also be output prompting the user to input biometric information, such as: when a user sees the information, the fingerprint information is input through a fingerprint identification module of the electronic equipment so as to be used for subsequently determining the legality of the identity of the user. For another example: when the input operation of the target input box is monitored, prompt information 'needing to collect a face image of a user to ensure the safety of information input' is displayed on an interface where the target input box of the electronic equipment is located.
Because the biological characteristic information such as fingerprint information, face image and the like is private data of the user, the prompt information requesting whether the user allows to collect the biological characteristic information can be displayed while the prompt information is displayed, and if the user agrees, the biological characteristic information of the user is collected, for example: fingerprint information, face images and the like for subsequently determining the legality of the user identity; if the user disagrees, the collection of the biometric information of the user is not allowed, and meanwhile, the pop-up input method application program is prevented from being input illegally. That is, when the user wants to input contents in the target input box, the user who is determined to be legitimate based on the biometric information must pass the authentication before the input method application can be normally used.
102, determining identity indication information of a user based on the biological characteristic information; the identity indicating information is used for indicating the legality of the user identity;
during specific implementation, identity indicating information can be obtained by judging whether the biological characteristic information is consistent with preset characteristic information;
for example, the pre-stored preset feature information is fingerprint information of a legal user, when the input operation on the target input box is monitored, the biological feature information of the user is collected as the fingerprint information, whether the fingerprint information of the user is consistent with the pre-stored fingerprint information of the legal user is compared, and if the fingerprint information of the user is consistent with the pre-stored fingerprint information of the legal user, the identity indication information indicates that the identity of the user is legal; if not, the identity indication information indicates that the identity of the user is not legitimate.
In addition, when the identity indicating information of the user is determined according to the biological characteristic information, the biological characteristic information is subjected to characteristic extraction to obtain key characteristic information; and judging whether the extracted key characteristic information is consistent with preset characteristic information or not to obtain identity indication information.
For convenience of understanding, here, for example, the pre-stored preset feature information is face feature information of a legal user, for example: when monitoring the input operation of the target input box, acquiring biological characteristic information of a user as a face image, performing characteristic extraction on the face image to obtain key characteristic information of the face image, and judging whether the key characteristic information is consistent with face characteristic information (such as a face characteristic vector) of a legal user; if the identity information is consistent with the identity information, the identity indication information indicates that the identity of the user is legal; if not, the identity indication information indicates that the identity of the user is not legitimate.
And 103, controlling the operation of the input method application program based on the identity indication information.
Specifically, a control instruction corresponding to the identity indication information is generated; when the identity indication information indicates that the identity of the user is legal, the control instruction is used for indicating to pop up the input method application program; when the identity indication information indicates that the identity of the user is illegal, the control instruction is used for indicating to prevent the pop-up input method application program; and controlling the operation of the input method application program according to the control instruction.
And when the identity indication information indicates that the identity of the user is legal, allowing the input method application program to be popped up in response to the input operation for normal input of the user. And when the identity indication information indicates that the identity of the user is illegal, the user is prevented from popping up the input method application program, and the user cannot use the input method application program to input any content in the target input box so as to ensure the personal information safety of the legal user.
In addition, when the identity of the user is illegal, the user is prevented from popping up the input method application program, and simultaneously, the 'identity authentication failure and input incapability' can be prompted on the display interface of the application program.
In the embodiment of the application, when the user clicks the target input box, the biological characteristic information of the user is obtained, the identity indication information of the user is determined through the biological characteristic information to determine whether the identity of the user is legal or not, and the operation of the input method application program is controlled according to the legality of the identity of the user. In the embodiment of the application, the operation of the input method application program can be controlled according to the legality of the user identity, the use safety of the input method application program is improved, illegal input is avoided, unnecessary loss is brought to the user, and the privacy and property safety of the user are guaranteed. In addition, in the technical scheme provided by the embodiment of the application, as long as the input operation of the user on the target input box is monitored, the safety control is immediately triggered to prevent the input method application program from being popped up, so that an illegal user cannot input any content, and the method is safer.
In order to more clearly explain the control method of the input method application program provided in the embodiment of the present application, taking the target input box as the password input box and the biometric information as the face information as an example, the control method of the input method application program provided in the present application is further explained, specifically referring to fig. 2, and the control method includes the following steps:
step 201, when the click operation on an input box is monitored, judging whether the input box is a password input box; if yes, go to step 202; if not, go to step 203;
step 202, acquiring face information of the user, and judging whether the identity of the user is legal or not based on the face information; if the user's identity is legal, go to step 203; if the user's identity is not legitimate, go to step 204;
step 203, popping up an input method application program;
and step 204, preventing the input method application program from popping up, and popping up prompt information that the human face recognition fails and the input cannot be carried out.
When the user clicks the password input box, face information needs to be collected for face matching, and if the matching is passed, an input method application program is popped up for the user to normally input contents; and if the face matching fails, preventing the input method application program from popping up, and popping up prompt information, namely 'face recognition fails and input cannot be carried out'. And if the input box clicked by the user is not the password input box, normally popping up an input method application program for the user to input.
The control method for the input method application program provided by the embodiment of the application can avoid the situation that when a user is about to input contents in a certain password input box, password information is stored in the input operation of the input method application program, the password is input at this time and is associated according to part of input characters, and the user selects the password in a candidate character area, so that the password of the user is prevented from being leaked, the use safety of the input method application program is improved, the user is prevented from being subjected to illegal input, unnecessary loss is brought to the user, and the privacy and property safety of the user are guaranteed.
Based on the same concept, an embodiment of the present application provides an apparatus for an input method application, and specific implementation of the apparatus may refer to descriptions in the method embodiment, and repeated descriptions are omitted, as shown in fig. 3, the apparatus mainly includes:
an obtaining module 301, configured to obtain biometric information of a user when an input operation on a target input box is monitored;
a determining module 302, configured to determine identity indicating information of a user based on the biometric information; the identity indicating information is used for indicating the legality of the user identity;
and the control module 303 is configured to control the operation of the input method application based on the identity indication information.
In a specific embodiment, the control module 303 is configured to generate a control instruction corresponding to the identity indication information; when the identity indication information indicates that the identity of the user is legal, the control instruction is used for indicating to pop up the input method application program; when the identity indication information indicates that the identity of the user is illegal, the control instruction is used for indicating to prevent the pop-up input method application program; and controlling the operation of the input method application program according to the control instruction.
In a specific embodiment, the obtaining module 301 is configured to obtain attribute information of an input box when an input operation on the input box is obtained; and determining that the input box is the target input box based on the attribute information, and judging that the input operation on the target input box is monitored.
In a specific embodiment, the obtaining module 301 is specifically configured to determine that the type of the input box indicated by the attribute information is a password input box, and determine that the input box is a target input box; or, the obtaining module 301 is specifically configured to obtain a target input box list; the target input box list is stored with at least one target input box, corresponding attribute information and corresponding relation between the target input box and the corresponding application program in advance; acquiring a target application program to which an input box belongs; and determining that the target input box matched with the target application program and the attribute information exists in the target input box list, and judging that the input box is the target input box.
In a specific embodiment, the obtaining module 301 is specifically configured to obtain a view object of a current focus to which an input box belongs; and acquiring a target application program corresponding to the view object.
In an embodiment, the control module 303 is further configured to determine that there is no target input box in the list of target input boxes that matches the target application and the attribute information, and allow the input method application to pop up in response to the input operation.
In a specific embodiment, the obtaining module 301 is configured to output a prompt message prompting a user to input biometric information; and responding to the prompt information and collecting the biological characteristic information of the user.
In a specific embodiment, the determining module 302 is configured to determine whether the biometric information is consistent with the preset feature information, so as to obtain identity indicating information; or, extracting the characteristics of the biological characteristic information to obtain key characteristic information; and judging whether the extracted key characteristic information is consistent with preset characteristic information or not to obtain identity indication information.
In the embodiment of the application, when the user clicks the target input box, the biological characteristic information of the user is obtained, the identity indication information of the user is determined through the biological characteristic information to determine whether the identity of the user is legal or not, and the operation of the input method application program is controlled according to the legality of the identity of the user. In the embodiment of the application, the operation of the input method application program can be controlled according to the legality of the user identity, the use safety of the input method application program is improved, illegal input is avoided, unnecessary loss is brought to the user, and the privacy and property safety of the user are guaranteed.
Based on the same concept, an embodiment of the present application further provides an electronic device, as shown in fig. 4, the electronic device mainly includes: a processor 401, a memory 402 and a communication bus 403, wherein the processor 401 and the memory 402 communicate with each other via the communication bus 403. The memory 402 stores a program executable by the processor 401, and the processor 401 executes the program stored in the memory 402, so as to implement the following steps:
when the input operation of the target input box is monitored, acquiring biological characteristic information of a user;
determining identity indicating information of the user based on the biometric information; the identity indicating information is used for indicating the legality of the user identity;
and controlling the operation of the input method application program based on the identity indication information.
The communication bus 403 mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus 403 may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 4, but this does not indicate only one bus or one type of bus.
The Memory 402 may include a Random Access Memory (RAM) or a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. Alternatively, the memory may be at least one memory device located remotely from the aforementioned processor 401.
The Processor 401 may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), etc., and may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic devices, discrete gates or transistor logic devices, and discrete hardware components.
In still another embodiment of the present application, there is also provided a computer-readable storage medium having stored therein a computer program which, when run on a computer, causes the computer to execute a control method of an input method application described in the above-described embodiment.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wirelessly (e.g., infrared, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that includes one or more of the available media. The available media may be magnetic media (e.g., floppy disks, hard disks, tapes, etc.), optical media (e.g., DVDs), or semiconductor media (e.g., solid state drives), among others.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The foregoing are merely exemplary embodiments of the present invention, which enable those skilled in the art to understand or practice the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A control method for an input method application program is characterized by comprising the following steps:
when the input operation of the target input box is monitored, acquiring biological characteristic information of a user;
determining identity indicating information of the user based on the biometric information; the identity indication information is used for indicating the legality of the user identity;
and controlling the operation of the input method application program based on the identity indication information.
2. The method for controlling an input method application program according to claim 1, wherein the controlling the operation of the input method application program based on the identity indicating information includes:
generating a control instruction corresponding to the identity indication information; when the identity indication information indicates that the identity of the user is legal, the control instruction is used for indicating to pop up the input method application program; when the identity indication information indicates that the identity of the user is illegal, the control instruction is used for indicating to prevent the input method application program from being popped up;
and controlling the operation of the input method application program according to the control instruction.
3. The method for controlling an input method application according to claim 1, wherein the monitoring of the input operation to the target input box includes:
when the input operation of an input box is acquired, acquiring attribute information of the input box;
and determining that the input box is the target input box based on the attribute information, and judging that the input operation on the target input box is monitored.
4. The method for controlling an input method application according to claim 3, wherein the determining that the input box is the target input box based on the attribute information includes:
and determining that the input box is the target input box if the attribute information indicates that the type of the input box is a password input box.
5. The method for controlling an input method application according to claim 3, wherein the determining that the input box is the target input box based on the attribute information includes:
acquiring a target input box list; the target input box list is stored with at least one target input box, corresponding attribute information and corresponding relation between the target input box and the corresponding application program in advance;
acquiring a target application program to which the input box belongs;
and determining that a target input box matched with the target application program and the attribute information exists in the target input box list, and judging that the input box is the target input box.
6. The method for controlling an input method application program according to claim 5, wherein the acquiring the target application program to which the input frame belongs includes:
acquiring a view object of a current focus to which the input frame belongs;
and acquiring a target application program corresponding to the view object.
7. The method for controlling an input method application program according to claim 5 or 6, wherein after the obtaining of the target application program to which the input frame belongs, the method further comprises:
and if the target input box which is matched with the target application program and the attribute information is not determined in the target input box list, allowing the input method application program to be popped up in response to the input operation.
8. A control apparatus for an input method application, comprising:
the acquisition module is used for acquiring the biological characteristic information of the user when the input operation of the target input box is monitored;
a determination module for determining identity indicating information of the user based on the biometric information; the identity indication information is used for indicating the legality of the user identity;
and the control module is used for controlling the operation of the input method application program based on the identity indication information.
9. An electronic device, comprising: the system comprises a processor, a memory and a communication bus, wherein the processor and the memory are communicated with each other through the communication bus;
the memory for storing a computer program;
the processor is configured to execute the program stored in the memory, and implement the control method of the input method application program according to any one of claims 1 to 7.
10. A computer-readable storage medium storing a computer program, wherein the computer program realizes the control method of the input method application program according to any one of claims 1 to 7 when executed by a processor.
CN202110921162.9A 2021-08-11 2021-08-11 Control method, device and equipment of input method application program and storage medium Withdrawn CN113608627A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110921162.9A CN113608627A (en) 2021-08-11 2021-08-11 Control method, device and equipment of input method application program and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110921162.9A CN113608627A (en) 2021-08-11 2021-08-11 Control method, device and equipment of input method application program and storage medium

Publications (1)

Publication Number Publication Date
CN113608627A true CN113608627A (en) 2021-11-05

Family

ID=78308251

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110921162.9A Withdrawn CN113608627A (en) 2021-08-11 2021-08-11 Control method, device and equipment of input method application program and storage medium

Country Status (1)

Country Link
CN (1) CN113608627A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105404620A (en) * 2015-11-20 2016-03-16 华为技术有限公司 Form verification method and apparatus
WO2017020386A1 (en) * 2015-07-31 2017-02-09 宇龙计算机通信科技(深圳)有限公司 Fingerprint verification method and apparatus
CN106897639A (en) * 2017-01-06 2017-06-27 奇酷互联网络科技(深圳)有限公司 The method and apparatus of mobile terminal and its safety verification
CN109165490A (en) * 2018-07-24 2019-01-08 北京全知科技有限公司 A kind of data inputting method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017020386A1 (en) * 2015-07-31 2017-02-09 宇龙计算机通信科技(深圳)有限公司 Fingerprint verification method and apparatus
CN105404620A (en) * 2015-11-20 2016-03-16 华为技术有限公司 Form verification method and apparatus
CN106897639A (en) * 2017-01-06 2017-06-27 奇酷互联网络科技(深圳)有限公司 The method and apparatus of mobile terminal and its safety verification
CN109165490A (en) * 2018-07-24 2019-01-08 北京全知科技有限公司 A kind of data inputting method and device

Similar Documents

Publication Publication Date Title
JP6495970B2 (en) User authentication method and apparatus
CN113098870B (en) Phishing detection method and device, electronic equipment and storage medium
CN108846676B (en) Biological feature auxiliary payment method, device, computer equipment and storage medium
WO2015188788A1 (en) Method and apparatus for protecting mobile terminal payment security, and mobile terminal
US11165793B2 (en) Method and system for detecting credential stealing attacks
US20160328602A1 (en) Method, device, and system for displaying user interface
CN108650260B (en) Malicious website identification method and device
US9811826B2 (en) Method and apparatus for increasing security of an electronic payment
US10893061B2 (en) Automated detection of phishing campaigns via social media
US11004163B2 (en) Terminal-implemented method, server-implemented method and terminal for acquiring certification document
CN109547426B (en) Service response method and server
CN106888204B (en) Implicit identity authentication method based on natural interaction
US10666656B2 (en) Systems and methods for protecting users from malicious content
WO2021244531A1 (en) Payment method and apparatus based on facial recognition
US11924191B2 (en) Safe logon
CN109460653B (en) Rule engine based verification method, verification device, storage medium and apparatus
CN106600279A (en) Safety payment method and system based on fingerprint identification
US10887345B1 (en) Protecting users from phishing attempts
EP2728472B1 (en) User terminal, reliability management server, and method and program for preventing unauthorized remote operation
CN113949560A (en) Network security identification method, device, server and storage medium
CN113608627A (en) Control method, device and equipment of input method application program and storage medium
CN108985035B (en) Control method and device for user operation authority, storage medium and electronic equipment
CN107679865B (en) Identity verification method and device based on touch area
US10708260B1 (en) Method and system for detecting two-factor authentication
CN110706221A (en) Verification method, verification device, storage medium and device for customizing pictures

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20211105

WW01 Invention patent application withdrawn after publication