CN113687925A - Equipment operation processing method and device, storage medium and computer equipment - Google Patents

Equipment operation processing method and device, storage medium and computer equipment Download PDF

Info

Publication number
CN113687925A
CN113687925A CN202110832827.9A CN202110832827A CN113687925A CN 113687925 A CN113687925 A CN 113687925A CN 202110832827 A CN202110832827 A CN 202110832827A CN 113687925 A CN113687925 A CN 113687925A
Authority
CN
China
Prior art keywords
data
processed
program
shielding
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110832827.9A
Other languages
Chinese (zh)
Other versions
CN113687925B (en
Inventor
易钟鸣
潘明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Luyi Technology Co ltd
Original Assignee
Chengdu Luyi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Luyi Technology Co ltd filed Critical Chengdu Luyi Technology Co ltd
Priority to CN202110832827.9A priority Critical patent/CN113687925B/en
Publication of CN113687925A publication Critical patent/CN113687925A/en
Application granted granted Critical
Publication of CN113687925B publication Critical patent/CN113687925B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4812Task transfer initiation or dispatching by interrupt, e.g. masked

Abstract

The application discloses a device operation processing method and device, a storage medium and computer equipment, wherein the method comprises the following steps: registering a target shielding program at a system bottom layer; receiving data to be processed, and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, wherein the system bottom layer informs the target shielding program to process the data to be processed; and the target shielding program identifies whether the data to be processed belongs to a preset shielding data type, and discards the data to be processed when the data to be processed is identified to belong to the preset shielding data type. According to the method and the device, the target shielding program is registered at the bottom layer of the system, the type of the data to be processed can be identified through the target shielding program, then the shielding of user operation is realized, the client equipment is prevented from being disturbed by the user operation, the running efficiency of the program in the client equipment is ensured, and the safety of the client equipment is protected.

Description

Equipment operation processing method and device, storage medium and computer equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a device operation processing method and apparatus, a storage medium, and a computer device.
Background
With the widespread popularization of electronic information technology, more and more families purchase computers, and many users download files, compile files, write documents and the like by using the computers. In some application environments, a computer needs to be kept in a boot running state continuously, for example, when downloading and transmitting resources, many users do not always wait before the computer after starting a downloading task and a transmitting task in these usage scenarios, and at this time, the computer may be used by other people, for example, a child at home may play the computer when a parent is not present, which not only causes the task execution speed of the computer to be slow, for example, the speed of downloading and transmitting data to be slow, but also may cause the child to be addicted to the computer.
Disclosure of Invention
In view of this, the present application provides a device operation processing method and apparatus, a storage medium, and a computer device, which are helpful for implementing shielding of user operations in a specific scenario.
According to an aspect of the present application, there is provided a device operation processing method, applied to a client, including:
registering a target shielding program at a system bottom layer;
receiving data to be processed, and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, wherein the system bottom layer informs the target shielding program to process the data to be processed;
and the target shielding program identifies whether the data to be processed belongs to a preset shielding data type, and discards the data to be processed when the data to be processed is identified to belong to the preset shielding data type.
Optionally, the preset masked data type includes a device type of a preset input device;
the target shielding program identifies whether the data to be processed belongs to a preset shielding data type, and discards the data to be processed when the data to be processed is identified to belong to the preset shielding data type, and the method specifically includes:
the target shielding program identifies whether the data to be processed is data input through input equipment or not, and acquires an input equipment type corresponding to the data to be processed when the data to be processed is the data input through the input equipment;
and if the input equipment type corresponding to the data to be processed belongs to the equipment type of the preset input equipment, discarding the data to be processed.
Optionally, after the input device type corresponding to the data to be processed is obtained, the method further includes:
and if the input equipment type corresponding to the data to be processed does not belong to the equipment type of the preset input equipment, transmitting the data to be processed to a corresponding application program so as to process the data to be processed through the application program.
Optionally, the registering a target mask program at the system bottom layer specifically includes:
receiving an equipment locking instruction input by a user, and starting an equipment protection tool;
registering the target shielding program at the system bottom layer through the equipment protection tool.
Optionally, the device protection tool includes preset protection tool shutdown input information, where the preset protection tool shutdown input information is used to instruct to logout device input data of the target shielding program; before the obtaining of the input device type corresponding to the data to be processed, the method further includes:
judging whether the data to be processed is matched with preset protection tool closing input information or not;
if not, acquiring the input equipment type corresponding to the data to be processed;
and if so, logging out the target shielding program.
Optionally, the device lock instruction comprises a program logout time and/or a program logout signal; after the target masker is registered at the system bottom layer by the device protection tool, the method further comprises:
when the program logout time is reached, logging out the target shielding program; and/or the presence of a gas in the gas,
and when the program logout signal is monitored, logging out the target shielding program.
Optionally, after the target shielding program is registered at the system bottom level, the method further includes:
controlling the client to enter a screen locking state;
correspondingly, if the input device type corresponding to the data to be processed belongs to the device type of the preset input device, the method further includes:
and outputting prompt information to prompt the user that the client is in the equipment locking state currently.
According to another aspect of the present application, there is provided a device operation processing apparatus, applied to a client, including:
the registration module is used for registering the target shielding program at the bottom layer of the system;
the data receiving module is used for receiving data to be processed and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, and the system bottom layer informs the target shielding program to process the data to be processed;
and the operation shielding module is used for identifying whether the data to be processed belongs to a preset shielding data type or not by the target shielding program, and discarding the data to be processed when the data to be processed is identified to belong to the preset shielding data type.
Optionally, the preset masked data type includes a device type of a preset input device;
the operation shielding module is specifically configured to:
the target shielding program identifies whether the data to be processed is data input through input equipment or not, and acquires an input equipment type corresponding to the data to be processed when the data to be processed is the data input through the input equipment;
and if the input equipment type corresponding to the data to be processed belongs to the equipment type of the preset input equipment, discarding the data to be processed.
Optionally, the apparatus further comprises:
and the data processing module is used for transmitting the data to be processed to a corresponding application program to process the data to be processed through the application program if the input device type corresponding to the data to be processed does not belong to the device type of the preset input device after the input device type corresponding to the data to be processed is obtained.
Optionally, the registration module is specifically configured to:
receiving an equipment locking instruction input by a user, and starting an equipment protection tool;
registering the target shielding program at the system bottom layer through the equipment protection tool.
Optionally, the device protection tool includes preset protection tool shutdown input information, where the preset protection tool shutdown input information is used to instruct to logout device input data of the target shielding program; the device further comprises:
the data identification module is used for judging whether the data to be processed is matched with the preset protection tool closing input information before the input equipment type corresponding to the data to be processed is obtained; if not, acquiring the input equipment type corresponding to the data to be processed; and if so, logging out the target shielding program.
Optionally, the device lock instruction comprises a program logout time and/or a program logout signal; the device further comprises:
a logout module, configured to logout the target shielding program when the program logout time is reached after the target shielding program is registered at the system bottom layer by the device protection tool; and/or logging out the target shielding program when monitoring the program logging-out signal.
Optionally, the apparatus further comprises:
the screen locking module is used for controlling the client to enter a screen locking state after the target shielding program is registered at the bottom layer of the system;
correspondingly, the operation shielding module is further configured to output a prompt message to prompt a user that the client is currently in an equipment locking state if the input equipment type corresponding to the data to be processed belongs to the equipment type of the preset input equipment.
According to still another aspect of the present application, there is provided a storage medium having stored thereon a computer program which, when executed by a processor, implements the above-described device operation processing method.
According to yet another aspect of the present application, there is provided a computer device, including a storage medium, a processor, and a computer program stored on the storage medium and executable on the processor, the processor implementing the above device operation processing method when executing the program.
By means of the technical scheme, the device operation processing method and device, the storage medium and the computer device, provided by the application, the target shielding program is registered in the system bottom layer, so that when the data to be processed is transmitted to the system bottom layer, the system bottom layer informs the target shielding program to process the data, the target shielding program can specifically identify the data type of the data to be processed, and when the data to be processed is identified to belong to the preset shielding data type, the data to be processed is discarded, so that the shielding of the data to be processed is realized. According to the method and the device, the target shielding program is registered at the bottom layer of the system, the type of the data to be processed can be identified through the target shielding program, then the shielding of user operation is realized, the client equipment is prevented from being disturbed by the user operation, the running efficiency of the program in the client equipment is ensured, and the safety of the client equipment is protected.
The foregoing description is only an overview of the technical solutions of the present application, and the present application can be implemented according to the content of the description in order to make the technical means of the present application more clearly understood, and the following detailed description of the present application is given in order to make the above and other objects, features, and advantages of the present application more clearly understandable.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flow chart illustrating a method for processing device operations according to an embodiment of the present application;
FIG. 2 is a flow chart illustrating another method for processing device operations according to an embodiment of the present disclosure;
fig. 3 shows a schematic structural diagram of an apparatus operation processing device provided in an embodiment of the present application.
Detailed Description
The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
In this embodiment, a device operation processing method is provided, as shown in fig. 1, the method including:
step 101, registering a target shielding program at a system bottom layer;
102, receiving data to be processed, and sequentially transmitting the data to be processed to a hardware abstraction layer and a system bottom layer, wherein the system bottom layer informs a target shielding program to process the data to be processed;
step 103, the target shielding program identifies whether the data to be processed belongs to a preset shielding data type, and discards the data to be processed when the data to be processed is identified to belong to the preset shielding data type.
The embodiment of the application can be applied to a client, and specifically can include a computer device. In this embodiment, the target shielding program may be integrated in the device protection tool, for example, the device protection tool may specifically be a device locking tool, and after the device protection tool is installed and started in the computer device, the target shielding program is registered by the device protection tool.
In an actual application scenario, the operation of the user on the computer device is almost completed through an external hardware device, for example, the operation on the computer device is realized through a bluetooth or USB input device such as a mouse or a keyboard, and therefore, in some application scenarios where other users do not want to use the computer device, the protection on the computer device can be realized by shielding the operation data of the hardware device. In an operating system of computer equipment, after a user operates the equipment, operating data of the user can be input into a hardware abstraction layer (HAL layer), and then is transmitted into a system bottom layer through the HAL layer, and the system bottom layer transmits the operating data to a corresponding application program so as to process the operating data through the application program, thereby realizing response to the user operation. Therefore, the embodiment of the application realizes the shielding of the user operation in a mode of shielding the user operation data at the bottom layer of the system.
Firstly, a target shielding program is registered in a system bottom layer of an operating system, and after the program is registered in the system bottom layer and data input behaviors exist in the system, the target shielding program is firstly informed to process and then is transmitted to other programs in an application layer. Then, after registering the target shielding program, when the operating system receives the data to be processed, the data to be processed is transmitted to the HAL layer first and then to the system bottom layer, and after the system bottom layer receives the data to be processed, the system bottom layer notifies the target shielding program of the received data to be processed due to the fact that the target shielding program is registered in advance. Finally, after receiving the notification, the target shielding program may identify the data type of the data to be processed to identify whether the data to be processed belongs to the data type to be shielded, that is, identify whether the data to be processed belongs to a preset shielding data type, where the preset shielding data type may specifically be input data of the hardware device, and when the data to be processed is identified to belong to the input data of the hardware device, discard the data to be processed to shield the user operation.
By applying the technical scheme of the embodiment, the target shielding program is registered in the system bottom layer, so that when the data to be processed is transmitted to the system bottom layer, the system bottom layer informs the target shielding program to process the data, the target shielding program can specifically identify the data type of the data to be processed, and when the data to be processed is identified to belong to the preset shielding data type, the data to be processed is discarded, so that the shielding of the data to be processed is realized. According to the method and the device, the target shielding program is registered at the bottom layer of the system, the type of the data to be processed can be identified through the target shielding program, and then the shielding of user operation is realized, the client device is prevented from being disturbed by the user operation, the running efficiency of the program in the client device is ensured, and the safety of the client device is protected.
In this embodiment of the present application, to implement shielding of user operations in a computer device, optionally, the preset shielded data type includes a device type of a preset input device; the step 103 may specifically include:
103-1, identifying whether the data to be processed is data input through an input device by the target shielding program, and acquiring an input device type corresponding to the data to be processed when the data to be processed is the data input through the input device;
103-2, if the input device type corresponding to the data to be processed belongs to the device type of the preset input device, discarding the data to be processed;
and 103-3, if the input device type corresponding to the data to be processed does not belong to the device type of the preset input device, transmitting the data to be processed to a corresponding application program so as to process the data to be processed through the application program.
In the above embodiment, since the operation of the computer device by the user is almost completed through the externally accessed hardware device, it is specifically possible to identify whether the data to be processed is data input by a specific type of externally accessed device, where the preset masked data type may specifically include a device type of the preset input device. When the target shielding program receives the notification of the system bottom layer, whether the data to be processed is the device input data or not can be specifically identified, if the data to be processed is the device input data, whether the input device type corresponding to the data to be processed belongs to the device type of the preset input device or not can be further judged, for example, the preset input device can comprise a USB mouse, a USB keyboard, a bluetooth mouse, a bluetooth keyboard and the like, when the input device type corresponding to the data to be processed is identified to belong to the device type of the preset input device, the data to be processed is discarded, the user operation is shielded, otherwise, the data to be processed can be processed according to the original rule, the data to be processed can be specifically transmitted to the corresponding application program, and therefore, the data to be processed is processed through the corresponding application program, and the response of the data to be processed is achieved.
In an actual application scenario, a user can freely set the type of the input device to be shielded, for example, the user sets to shield an external input device such as a USB mouse, and the user can control the computer device through a mobile phone connected with the computer device in a bluetooth pairing manner, and the bluetooth mobile phone is not set as a preset input device, so that the user can respond to the operation of the computer device through the bluetooth mobile phone, and the shielding of the computer device is more flexible and better meets the user requirements.
In this embodiment of the present application, the target shielding program may be registered through an equipment protection tool, and optionally, step 101 may specifically include:
step 101-1, receiving an equipment locking instruction input by a user, and starting an equipment protection tool;
step 101-2, registering the target shielding program at the system bottom layer through the equipment protection tool.
In the above embodiment, the device protection tool may be installed in the computer device in advance, and when some operations in the device need to be shielded, the installed device protection tool in the computer device may be started, and after the device protection tool is started, the target shielding program may be registered in the system bottom layer. In a particular application scenario, the device protection tool is launched in response to a device lock instruction. Wherein the device lock instruction may be generated based on an active operation by the user, such as a double-click of the device protection tool by the user to trigger the tool to start. Or automatically generating the device locking instruction after detecting that the computer device reaches a certain condition, for example, when the computer device detects that the downloading task of the downloading tool runs for more than a preset time and the computer device does not receive any operation data of the hardware input device within the preset time, the device locking instruction may be automatically generated, and the device protection tool may be started. Of course, other automatic starting conditions may also be set, and the embodiment of the present application is not limited herein.
In this embodiment of the application, optionally, the device protection tool includes preset protection tool closing input information, where the preset protection tool closing input information is used to instruct to logout device input data of the target shielding program; in step 103-1, before the obtaining of the input device type corresponding to the data to be processed, the method further includes: judging whether the data to be processed is matched with preset protection tool closing input information or not; if not, acquiring the input equipment type corresponding to the data to be processed; and if so, logging out the target shielding program.
In the above embodiment, a command to logout the target shielding program and to close the device protection tool may also be set, that is, the preset protection tool closes the input information, and the user may logout the target shielding program and close the device protection tool by inputting data matched with the preset protection tool close input information, so that the computer device is restored to the normal use state. In a specific application scenario, when it is recognized that the data to be processed is data input by the input device, it may be determined whether the data to be processed matches preset protection tool closing input information, for example, the preset protection tool closing input information is a plurality of key identifiers on the keyboard device, when a user wants to resume normal use of the computer device, the user may trigger closing of the device protection tool by pressing the preset key, when it is determined that the data to be processed simultaneously presses the preset keys, that is, when the data to be processed matches preset protection attack closing input information, the target shielding program is cancelled, and the device protection tool is closed, otherwise it indicates that the input operation of the external device is not an operation that the user wants to resume normal use of the computer device, but may be a false touch or unauthorized use by other people, the process of obtaining the input device type corresponding to the data to be processed in step 103-1 may be further performed, and continuously judging whether the input equipment type of the data to be processed is the equipment type of the preset input equipment or not so as to identify whether the data to be processed should be discarded or not.
In this embodiment of the present application, optionally, the device lock instruction includes a program logout time and/or a program logout signal; after step 101, the method further comprises:
step 104, when the program logout time is reached, logging out the target shielding program; and/or logging out the target shielding program when monitoring the program logging-out signal.
In the above embodiment, the device locking instruction may include a program logout time and/or a program logout signal, for example, while a user issues a device locking instruction to open the device protection tool, the user may specify a closing time and/or a closing signal of the device protection tool, that is, the program logout time and/or the program logout signal, when the closing time is reached and/or the closing signal is detected, the device protection tool may logout the target mask program at the bottom layer of the system, so that when the specific time is reached and the specific signal is sensed, the computer device may resume normal use, for example, after the program logout time is 2 hours, the target mask program is counted from registration, and after 2 hours, the target mask program is automatically logged out, for example, the program logout signal is a signal of the end of downloading a specific file, when the downloading of the specific file is ended, and automatically logging out the target shielding program so that the computer equipment is not used by other people when the downloading task is executed, and the downloading speed is ensured.
In this embodiment of the present application, optionally, step 101 may further include: controlling the client to enter a screen locking state; correspondingly, if the input device type corresponding to the data to be processed belongs to the device type of the preset input device, the method may further include: and outputting prompt information to prompt the user that the client is in the equipment locking state currently.
In the above embodiment, after the device protection tool is opened and the target shielding program is registered, the screen of the computer device may be locked, and specifically, the screen-locking screen saver may be displayed, so that other users are prevented from seeing the operation condition of the computer device. The unlocking time of the device, namely the program logout time, can also be prompted so that the user can use the device after the device is unlocked.
In a specific application scene, optionally, the starting time and the closing time of the device protection tool can be set, so that the device can be automatically started and closed at corresponding time, the device can be used by children in a specific time period, and the phenomenon that the children use computers for a long time to influence eyesight and indulge in networks is avoided.
Further, as a refinement and an extension of the specific implementation of the above embodiment, in order to fully illustrate the specific implementation process of the embodiment, another device operation processing method is provided, as shown in fig. 2, and the method includes:
step 201, receiving an equipment locking instruction input by a user, and starting an equipment protection tool; registering the target shielding program at the system bottom layer through the equipment protection tool.
Step 202, receiving data to be processed, and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, wherein the system bottom layer notifies the target shielding program to process the data to be processed;
step 203, the target shielding program identifies whether the data to be processed is data input through an input device, and when the data to be processed is the data input through the input device, judges whether the data to be processed is matched with input information of closing the preset protection tool;
step 204, if not, acquiring the input equipment type corresponding to the data to be processed;
step 205, if the matching is performed, the target shielding program is cancelled;
step 206, if the input device type corresponding to the data to be processed belongs to the device type of the preset input device, discarding the data to be processed;
step 207, if the input device type corresponding to the data to be processed does not belong to the device type of the preset input device, transmitting the data to be processed to a corresponding application program, so as to process the data to be processed through the application program.
Step 208, when the program logout time is reached, logging out the target shielding program; and/or logging out the target shielding program when monitoring the program logging-out signal.
Further, as a specific implementation of the method in fig. 1, an embodiment of the present application provides an apparatus for processing device operations, which is applied to a client, and as shown in fig. 3, the apparatus includes:
the registration module is used for registering the target shielding program at the bottom layer of the system;
the data receiving module is used for receiving data to be processed and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, and the system bottom layer informs the target shielding program to process the data to be processed;
and the operation shielding module is used for identifying whether the data to be processed belongs to a preset shielding data type or not by the target shielding program, and discarding the data to be processed when the data to be processed is identified to belong to the preset shielding data type.
Optionally, the preset masked data type includes a device type of a preset input device;
the operation shielding module is specifically configured to:
the target shielding program identifies whether the data to be processed is data input through input equipment or not, and acquires an input equipment type corresponding to the data to be processed when the data to be processed is the data input through the input equipment;
and if the input equipment type corresponding to the data to be processed belongs to the equipment type of the preset input equipment, discarding the data to be processed.
Optionally, the apparatus further comprises:
and the data processing module is used for transmitting the data to be processed to a corresponding application program to process the data to be processed through the application program if the input device type corresponding to the data to be processed does not belong to the device type of the preset input device after the input device type corresponding to the data to be processed is obtained.
Optionally, the registration module is specifically configured to:
receiving an equipment locking instruction input by a user, and starting an equipment protection tool;
registering the target shielding program at the system bottom layer through the equipment protection tool.
Optionally, the device protection tool includes preset protection tool shutdown input information, where the preset protection tool shutdown input information is used to instruct to logout device input data of the target shielding program; the device further comprises:
the data identification module is used for judging whether the data to be processed is matched with the preset protection tool closing input information before the input equipment type corresponding to the data to be processed is obtained; if not, acquiring the input equipment type corresponding to the data to be processed; and if so, logging out the target shielding program.
Optionally, the device lock instruction comprises a program logout time and/or a program logout signal; the device further comprises:
a logout module, configured to logout the target shielding program when the program logout time is reached after the target shielding program is registered at the system bottom layer by the device protection tool; and/or logging out the target shielding program when monitoring the program logging-out signal.
Optionally, the apparatus further comprises:
the screen locking module is used for controlling the client to enter a screen locking state after the target shielding program is registered at the bottom layer of the system;
correspondingly, the operation shielding module is further configured to output a prompt message to prompt a user that the client is currently in an equipment locking state if the input equipment type corresponding to the data to be processed belongs to the equipment type of the preset input equipment.
It should be noted that other corresponding descriptions of the functional units related to the device operation processing apparatus provided in the embodiment of the present application may refer to corresponding descriptions in the methods in fig. 1 to fig. 2, and are not described again here.
Based on the method shown in fig. 1 to 2, correspondingly, the present application further provides a storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the method for processing the device operation shown in fig. 1 to 2 is implemented.
Based on such understanding, the technical solution of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the implementation scenarios of the present application.
Based on the above methods shown in fig. 1 to fig. 2 and the virtual device embodiment shown in fig. 3, in order to achieve the above object, an embodiment of the present application further provides a computer device, which may specifically be a personal computer, a server, a network device, and the like, where the computer device includes a storage medium and a processor; a storage medium for storing a computer program; a processor for executing a computer program to implement the above-described device operation processing method as shown in fig. 1 to 2.
Optionally, the computer device may also include a user interface, a network interface, a camera, Radio Frequency (RF) circuitry, sensors, audio circuitry, a WI-FI module, and so forth. The user interface may include a Display screen (Display), an input unit such as a keypad (Keyboard), etc., and the optional user interface may also include a USB interface, a card reader interface, etc. The network interface may optionally include a standard wired interface, a wireless interface (e.g., a bluetooth interface, WI-FI interface), etc.
It will be appreciated by those skilled in the art that the present embodiment provides a computer device architecture that is not limiting of the computer device, and that may include more or fewer components, or some components in combination, or a different arrangement of components.
The storage medium may further include an operating system and a network communication module. An operating system is a program that manages and maintains the hardware and software resources of a computer device, supporting the operation of information handling programs, as well as other software and/or programs. The network communication module is used for realizing communication among components in the storage medium and other hardware and software in the entity device.
Through the description of the above embodiments, those skilled in the art can clearly understand that the present application may be implemented by software plus a necessary general hardware platform, and may also register the target mask program in the system bottom layer by hardware, so that when the data to be processed is transferred to the system bottom layer, the system bottom layer notifies the target mask program to process the data, and the target mask program may specifically identify the data type of the data to be processed, and when it is identified that the data to be processed belongs to the preset mask data type, discard the data to be processed, so as to implement the masking of the data to be processed. According to the method and the device, the target shielding program is registered at the bottom layer of the system, the type of the data to be processed can be identified through the target shielding program, and then the shielding of user operation is realized, the client device is prevented from being disturbed by the user operation, the running efficiency of the program in the client device is ensured, and the safety of the client device is protected.
Those skilled in the art will appreciate that the figures are merely schematic representations of one preferred implementation scenario and that the blocks or flow diagrams in the figures are not necessarily required to practice the present application. Those skilled in the art will appreciate that the modules in the devices in the implementation scenario may be distributed in the devices in the implementation scenario according to the description of the implementation scenario, or may be located in one or more devices different from the present implementation scenario with corresponding changes. The modules of the implementation scenario may be combined into one module, or may be further split into a plurality of sub-modules.
The above application serial numbers are for description purposes only and do not represent the superiority or inferiority of the implementation scenarios. The above disclosure is only a few specific implementation scenarios of the present application, but the present application is not limited thereto, and any variations that can be made by those skilled in the art are intended to fall within the scope of the present application.

Claims (10)

1. The device operation processing method is applied to a client and comprises the following steps:
registering a target shielding program at a system bottom layer;
receiving data to be processed, and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, wherein the system bottom layer informs the target shielding program to process the data to be processed;
and the target shielding program identifies whether the data to be processed belongs to a preset shielding data type, and discards the data to be processed when the data to be processed is identified to belong to the preset shielding data type.
2. The method of claim 1, wherein the preset masked data type comprises a device type of a preset input device; the target shielding program identifies whether the data to be processed belongs to a preset shielding data type, and discards the data to be processed when the data to be processed is identified to belong to the preset shielding data type, and the method specifically includes:
the target shielding program identifies whether the data to be processed is data input through input equipment or not, and acquires an input equipment type corresponding to the data to be processed when the data to be processed is the data input through the input equipment;
and if the input equipment type corresponding to the data to be processed belongs to the equipment type of the preset input equipment, discarding the data to be processed.
3. The method according to claim 2, wherein after the obtaining of the input device type corresponding to the data to be processed, the method further comprises:
and if the input equipment type corresponding to the data to be processed does not belong to the equipment type of the preset input equipment, transmitting the data to be processed to a corresponding application program so as to process the data to be processed through the application program.
4. The method according to claim 2, wherein the registering of the target masker at the system bottom layer specifically comprises:
receiving an equipment locking instruction input by a user, and starting an equipment protection tool;
registering the target shielding program at the system bottom layer through the equipment protection tool.
5. The method according to claim 4, wherein the device protection tool includes preset protection tool shutdown input information, the preset protection tool shutdown input information being used to instruct to log out device input data of the target shielding program; before the obtaining of the input device type corresponding to the data to be processed, the method further includes:
judging whether the data to be processed is matched with preset protection tool closing input information or not;
if not, acquiring the input equipment type corresponding to the data to be processed;
and if so, logging out the target shielding program.
6. Method according to claim 4 or 5, characterized in that the device lock instruction comprises a program logout time and/or a program logout signal; after the target masker is registered at the system bottom layer by the device protection tool, the method further comprises:
when the program logout time is reached, logging out the target shielding program; and/or the presence of a gas in the gas,
and when the program logout signal is monitored, logging out the target shielding program.
7. The method according to any one of claims 2 to 5, wherein after registering the target masker at the system bottom level, the method further comprises:
controlling the client to enter a screen locking state;
correspondingly, if the input device type corresponding to the data to be processed belongs to the device type of the preset input device, the method further includes:
and outputting prompt information to prompt the user that the client is in the equipment locking state currently.
8. An apparatus operation processing device, applied to a client, includes:
the registration module is used for registering the target shielding program at the bottom layer of the system;
the data receiving module is used for receiving data to be processed and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, and the system bottom layer informs the target shielding program to process the data to be processed;
and the operation shielding module is used for identifying whether the data to be processed belongs to a preset shielding data type or not by the target shielding program, and discarding the data to be processed when the data to be processed is identified to belong to the preset shielding data type.
9. A storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the method of any of claims 1 to 7.
10. A computer device comprising a storage medium, a processor and a computer program stored on the storage medium and executable on the processor, characterized in that the processor implements the method of any one of claims 1 to 7 when executing the computer program.
CN202110832827.9A 2021-07-22 2021-07-22 Equipment operation processing method and device, storage medium and computer equipment Active CN113687925B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110832827.9A CN113687925B (en) 2021-07-22 2021-07-22 Equipment operation processing method and device, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110832827.9A CN113687925B (en) 2021-07-22 2021-07-22 Equipment operation processing method and device, storage medium and computer equipment

Publications (2)

Publication Number Publication Date
CN113687925A true CN113687925A (en) 2021-11-23
CN113687925B CN113687925B (en) 2023-09-29

Family

ID=78577751

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110832827.9A Active CN113687925B (en) 2021-07-22 2021-07-22 Equipment operation processing method and device, storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN113687925B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114265660A (en) * 2022-03-01 2022-04-01 成都鲁易科技有限公司 Desktop screen locking method and device, storage medium and computer equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1553316A (en) * 2003-03-12 2004-12-08 中兴通讯股份有限公司 Universal locking system of windows applied programm interface and method thereof
CN102681845A (en) * 2012-04-24 2012-09-19 深圳创维数字技术股份有限公司 Method and device for managing input events
WO2014032413A1 (en) * 2012-08-31 2014-03-06 华为技术有限公司 Method, controller and system for processing data packet
CN105893886A (en) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 System locking method and device
CN106909295A (en) * 2015-12-23 2017-06-30 北京奇虎科技有限公司 The processing method and terminal of application program
CN109165059A (en) * 2018-07-11 2019-01-08 小草数语(北京)科技有限公司 page locking method and device thereof
CN109977703A (en) * 2019-03-26 2019-07-05 北京智游网安科技有限公司 A kind of encryption method of safety keyboard, storage medium and terminal device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1553316A (en) * 2003-03-12 2004-12-08 中兴通讯股份有限公司 Universal locking system of windows applied programm interface and method thereof
CN102681845A (en) * 2012-04-24 2012-09-19 深圳创维数字技术股份有限公司 Method and device for managing input events
WO2014032413A1 (en) * 2012-08-31 2014-03-06 华为技术有限公司 Method, controller and system for processing data packet
CN106909295A (en) * 2015-12-23 2017-06-30 北京奇虎科技有限公司 The processing method and terminal of application program
CN105893886A (en) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 System locking method and device
CN109165059A (en) * 2018-07-11 2019-01-08 小草数语(北京)科技有限公司 page locking method and device thereof
CN109977703A (en) * 2019-03-26 2019-07-05 北京智游网安科技有限公司 A kind of encryption method of safety keyboard, storage medium and terminal device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵英涛等: "基于Linux的轻量级嵌入式GUI系统及实现", 《微计算机信息》, pages 77 - 78 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114265660A (en) * 2022-03-01 2022-04-01 成都鲁易科技有限公司 Desktop screen locking method and device, storage medium and computer equipment
CN114265660B (en) * 2022-03-01 2022-05-03 成都鲁易科技有限公司 Desktop screen locking method and device, storage medium and computer equipment

Also Published As

Publication number Publication date
CN113687925B (en) 2023-09-29

Similar Documents

Publication Publication Date Title
JP6228966B2 (en) Computing device that detects malware
US8595834B2 (en) Detecting unauthorized use of computing devices based on behavioral patterns
US9183392B2 (en) Anti-malware tool for mobile apparatus
EP3245609A1 (en) Intelligent context aware user interaction for malware detection
EP2769327A1 (en) System and method for whitelisting applications in a mobile network environment
CN108932428B (en) Lesog software processing method, device, equipment and readable storage medium
Schmidt et al. Malicious software for smartphones
Schmidt Detection of smartphone malware
CN108804915A (en) Virus method for cleaning, storage device and electric terminal
JP2011233081A (en) Application determination system and program
CN110865774B (en) Information security detection method and device for printing equipment
CN113687925A (en) Equipment operation processing method and device, storage medium and computer equipment
US8479293B2 (en) Security technique for an open computing platform system
Muzammal et al. ScreenStealer: Addressing screenshot attacks on android devices
CN115378686A (en) Sandbox application method and device of industrial control network and storage medium
CN111444539B (en) Authority processing method and device, storage medium and terminal
Yuan et al. Smartpatch: Verifying the authenticity of the trigger-event in the IoT platform
CN114035812A (en) Application software installation and/or operation method, device, electronic equipment and storage medium
CN113515744A (en) Malicious document detection method, device and system, electronic device and storage medium
CN115801466B (en) Flow-based mining script detection method and device
KR101667117B1 (en) Method and device to defend against the phishing of short message service based on operating system
CN110691095B (en) Data processing method, device and equipment based on data security room and storage medium
JP2015055960A (en) Monitoring device, information processing system, monitoring method, and program
Khan et al. Differences in Inter-App Communication Between Android and iOS Systems
CN111030987A (en) Correlation analysis method and device for multiple safety devices and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant