CN113687925A - Equipment operation processing method and device, storage medium and computer equipment - Google Patents
Equipment operation processing method and device, storage medium and computer equipment Download PDFInfo
- Publication number
- CN113687925A CN113687925A CN202110832827.9A CN202110832827A CN113687925A CN 113687925 A CN113687925 A CN 113687925A CN 202110832827 A CN202110832827 A CN 202110832827A CN 113687925 A CN113687925 A CN 113687925A
- Authority
- CN
- China
- Prior art keywords
- data
- processed
- program
- shielding
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4812—Task transfer initiation or dispatching by interrupt, e.g. masked
Abstract
The application discloses a device operation processing method and device, a storage medium and computer equipment, wherein the method comprises the following steps: registering a target shielding program at a system bottom layer; receiving data to be processed, and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, wherein the system bottom layer informs the target shielding program to process the data to be processed; and the target shielding program identifies whether the data to be processed belongs to a preset shielding data type, and discards the data to be processed when the data to be processed is identified to belong to the preset shielding data type. According to the method and the device, the target shielding program is registered at the bottom layer of the system, the type of the data to be processed can be identified through the target shielding program, then the shielding of user operation is realized, the client equipment is prevented from being disturbed by the user operation, the running efficiency of the program in the client equipment is ensured, and the safety of the client equipment is protected.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to a device operation processing method and apparatus, a storage medium, and a computer device.
Background
With the widespread popularization of electronic information technology, more and more families purchase computers, and many users download files, compile files, write documents and the like by using the computers. In some application environments, a computer needs to be kept in a boot running state continuously, for example, when downloading and transmitting resources, many users do not always wait before the computer after starting a downloading task and a transmitting task in these usage scenarios, and at this time, the computer may be used by other people, for example, a child at home may play the computer when a parent is not present, which not only causes the task execution speed of the computer to be slow, for example, the speed of downloading and transmitting data to be slow, but also may cause the child to be addicted to the computer.
Disclosure of Invention
In view of this, the present application provides a device operation processing method and apparatus, a storage medium, and a computer device, which are helpful for implementing shielding of user operations in a specific scenario.
According to an aspect of the present application, there is provided a device operation processing method, applied to a client, including:
registering a target shielding program at a system bottom layer;
receiving data to be processed, and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, wherein the system bottom layer informs the target shielding program to process the data to be processed;
and the target shielding program identifies whether the data to be processed belongs to a preset shielding data type, and discards the data to be processed when the data to be processed is identified to belong to the preset shielding data type.
Optionally, the preset masked data type includes a device type of a preset input device;
the target shielding program identifies whether the data to be processed belongs to a preset shielding data type, and discards the data to be processed when the data to be processed is identified to belong to the preset shielding data type, and the method specifically includes:
the target shielding program identifies whether the data to be processed is data input through input equipment or not, and acquires an input equipment type corresponding to the data to be processed when the data to be processed is the data input through the input equipment;
and if the input equipment type corresponding to the data to be processed belongs to the equipment type of the preset input equipment, discarding the data to be processed.
Optionally, after the input device type corresponding to the data to be processed is obtained, the method further includes:
and if the input equipment type corresponding to the data to be processed does not belong to the equipment type of the preset input equipment, transmitting the data to be processed to a corresponding application program so as to process the data to be processed through the application program.
Optionally, the registering a target mask program at the system bottom layer specifically includes:
receiving an equipment locking instruction input by a user, and starting an equipment protection tool;
registering the target shielding program at the system bottom layer through the equipment protection tool.
Optionally, the device protection tool includes preset protection tool shutdown input information, where the preset protection tool shutdown input information is used to instruct to logout device input data of the target shielding program; before the obtaining of the input device type corresponding to the data to be processed, the method further includes:
judging whether the data to be processed is matched with preset protection tool closing input information or not;
if not, acquiring the input equipment type corresponding to the data to be processed;
and if so, logging out the target shielding program.
Optionally, the device lock instruction comprises a program logout time and/or a program logout signal; after the target masker is registered at the system bottom layer by the device protection tool, the method further comprises:
when the program logout time is reached, logging out the target shielding program; and/or the presence of a gas in the gas,
and when the program logout signal is monitored, logging out the target shielding program.
Optionally, after the target shielding program is registered at the system bottom level, the method further includes:
controlling the client to enter a screen locking state;
correspondingly, if the input device type corresponding to the data to be processed belongs to the device type of the preset input device, the method further includes:
and outputting prompt information to prompt the user that the client is in the equipment locking state currently.
According to another aspect of the present application, there is provided a device operation processing apparatus, applied to a client, including:
the registration module is used for registering the target shielding program at the bottom layer of the system;
the data receiving module is used for receiving data to be processed and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, and the system bottom layer informs the target shielding program to process the data to be processed;
and the operation shielding module is used for identifying whether the data to be processed belongs to a preset shielding data type or not by the target shielding program, and discarding the data to be processed when the data to be processed is identified to belong to the preset shielding data type.
Optionally, the preset masked data type includes a device type of a preset input device;
the operation shielding module is specifically configured to:
the target shielding program identifies whether the data to be processed is data input through input equipment or not, and acquires an input equipment type corresponding to the data to be processed when the data to be processed is the data input through the input equipment;
and if the input equipment type corresponding to the data to be processed belongs to the equipment type of the preset input equipment, discarding the data to be processed.
Optionally, the apparatus further comprises:
and the data processing module is used for transmitting the data to be processed to a corresponding application program to process the data to be processed through the application program if the input device type corresponding to the data to be processed does not belong to the device type of the preset input device after the input device type corresponding to the data to be processed is obtained.
Optionally, the registration module is specifically configured to:
receiving an equipment locking instruction input by a user, and starting an equipment protection tool;
registering the target shielding program at the system bottom layer through the equipment protection tool.
Optionally, the device protection tool includes preset protection tool shutdown input information, where the preset protection tool shutdown input information is used to instruct to logout device input data of the target shielding program; the device further comprises:
the data identification module is used for judging whether the data to be processed is matched with the preset protection tool closing input information before the input equipment type corresponding to the data to be processed is obtained; if not, acquiring the input equipment type corresponding to the data to be processed; and if so, logging out the target shielding program.
Optionally, the device lock instruction comprises a program logout time and/or a program logout signal; the device further comprises:
a logout module, configured to logout the target shielding program when the program logout time is reached after the target shielding program is registered at the system bottom layer by the device protection tool; and/or logging out the target shielding program when monitoring the program logging-out signal.
Optionally, the apparatus further comprises:
the screen locking module is used for controlling the client to enter a screen locking state after the target shielding program is registered at the bottom layer of the system;
correspondingly, the operation shielding module is further configured to output a prompt message to prompt a user that the client is currently in an equipment locking state if the input equipment type corresponding to the data to be processed belongs to the equipment type of the preset input equipment.
According to still another aspect of the present application, there is provided a storage medium having stored thereon a computer program which, when executed by a processor, implements the above-described device operation processing method.
According to yet another aspect of the present application, there is provided a computer device, including a storage medium, a processor, and a computer program stored on the storage medium and executable on the processor, the processor implementing the above device operation processing method when executing the program.
By means of the technical scheme, the device operation processing method and device, the storage medium and the computer device, provided by the application, the target shielding program is registered in the system bottom layer, so that when the data to be processed is transmitted to the system bottom layer, the system bottom layer informs the target shielding program to process the data, the target shielding program can specifically identify the data type of the data to be processed, and when the data to be processed is identified to belong to the preset shielding data type, the data to be processed is discarded, so that the shielding of the data to be processed is realized. According to the method and the device, the target shielding program is registered at the bottom layer of the system, the type of the data to be processed can be identified through the target shielding program, then the shielding of user operation is realized, the client equipment is prevented from being disturbed by the user operation, the running efficiency of the program in the client equipment is ensured, and the safety of the client equipment is protected.
The foregoing description is only an overview of the technical solutions of the present application, and the present application can be implemented according to the content of the description in order to make the technical means of the present application more clearly understood, and the following detailed description of the present application is given in order to make the above and other objects, features, and advantages of the present application more clearly understandable.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flow chart illustrating a method for processing device operations according to an embodiment of the present application;
FIG. 2 is a flow chart illustrating another method for processing device operations according to an embodiment of the present disclosure;
fig. 3 shows a schematic structural diagram of an apparatus operation processing device provided in an embodiment of the present application.
Detailed Description
The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
In this embodiment, a device operation processing method is provided, as shown in fig. 1, the method including:
102, receiving data to be processed, and sequentially transmitting the data to be processed to a hardware abstraction layer and a system bottom layer, wherein the system bottom layer informs a target shielding program to process the data to be processed;
The embodiment of the application can be applied to a client, and specifically can include a computer device. In this embodiment, the target shielding program may be integrated in the device protection tool, for example, the device protection tool may specifically be a device locking tool, and after the device protection tool is installed and started in the computer device, the target shielding program is registered by the device protection tool.
In an actual application scenario, the operation of the user on the computer device is almost completed through an external hardware device, for example, the operation on the computer device is realized through a bluetooth or USB input device such as a mouse or a keyboard, and therefore, in some application scenarios where other users do not want to use the computer device, the protection on the computer device can be realized by shielding the operation data of the hardware device. In an operating system of computer equipment, after a user operates the equipment, operating data of the user can be input into a hardware abstraction layer (HAL layer), and then is transmitted into a system bottom layer through the HAL layer, and the system bottom layer transmits the operating data to a corresponding application program so as to process the operating data through the application program, thereby realizing response to the user operation. Therefore, the embodiment of the application realizes the shielding of the user operation in a mode of shielding the user operation data at the bottom layer of the system.
Firstly, a target shielding program is registered in a system bottom layer of an operating system, and after the program is registered in the system bottom layer and data input behaviors exist in the system, the target shielding program is firstly informed to process and then is transmitted to other programs in an application layer. Then, after registering the target shielding program, when the operating system receives the data to be processed, the data to be processed is transmitted to the HAL layer first and then to the system bottom layer, and after the system bottom layer receives the data to be processed, the system bottom layer notifies the target shielding program of the received data to be processed due to the fact that the target shielding program is registered in advance. Finally, after receiving the notification, the target shielding program may identify the data type of the data to be processed to identify whether the data to be processed belongs to the data type to be shielded, that is, identify whether the data to be processed belongs to a preset shielding data type, where the preset shielding data type may specifically be input data of the hardware device, and when the data to be processed is identified to belong to the input data of the hardware device, discard the data to be processed to shield the user operation.
By applying the technical scheme of the embodiment, the target shielding program is registered in the system bottom layer, so that when the data to be processed is transmitted to the system bottom layer, the system bottom layer informs the target shielding program to process the data, the target shielding program can specifically identify the data type of the data to be processed, and when the data to be processed is identified to belong to the preset shielding data type, the data to be processed is discarded, so that the shielding of the data to be processed is realized. According to the method and the device, the target shielding program is registered at the bottom layer of the system, the type of the data to be processed can be identified through the target shielding program, and then the shielding of user operation is realized, the client device is prevented from being disturbed by the user operation, the running efficiency of the program in the client device is ensured, and the safety of the client device is protected.
In this embodiment of the present application, to implement shielding of user operations in a computer device, optionally, the preset shielded data type includes a device type of a preset input device; the step 103 may specifically include:
103-1, identifying whether the data to be processed is data input through an input device by the target shielding program, and acquiring an input device type corresponding to the data to be processed when the data to be processed is the data input through the input device;
103-2, if the input device type corresponding to the data to be processed belongs to the device type of the preset input device, discarding the data to be processed;
and 103-3, if the input device type corresponding to the data to be processed does not belong to the device type of the preset input device, transmitting the data to be processed to a corresponding application program so as to process the data to be processed through the application program.
In the above embodiment, since the operation of the computer device by the user is almost completed through the externally accessed hardware device, it is specifically possible to identify whether the data to be processed is data input by a specific type of externally accessed device, where the preset masked data type may specifically include a device type of the preset input device. When the target shielding program receives the notification of the system bottom layer, whether the data to be processed is the device input data or not can be specifically identified, if the data to be processed is the device input data, whether the input device type corresponding to the data to be processed belongs to the device type of the preset input device or not can be further judged, for example, the preset input device can comprise a USB mouse, a USB keyboard, a bluetooth mouse, a bluetooth keyboard and the like, when the input device type corresponding to the data to be processed is identified to belong to the device type of the preset input device, the data to be processed is discarded, the user operation is shielded, otherwise, the data to be processed can be processed according to the original rule, the data to be processed can be specifically transmitted to the corresponding application program, and therefore, the data to be processed is processed through the corresponding application program, and the response of the data to be processed is achieved.
In an actual application scenario, a user can freely set the type of the input device to be shielded, for example, the user sets to shield an external input device such as a USB mouse, and the user can control the computer device through a mobile phone connected with the computer device in a bluetooth pairing manner, and the bluetooth mobile phone is not set as a preset input device, so that the user can respond to the operation of the computer device through the bluetooth mobile phone, and the shielding of the computer device is more flexible and better meets the user requirements.
In this embodiment of the present application, the target shielding program may be registered through an equipment protection tool, and optionally, step 101 may specifically include:
step 101-1, receiving an equipment locking instruction input by a user, and starting an equipment protection tool;
step 101-2, registering the target shielding program at the system bottom layer through the equipment protection tool.
In the above embodiment, the device protection tool may be installed in the computer device in advance, and when some operations in the device need to be shielded, the installed device protection tool in the computer device may be started, and after the device protection tool is started, the target shielding program may be registered in the system bottom layer. In a particular application scenario, the device protection tool is launched in response to a device lock instruction. Wherein the device lock instruction may be generated based on an active operation by the user, such as a double-click of the device protection tool by the user to trigger the tool to start. Or automatically generating the device locking instruction after detecting that the computer device reaches a certain condition, for example, when the computer device detects that the downloading task of the downloading tool runs for more than a preset time and the computer device does not receive any operation data of the hardware input device within the preset time, the device locking instruction may be automatically generated, and the device protection tool may be started. Of course, other automatic starting conditions may also be set, and the embodiment of the present application is not limited herein.
In this embodiment of the application, optionally, the device protection tool includes preset protection tool closing input information, where the preset protection tool closing input information is used to instruct to logout device input data of the target shielding program; in step 103-1, before the obtaining of the input device type corresponding to the data to be processed, the method further includes: judging whether the data to be processed is matched with preset protection tool closing input information or not; if not, acquiring the input equipment type corresponding to the data to be processed; and if so, logging out the target shielding program.
In the above embodiment, a command to logout the target shielding program and to close the device protection tool may also be set, that is, the preset protection tool closes the input information, and the user may logout the target shielding program and close the device protection tool by inputting data matched with the preset protection tool close input information, so that the computer device is restored to the normal use state. In a specific application scenario, when it is recognized that the data to be processed is data input by the input device, it may be determined whether the data to be processed matches preset protection tool closing input information, for example, the preset protection tool closing input information is a plurality of key identifiers on the keyboard device, when a user wants to resume normal use of the computer device, the user may trigger closing of the device protection tool by pressing the preset key, when it is determined that the data to be processed simultaneously presses the preset keys, that is, when the data to be processed matches preset protection attack closing input information, the target shielding program is cancelled, and the device protection tool is closed, otherwise it indicates that the input operation of the external device is not an operation that the user wants to resume normal use of the computer device, but may be a false touch or unauthorized use by other people, the process of obtaining the input device type corresponding to the data to be processed in step 103-1 may be further performed, and continuously judging whether the input equipment type of the data to be processed is the equipment type of the preset input equipment or not so as to identify whether the data to be processed should be discarded or not.
In this embodiment of the present application, optionally, the device lock instruction includes a program logout time and/or a program logout signal; after step 101, the method further comprises:
step 104, when the program logout time is reached, logging out the target shielding program; and/or logging out the target shielding program when monitoring the program logging-out signal.
In the above embodiment, the device locking instruction may include a program logout time and/or a program logout signal, for example, while a user issues a device locking instruction to open the device protection tool, the user may specify a closing time and/or a closing signal of the device protection tool, that is, the program logout time and/or the program logout signal, when the closing time is reached and/or the closing signal is detected, the device protection tool may logout the target mask program at the bottom layer of the system, so that when the specific time is reached and the specific signal is sensed, the computer device may resume normal use, for example, after the program logout time is 2 hours, the target mask program is counted from registration, and after 2 hours, the target mask program is automatically logged out, for example, the program logout signal is a signal of the end of downloading a specific file, when the downloading of the specific file is ended, and automatically logging out the target shielding program so that the computer equipment is not used by other people when the downloading task is executed, and the downloading speed is ensured.
In this embodiment of the present application, optionally, step 101 may further include: controlling the client to enter a screen locking state; correspondingly, if the input device type corresponding to the data to be processed belongs to the device type of the preset input device, the method may further include: and outputting prompt information to prompt the user that the client is in the equipment locking state currently.
In the above embodiment, after the device protection tool is opened and the target shielding program is registered, the screen of the computer device may be locked, and specifically, the screen-locking screen saver may be displayed, so that other users are prevented from seeing the operation condition of the computer device. The unlocking time of the device, namely the program logout time, can also be prompted so that the user can use the device after the device is unlocked.
In a specific application scene, optionally, the starting time and the closing time of the device protection tool can be set, so that the device can be automatically started and closed at corresponding time, the device can be used by children in a specific time period, and the phenomenon that the children use computers for a long time to influence eyesight and indulge in networks is avoided.
Further, as a refinement and an extension of the specific implementation of the above embodiment, in order to fully illustrate the specific implementation process of the embodiment, another device operation processing method is provided, as shown in fig. 2, and the method includes:
step 207, if the input device type corresponding to the data to be processed does not belong to the device type of the preset input device, transmitting the data to be processed to a corresponding application program, so as to process the data to be processed through the application program.
Further, as a specific implementation of the method in fig. 1, an embodiment of the present application provides an apparatus for processing device operations, which is applied to a client, and as shown in fig. 3, the apparatus includes:
the registration module is used for registering the target shielding program at the bottom layer of the system;
the data receiving module is used for receiving data to be processed and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, and the system bottom layer informs the target shielding program to process the data to be processed;
and the operation shielding module is used for identifying whether the data to be processed belongs to a preset shielding data type or not by the target shielding program, and discarding the data to be processed when the data to be processed is identified to belong to the preset shielding data type.
Optionally, the preset masked data type includes a device type of a preset input device;
the operation shielding module is specifically configured to:
the target shielding program identifies whether the data to be processed is data input through input equipment or not, and acquires an input equipment type corresponding to the data to be processed when the data to be processed is the data input through the input equipment;
and if the input equipment type corresponding to the data to be processed belongs to the equipment type of the preset input equipment, discarding the data to be processed.
Optionally, the apparatus further comprises:
and the data processing module is used for transmitting the data to be processed to a corresponding application program to process the data to be processed through the application program if the input device type corresponding to the data to be processed does not belong to the device type of the preset input device after the input device type corresponding to the data to be processed is obtained.
Optionally, the registration module is specifically configured to:
receiving an equipment locking instruction input by a user, and starting an equipment protection tool;
registering the target shielding program at the system bottom layer through the equipment protection tool.
Optionally, the device protection tool includes preset protection tool shutdown input information, where the preset protection tool shutdown input information is used to instruct to logout device input data of the target shielding program; the device further comprises:
the data identification module is used for judging whether the data to be processed is matched with the preset protection tool closing input information before the input equipment type corresponding to the data to be processed is obtained; if not, acquiring the input equipment type corresponding to the data to be processed; and if so, logging out the target shielding program.
Optionally, the device lock instruction comprises a program logout time and/or a program logout signal; the device further comprises:
a logout module, configured to logout the target shielding program when the program logout time is reached after the target shielding program is registered at the system bottom layer by the device protection tool; and/or logging out the target shielding program when monitoring the program logging-out signal.
Optionally, the apparatus further comprises:
the screen locking module is used for controlling the client to enter a screen locking state after the target shielding program is registered at the bottom layer of the system;
correspondingly, the operation shielding module is further configured to output a prompt message to prompt a user that the client is currently in an equipment locking state if the input equipment type corresponding to the data to be processed belongs to the equipment type of the preset input equipment.
It should be noted that other corresponding descriptions of the functional units related to the device operation processing apparatus provided in the embodiment of the present application may refer to corresponding descriptions in the methods in fig. 1 to fig. 2, and are not described again here.
Based on the method shown in fig. 1 to 2, correspondingly, the present application further provides a storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the method for processing the device operation shown in fig. 1 to 2 is implemented.
Based on such understanding, the technical solution of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the implementation scenarios of the present application.
Based on the above methods shown in fig. 1 to fig. 2 and the virtual device embodiment shown in fig. 3, in order to achieve the above object, an embodiment of the present application further provides a computer device, which may specifically be a personal computer, a server, a network device, and the like, where the computer device includes a storage medium and a processor; a storage medium for storing a computer program; a processor for executing a computer program to implement the above-described device operation processing method as shown in fig. 1 to 2.
Optionally, the computer device may also include a user interface, a network interface, a camera, Radio Frequency (RF) circuitry, sensors, audio circuitry, a WI-FI module, and so forth. The user interface may include a Display screen (Display), an input unit such as a keypad (Keyboard), etc., and the optional user interface may also include a USB interface, a card reader interface, etc. The network interface may optionally include a standard wired interface, a wireless interface (e.g., a bluetooth interface, WI-FI interface), etc.
It will be appreciated by those skilled in the art that the present embodiment provides a computer device architecture that is not limiting of the computer device, and that may include more or fewer components, or some components in combination, or a different arrangement of components.
The storage medium may further include an operating system and a network communication module. An operating system is a program that manages and maintains the hardware and software resources of a computer device, supporting the operation of information handling programs, as well as other software and/or programs. The network communication module is used for realizing communication among components in the storage medium and other hardware and software in the entity device.
Through the description of the above embodiments, those skilled in the art can clearly understand that the present application may be implemented by software plus a necessary general hardware platform, and may also register the target mask program in the system bottom layer by hardware, so that when the data to be processed is transferred to the system bottom layer, the system bottom layer notifies the target mask program to process the data, and the target mask program may specifically identify the data type of the data to be processed, and when it is identified that the data to be processed belongs to the preset mask data type, discard the data to be processed, so as to implement the masking of the data to be processed. According to the method and the device, the target shielding program is registered at the bottom layer of the system, the type of the data to be processed can be identified through the target shielding program, and then the shielding of user operation is realized, the client device is prevented from being disturbed by the user operation, the running efficiency of the program in the client device is ensured, and the safety of the client device is protected.
Those skilled in the art will appreciate that the figures are merely schematic representations of one preferred implementation scenario and that the blocks or flow diagrams in the figures are not necessarily required to practice the present application. Those skilled in the art will appreciate that the modules in the devices in the implementation scenario may be distributed in the devices in the implementation scenario according to the description of the implementation scenario, or may be located in one or more devices different from the present implementation scenario with corresponding changes. The modules of the implementation scenario may be combined into one module, or may be further split into a plurality of sub-modules.
The above application serial numbers are for description purposes only and do not represent the superiority or inferiority of the implementation scenarios. The above disclosure is only a few specific implementation scenarios of the present application, but the present application is not limited thereto, and any variations that can be made by those skilled in the art are intended to fall within the scope of the present application.
Claims (10)
1. The device operation processing method is applied to a client and comprises the following steps:
registering a target shielding program at a system bottom layer;
receiving data to be processed, and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, wherein the system bottom layer informs the target shielding program to process the data to be processed;
and the target shielding program identifies whether the data to be processed belongs to a preset shielding data type, and discards the data to be processed when the data to be processed is identified to belong to the preset shielding data type.
2. The method of claim 1, wherein the preset masked data type comprises a device type of a preset input device; the target shielding program identifies whether the data to be processed belongs to a preset shielding data type, and discards the data to be processed when the data to be processed is identified to belong to the preset shielding data type, and the method specifically includes:
the target shielding program identifies whether the data to be processed is data input through input equipment or not, and acquires an input equipment type corresponding to the data to be processed when the data to be processed is the data input through the input equipment;
and if the input equipment type corresponding to the data to be processed belongs to the equipment type of the preset input equipment, discarding the data to be processed.
3. The method according to claim 2, wherein after the obtaining of the input device type corresponding to the data to be processed, the method further comprises:
and if the input equipment type corresponding to the data to be processed does not belong to the equipment type of the preset input equipment, transmitting the data to be processed to a corresponding application program so as to process the data to be processed through the application program.
4. The method according to claim 2, wherein the registering of the target masker at the system bottom layer specifically comprises:
receiving an equipment locking instruction input by a user, and starting an equipment protection tool;
registering the target shielding program at the system bottom layer through the equipment protection tool.
5. The method according to claim 4, wherein the device protection tool includes preset protection tool shutdown input information, the preset protection tool shutdown input information being used to instruct to log out device input data of the target shielding program; before the obtaining of the input device type corresponding to the data to be processed, the method further includes:
judging whether the data to be processed is matched with preset protection tool closing input information or not;
if not, acquiring the input equipment type corresponding to the data to be processed;
and if so, logging out the target shielding program.
6. Method according to claim 4 or 5, characterized in that the device lock instruction comprises a program logout time and/or a program logout signal; after the target masker is registered at the system bottom layer by the device protection tool, the method further comprises:
when the program logout time is reached, logging out the target shielding program; and/or the presence of a gas in the gas,
and when the program logout signal is monitored, logging out the target shielding program.
7. The method according to any one of claims 2 to 5, wherein after registering the target masker at the system bottom level, the method further comprises:
controlling the client to enter a screen locking state;
correspondingly, if the input device type corresponding to the data to be processed belongs to the device type of the preset input device, the method further includes:
and outputting prompt information to prompt the user that the client is in the equipment locking state currently.
8. An apparatus operation processing device, applied to a client, includes:
the registration module is used for registering the target shielding program at the bottom layer of the system;
the data receiving module is used for receiving data to be processed and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, and the system bottom layer informs the target shielding program to process the data to be processed;
and the operation shielding module is used for identifying whether the data to be processed belongs to a preset shielding data type or not by the target shielding program, and discarding the data to be processed when the data to be processed is identified to belong to the preset shielding data type.
9. A storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the method of any of claims 1 to 7.
10. A computer device comprising a storage medium, a processor and a computer program stored on the storage medium and executable on the processor, characterized in that the processor implements the method of any one of claims 1 to 7 when executing the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110832827.9A CN113687925B (en) | 2021-07-22 | 2021-07-22 | Equipment operation processing method and device, storage medium and computer equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110832827.9A CN113687925B (en) | 2021-07-22 | 2021-07-22 | Equipment operation processing method and device, storage medium and computer equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113687925A true CN113687925A (en) | 2021-11-23 |
CN113687925B CN113687925B (en) | 2023-09-29 |
Family
ID=78577751
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110832827.9A Active CN113687925B (en) | 2021-07-22 | 2021-07-22 | Equipment operation processing method and device, storage medium and computer equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113687925B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114265660A (en) * | 2022-03-01 | 2022-04-01 | 成都鲁易科技有限公司 | Desktop screen locking method and device, storage medium and computer equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1553316A (en) * | 2003-03-12 | 2004-12-08 | 中兴通讯股份有限公司 | Universal locking system of windows applied programm interface and method thereof |
CN102681845A (en) * | 2012-04-24 | 2012-09-19 | 深圳创维数字技术股份有限公司 | Method and device for managing input events |
WO2014032413A1 (en) * | 2012-08-31 | 2014-03-06 | 华为技术有限公司 | Method, controller and system for processing data packet |
CN105893886A (en) * | 2016-04-01 | 2016-08-24 | 乐视控股(北京)有限公司 | System locking method and device |
CN106909295A (en) * | 2015-12-23 | 2017-06-30 | 北京奇虎科技有限公司 | The processing method and terminal of application program |
CN109165059A (en) * | 2018-07-11 | 2019-01-08 | 小草数语(北京)科技有限公司 | page locking method and device thereof |
CN109977703A (en) * | 2019-03-26 | 2019-07-05 | 北京智游网安科技有限公司 | A kind of encryption method of safety keyboard, storage medium and terminal device |
-
2021
- 2021-07-22 CN CN202110832827.9A patent/CN113687925B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1553316A (en) * | 2003-03-12 | 2004-12-08 | 中兴通讯股份有限公司 | Universal locking system of windows applied programm interface and method thereof |
CN102681845A (en) * | 2012-04-24 | 2012-09-19 | 深圳创维数字技术股份有限公司 | Method and device for managing input events |
WO2014032413A1 (en) * | 2012-08-31 | 2014-03-06 | 华为技术有限公司 | Method, controller and system for processing data packet |
CN106909295A (en) * | 2015-12-23 | 2017-06-30 | 北京奇虎科技有限公司 | The processing method and terminal of application program |
CN105893886A (en) * | 2016-04-01 | 2016-08-24 | 乐视控股(北京)有限公司 | System locking method and device |
CN109165059A (en) * | 2018-07-11 | 2019-01-08 | 小草数语(北京)科技有限公司 | page locking method and device thereof |
CN109977703A (en) * | 2019-03-26 | 2019-07-05 | 北京智游网安科技有限公司 | A kind of encryption method of safety keyboard, storage medium and terminal device |
Non-Patent Citations (1)
Title |
---|
赵英涛等: "基于Linux的轻量级嵌入式GUI系统及实现", 《微计算机信息》, pages 77 - 78 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114265660A (en) * | 2022-03-01 | 2022-04-01 | 成都鲁易科技有限公司 | Desktop screen locking method and device, storage medium and computer equipment |
CN114265660B (en) * | 2022-03-01 | 2022-05-03 | 成都鲁易科技有限公司 | Desktop screen locking method and device, storage medium and computer equipment |
Also Published As
Publication number | Publication date |
---|---|
CN113687925B (en) | 2023-09-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6228966B2 (en) | Computing device that detects malware | |
US8595834B2 (en) | Detecting unauthorized use of computing devices based on behavioral patterns | |
US9183392B2 (en) | Anti-malware tool for mobile apparatus | |
EP3245609A1 (en) | Intelligent context aware user interaction for malware detection | |
EP2769327A1 (en) | System and method for whitelisting applications in a mobile network environment | |
CN108932428B (en) | Lesog software processing method, device, equipment and readable storage medium | |
Schmidt et al. | Malicious software for smartphones | |
Schmidt | Detection of smartphone malware | |
CN108804915A (en) | Virus method for cleaning, storage device and electric terminal | |
JP2011233081A (en) | Application determination system and program | |
CN110865774B (en) | Information security detection method and device for printing equipment | |
CN113687925A (en) | Equipment operation processing method and device, storage medium and computer equipment | |
US8479293B2 (en) | Security technique for an open computing platform system | |
Muzammal et al. | ScreenStealer: Addressing screenshot attacks on android devices | |
CN115378686A (en) | Sandbox application method and device of industrial control network and storage medium | |
CN111444539B (en) | Authority processing method and device, storage medium and terminal | |
Yuan et al. | Smartpatch: Verifying the authenticity of the trigger-event in the IoT platform | |
CN114035812A (en) | Application software installation and/or operation method, device, electronic equipment and storage medium | |
CN113515744A (en) | Malicious document detection method, device and system, electronic device and storage medium | |
CN115801466B (en) | Flow-based mining script detection method and device | |
KR101667117B1 (en) | Method and device to defend against the phishing of short message service based on operating system | |
CN110691095B (en) | Data processing method, device and equipment based on data security room and storage medium | |
JP2015055960A (en) | Monitoring device, information processing system, monitoring method, and program | |
Khan et al. | Differences in Inter-App Communication Between Android and iOS Systems | |
CN111030987A (en) | Correlation analysis method and device for multiple safety devices and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |