CN116627272B - Touch control method and device and computer equipment - Google Patents

Touch control method and device and computer equipment Download PDF

Info

Publication number
CN116627272B
CN116627272B CN202310896732.2A CN202310896732A CN116627272B CN 116627272 B CN116627272 B CN 116627272B CN 202310896732 A CN202310896732 A CN 202310896732A CN 116627272 B CN116627272 B CN 116627272B
Authority
CN
China
Prior art keywords
characters
character
model
analysis
coding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310896732.2A
Other languages
Chinese (zh)
Other versions
CN116627272A (en
Inventor
蔡巢
王凯佳
韩伟聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zecheng Electronics Co ltd
Original Assignee
Shenzhen Zecheng Electronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zecheng Electronics Co ltd filed Critical Shenzhen Zecheng Electronics Co ltd
Priority to CN202310896732.2A priority Critical patent/CN116627272B/en
Publication of CN116627272A publication Critical patent/CN116627272A/en
Application granted granted Critical
Publication of CN116627272B publication Critical patent/CN116627272B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/041Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
    • G06F3/0416Control or interface arrangements specially adapted for digitisers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a touch control method, a touch control device and computer equipment, which comprise the steps of collecting authority codes of a user when the user starts electronic equipment; analyzing the authority codes, and analyzing a first characteristic character and a second characteristic character from the authority codes; analyzing the second characteristic character based on the analysis model corresponding to the first characteristic character matching, and obtaining an analysis code as a decryption password, and sequentially decrypting a plurality of folders stored in a database; taking the decrypted folder as a target folder, and taking a touch signal control model in the target folder as a target touch signal control model; and receiving a touch signal of a user on a touch screen of the electronic device, and responding to the touch signal of the user based on the target touch signal control model. Corresponding touch control modes are acquired through a safe means aiming at different users, so that touch control is performed, and the accuracy and the recognition efficiency of touch recognition are improved.

Description

Touch control method and device and computer equipment
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a touch control method, a touch control device, and a computer device.
Background
In modern electronic devices, touch screens have become one of the dominant input modes. Current touch screens typically use capacitive or resistive sensors to detect a user's touch input. Different users have different touch habits, such as touch modes, touch strengths, touch times, etc., when using the touch screen of the electronic device. At present, the same touch control mode is adopted for different users, so that the efficiency and accuracy of touch identification cannot be ensured when different users use the same electronic equipment.
Disclosure of Invention
The invention mainly aims to provide a touch control method, a touch control device and computer equipment, aiming at different users, adopting a corresponding touch control mode to improve the accuracy and the recognition efficiency of touch recognition.
In order to achieve the above object, the present invention provides a touch control method, including the steps of:
when a user starts the electronic equipment, collecting user information of the user; wherein, the user information comprises a permission code input by a user;
analyzing the authority code, and analyzing a first characteristic character and a second characteristic character from the authority code;
Based on the first characteristic characters, matching a corresponding analysis model, and analyzing the second characteristic characters based on the analysis model to obtain analysis codes;
sequentially decrypting the folders stored in the database by taking the analysis code as a decryption password; wherein, each folder stores a touch signal control model which is different from each other, and decryption passwords of each folder are different from each other;
judging whether a folder is decrypted by the decryption password, if so, taking the decrypted folder as a target folder, wherein a touch signal control model in the target folder is taken as a target touch signal control model;
monitoring whether a touch signal of a user is received on a touch screen of the electronic device, and if so, responding to the touch signal of the user based on the target touch signal control model.
Further, the step of analyzing the authority code to analyze the first feature character and the second feature character from the authority code includes:
acquiring model information of electronic equipment, and extracting key characters and target characters from the model information; the target characters are all characters except the key characters in the model information;
Matching a corresponding first analysis rule in the analysis script based on the key character, and analyzing the target character based on the first analysis rule to obtain a corresponding analysis result; the analysis result is a second analysis rule for analyzing the authority code;
analyzing the authority code based on the second analysis rule to obtain a first character combination and a second character combination;
extracting corresponding characters from the first character combination according to a preset first character extraction rule to obtain the first characteristic characters;
matching corresponding second character extraction rules in a database based on the first characteristic characters; and extracting corresponding characters from the second character combination based on the second character extraction rule to obtain the second characteristic characters.
Further, the step of analyzing the second feature character based on the analysis model to obtain an analysis code based on the analysis model corresponding to the first feature character comprises the following steps:
obtaining a standard analysis model stored in a database; the standard analysis model is a standard coding table, and the coding table comprises a mapping relation between sequence numbers and coding characters;
Rearranging the coding characters in the coding table based on the first characteristic characters to obtain an updated coding table;
based on the updated encoding table, encoding the second characteristic characters to obtain corresponding encoding values as the analysis codes; wherein the second feature character is a digital character.
Further, the first feature character is a digital character; the step of rearranging the coding characters in the coding table based on the first characteristic characters to obtain an updated coding table comprises the following steps:
encoding the first characteristic characters based on the encoding table to obtain first encoding values; wherein, the characters in the first coding value are all coding characters in the coding table;
performing de-duplication on the characters in the first coding value to obtain a de-duplication coding value;
removing the same code character as the de-recoded value from the code table, and leaving a plurality of empty code character bits in the code table; acquiring a first empty coding character bit as a target coding character bit;
and sequentially inserting characters in the de-recoded value from the target coding character bits, and translating the arranged coding characters to fill all empty coding character bits, so as to obtain the updated coding table.
Further, the first feature character is a digital character; the step of rearranging the coding characters in the coding table based on the first characteristic characters to obtain an updated coding table comprises the following steps:
performing duplication elimination on each digital character in the first characteristic characters to obtain duplication elimination characteristic characters, and acquiring each digital character in the duplication elimination characteristic characters;
according to the sequence of each digital character in the duplication eliminating characteristic characters, matching the sequence numbers corresponding to each digital character in the coding table as target sequence numbers;
sequentially extracting target coding characters respectively mapped by the target sequence numbers, sequentially combining the target coding characters into target coding character combinations, and deleting the target coding characters respectively mapped by the target sequence numbers;
and inserting each target coding character in the target coding character combination into the first bit of a coding table, and sequentially and backwardly shifting all the coding characters to fill the whole coding table so as to obtain the updated coding table.
Further, the step of matching the corresponding analytical model based on the first characteristic character includes:
Carrying out hash operation on the first characteristic characters to obtain corresponding characteristic hash values;
acquiring a plurality of analytical models stored in a database; wherein each analytical model is an encrypted analytical model;
decrypting each analysis model by taking the characteristic hash value as a decryption password; judging whether decryption is successful, if so, acquiring an analysis model which is successfully decrypted as a preselected analysis model, and acquiring identification information of the preselected analysis model;
carrying out hash operation on the identification information of the pre-selected analytical model to obtain a corresponding model hash value;
searching an identification hash value stored in a designated position of the pre-selected analytical model, and judging whether the model hash value is the same as the identification hash value or not; and if the pre-selected analytical model is the same, the pre-selected analytical model is used as the analytical model matched with the first characteristic characters.
The invention also provides a touch control device, which comprises:
the acquisition unit is used for acquiring user information of a user when the user starts the electronic equipment; wherein, the user information comprises a permission code input by a user;
the first analysis unit is used for analyzing the authority codes and analyzing first characteristic characters and second characteristic characters from the authority codes;
The second analysis unit is used for matching a corresponding analysis model based on the first characteristic characters and analyzing the second characteristic characters based on the analysis model to obtain analysis codes;
the decryption unit is used for sequentially decrypting the folders stored in the database by taking the analysis code as a decryption password; wherein, each folder stores a touch signal control model which is different from each other, and decryption passwords of each folder are different from each other;
the judging unit is used for judging whether the folder is decrypted by the decryption password, if yes, the decrypted folder is used as a target folder, and a touch signal control model in the target folder is used as a target touch signal control model;
and the control unit is used for monitoring whether a touch signal of a user is received on a touch screen of the electronic equipment, and responding to the touch signal of the user based on the target touch signal control model if the touch signal of the user is received.
Further, the first parsing unit is specifically configured to:
acquiring model information of electronic equipment, and extracting key characters and target characters from the model information; the target characters are all characters except the key characters in the model information;
Matching a corresponding first analysis rule in the analysis script based on the key character, and analyzing the target character based on the first analysis rule to obtain a corresponding analysis result; the analysis result is a second analysis rule for analyzing the authority code;
analyzing the authority code based on the second analysis rule to obtain a first character combination and a second character combination;
extracting corresponding characters from the first character combination according to a preset first character extraction rule to obtain the first characteristic characters;
matching corresponding second character extraction rules in a database based on the first characteristic characters; and extracting corresponding characters from the second character combination based on the second character extraction rule to obtain the second characteristic characters.
Further, the second parsing unit matches a corresponding parsing model based on the first feature character, and specifically includes:
carrying out hash operation on the first characteristic characters to obtain corresponding characteristic hash values;
acquiring a plurality of analytical models stored in a database; wherein each analytical model is an encrypted analytical model;
Decrypting each analysis model by taking the characteristic hash value as a decryption password; judging whether decryption is successful, if so, acquiring an analysis model which is successfully decrypted as a preselected analysis model, and acquiring identification information of the preselected analysis model;
carrying out hash operation on the identification information of the pre-selected analytical model to obtain a corresponding model hash value;
searching an identification hash value stored in a designated position of the pre-selected analytical model, and judging whether the model hash value is the same as the identification hash value or not; and if the pre-selected analytical model is the same, the pre-selected analytical model is used as the analytical model matched with the first characteristic characters.
The invention also provides a computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of any of the methods described above when the computer program is executed.
The invention also provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the method of any of the preceding claims.
The touch control method, the touch control device and the computer equipment provided by the invention comprise the steps that when a user starts the electronic equipment, user information of the user is collected; wherein, the user information comprises a permission code input by a user; analyzing the authority code, and analyzing a first characteristic character and a second characteristic character from the authority code; based on the first characteristic characters, matching a corresponding analysis model, and analyzing the second characteristic characters based on the analysis model to obtain analysis codes; sequentially decrypting the folders stored in the database by taking the analysis code as a decryption password; judging whether a folder is decrypted by the decryption password, if so, taking the decrypted folder as a target folder, wherein a touch signal control model in the target folder is taken as a target touch signal control model; monitoring whether a touch signal of a user is received on a touch screen of the electronic device, and if so, responding to the touch signal of the user based on the target touch signal control model. According to the invention, the corresponding touch control mode is acquired through a safe means aiming at different users, so that the touch control is further performed, and the accuracy and the recognition efficiency of touch recognition are improved.
Drawings
FIG. 1 is a schematic diagram showing steps of a touch control method according to an embodiment of the present invention;
FIG. 2 is a block diagram of a touch control device according to an embodiment of the present invention;
fig. 3 is a block diagram schematically illustrating a structure of a computer device according to an embodiment of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1, in one embodiment of the present invention, there is provided a touch control method including the steps of:
step S1, when a user starts an electronic device, user information of the user is collected; wherein, the user information comprises a permission code input by a user;
s2, analyzing the authority codes, and analyzing a first characteristic character and a second characteristic character from the authority codes;
step S3, matching a corresponding analysis model based on the first characteristic characters, and analyzing the second characteristic characters based on the analysis model to obtain analysis codes;
S4, sequentially decrypting the folders stored in the database by taking the analysis code as a decryption password; wherein, each folder stores a touch signal control model which is different from each other, and decryption passwords of each folder are different from each other;
step S5, judging whether a folder is decrypted by the decryption password, if yes, taking the decrypted folder as a target folder, wherein a touch signal control model in the target folder is taken as a target touch signal control model;
and S6, monitoring whether a touch signal of a user is received on a touch screen of the electronic equipment, and if so, responding to the touch signal of the user based on the target touch signal control model.
In this embodiment, the above scheme is applied to touch control of a touch screen in an electronic device, and based on the above scheme, corresponding touch control modes are obtained by a security means for different users, so as to perform touch control, thereby improving accuracy and recognition efficiency of touch recognition.
Specifically, as described in step S1 above, upon the electronic device being started, the system prompts the user to enter a user name and password. After entering the correct user name and password, the system stores the user information into a local database, including the user's name, mobile phone number, mailbox address, etc. In addition, the permission code and the use times input by the user are recorded for subsequent permission verification.
As described in the above step S2, the permission code is a series of numbers or letter combinations input by the user, and is generated through a specific encryption algorithm. In order to ensure security, the system needs to analyze the permission code to acquire the information contained in the permission code. The parsing method can be a key-based encryption algorithm, such as RSA or AES algorithm, or a custom parsing algorithm. In this embodiment, the system uses a custom parsing algorithm to parse the permission code, and extracts the first feature character and the second feature character from the permission code.
As described in the above step S3, the corresponding analytical model is matched according to the first feature character to obtain the information of the second feature character. The analysis model can be a pre-trained neural network model, a decision tree model or other mechanical models, and also can be a rule model written manually. In this embodiment, the system uses a pre-trained neural network model to perform matching, and uses the model to parse the second feature character to obtain the parsed code.
As described in the above step S4, the analysis code is used as the decryption code to sequentially decrypt the touch signal control models stored in different folders. The touch signal control model is a mathematical model describing the operational behavior of a user and may be trained by collecting touch data of the user. In this embodiment, the system stores a plurality of touch signal control models in different folders, and sets an independent decryption password for each folder to ensure security. It is particularly important that each folder stores a touch signal control model which is different from each other, and decryption passwords of each folder are different from each other. It can be understood that the decryption password can only decrypt one folder at most, so as to obtain the corresponding touch signal control model.
As described in step S5 above, it is determined which folder is decrypted, and the folder is taken as the target folder. The touch signal control model in the target folder will be the target touch signal control model.
As described in the above step S6, the touch screen signal of the electronic device is continuously monitored to obtain the operation behavior of the user. When a touch signal of a user is received, the system responds to the touch signal of the user based on the target touch signal control model. The responding mode may be to execute corresponding operation instruction or prompt the user to perform further operation. And converting the touch signal of the user into a specific operation instruction and executing corresponding operation. For example, when the user slides on the screen, the system automatically adjusts the volume; when the user clicks on an icon, the system opens the corresponding application. Meanwhile, the system records the operation behaviors of the user and performs intelligent optimization according to the operation inertia of the user.
Based on the technical scheme, the invention has the following beneficial effects:
the safety is high: the method for analyzing the passwords is used for realizing the management and control of the electronic equipment, so that the problem that the traditional passwords are easy to crack or forget can be effectively avoided, and the safety of the electronic equipment is improved.
The operation is simple: the user can finish the management and control of the electronic equipment by only inputting one permission code, does not need to memorize complex passwords or execute complex operation flows, and improves the user experience.
The flexibility is strong: by adopting a database storage mode, the data and the information in a plurality of folders can be flexibly managed and controlled, and the requirements of different users are met.
In this embodiment, a decryption password is parsed based on a permission code input by a user, and the password is used to decrypt and respond to touch signal control models stored in different folders. The scheme has the advantages of high safety, simplicity in operation and the like, and the safety and the user experience of the electronic equipment can be effectively improved. Meanwhile, the scheme is wide in application range and has good practical application value.
In an embodiment, the step of parsing the authority code to parse the first feature character and the second feature character from the authority code includes:
acquiring model information of electronic equipment, and extracting key characters and target characters from the model information; the target characters are all characters except the key characters in the model information; the device model information may be obtained by accessing system information of the device or calling a related API. And extracting key characters and target characters from the equipment model information according to preset rules. For example, if a character at a specified position of a specified device model is a key character, the character at the specified position may be extracted from the device model information as the key character, and the remaining characters as target characters.
Matching a corresponding first analysis rule in the analysis script based on the key character, and analyzing the target character based on the first analysis rule to obtain a corresponding analysis result; the analysis result is a second analysis rule for analyzing the authority code; and matching the key characters with preset rules to find out corresponding first analysis rules. And analyzing the target character according to the first analysis rule to obtain an analysis result.
Analyzing the authority code based on the second analysis rule to obtain a first character combination and a second character combination;
extracting corresponding characters from the first character combination according to a preset first character extraction rule to obtain the first characteristic characters;
matching corresponding second character extraction rules in a database based on the first characteristic characters; and extracting corresponding characters from the second character combination based on the second character extraction rule to obtain the second characteristic characters. In this embodiment, progressive analysis is required layer by layer according to the analysis rule, so that the security of data is increased, and data leakage caused by easy cracking of the data is avoided.
In an embodiment, the step of obtaining the analysis code based on the first feature character matching the corresponding analysis model and analyzing the second feature character based on the analysis model includes:
obtaining a standard analysis model stored in a database; the standard analysis model is a standard coding table, and the coding table comprises a mapping relation between sequence numbers and coding characters;
rearranging the coding characters in the coding table based on the first characteristic characters to obtain an updated coding table;
based on the updated encoding table, encoding the second characteristic characters to obtain corresponding encoding values as the analysis codes; wherein the second feature character is a digital character.
In this embodiment, a standard parsing model is first obtained from an existing database, and this model is usually formed by experience accumulated in the previous patent application, so that different types of texts can be parsed effectively. And then rearranging the coding characters in the coding table based on the first characteristic characters to obtain an updated coding table; the rearranged updated code table is a unique form of code table that has a higher privacy. And the safety of subsequent data coding is improved. And finally, encoding the second characteristic characters by using the updated encoding table, thereby generating corresponding analysis codes. In this process, the second character is a numeric character and the encoding system is dedicated to the parsing and encoding of numeric characters.
In an embodiment, the first feature character is a digital character; the step of rearranging the coding characters in the coding table based on the first characteristic characters to obtain an updated coding table comprises the following steps:
encoding the first characteristic characters based on the encoding table to obtain first encoding values; wherein, the characters in the first coding value are all coding characters in the coding table;
performing de-duplication on the characters in the first coding value to obtain a de-duplication coding value;
removing the same code character as the de-recoded value from the code table, and leaving a plurality of empty code character bits in the code table; acquiring a first empty coding character bit as a target coding character bit;
and sequentially inserting characters in the de-recoded value from the target coding character bits, and translating the arranged coding characters to fill all empty coding character bits, so as to obtain the updated coding table.
In this embodiment, in order to update the encoding table, the first characteristic character needs to be encoded, that is, the number character is mapped to a corresponding position in the encoding table, and a first encoding value composed of the encoding character is obtained. Then, the characters in the first code value are de-duplicated to obtain a de-recoded value. Next, the encoded characters in the encoding table need to be rearranged in order to insert new characters. Specifically, it is necessary to remove the same code character from the code table as in the de-recoded value and leave a plurality of empty code character bits in the code table. Then, the first empty code character bit needs to be acquired as the target code character bit. Next, characters in the de-recoded value are sequentially inserted from the target code character bit while the code characters arranged later are shifted to fill out all the empty code character bits. This results in an updated encoding table containing the encoded characters rearranged in order. This updated encoding table may be used to encode the digital characters to generate an analytical code.
In an embodiment, the first feature character is a digital character; the step of rearranging the coding characters in the coding table based on the first characteristic characters to obtain an updated coding table comprises the following steps:
performing duplication elimination on each digital character in the first characteristic characters to obtain duplication elimination characteristic characters, and acquiring each digital character in the duplication elimination characteristic characters;
according to the sequence of each digital character in the duplication eliminating characteristic characters, matching the sequence numbers corresponding to each digital character in the coding table as target sequence numbers;
sequentially extracting target coding characters respectively mapped by the target sequence numbers, sequentially combining the target coding characters into target coding character combinations, and deleting the target coding characters respectively mapped by the target sequence numbers;
and inserting each target coding character in the target coding character combination into the first bit of a coding table, and sequentially and backwardly shifting all the coding characters to fill the whole coding table so as to obtain the updated coding table.
In this embodiment, in order to update the encoding table, it is first necessary to perform deduplication on each number character in the first feature character, to obtain a new character string composed of deduplicated feature characters, and to obtain each number character in the character string. Then, the corresponding sequence numbers are sequentially matched in the coding table as target sequence numbers according to the sequence of the number characters in the duplication elimination feature characters. That is, if a certain numeric character is 2, its corresponding sequence number in the encoding table is 2.
Next, it is necessary to sequentially extract the target code characters mapped by the respective target sequence numbers and combine them together to form a target code character combination. Meanwhile, the target coding characters respectively mapped by the numbers of each target sequence are required to be deleted so as to avoid repetition.
Finally, each target coding character in the target coding character combination is inserted into the first bit of the coding table, and all the following coding characters are sequentially shifted backwards to fill the complete coding table. The updated encoding table is thus obtained and can be used to encode digital characters to generate an analytical code.
In an embodiment, the step of matching the corresponding analytical model based on the first feature character includes:
carrying out hash operation on the first characteristic characters to obtain corresponding characteristic hash values;
acquiring a plurality of analytical models stored in a database; wherein each analytical model is an encrypted analytical model;
decrypting each analysis model by taking the characteristic hash value as a decryption password; judging whether decryption is successful, if so, acquiring an analysis model which is successfully decrypted as a preselected analysis model, and acquiring identification information of the preselected analysis model;
Carrying out hash operation on the identification information of the pre-selected analytical model to obtain a corresponding model hash value;
searching an identification hash value stored in a designated position of the pre-selected analytical model, and judging whether the model hash value is the same as the identification hash value or not; and if the pre-selected analytical model is the same, the pre-selected analytical model is used as the analytical model matched with the first characteristic characters.
In this embodiment, a hash operation needs to be performed on the input first feature character to obtain a corresponding feature hash value. Common hash algorithms may be used herein, such as MD5, SHA-1, etc. Then, a stored plurality of encrypted analytical models are obtained from the database. These analytical models are stored in an encrypted form in a database. And taking the calculated characteristic hash value as a decryption password, and performing decryption operation on each encrypted analysis model. Here, the decryption is performed by using a corresponding decryption algorithm, and the characteristic hash value is used as a decryption password. Further, it is judged whether decryption is successful. If the decryption is successful, it is indicated that the current analytical model is one of the pre-selected analytical models that meets the requirements. At this time, the identification information of the pre-selected analytical model needs to be obtained from the decrypted result for verification in the subsequent step.
And carrying out hash operation on the identification information of the pre-selected analytical model to obtain a corresponding model hash value. Also, the calculation may be performed using a common hash algorithm. The identification hash value stored at the specified location in the pre-selected analytical model is retrieved and compared with the calculated model hash value. If the two analysis models are the same, the current pre-selection analysis model is the analysis model meeting the requirement, and the analysis model can be used as the analysis model matched with the first characteristic characters. When an illegal user falsifies the identification information of the pre-selected analysis model, the risk can be judged because the identification hash value stored in the appointed position of the pre-selected analysis model cannot correspond to the model hash value, and the pre-selected analysis model is forbidden to be used as the finally needed analysis model.
In general, the implementation mode of the analytical model based on the first characteristic character matching is simpler, and the analytical model stored in the database is screened only through hash operation and decryption operation, so that the analytical model meeting the requirements is finally obtained.
Referring to fig. 2, in an embodiment of the present invention, there is further provided a touch control apparatus including:
the acquisition unit is used for acquiring user information of a user when the user starts the electronic equipment; wherein, the user information comprises a permission code input by a user;
The first analysis unit is used for analyzing the authority codes and analyzing first characteristic characters and second characteristic characters from the authority codes;
the second analysis unit is used for matching a corresponding analysis model based on the first characteristic characters and analyzing the second characteristic characters based on the analysis model to obtain analysis codes;
the decryption unit is used for sequentially decrypting the folders stored in the database by taking the analysis code as a decryption password; wherein, each folder stores a touch signal control model which is different from each other, and decryption passwords of each folder are different from each other;
the judging unit is used for judging whether the folder is decrypted by the decryption password, if yes, the decrypted folder is used as a target folder, and a touch signal control model in the target folder is used as a target touch signal control model;
and the control unit is used for monitoring whether a touch signal of a user is received on a touch screen of the electronic equipment, and responding to the touch signal of the user based on the target touch signal control model if the touch signal of the user is received.
In an embodiment, the first parsing unit is specifically configured to:
Acquiring model information of electronic equipment, and extracting key characters and target characters from the model information; the target characters are all characters except the key characters in the model information;
matching a corresponding first analysis rule in the analysis script based on the key character, and analyzing the target character based on the first analysis rule to obtain a corresponding analysis result; the analysis result is a second analysis rule for analyzing the authority code;
analyzing the authority code based on the second analysis rule to obtain a first character combination and a second character combination;
extracting corresponding characters from the first character combination according to a preset first character extraction rule to obtain the first characteristic characters;
matching corresponding second character extraction rules in a database based on the first characteristic characters; and extracting corresponding characters from the second character combination based on the second character extraction rule to obtain the second characteristic characters.
In an embodiment, the second parsing unit matches a corresponding parsing model based on the first feature character, and specifically includes:
Carrying out hash operation on the first characteristic characters to obtain corresponding characteristic hash values;
acquiring a plurality of analytical models stored in a database; wherein each analytical model is an encrypted analytical model;
decrypting each analysis model by taking the characteristic hash value as a decryption password; judging whether decryption is successful, if so, acquiring an analysis model which is successfully decrypted as a preselected analysis model, and acquiring identification information of the preselected analysis model;
carrying out hash operation on the identification information of the pre-selected analytical model to obtain a corresponding model hash value;
searching an identification hash value stored in a designated position of the pre-selected analytical model, and judging whether the model hash value is the same as the identification hash value or not; and if the pre-selected analytical model is the same, the pre-selected analytical model is used as the analytical model matched with the first characteristic characters.
In this embodiment, for specific implementation of each unit in the above embodiment of the apparatus, please refer to the description in the above embodiment of the method, and no further description is given here.
Referring to fig. 3, in an embodiment of the present invention, there is further provided a computer device, which may be a server, and an internal structure thereof may be as shown in fig. 3. The computer device includes a processor, a memory, a display screen, an input device, a network interface, and a database connected by a system bus. Wherein the computer is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used to store the corresponding data in this embodiment. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements the touch control method described above.
It will be appreciated by those skilled in the art that the architecture shown in fig. 3 is merely a block diagram of a portion of the architecture in connection with the present inventive arrangements and is not intended to limit the computer devices to which the present inventive arrangements are applicable.
An embodiment of the present invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the above-described touch control method. It is understood that the computer readable storage medium in this embodiment may be a volatile readable storage medium or a nonvolatile readable storage medium.
In summary, the touch control method, the touch control device and the computer device in the embodiments of the present invention include collecting user information of a user when the user starts the electronic device; wherein, the user information comprises a permission code input by a user; analyzing the authority code, and analyzing a first characteristic character and a second characteristic character from the authority code; based on the first characteristic characters, matching a corresponding analysis model, and analyzing the second characteristic characters based on the analysis model to obtain analysis codes; sequentially decrypting the folders stored in the database by taking the analysis code as a decryption password; judging whether a folder is decrypted by the decryption password, if so, taking the decrypted folder as a target folder, wherein a touch signal control model in the target folder is taken as a target touch signal control model; monitoring whether a touch signal of a user is received on a touch screen of the electronic device, and if so, responding to the touch signal of the user based on the target touch signal control model. According to the invention, the corresponding touch control mode is acquired through a safe means aiming at different users, so that the touch control is further performed, and the accuracy and the recognition efficiency of touch recognition are improved.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium provided by the present invention and used in embodiments may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual data rate SDRAM (SSRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM, among others.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, apparatus, article or method that comprises the element.
The foregoing description is only of the preferred embodiments of the present invention and is not intended to limit the scope of the invention, and all equivalent structures or equivalent processes using the descriptions and drawings of the present invention or direct or indirect application in other related technical fields are included in the scope of the present invention.

Claims (8)

1. A touch control method, comprising the steps of:
when a user starts the electronic equipment, collecting user information of the user; wherein, the user information comprises a permission code input by a user;
Analyzing the authority code, and analyzing a first characteristic character and a second characteristic character from the authority code;
based on the first characteristic characters, matching a corresponding analysis model, and analyzing the second characteristic characters based on the analysis model to obtain analysis codes;
sequentially decrypting the folders stored in the database by taking the analysis code as a decryption password; wherein, each folder stores a touch signal control model which is different from each other, and decryption passwords of each folder are different from each other;
judging whether a folder is decrypted by the decryption password, if so, taking the decrypted folder as a target folder, wherein a touch signal control model in the target folder is taken as a target touch signal control model;
monitoring whether a touch signal of a user is received on a touch screen of electronic equipment, and if so, responding to the touch signal of the user based on the target touch signal control model;
the step of matching the corresponding analytical model based on the first characteristic character comprises the following steps:
carrying out hash operation on the first characteristic characters to obtain corresponding characteristic hash values;
Acquiring a plurality of analytical models stored in a database; wherein each analytical model is an encrypted analytical model;
decrypting each analysis model by taking the characteristic hash value as a decryption password; judging whether decryption is successful, if so, acquiring an analysis model which is successfully decrypted as a preselected analysis model, and acquiring identification information of the preselected analysis model;
carrying out hash operation on the identification information of the pre-selected analytical model to obtain a corresponding model hash value;
searching an identification hash value stored in a designated position of the pre-selected analytical model, and judging whether the model hash value is the same as the identification hash value or not; and if the pre-selected analytical model is the same, the pre-selected analytical model is used as the analytical model matched with the first characteristic characters.
2. The touch control method according to claim 1, wherein the step of parsing the authority code to parse the first feature character and the second feature character from the authority code includes:
acquiring model information of electronic equipment, and extracting key characters and target characters from the model information; the target characters are all characters except the key characters in the model information;
Matching a corresponding first analysis rule in the analysis script based on the key character, and analyzing the target character based on the first analysis rule to obtain a corresponding analysis result; the analysis result is a second analysis rule for analyzing the authority code;
analyzing the authority code based on the second analysis rule to obtain a first character combination and a second character combination;
extracting corresponding characters from the first character combination according to a preset first character extraction rule to obtain the first characteristic characters;
matching corresponding second character extraction rules in a database based on the first characteristic characters; and extracting corresponding characters from the second character combination based on the second character extraction rule to obtain the second characteristic characters.
3. The method according to claim 1, wherein the step of parsing the second feature character based on the parsing model to obtain the parsing code based on the parsing model matching the first feature character comprises:
obtaining a standard analysis model stored in a database; the standard analysis model is a standard coding table, and the coding table comprises a mapping relation between sequence numbers and coding characters;
Rearranging the coding characters in the coding table based on the first characteristic characters to obtain an updated coding table;
based on the updated encoding table, encoding the second characteristic characters to obtain corresponding encoding values as the analysis codes; wherein the second feature character is a digital character.
4. The touch control method of claim 3, wherein the first feature character is a digital character; the step of rearranging the coding characters in the coding table based on the first characteristic characters to obtain an updated coding table comprises the following steps:
encoding the first characteristic characters based on the encoding table to obtain first encoding values; wherein, the characters in the first coding value are all coding characters in the coding table;
performing de-duplication on the characters in the first coding value to obtain a de-duplication coding value;
removing the same code character as the de-recoded value from the code table, and leaving a plurality of empty code character bits in the code table; acquiring a first empty coding character bit as a target coding character bit;
and sequentially inserting characters in the de-recoded value from the target coding character bits, and translating the arranged coding characters to fill all empty coding character bits, so as to obtain the updated coding table.
5. The touch control method of claim 3, wherein the first feature character is a digital character; the step of rearranging the coding characters in the coding table based on the first characteristic characters to obtain an updated coding table comprises the following steps:
performing duplication elimination on each digital character in the first characteristic characters to obtain duplication elimination characteristic characters, and acquiring each digital character in the duplication elimination characteristic characters;
according to the sequence of each digital character in the duplication eliminating characteristic characters, matching the sequence numbers corresponding to each digital character in the coding table as target sequence numbers;
sequentially extracting target coding characters respectively mapped by the target sequence numbers, sequentially combining the target coding characters into target coding character combinations, and deleting the target coding characters respectively mapped by the target sequence numbers;
and inserting each target coding character in the target coding character combination into the first bit of a coding table, and sequentially and backwardly shifting all the coding characters to fill the whole coding table so as to obtain the updated coding table.
6. A touch control device, comprising:
The acquisition unit is used for acquiring user information of a user when the user starts the electronic equipment; wherein, the user information comprises a permission code input by a user;
the first analysis unit is used for analyzing the authority codes and analyzing first characteristic characters and second characteristic characters from the authority codes;
the second analysis unit is used for matching a corresponding analysis model based on the first characteristic characters and analyzing the second characteristic characters based on the analysis model to obtain analysis codes;
the decryption unit is used for sequentially decrypting the folders stored in the database by taking the analysis code as a decryption password; wherein, each folder stores a touch signal control model which is different from each other, and decryption passwords of each folder are different from each other;
the judging unit is used for judging whether the folder is decrypted by the decryption password, if yes, the decrypted folder is used as a target folder, and a touch signal control model in the target folder is used as a target touch signal control model;
the control unit is used for monitoring whether a touch signal of a user is received on a touch screen of the electronic equipment, and responding to the touch signal of the user based on the target touch signal control model if the touch signal of the user is received;
The second parsing unit matches a corresponding parsing model based on the first characteristic characters, and specifically includes:
carrying out hash operation on the first characteristic characters to obtain corresponding characteristic hash values;
acquiring a plurality of analytical models stored in a database; wherein each analytical model is an encrypted analytical model;
decrypting each analysis model by taking the characteristic hash value as a decryption password; judging whether decryption is successful, if so, acquiring an analysis model which is successfully decrypted as a preselected analysis model, and acquiring identification information of the preselected analysis model;
carrying out hash operation on the identification information of the pre-selected analytical model to obtain a corresponding model hash value;
searching an identification hash value stored in a designated position of the pre-selected analytical model, and judging whether the model hash value is the same as the identification hash value or not; and if the pre-selected analytical model is the same, the pre-selected analytical model is used as the analytical model matched with the first characteristic characters.
7. The touch control device of claim 6, wherein the first parsing unit is specifically configured to:
acquiring model information of electronic equipment, and extracting key characters and target characters from the model information; the target characters are all characters except the key characters in the model information;
Matching a corresponding first analysis rule in the analysis script based on the key character, and analyzing the target character based on the first analysis rule to obtain a corresponding analysis result; the analysis result is a second analysis rule for analyzing the authority code;
analyzing the authority code based on the second analysis rule to obtain a first character combination and a second character combination;
extracting corresponding characters from the first character combination according to a preset first character extraction rule to obtain the first characteristic characters;
matching corresponding second character extraction rules in a database based on the first characteristic characters; and extracting corresponding characters from the second character combination based on the second character extraction rule to obtain the second characteristic characters.
8. A computer device comprising a memory and a processor, the memory having stored therein a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 5.
CN202310896732.2A 2023-07-21 2023-07-21 Touch control method and device and computer equipment Active CN116627272B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310896732.2A CN116627272B (en) 2023-07-21 2023-07-21 Touch control method and device and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310896732.2A CN116627272B (en) 2023-07-21 2023-07-21 Touch control method and device and computer equipment

Publications (2)

Publication Number Publication Date
CN116627272A CN116627272A (en) 2023-08-22
CN116627272B true CN116627272B (en) 2024-01-26

Family

ID=87642123

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310896732.2A Active CN116627272B (en) 2023-07-21 2023-07-21 Touch control method and device and computer equipment

Country Status (1)

Country Link
CN (1) CN116627272B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117112506B (en) * 2023-10-25 2024-01-12 湖南云档信息科技有限公司 Multimedia archive application method, system and storage medium
CN118034629B (en) * 2024-04-11 2024-06-11 深圳市瑞普创新科技有限公司 LED display screen splicing optimization method and device, electronic equipment and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103617382A (en) * 2013-11-22 2014-03-05 北京奇虎科技有限公司 Privacy protection method and device
CN108229139A (en) * 2018-01-24 2018-06-29 维沃移动通信有限公司 A kind of cipher-code input method and mobile terminal
CN113139173A (en) * 2020-01-17 2021-07-20 Oppo广东移动通信有限公司 Input password acquisition method and device, electronic equipment and storage medium
WO2022252449A1 (en) * 2021-05-31 2022-12-08 统信软件技术有限公司 File access control method, file encryption method, and computing device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105493094A (en) * 2014-06-27 2016-04-13 微软技术许可有限责任公司 Data protection system based on user input patterns on device
US11036839B2 (en) * 2018-12-14 2021-06-15 Beijing Didi Infinity Technology And Development Co., Ltd. Password authentication with input pattern analysis

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103617382A (en) * 2013-11-22 2014-03-05 北京奇虎科技有限公司 Privacy protection method and device
CN108229139A (en) * 2018-01-24 2018-06-29 维沃移动通信有限公司 A kind of cipher-code input method and mobile terminal
CN113139173A (en) * 2020-01-17 2021-07-20 Oppo广东移动通信有限公司 Input password acquisition method and device, electronic equipment and storage medium
WO2022252449A1 (en) * 2021-05-31 2022-12-08 统信软件技术有限公司 File access control method, file encryption method, and computing device

Also Published As

Publication number Publication date
CN116627272A (en) 2023-08-22

Similar Documents

Publication Publication Date Title
CN116627272B (en) Touch control method and device and computer equipment
CN107423632B (en) Customizable sensitive data desensitization method and system
US9460310B2 (en) Method and apparatus for substitution scheme for anonymizing personally identifiable information
WO2015151155A1 (en) Personal safety verification system and similarity search method for data encrypted for confidentiality
CN108647262B (en) Picture management method and device, computer equipment and storage medium
CN116484437B (en) Asset information management method and device and computer equipment
CN110019640B (en) Secret-related file checking method and device
CN106098069B (en) Identity authentication method and terminal equipment
CN112183496B (en) Face recognition information secondary encryption method, device, equipment and storage medium
CN103559433A (en) Mobile terminal antitheft method and device
CN113486350B (en) Method, device, equipment and storage medium for identifying malicious software
CN107819748B (en) Anti-cracking verification code implementation method and device
CN113470229B (en) Unlocking control method and device, equipment and storage medium
CN106098070B (en) identity authentication method and network system
CN115859370B (en) Transaction data processing method, device, computer equipment and storage medium
CN114969777A (en) File access control method and device, electronic equipment and storage medium
CN114416806A (en) Method and device for acquiring power safety knowledge data and computer equipment
CN108959486B (en) Audit field information acquisition method and device, computer equipment and storage medium
CN110460585B (en) Equipment identity identification method and device, computer equipment and storage medium
CN116414976A (en) Document detection method and device and electronic equipment
US9882879B1 (en) Using steganography to protect cryptographic information on a mobile device
CN110751033A (en) Offline login method and related product
CN117390494A (en) Method, device, equipment and storage medium for classifying user data
CN117675870B (en) Electronic medical record distributed sharing method and device based on blockchain
CN116450745B (en) Multi-device-based note file operation method, system and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant