WO2016197717A1 - Procédé et dispositif permettant de saisir des informations sur un terminal mobile - Google Patents

Procédé et dispositif permettant de saisir des informations sur un terminal mobile Download PDF

Info

Publication number
WO2016197717A1
WO2016197717A1 PCT/CN2016/080058 CN2016080058W WO2016197717A1 WO 2016197717 A1 WO2016197717 A1 WO 2016197717A1 CN 2016080058 W CN2016080058 W CN 2016080058W WO 2016197717 A1 WO2016197717 A1 WO 2016197717A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
input
application
character group
mobile terminal
Prior art date
Application number
PCT/CN2016/080058
Other languages
English (en)
Chinese (zh)
Inventor
王晋飞
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016197717A1 publication Critical patent/WO2016197717A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04886Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting

Definitions

  • This document relates to, but is not limited to, the field of terminal technologies, and in particular, to a method and apparatus for inputting information on a mobile terminal.
  • the prior art also provides a solution for implementing a shortcut input of a preset character by a simple operation, which draws a point track through the touch screen to correspond to a string of characters, and the correspondence needs to be uploaded to the server, and The server downloads and responds, and the applicable scenario is narrow.
  • the input process is a password keyboard.
  • the form visible to the eye there are always loopholes in security.
  • terminal manufacturers have used personal biometric information such as fingerprints instead of payment passwords in cooperation with third-party apps to improve the security and convenience of payment password input, but considering the diversity of third-party payment apps.
  • Each service provider has to jointly develop and open up the underlying associations, and the workload is huge.
  • the present invention provides a method and apparatus for inputting information on a mobile terminal, which can better solve the problem of inputting information on the mobile terminal safely and quickly.
  • An embodiment of the present invention provides a method for inputting information on a mobile terminal, including:
  • the mobile terminal acquires the application information of the activated application, and determines whether the application information of the activated application has been saved in the first shortcut input information of the mobile terminal;
  • the second shortcut input information that has been saved in the mobile terminal is used to obtain the preset character group information corresponding to the trigger information input by the user. And inputting the preset character group information to the activated application;
  • the trigger information input by the user and the preset character group corresponding to the application information are obtained by using the first shortcut input information.
  • Information, and inputting the preset character group information to the activated application are obtained by using the first shortcut input information.
  • the first shortcut input information is a first relationship mapping table that includes a mapping relationship between the application information, the trigger information, and the preset character group information;
  • the second shortcut input The information is a second relationship mapping table including a mapping relationship between the trigger information and the preset character group information.
  • the step of acquiring the preset character group information corresponding to the trigger information input by the user by using the second shortcut input information that has been saved in the mobile terminal includes:
  • the mobile terminal monitors trigger information input by the user
  • the preset relationship group information corresponding to the trigger information is searched in the second relationship mapping table.
  • the first relationship mapping table includes a relationship mapping table for regular input and a relationship mapping table for security input, where the trigger information and the user input are obtained by using the first shortcut input information.
  • the method further includes:
  • the trigger information input by the user and the preset character group information corresponding to the application information are obtained by using the relationship mapping table for security input.
  • the step of acquiring the trigger information input by the user and the preset character group information corresponding to the application information by using the first shortcut input information includes:
  • the mobile terminal monitors trigger information input by the user
  • the trigger information and the preset character group information corresponding to the application information are searched in the relationship mapping table for the normal input or the relationship mapping table for the security input.
  • the step of inputting the preset character group information to the activated application includes:
  • the trigger information is information input by the user that is received by the mobile terminal when the at least one trigger mode is activated;
  • the triggering manner includes at least one of the following manners: fingerprint recognition, eye pattern or iris recognition, Face recognition, blink recognition, fixed physical buttons, button combinations, gestures, screen touch gestures.
  • An embodiment of the present invention further provides an apparatus for inputting information on a mobile terminal, including:
  • the determining module is configured to obtain application information of the activated application of the mobile terminal, and determine whether the application information of the activated application has been saved in the first shortcut input information of the mobile terminal;
  • the first input module is configured to: when determining that the application information of the activated application is not saved in the first shortcut input information, acquire the trigger information input by the user by using the second shortcut input information that has been saved in the mobile terminal Corresponding preset character group information, and inputting the preset character group information to the activated application;
  • a second input module configured to acquire trigger information input by the user and the application information by using the first shortcut input information when determining that the application information of the activated application has been saved in the first shortcut input information Corresponding preset character group information, and inputting the preset character group information to the activated application.
  • the first shortcut input information is a first relationship mapping table that includes a mapping relationship between the application information, the trigger information, and the preset character group information;
  • the second shortcut input information is And a second relationship mapping table including a mapping relationship between the trigger information and the preset character group information.
  • the first relationship mapping table includes a relationship mapping table for regular input and a relationship mapping table for security input, if the determining module determines that the application information of the activated application has been saved in the first In a quick input information, the input of the second input module to the mobile terminal
  • the keyboard is monitored, and when the local input method keyboard of the mobile terminal is started, the trigger information input by the user and the preset character corresponding to the application information are obtained by using the relationship mapping table for regular input.
  • the group information is used to obtain the trigger information input by the user and the preset character group information corresponding to the application information by using the relationship mapping table for the security input when the booting of the custom password is started. .
  • the embodiment of the invention further provides a computer readable storage medium storing computer executable instructions, which are implemented when executed by a processor.
  • the embodiment of the present invention utilizes various component functions and combinations on the mobile terminal to set preset character group information, such as a login password, by setting a trigger mode on the premise of taking security into consideration.
  • preset character group information such as a login password
  • the payment password, basic user information, and the like are directly transmitted to the control or app to receive the input information, so that the mobile terminal can input safely and quickly under various scenarios.
  • FIG. 1 is a block diagram of a method for inputting information on a mobile terminal according to an embodiment of the present invention
  • FIG. 2 is a block diagram of an apparatus for inputting information on a mobile terminal according to an embodiment of the present invention
  • FIG. 3 is a flowchart of a type of a technical solution for judging a shortcut input monitoring mode according to an embodiment of the present invention
  • Figure 4 is a flow chart of the Type A scheme of Figure 3;
  • Figure 5 is a flow chart of the Type B scheme of Figure 3;
  • Figure 6 is a flow chart of the Type C scheme of Figure 3.
  • FIG. 7 is a flowchart of a Type A fingerprinting scheme provided by an embodiment of the present invention.
  • FIG. 8 is a flowchart of a Type B fingerprint solution according to an embodiment of the present invention.
  • FIG. 9 is a flowchart of a Type C fingerprinting scheme provided by an embodiment of the present invention.
  • FIG. 1 is a block diagram of a method for inputting information on a mobile terminal according to an embodiment of the present invention. As shown in FIG. 1, the steps include:
  • Step S101 The mobile terminal acquires the application information of the activated application, and determines whether the application information of the activated application has been saved in the first shortcut input information of the mobile terminal.
  • the first shortcut input information is a first relationship mapping table that includes a mapping relationship between the application information, the trigger information, and the preset character group information.
  • the preset character group information includes, but is not limited to, a user-defined phrase, a user's personal information, a login name of each application (app), a login password, a payment (transaction) password, etc., and the preset character group information is strong.
  • the encryption mode is stored in the local secure storage area of the mobile terminal.
  • Step S102 If it is determined that the application information of the activated application is not saved in the first shortcut input information, the second shortcut input information that has been saved in the mobile terminal is used to obtain a preset corresponding to the trigger information input by the user. Character group information, and inputting the preset character group information to the activated application.
  • the second shortcut input information is a second relationship mapping table that includes a mapping relationship between the trigger information and the preset character group information.
  • the second shortcut input information is used, that is, the second relationship mapping table is used for shortcut input.
  • the mobile terminal monitors the trigger information input by the user, and when the trigger information is detected, searches the second relationship mapping table for the preset character group information corresponding to the trigger information, and sets the preset character group. Information is entered at the input controls.
  • Step S103 If it is determined that the application information of the activated application has been saved in the first shortcut In the information, the first shortcut input information is used to obtain the trigger information input by the user and the preset character group information corresponding to the application information, and input the preset character group information to the activated application. .
  • the input method keyboard of the mobile terminal performs monitoring, and classifies the first relationship mapping table into a relationship mapping table for regular input and a relationship mapping table for security input, so that local input of the mobile terminal is monitored
  • the relationship mapping table for the normal input may be used to obtain the trigger information input by the user and the preset character group information corresponding to the application information, and
  • the found preset character group information is directly input to the input method focus of the activated application; after the startup of the custom password keyboard of the activated application is detected, if the trigger information input by the user is monitored, the use may be utilized.
  • Obtaining the trigger information input by the user and the preset character group information corresponding to the application information in the relationship mapping table of the security input When inputting, by performing image analysis on the image of the area where the custom password keyboard is located, the screen coordinates of each character in the found preset character group information are obtained, and according to the obtained screen coordinates of each character, The virtual touch operation is sequentially performed on the custom password keyboard, so that the preset character group information is quickly input.
  • the trigger information is information input by the user that is received by the mobile terminal when the at least one trigger mode is activated, and the triggering manner includes fingerprint recognition, eye pattern or iris recognition, face recognition, blink recognition, fixed physical buttons, and buttons. Trigger methods such as combination, gesture action, and screen touch gesture.
  • the mobile terminal newly downloads to the local app1, and the user is not registered.
  • the corresponding preset character group information such as the name, the mobile phone number, the ID card number, and the home address, may be found in the second mapping table according to the trigger information. , mail address, etc., and passed to the input control of app1, to achieve quick input of personal information.
  • the mobile terminal local app2 the user has registered, its application information and corresponding trigger information and preset character group information (such as payment password, login password, etc.) are saved in the first mapping table, and after the app2 is started, the trigger may be triggered according to The information finds the preset character group information of the app2, and passes it to the input control of the app2, which simplifies the password input process, improves the password input efficiency, ensures the security of the password input, and avoids the password reset caused by the user forgetting the password. Trivial operation.
  • preset character group information such as payment password, login password, etc.
  • the mobile terminal local app3 the user has registered, but the application information is not saved in the first mapping table.
  • the corresponding preset character group information may be found in the second mapping table according to the trigger information, and transmitted. Give the input controls to app3.
  • FIG. 2 is a block diagram of a device for quickly inputting preset character group information on a mobile terminal according to an embodiment of the present invention. As shown in FIG. 2, the method includes a judging module 10, a first input module 20, and a second input module 30.
  • the determining module 10 is configured to obtain application information of the activated application of the mobile terminal, and determine whether the application information of the activated application has been saved in the first shortcut input information of the mobile terminal.
  • the first shortcut input information is a first relationship mapping table including a mapping relationship between the application information, trigger information, and preset character group information, and includes a relationship mapping table for regular input and is used for security. Enter the relationship mapping table.
  • the application information in the first relationship mapping table may be app attribute information, such as an app package name.
  • the preset character group information in the first relationship mapping table may be information such as a login password, a payment password, a query password, and the like.
  • the first input module 20 is configured to: when determining that the application information of the activated application is not saved in the first shortcut input information, acquire the trigger of the user shortcut input by using the second shortcut input information that has been saved in the mobile terminal The preset character group information corresponding to the information, and inputting the preset character group information to the activated application.
  • the second shortcut input information is a second relationship mapping table that includes a mapping relationship between the trigger information and the preset character group information.
  • the preset character group information in the second relationship mapping table may be personal common information such as a name, a mobile phone number, an ID card number, a home address, and an email address.
  • the first input module 20 monitors trigger information input by the user, and when the trigger information is detected, The preset relationship group information corresponding to the trigger information is searched in the second relationship mapping table, and the found preset character group information is directly input to the input method focus of the activated application.
  • the second input module 30 is configured to: when determining that the application information of the activated application has been saved in the first shortcut input information, use the first shortcut input information to acquire trigger information input by the user and the application The preset character group information corresponding to the information, and inputting the preset character group information to the activated application. After the second input module 30 detects that the local input method keyboard of the mobile terminal is started, if the trigger information input by the user is monitored, the second input module 30 can be used for regular input.
  • the relationship mapping table for the security input may be used to obtain the trigger information input by the user and the preset character corresponding to the application information.
  • Group information during image input, by performing image analysis on the image of the area where the custom password keyboard is located, obtaining screen coordinates of each character in the found preset character group information, and according to each character obtained The screen coordinates are sequentially performed on the custom password keyboard, so that the preset character group information is quickly input.
  • FIG. 3 is a flowchart of a technical solution for determining a shortcut input monitoring mode according to an embodiment of the present invention. As shown in FIG. 3, the steps include:
  • Step S301 The mobile terminal is in a standby state.
  • Step S302 The mobile terminal enters the shortcut input monitoring mode.
  • the shortcut input monitoring mode described in this embodiment enters the monitoring state after the mobile terminal is powered on, and is responsible for determining which shortcut input technical solution the mobile terminal should perform, and when and how to initiate the shortcut input.
  • Step S303 A certain app on the mobile terminal is started.
  • Step S304 Detecting the mapping table to which the currently started app belongs, determining whether the currently launched app is in the mapping table, if yes in the mapping table, executing step S306, otherwise performing step S305.
  • Step S305 The mobile terminal determines, in the shortcut input monitoring mode, that the implementation scheme of the current shortcut input adopts Type A.
  • Step S306 Monitor the input method keyboard. If the custom password keyboard is started, step S308 is performed. If the local input method keyboard is started, step S307 is performed.
  • Step S307 The mobile terminal determines, in the shortcut input monitoring mode, that the implementation scheme of the current shortcut input adopts the Type B scheme.
  • Step S308 The mobile terminal determines, in the shortcut input monitoring mode, that the implementation scheme of the current shortcut input adopts the Type C scheme.
  • the present invention defines three basic shortcut input schemes according to the application (app) in which the mobile terminal is currently in an active state and the input keyboard type that is invoked.
  • the differences between the three schemes are:
  • the current app has mapping information in the mapping table, and the current input method keyboard is a local input method keyboard, that is, the system default keyboard and the keyboard whose output key value is under the control of the system authority;
  • the current app has mapping information in the mapping table, and the current input method keyboard is an app custom password keyboard, that is, a security keyboard.
  • the relationship mapping table between the triggering mode and the preset character group information defined in the present invention is stored in the local secure storage area of the mobile terminal, and corresponds to the three schemes.
  • the basic structure of the relationship mapping table is shown in Table 1.
  • triggering modes listed in the present invention are applicable to different shortcut input schemes according to their basic principles and characteristics.
  • a trigger mode has only one type of trigger information
  • the face recognition trigger mode can only have one type of facial feature information
  • only one set of character sets can be corresponding to a type of mapping table, and this case is defined as “one-to-one”
  • the fingerprint identification method may have multiple sets of fingerprint information
  • one type of mapping table may respectively correspond to multiple sets of character groups, and this situation is defined as “many-to-many”
  • adding a dimension will also result in a "one-to-many" situation in Type B and Type C.
  • the triggering methods for various preset information input include fingerprint, eye pattern, face recognition, blink recognition, fixed physical button or button combination, gesture action, screen gesture, etc., and the possible support conditions are shown in Table 2.
  • FIG. 4 is a flow chart of the Type A scheme of FIG. 3, and if the shortcut input monitoring mode is determined to be Type A The scheme starts the trigger monitoring mechanism.
  • the mapping table A is queried, and the corresponding character group information is obtained according to the trigger information, and is transmitted to the current input method focus to complete a shortcut input action.
  • the steps include:
  • Step S401 The mobile terminal is in a standby state.
  • Step S402 The mobile terminal enters the shortcut input monitoring mode.
  • Step S403 A certain app on the mobile terminal is started.
  • Step S404 Monitor the mapping table to which the currently started app belongs, and determine whether the currently launched app is in the mapping table. If the mapping table is in the mapping table, execute step S405; otherwise, execute step S406.
  • Step S405 The mobile terminal determines, in the shortcut input monitoring mode, that the implementation scheme of the current shortcut input adopts a Type B scheme or a Type C scheme.
  • Step S406 The mobile terminal determines that the implementation scheme of the current shortcut input adopts the Type A scheme in the shortcut input monitoring mode, and monitors the input method keyboard, thereby starting the trigger monitoring mechanism.
  • Step S407 When the local input method keyboard is started, the loop trigger information is cyclically monitored.
  • Step S408 When the triggered trigger information is successfully detected, the mapping table A (ie, the second relationship mapping table) is queried to obtain the character group information corresponding to the trigger information.
  • the mapping table A ie, the second relationship mapping table
  • Step S409 The obtained character group information is delivered to the current input method focus.
  • Step S410 A shortcut input action is completed, and step S402 is performed.
  • the Type A scheme of the present invention can replace the preset character group information by using the common input method to preset the shortcut phrase, but the convenience is slightly worse than the embodiment.
  • FIG. 5 is a flowchart of the Type B scheme in FIG. 3, if the shortcut input monitoring mode is determined to be a Type B scheme, a trigger monitoring mechanism is started; when the triggered trigger information is monitored, the mapping table B is queried according to the current application attribute and Trigger information to obtain the corresponding character group information, and pass it to the current input method focus to complete a shortcut input action. As shown in Figure 5, the steps include:
  • Step S501 The mobile terminal is in a standby state.
  • Step S502 The mobile terminal enters the shortcut input monitoring mode.
  • Step S503 an app on the mobile terminal is started.
  • Step S504 Detecting the mapping table to which the currently started app belongs, and determining whether the currently launched app is in the mapping table. If not in the mapping table, step S505 is performed; otherwise, step S506 is performed.
  • Step S505 The mobile terminal determines, in the shortcut input monitoring mode, that the implementation scheme of the current shortcut input adopts the Type A scheme.
  • Step S506 The input method keyboard is monitored. When the custom password keyboard is detected to start, step S507 is performed, and when the local input method keyboard is detected to be started, step S508 is performed.
  • Step S507 The mobile terminal determines, in the shortcut input monitoring mode, that the implementation scheme of the current shortcut input adopts the Type C scheme.
  • Step S508 When the local input method keyboard is started, the loop trigger information is cyclically monitored.
  • Step S509 When the trigger information for triggering success is monitored, the mapping table B (ie, the relationship mapping table for regular input in the first relationship mapping table) is queried to obtain the character group information corresponding to the trigger information.
  • the mapping table B ie, the relationship mapping table for regular input in the first relationship mapping table
  • Step S510 Pass the obtained character group information to the current input method focus.
  • Step S511 A shortcut input action is completed, and step S502 is performed.
  • Type B solution of this embodiment can be replaced by a combination of custom development and deep customization with multiple or all third party apps, but the implementation cost of the embodiment is the lowest, no need for customized development, and convenient and flexible.
  • a trigger monitoring mechanism is activated; when the triggered trigger information is monitored, the area of the password keyboard on the current screen is first obtained.
  • Information take a screenshot and perform image analysis to obtain the screen coordinate information corresponding to all the characters on the keyboard, then query the mapping table C, obtain the corresponding character group information according to the current application attribute and the trigger information, and then compare and judge the characters obtained from the image analysis. Whether the character information in all the preset character group information is already included.
  • the virtual click key switch keyboard button is used to obtain the image analysis and comparison of the next layer keyboard, and then the preset character group information is converted into the The screen coordinate information on the password keyboard, and convert the coordinate information into a virtual touch operation to complete a quick input action.
  • the steps include:
  • Step S601 The mobile terminal is in a standby state.
  • Step S602 The mobile terminal enters the shortcut input monitoring mode.
  • Step S603 A certain app on the mobile terminal is started.
  • Step S604 Detecting the mapping table to which the currently launched app belongs, and determining whether the currently launched app is in the mapping table. If not in the mapping table, step S605 is performed; otherwise, step S606 is performed.
  • Step S605 The mobile terminal determines, in the shortcut input monitoring mode, that the implementation scheme of the current shortcut input adopts the Type A scheme.
  • Step S606 The input method keyboard is monitored. When the local input method keyboard is detected to start, step S607 is performed, and when the custom password keyboard is detected to be started, step S608 is performed.
  • Step S607 The mobile terminal determines, in the shortcut input monitoring mode, that the implementation scheme of the current shortcut input adopts the Type B scheme.
  • Step S608 When the custom password keyboard is started, the loop trigger information is cyclically monitored.
  • Step S609 Acquire area range information of the custom password keyboard on the current screen.
  • Step S610 Perform a screenshot on the custom password keyboard according to the acquired area range information.
  • Step S611 Perform image analysis on the obtained screenshot to obtain screen coordinate information corresponding to all characters (including numbers, letters, etc.) on the keyboard.
  • Step S612 Query the mapping table C (ie, the relationship mapping table for security input in the first relationship mapping table), and obtain corresponding character group information according to the current application attribute and the trigger information.
  • mapping table C ie, the relationship mapping table for security input in the first relationship mapping table
  • Step S613 It is determined whether all the characters obtained in step S611 already contain the character information in all the preset character group information. If yes, step S615 is performed, otherwise step S614 is performed.
  • Step S614 Virtually clicking the switch button of the custom password keyboard to obtain the area range information of the next layer of the keyboard, and executing step S610.
  • Step S615 sequentially obtain screen coordinate information of the corresponding character according to the order of the characters in the preset character group information.
  • Step S616 Perform a virtual touch operation according to the screen coordinate information obtained in step S615.
  • Step S617 A shortcut input action is completed, and step S602 is performed.
  • Type C it is necessary to perform image recognition processing on a third-party soft keyboard (password keyboard or security keyboard), and adopt a virtual touch input mechanism.
  • Type C solution of this embodiment can be replaced by a combination of custom development and deep customization with multiple or all third party apps, but the implementation cost of the embodiment is the lowest, no need for customized development, convenient and flexible.
  • the preset character group is directly transmitted to the current input control manner.
  • a custom password keyboard is used, and characters cannot be directly transmitted.
  • the character input problem can be solved by image recognition and virtual touch; the definition of the preset character group information and the image recognition technology are involved.
  • the image recognition technology used in the embodiment of the present invention is an existing and mature technical solution.
  • the present invention does not repeat the above, that is, the existing image recognition technology can be used to perform the security keyboard area in the current display screen of the mobile terminal.
  • the mechanism for triggering the automatic input action of the preset character group information includes, but is not limited to, fingerprint recognition, eye pattern (or iris) recognition, face recognition, blink recognition, fixed physical button or button combination, Trigger actions such as gestures and screen touch gestures.
  • fingerprint identification is taken as an example, and the above three schemes are explained in conjunction with FIG. 7 to FIG.
  • the implementation scenarios of other trigger modes are similar to the fingerprint touch mode.
  • the methods of sensor monitoring, triggering, security, and fault tolerance are different.
  • FIG. 7 is a flowchart of a Type A fingerprinting scheme provided by an embodiment of the present invention. As shown in FIG. 7, the steps include:
  • Step S701 The mobile terminal is in a standby state.
  • Step S702 The mobile terminal enters the shortcut input monitoring mode.
  • Step S703 A certain app on the mobile terminal is started.
  • Step S704 Monitor the mapping table to which the currently started app belongs, and determine whether the currently launched app is in the mapping table. If the mapping table is in the mapping table, execute step S705; otherwise, perform step S706.
  • Step S705 The mobile terminal determines, in the shortcut input monitoring mode, that the implementation scheme of the current shortcut input adopts a Type B scheme or a Type C scheme.
  • Step S706 The mobile terminal determines, in the shortcut input monitoring mode, that the implementation scheme of the current shortcut input adopts the Type A scheme, and monitors the input method keyboard, thereby starting the trigger monitoring mechanism.
  • Step S707 When the local input method keyboard is started, the fingerprint information input state is cyclically monitored.
  • Step S709 When the current fingerprint information is the same as the last fingerprint information, an error prompt is activated and step S707 is re-executed.
  • Step S710 When the current fingerprint information is different from the previous fingerprint information, it is determined whether the count value n of the fingerprint check counter is less than the threshold value, if yes, step S712 is performed, otherwise step S711 is performed;
  • the threshold is set to a threshold number of input errors, such as set to 3
  • Step S711 The shortcut input mode is frozen, and after the preset protection time M, step S702 is re-executed.
  • Step S712 performing fingerprint verification, that is, matching the fingerprint information with the fingerprint information in the mapping table A. If there is matching fingerprint information in the mapping table A, the verification passes, and step S713 is performed; otherwise, the fingerprint verification counter is executed. The count value n is incremented by 1, and step S707 is executed to return the fingerprint monitoring state and give a prompt.
  • Step S713 Obtain the character group information corresponding to the fingerprint information from the mapping table A.
  • Step S714 The obtained character group information is delivered to the current input method focus.
  • Step S715 Determine the state of the local input method. If the input method keyboard is closed or hidden by the user, the input state ends, and step S702 is performed. Otherwise, the input state is still continued, and step S707 is performed.
  • the user pre-stores three sets of fingerprint information in the mobile terminal, wherein the fingerprint 1 corresponds to the mapping
  • the character group A1 for example, a name
  • the fingerprint 2 corresponds to the character group A2 (for example, a mobile phone number) in the mapping table A
  • the fingerprint 3 corresponds to the character group A3 (for example, a mailing address) in the mapping table A.
  • the shortcut input monitoring mode running in the background first detects the mapping table of the current app, if there is a mapping table in the mapping table.
  • the app package name adopts the Type B and Type C schemes; this embodiment assumes that the app is not in the mapping table, and the default is the Type A scheme.
  • the local input method keyboard is activated, and the quick input monitoring mode monitors the action, and the background sends a fingerprint input instruction to the fingerprint sensor, and starts the cyclic monitoring of the fingerprint information.
  • the fault-tolerant test is first performed to determine whether the fingerprint information is the same as the previous one. If the same, it belongs to the repeated input (may be user misoperation), start the error prompt and re-enter the fingerprint monitoring. Status; if it is different from last time, it is judged whether the fingerprint verification counter n is smaller than the threshold value, then the fingerprint information is compared with the fingerprint information in the mapping table A, and if there is matching fingerprint data, the verification is passed; otherwise, n is incremented 1. Return the fingerprint monitoring status and give a prompt.
  • the next step is to perform the action of querying the mapping table A, and then find the corresponding character group A1 (name); then pass the character group A1 to the focus of the current input method, that is, input the name to Enter the control; check the status of the input method. If the input method keyboard is closed or hidden, the input is considered to be finished, and the shortcut input monitoring mode is returned. If the input method keyboard is not closed or hidden by the user, the fingerprint input information is continuously monitored. For example, if the user chooses to continue inputting at this time, and clicks another control again to activate the input method focus, the input method is still activated. When the user inputs the fingerprint 2, the character group A2 (mobile phone number) is transmitted in the control, and so on. .
  • the shortcut input mode is frozen and thawed after the preset protection time M.
  • FIG. 8 is a flowchart of a Type B fingerprinting scheme provided by an embodiment of the present invention. As shown in FIG. 8, the steps include:
  • Step S801 The mobile terminal is in a standby state.
  • Step S802 The mobile terminal enters the shortcut input monitoring mode.
  • Step S803 an app on the mobile terminal is started.
  • Step S804 Detecting the mapping table to which the currently started app belongs, and determining whether the currently launched app is in the mapping table. If not in the mapping table, step S805 is performed; otherwise, step S806 is performed.
  • Step S805 The mobile terminal determines, in the shortcut input monitoring mode, that the implementation scheme of the current shortcut input adopts the Type A scheme.
  • Step S806 The input method keyboard is monitored. When the custom password keyboard is detected to start, step S807 is performed, and when the local input method keyboard is detected to be started, step S808 is performed.
  • Step S807 The mobile terminal determines that the implementation scheme of the current shortcut input adopts the Type C scheme in the shortcut input monitoring mode.
  • Step S808 When the local input method keyboard is started, the fingerprint information input state is cyclically monitored.
  • Step S810 When the current fingerprint information is the same as the last fingerprint information, an error prompt is activated and step S808 is re-executed.
  • Step S811 When the current fingerprint information is different from the previous fingerprint information, it is determined whether the count value n of the fingerprint verification counter is less than the threshold value, if yes, step S813 is performed, otherwise step S812 is performed;
  • the threshold is set to a threshold number of times the error is input, for example, set to 3.
  • Step S812 The shortcut input mode is frozen, and after the preset protection time M, step S802 is re-executed.
  • Step S813 performing fingerprint verification, that is, matching the fingerprint information with the fingerprint information in the mapping table B. If there is matching fingerprint information in the mapping table B, the verification passes, and step S814 is performed; otherwise, the fingerprint verification counter is executed. The count value n is incremented by 1, and step S808 is executed to return the fingerprint monitoring state and give a prompt.
  • Step S814 Obtain the character group information corresponding to the fingerprint information from the mapping table B.
  • Step S815 Pass the obtained character group information to the current input method focus.
  • Step S816 Determine the state of the local input method. If the input method keyboard is closed or hidden by the user, the input state ends, and step S802 is performed. Otherwise, the input state is still continued, and step S808 is performed.
  • the user stores the fingerprint 1 in advance, and specifies that the corresponding character group of the fingerprint 1 in the app1 (for example, 12306) is the character group B1 (12306 login password), and the corresponding character group in the app2 (for example, China Merchants Bank) is the character group B2 (China Merchants Bank) Login password), the user stores this mapping relationship in mapping table B.
  • the corresponding character group of the fingerprint 1 in the app1 for example, 12306
  • the corresponding character group in the app2 for example, China Merchants Bank
  • the character group B2 China Merchants Bank
  • the shortcut input monitoring mode is in the background resident state.
  • the app1 requests to input the login password
  • the shortcut input monitoring mode first detects the mapping table of the current app. If the current app (12306) package name has information in the mapping table B, it is determined that the Type B scheme is adopted.
  • the fingerprint command is sent to the fingerprint sensor at the same time, and the fingerprint monitoring is started; when the fingerprint information is detected, the fault tolerance test is first performed. It is used to judge whether the fingerprint information is the same as the last time. If it is the same, it belongs to repeated input (may be user misoperation), activates the error prompt and re-enters the fingerprint monitoring state; if it is different from the last time, determines whether the fingerprint verification counter n is If the value is less than the threshold, the fingerprint information is compared with the fingerprint information in the mapping table B. If there is matching fingerprint data, the verification is passed. Otherwise, n is incremented by 1, and the fingerprint monitoring state is returned and a prompt is given.
  • the next step is to perform the operation of querying the mapping table B, and then find the corresponding character group B1 (ie, 12306 login password); then pass the character group B1 to the current input method focus, that is, the password Input to the input control; check the status of the input method, if the input method keyboard is closed or hidden, the input is considered to be finished, that is, the user thinks that the password shortcut input action has been completed, and the next operation is selected, then the shortcut input monitoring mode is returned. If the input method keyboard is not closed or hidden by the user, continue to monitor the fingerprint input information.
  • the shortcut input mode is frozen and thawed after the preset protection time M.
  • FIG. 9 is a flowchart of a Type C fingerprinting solution according to an embodiment of the present invention. As shown in FIG. 9, the steps include:
  • Step S901 The mobile terminal is in a standby state.
  • Step S902 The mobile terminal enters the shortcut input monitoring mode.
  • Step S903 an app on the mobile terminal is started.
  • Step S904 Detecting the mapping table to which the currently started app belongs, and determining whether the currently started app is in the mapping table. If not in the mapping table, step S905 is performed; otherwise, step S906 is performed.
  • Step S905 The mobile terminal determines, in the shortcut input monitoring mode, that the implementation scheme of the current shortcut input adopts the Type A scheme.
  • Step S906 The input method keyboard is monitored. When the local input method keyboard is detected to start, step S907 is performed, and when the custom password keyboard is detected to be started, step S908 is performed.
  • Step S907 The mobile terminal determines, in the shortcut input monitoring mode, that the implementation scheme of the current shortcut input adopts the Type B scheme.
  • Step S908 When the custom password keyboard is started, the fingerprint information input state is cyclically monitored.
  • Step S910 When the current fingerprint information is the same as the last fingerprint information, an error prompt is activated and step S908 is re-executed.
  • Step S911 When the current fingerprint information is different from the previous fingerprint information, it is determined whether the count value n of the fingerprint verification counter is less than the threshold value, if yes, step S913 is performed, otherwise step S912 is performed;
  • the threshold is set to a threshold number of times the error is input, for example, set to 3.
  • Step S912 The shortcut input mode is frozen, and after the preset protection time M, step S902 is re-executed.
  • Step S913 performing fingerprint verification, that is, matching the fingerprint information with the fingerprint information in the mapping table B. If there is matching fingerprint information in the mapping table B, the verification passes, and step S914 is performed; otherwise, the fingerprint verification counter is executed. The count value n is incremented by 1, and step S908 is performed to return the fingerprint monitoring. Status and give a hint.
  • Step S914 Acquire area range information of the custom password keyboard on the current screen.
  • Step S915 Perform a screenshot on the custom password keyboard according to the obtained area range information.
  • Step S916 Perform image analysis on the obtained screenshot to obtain screen coordinate information corresponding to all characters (including numbers, letters, etc.) on the keyboard.
  • Step S917 Query the mapping table C, and obtain corresponding character group information according to the current application attribute and the trigger information.
  • Step S918 It is determined whether all the characters obtained in step S916 already contain the character information in all the preset character group information. If yes, step S920 is performed, otherwise step S919 is performed.
  • Step S919 Virtually click the switch button of the custom password keyboard to obtain the area range information of the next layer of the keyboard, and step S915 is performed.
  • Step S920 sequentially obtain screen coordinate information of the corresponding character according to the order of the characters in the preset character group information.
  • Step S921 Perform a virtual touch operation according to the screen coordinate information obtained in step S920.
  • Step S922 Determine the state of the local input method. If the input method keyboard is closed or hidden by the user, the input state ends, and step S902 is performed. Otherwise, the input state is still continued, and step S908 is performed.
  • the user pre-stores the fingerprint 1 and specifies that the corresponding character group of the fingerprint 1 in the app1 (for example, Alipay) is the character group C1 (the payment password of Alipay), and the corresponding character group in the app2 (for example, China Merchants Bank) is the character group C2 (investment)
  • the user stores this mapping relationship in the mapping table C.
  • the user specifies that the fingerprint 1 corresponds to the character group B1 (such as the payment package login password) in app1 (ie, Alipay), and stores it in the mapping table B.
  • the shortcut input monitoring mode is in the background resident state.
  • the shortcut input monitoring mode first detects the mapping table of the current app, and queries the current app (Alipay) package name in the mapping table B, There is information in C, this fashion can not judge which plan to adopt.
  • the user clicks on a certain control to call the local input method it is determined to be the Type B scheme; if the user enters the last step of the payment process, that is, the app asks to input the payment password, When the smart input mode detects that the custom password keyboard of app1 is popped up, it is determined to be the Type C scheme.
  • the quick input monitoring mode sends a fingerprint receiving command to the fingerprint sensor, and starts fingerprint monitoring.
  • the fault tolerance test is first performed to determine whether the fingerprint information is the same as the last time, and if it is the same, it is a duplicate. Input (may be user misoperation), start error prompt and re-enter fingerprint monitoring status; if it is different from last time, judge whether fingerprint verification counter n is less than the threshold, then compare fingerprint information with fingerprint information in mapping table C If there is matching fingerprint data, the verification is passed, otherwise the fingerprint monitoring status is returned and a prompt is given.
  • the shortcut input monitoring mode requests the mobile terminal to obtain the password keyboard drawing area range information, and passes it to the cryptographic keyboard image processing unit, and the unit performs an image on the screen capture information. Analyze to get the screen coordinate information corresponding to all the numbers or letters on the current keyboard.
  • the action of querying the mapping table C is performed, and the fingerprint information and the app information are correspondingly matched to the character group C1 (ie, the Alipay payment password); then all the characters of C1 are compared with the character extraction result of the password keyboard image processing unit, if the current keyboard If all the character information of C1 is already included, the C1 character is sequentially converted into screen coordinate information, and is transmitted to the virtual touch unit to perform a virtual click operation; if the character of C1 is not on the current keyboard, the password keyboard switch is performed by the virtual touch unit.
  • the character group C1 ie, the Alipay payment password
  • the virtual input After the virtual input is completed, check the status of the input method. If the input method keyboard is closed or hidden, the input is considered to be ended, that is, the user or the app thinks that the password shortcut input action has been completed, and the next operation is selected, and then the shortcut input monitoring mode is returned. If the input method keyboard is not closed or hidden by the user, continue to monitor the fingerprint input information.
  • the shortcut input mode is frozen and thawed after the preset protection time M.
  • the embodiment of the invention can achieve a good balance between security, practicability and convenience. After the user has three modes of flexibility, the user can input the common information more conveniently, and enjoy the safe and comfortable payment by the mobile payment. The sense of excitement, eliminating the inconvenience of forgetting the password, the user's repetitive character input experience will be fundamentally improved.
  • each module/unit in the above embodiment may be implemented in the form of hardware, for example, by implementing an integrated circuit to implement its corresponding function, or may be implemented in the form of a software function module, for example, executing a program stored in the memory by a processor. Instructions to achieve their corresponding functions. This application is not limited to any specific combination of hardware and software.
  • the technical solution provided by the embodiment of the invention can achieve a good balance between security, practicability and convenience. After the user has three modes of flexibility, the user can input personal information more conveniently, and enjoy the movement more safely and comfortably. The quick feeling of quick payment and the inconvenience caused by forgetting the password will greatly improve the user's repetitive character input experience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Artificial Intelligence (AREA)
  • Telephone Function (AREA)
  • Input From Keyboards Or The Like (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

La présente invention s'applique aux terminaux mobiles. Elle concerne un procédé et un dispositif permettant de saisir des informations sur un terminal mobile. Selon ledit procédé : un terminal mobile obtient des informations d'application d'une application qui a été lancée, et détermine si les informations d'application de l'application qui a été lancée sont déjà mémorisées parmi des premières informations de saisie rapide appartenant au terminal mobile (S101) ; si les informations d'application ne sont pas déjà mémorisées parmi les premières informations de saisie rapide, le terminal mobile utilise des secondes informations de saisie rapide déjà mémorisées dans le terminal mobile (S102) ; si les informations d'application sont déjà mémorisées parmi les premières informations de saisie rapide, le terminal mobile utilise les premières informations de saisie rapide et obtient des informations de déclenchement saisies par un utilisateur ainsi que des informations d'ensemble de caractères prédéfinies correspondant aux informations d'application (S103) ; et le terminal mobile saisit les informations d'ensemble de caractères prédéfinies obtenues dans l'application qui a été lancée. Cette invention tient compte de la sécurité, elle transfère directement les informations d'ensemble de caractères prédéfinies à une application de commande par l'intermédiaire de moyens de déclenchement préétablis, et elle met en œuvre une saisie sécurisée et rapide.
PCT/CN2016/080058 2016-01-11 2016-04-22 Procédé et dispositif permettant de saisir des informations sur un terminal mobile WO2016197717A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610014719.XA CN106959811A (zh) 2016-01-11 2016-01-11 一种在移动终端上输入信息的方法及装置
CN201610014719.X 2016-01-11

Publications (1)

Publication Number Publication Date
WO2016197717A1 true WO2016197717A1 (fr) 2016-12-15

Family

ID=57502768

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/080058 WO2016197717A1 (fr) 2016-01-11 2016-04-22 Procédé et dispositif permettant de saisir des informations sur un terminal mobile

Country Status (2)

Country Link
CN (1) CN106959811A (fr)
WO (1) WO2016197717A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111538418A (zh) * 2020-04-30 2020-08-14 中国银行股份有限公司 一种信息输入方法及装置

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI658401B (zh) * 2017-11-14 2019-05-01 財團法人工業技術研究院 基於虛擬化行動架構之行動通訊裝置及其相關輸入法切換方法
CN109976549B (zh) * 2017-12-28 2022-08-16 北京搜狗科技发展有限公司 数据处理方法、装置和机器可读介质
CN108551521B (zh) * 2018-03-16 2020-03-31 维沃移动通信有限公司 一种登录信息提示方法及移动终端

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6192380B1 (en) * 1998-03-31 2001-02-20 Intel Corporation Automatic web based form fill-in
CN101963844A (zh) * 2010-09-26 2011-02-02 百度在线网络技术(北京)有限公司 一种表单输入的方法和设备
CN103581212A (zh) * 2012-07-18 2014-02-12 百度在线网络技术(北京)有限公司 基于云端分析的表单自动填充方法、系统及装置
CN103902519A (zh) * 2014-03-17 2014-07-02 联想(北京)有限公司 一种信息处理方法及电子设备
CN103984747A (zh) * 2014-05-26 2014-08-13 中国工商银行股份有限公司 屏幕信息处理方法和装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8798250B1 (en) * 2013-02-11 2014-08-05 Blackberry Limited Autocorrect for phone numbers
CN104660688B (zh) * 2015-02-03 2019-07-26 百度在线网络技术(北京)有限公司 一种获取登录信息的方法与装置
CN105159475B (zh) * 2015-08-27 2018-03-30 广东欧珀移动通信有限公司 一种字符输入方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6192380B1 (en) * 1998-03-31 2001-02-20 Intel Corporation Automatic web based form fill-in
CN101963844A (zh) * 2010-09-26 2011-02-02 百度在线网络技术(北京)有限公司 一种表单输入的方法和设备
CN103581212A (zh) * 2012-07-18 2014-02-12 百度在线网络技术(北京)有限公司 基于云端分析的表单自动填充方法、系统及装置
CN103902519A (zh) * 2014-03-17 2014-07-02 联想(北京)有限公司 一种信息处理方法及电子设备
CN103984747A (zh) * 2014-05-26 2014-08-13 中国工商银行股份有限公司 屏幕信息处理方法和装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111538418A (zh) * 2020-04-30 2020-08-14 中国银行股份有限公司 一种信息输入方法及装置

Also Published As

Publication number Publication date
CN106959811A (zh) 2017-07-18

Similar Documents

Publication Publication Date Title
CN109952753B (zh) 用于管理对在操作中使用的凭证的访问的用户界面
US10313882B2 (en) Dynamic unlock mechanisms for mobile devices
RU2589397C2 (ru) Аутентификация графических жестов
JP6859501B2 (ja) 通信ソフトウェアにおいて音声により業務を起動する方法及びこれに対応する装置
CN108139864A (zh) 使用指纹识别的操作方法、装置、移动终端
US10055562B2 (en) Techniques for identifying a change in users
EP2951746B1 (fr) Système et procédé d'amélioration de la sécurité d'un dispositif sans fil par détection du type d'utilisation
WO2016197717A1 (fr) Procédé et dispositif permettant de saisir des informations sur un terminal mobile
EP3055806B1 (fr) Enrôlement et identification implicites informés
TWI706288B (zh) 穿戴式設備、解鎖控制系統及解鎖控制方法
CN106843660B (zh) 一种数据处理方法及其设备
CN112313983A (zh) 使用伴随设备的用户认证
WO2017088745A1 (fr) Procédé et appareil de traitement d'informations, et dispositif électronique
CN109472122A (zh) 一种多媒体信息提示方法及系统
KR101435487B1 (ko) 사용자 단말기, 사용자 단말기의 숨김 페이지 사용 방법 및 컴퓨터 판독 가능한 기록 매체
KR20150063899A (ko) 숫자와 패턴을 조합한 스마트폰 보안모드 잠금해제 방법 및 단말 장치
CN116954532A (zh) 分屏显示方法和电子设备
TW201738791A (zh) 一種資訊處理系統及方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16806615

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16806615

Country of ref document: EP

Kind code of ref document: A1