WO2018014400A1 - 一种用户输入管理方法及装置、终端 - Google Patents

一种用户输入管理方法及装置、终端 Download PDF

Info

Publication number
WO2018014400A1
WO2018014400A1 PCT/CN2016/095340 CN2016095340W WO2018014400A1 WO 2018014400 A1 WO2018014400 A1 WO 2018014400A1 CN 2016095340 W CN2016095340 W CN 2016095340W WO 2018014400 A1 WO2018014400 A1 WO 2018014400A1
Authority
WO
WIPO (PCT)
Prior art keywords
interference
input
byte
input method
character
Prior art date
Application number
PCT/CN2016/095340
Other languages
English (en)
French (fr)
Inventor
姚均营
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2018014400A1 publication Critical patent/WO2018014400A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Definitions

  • the present invention relates to the field of user input, and in particular, to a user input management method and apparatus, and a terminal.
  • the embodiment of the invention provides a user input management method, device and terminal, so as to solve the problem that the user privacy information is leaked due to the intrusion of the input method.
  • a user input management method including:
  • an interference operation is generated and transmitted to the input method, and the interference operation is used to generate the interference byte by the input method;
  • the input input method generates a to-be-entered byte according to a click operation and an interference operation
  • the input method in deleting the byte to be input generates a target byte according to the interference byte generated by the interference operation
  • a user input management apparatus including: a detection module, an interference module, and a de-interference module, wherein
  • the detecting module is configured to detect a click operation of the user on the input method input interface when the input method is called by the target application;
  • the interference module is configured to generate an interference operation and transmit to the input method after detecting the click operation, and the interference operation is used to generate the interference byte by the input method;
  • the de-interference module is configured to receive the input byte to be input according to the click operation and the interference operation, delete the interference byte generated by the input method in the input byte according to the interference operation, generate a target byte, and input the target byte into the target.
  • the input interface of the application is configured to receive the input byte to be input according to the click operation and the interference operation, delete the interference byte generated by the input method in the input byte according to the interference operation, generate a target byte, and input the target byte into the target.
  • a terminal including: an input module, an application target, an input method module, and a processor, where
  • the input module is configured to receive a user operation and generate a click operation
  • the application module is set to start the target application according to the user operation, and invokes the input method on the input interface of the target application;
  • the input method module includes at least one input method for calling the input method to generate a byte according to the input operation, and outputting, and the input operation includes a click operation and an interference operation;
  • the processor is configured to detect a click operation of the user on the input method input interface when the input method is called by the target application, generate an interference operation and transmit to the input method after detecting the click operation, and the interference operation is used to generate the interference word by the input method.
  • the receiving input method is based on the to-be-entered byte generated by the click operation and the interference operation, deleting the interference byte generated by the input method in the input byte according to the interference operation, generating the target byte, and inputting the target byte into the input of the target application. interface.
  • a computer storage medium having stored therein computer executable instructions for performing the aforementioned user input management method.
  • the embodiment of the invention provides a user input management method. After detecting a user inputting a click operation, the method generates an interference operation, and deletes the interference operation on the target application interface.
  • the interference byte should be generated; since the click operation and the interference operation generate the corresponding byte through the input method, the input record obtained by the input method includes the click operation and the interference operation, so that even if the input method is invaded, the input method cannot be used. Recording illegally and accurately obtains the user's click operation, and thus cannot calculate the user's input content according to the click operation, nor can illegally obtain the private information input by the user through the input method, and solve the related technology that the user is invaded due to the input method being invaded.
  • the issue of the disclosure of private information has enhanced the user experience.
  • FIG. 1 is a flowchart of a user input management method according to a first embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a user input management apparatus according to a second embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of a terminal according to a third embodiment of the present invention.
  • FIG. 4 is a schematic diagram of an input method frame according to a fourth embodiment of the present invention.
  • Figure 5 is a flow chart showing the implementation of the related input method
  • FIG. 6 is a flowchart of an input method according to a fourth embodiment of the present invention.
  • FIG. 7 is a schematic diagram of a target program input interface according to a fourth embodiment of the present invention.
  • FIG. 1 is a flowchart of a user input management method according to a first embodiment of the present invention. As shown in FIG. 1, the user input management method provided in this embodiment includes:
  • the input method input interface may be implemented directly by using a terminal button, or may be implemented by a virtual button in a touch screen terminal; the click operation includes a user's key operation and/or pressing on a virtual keyboard. , touch and other operations.
  • the interference operation is triggered by the terminal autonomously, and is not clicked by the user.
  • the purpose of protecting the user's actual input is not recorded by the input method.
  • the input input method generates a to-be-entered byte according to the click operation and the interference operation;
  • the input method When the input method receives the input operation, the corresponding byte is generated according to the preset relationship. This is not the focus of the embodiment, and will not be described again.
  • the input operation includes the user's click operation and the terminal.
  • the generated interference operation such that the input method can not know / record the user's actual input intention, especially the bank account password and other private information related to financial security.
  • the generated target byte is what the user actually wants to input, so that the user input error is not caused by the interference operation.
  • generating an interference operation and transmitting to the input method includes:
  • An interference operation is generated based on the position coordinates of the interference operation and transmitted to the input method.
  • the interference rule may be any rule, such as arbitrarily selecting one or more characters as the interference characters from all the characters of the input method input interface, or selecting the next character of the corresponding character of the user to operate as the interference character, etc.
  • the interference rule is to select at least one character from the adjacent characters of the corresponding character of the click operation as the interference character
  • the selecting the interference character to be triggered according to the preset interference rule in the foregoing embodiment includes:
  • generating the interference operation includes:
  • the input method After detecting a click operation, the input method generates an interference operation before generating a byte according to the click operation; and/or,
  • an interference operation is generated.
  • the user input management method in the foregoing embodiment before deleting the interference byte generated by the input operation in the byte to be input, according to the interference operation, further includes:
  • the interference byte is displayed and displayed
  • Deleting the input byte in the byte to be input includes deleting the byte that is identified by the display.
  • the interference byte generated by the input method in the to-be-entered byte in the foregoing embodiment according to the interference operation includes:
  • the user input management apparatus includes: a detection module 21, an interference module 22, and a de-interference module 23, where
  • the detecting module 21 is configured to detect a click operation of the user on the input method input interface when the input method is called by the target application;
  • the interference module 22 is configured to generate an interference operation and transmit to the input method after detecting the click operation, and the interference operation is used to generate the interference byte by the input method;
  • the de-interference module 23 is configured to receive the input byte to be input according to the click operation and the interference operation, delete the interference byte generated by the input method in the input byte according to the interference operation, generate a target byte, and input the target byte.
  • the input interface of the target application is configured to receive the input byte to be input according to the click operation and the interference operation, delete the interference byte generated by the input method in the input byte according to the interference operation, generate a target byte, and input the target byte.
  • the interference module 22 in the above embodiment is configured to acquire the position coordinates of each character on the input method input interface; after detecting the click operation, obtain the position coordinates of the corresponding character of the click operation, and input the interface according to the input method.
  • the position coordinates of each character and the position coordinates of the corresponding characters of the click operation determine the adjacent characters of the corresponding characters of the click operation, select at least one character from the adjacent characters as the interference character, and use the position of the interference character as the position coordinate of the interference operation.
  • An interference operation is generated based on the position coordinates of the interference operation and transmitted to the input method.
  • the interference module 22 in the foregoing embodiment is configured to determine, according to an input method, a mapping relationship of the generated byte according to the operation, determine an interference byte corresponding to the interference operation, and display the interference byte by the identifier; the interference cancellation module is set to Delete the byte that is identified by the display.
  • the de-interference module 23 in the above embodiment is configured to delete the interference byte immediately after detecting that the input method generates the interference byte according to the interference operation; and/or, after detecting that the user closes the input method input interface After the input is completed, all the interference bytes are deleted in all the bytes to be input generated by the input method according to the click operation and the interference operation.
  • all the functional modules in the embodiment shown in FIG. 2 can be implemented by using a processor, an editing logic device, or the like.
  • the terminal provided by the embodiment includes: an input module 31, an application module 32, an input method module 33, and a processor 34, where
  • the input module 31 is configured to receive a user operation and generate a click operation; it may be a physical button on the terminal, a virtual button displayed on the touch screen, or a button provided by an external auxiliary device;
  • the application module 32 is configured to start the target application according to the user operation, and invoke the input method on the input interface of the target application; after the input method is invoked, a trigger message is sent to the processor 34;
  • the input method module 33 includes at least one input method for calling the input method to generate a byte according to the input operation, and outputting, and the input operation includes a click operation and an interference operation;
  • the processor 34 is configured to detect a click operation of the user on the input method input interface when the input method is received by the target application, and generate an interference operation and transmit to the input method after the click operation is detected, and the interference operation is performed.
  • the interference byte is generated by the input method
  • the input input method is based on the to-be-entered byte generated by the click operation and the interference operation, and the input method in the byte to be input is deleted according to the interference byte generated by the interference operation, and the target byte is generated, and the target is generated.
  • the byte is entered into the input interface of the target application.
  • the processor 34 in the above embodiment is configured to acquire the position coordinates of each character on the input method input interface; after detecting the click operation, select the interference character to be triggered according to the preset interference rule, and The position of the disturbing character is used as the position coordinate of the interference operation; the interference operation is generated according to the position coordinate of the interference operation, and is transmitted to the input method.
  • the processor 34 in the embodiment is configured to acquire the position coordinate of the corresponding character of the click operation; The position coordinates of each character on the input method input interface, And the position coordinate of the corresponding character of the click operation, determining the adjacent character of the corresponding character of the click operation; selecting at least one character from the adjacent character as the interference character.
  • the processor 34 in the above embodiment is configured to generate an interference operation before the input method generates a byte according to the click operation after detecting the click operation; and/or, when the click operation is detected, and the input method After the byte is generated according to the click operation, an interference operation is generated.
  • the processor 34 in the foregoing embodiment is configured to determine, according to an input method, a mapping relationship of the generated byte according to the operation, determine an interference byte corresponding to the interference operation; display the interference byte by the identifier; and delete the identified display. byte.
  • the processor 34 in the above embodiment is configured to delete the interference byte immediately after detecting that the input method generates the interference byte according to the interference operation; and/or, after detecting that the user closes the input method input interface. After input, all interfering bytes are deleted in all the bytes to be input generated by the input method according to the click operation and the interference operation.
  • the terminal system when the user inputs the character information through the input method, automatically adds the scrambling code to the character information input by the user, and deletes the scrambling code automatically added by the system in the target program of the input content, so that the user can be normal without affecting the user.
  • the input method program cannot accurately obtain the real content input by the user, and realizes the safe input of the content.
  • the terminal system automatically adds a scrambling code to the character information input by the user, which means that when the user clicks on a character on the keyboard and generates input coordinates, the system automatically adds other coordinates in the coordinate queue for generating the scrambling code.
  • the system input device file records the coordinate value input by the user.
  • the coordinate information of the touch screen is recorded in the input device file /dev/input/event*.
  • the system will generate single or multiple interference coordinates according to certain rules based on the coordinates generated by the user click and write to the input device file /dev/input/event*.
  • the input method program responds to these input coordinates, it will generate multiple characters in turn, which contain the normal characters input by the user and the system to join the dry Disturbed characters, these characters generated by the input method are transmitted to the target program.
  • the target program for inputting content refers to a series of software applications installed on the terminal system, such as social software, mobile banking software, and the like.
  • the terminal system deletes the interfering characters in the character queue, and only retains the normal characters input by the user.
  • the method of deleting the interfering characters in the terminal system is to obtain the characters of the control by parsing the target program interface control, and then deleting the interfering characters on the control.
  • the specific method for parsing the information of the target program interface control is to obtain the current interface control information through the function interface.
  • the Android platform terminal can obtain the control information through the dumpWindowHierarchy interface, or obtain the control information through the UiAutomator dump command.
  • the text content of the control may be changed through the function interface.
  • the text information of the control can be set by using the settext method in the UiAutomator class library, thereby completing the interference character deletion in the control text.
  • the malicious program cannot accurately collect the real content input by the user, thereby achieving the purpose of safe input.
  • the system framework of the intelligent terminal input method includes three parts: a target program, a system process, and an input method process; when the target program, such as social software and mobile banking software, needs to input
  • the system process receives the application, it binds the input box and displays the input method.
  • the interaction interaction is performed by the InputMethodManager, the InputMethodManagerService, and the InputMethodService in the target program, the system process, and the input method process, respectively.
  • the user clicks on the touch screen the input method generates a character, and the character is transmitted to the target program, and after the target program receives the character, it is displayed on the corresponding control.
  • the related input method workflow is shown in Figure 5.
  • the user clicks on the touch screen, and the general process of inputting characters includes the following steps:
  • S504 The touch screen driver generates a coordinate of the click position in response to the click action, and reports the coordinate content to the terminal input subsystem.
  • the terminal input subsystem writes the content reported by the driver to the input device file.
  • the input device file is in the /dev/input/ directory.
  • the terminal input subsystem monitors the content change in the input device file, and encapsulates the original coordinate information, and sends the content to the upper application (ie, the input method program) by inputting an event.
  • the input method program generates a character, such as the letter a, in response to the input event.
  • the target program receives the character sent by the input program, and displays the character on the currently focused control.
  • the character security input process includes the following steps:
  • the touch screen driver generates a coordinate of the click position in response to the click action, and reports the coordinate content to the terminal input subsystem.
  • the terminal input subsystem writes the content reported by the driver to the input device file.
  • the input device file is in the /dev/input/ directory.
  • the terminal input subsystem monitors the content change in the input device file, and encapsulates the original coordinate information, and sends the content to the upper application (ie, the input method program) by inputting an event.
  • the input method program generates a character, such as the letter a, in response to the input event.
  • the target program receives the character sent by the input program, and displays the character on the currently focused control.
  • the system process records characters that have been input by the user in the target program, such as the letter a. On this basis, the system generates interference coordinates and writes them to the /dev/input input device file.
  • the rule for generating interference coordinates by the system is to obtain the center coordinate position of each letter control by parsing the layout information of the current interface, and then randomly take out some of the letter coordinates as the interference coordinates.
  • S616 The system monitors the inserted interference coordinate information in the input device file, and performs encapsulation, and sends an interference input event to the input method program.
  • the input method program generates an interference character, such as the letter b, in response to the input event.
  • the target program receives and displays all characters, such as ab.
  • the terminal system process obtains the character content of the edit box in the target program, and compares with the character content recorded in step S614, and modifies the content of the target program edit box to the character content recorded in step S614, thereby deleting the disturbing character. purpose.
  • steps S620 and S622 are completed in a short time, and are automatically completed by the program in real time.
  • the time taken to input characters and delete characters is in the order of milliseconds, and the operation performed by the system process cannot be perceived during the normal input process of the user.
  • a schematic diagram of the user inputting the letter a by clicking on the screen is as shown in S702; the schematic diagram of the target program input after the system automatically generates the interference character is as shown in S704, and in S704, the character input by the user and the interference character inserted by the system can be Different font styles are displayed, giving the user a friendly prompt description, such as the letter b in the schematic diagram being displayed in color; in S706, the interference character b is deleted, and only the content input by the user is retained.
  • the embodiment provides a security input method, which can improve the input of the common input method program on the basis of the input system of the mobile terminal, and reduce the security risk caused by the input method itself, to a large extent. Improve the safety factor of the product.
  • the embodiment of the invention provides a user input management method. After detecting a user inputting a click operation, the method generates an interference operation, and deletes the interference byte corresponding to the interference operation on the target application interface; The corresponding byte is generated by the input method. Therefore, the input record obtained by the input method includes a click operation and an interference operation, so that even if the input method is invaded, the input operation method cannot be used to illegally and accurately obtain the user's click operation, and further It is also impossible to estimate the user's input content according to the click operation, nor can it illegally obtain the private information input by the user through the input method, and solve the problem that the related technology exists because the input method is invaded and the user's private information is leaked, thereby enhancing the user experience. .
  • Embodiments of the present invention also provide a storage medium.
  • the foregoing storage medium may be configured to store program code for performing the following steps:
  • the input input method generates a to-be-entered byte according to the click operation and the interference operation;
  • the storage medium is further arranged to store program code for performing the following steps:
  • the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • a mobile hard disk e.g., a hard disk
  • magnetic memory e.g., a hard disk
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions are provided for implementation in a block or blocks of a flow or a flow and/or a block diagram of the flowchart Functional steps.
  • the embodiment of the invention provides a user input management method. After detecting a user inputting a click operation, the method generates an interference operation, and deletes the interference byte corresponding to the interference operation on the target application interface; The corresponding byte is generated by the input method. Therefore, the input record obtained by the input method includes a click operation and an interference operation, so that even if the input method is invaded, the input operation method cannot be used to illegally and accurately obtain the user's click operation, and further It is also impossible to estimate the user's input content according to the click operation, nor can it illegally obtain the private information input by the user through the input method, and solve the problem that the related technology exists because the input method is invaded and the user's private information is leaked, thereby enhancing the user experience. .

Abstract

一种用户输入管理方法及装置、终端;该方法包括:在输入法被目标应用调用时,检测用户在输入法输入界面的点击操作(S101),在检测到点击操作后,生成干扰操作并传输至输入法(S102),干扰操作用于通过输入法生成干扰字节,接收输入法根据点击操作及干扰操作生成的待输入字节(S103),删除待输入字节中的输入法根据干扰操作生成的干扰字节,生成目标字节(S104),将目标字节输入目标应用的输入界面(S105)。通过本方法,由于点击操作及干扰操作都通过输入法生成对应字节,通过输入法获取的输入记录包括点击操作及干扰操作,不能通过输入法的记录来非法、准确的获取用户的点击操作,进而也不能推算用户的隐私信息。

Description

一种用户输入管理方法及装置、终端 技术领域
本发明涉及用户输入领域,尤其涉及一种用户输入管理方法及装置、终端。
背景技术
随着智能手机的快速普及,移动支付等业务在手机终端的服务获得了快速增长,随之而来的客户信息失窃和资金损失却成为普通用户的一大安全威胁。比如一种隐私窃取类病毒——“键盘黑手”,曾在海外流行,该病毒被打包到知名手机输入法SwiftKey KeyBoard中,可以直接监听用户键盘输入,上传泄露用户账户密码信息,甚至包括信用卡、网银等支付资料,该病毒的危害十分严重。即用户使用输入法输入隐私信息时,会因为输入法被入侵,导致用户隐私信息的泄露。
发明内容
本发明实施例提供了一种用户输入管理方法及装置、终端,以解决相关技术存在的因输入法被入侵导致用户隐私信息被泄露的问题。
一方面,提供了一种用户输入管理方法,包括:
在输入法被目标应用调用时,检测用户在输入法输入界面的点击操作;
在检测到点击操作后,生成干扰操作并传输至输入法,干扰操作用于通过输入法生成干扰字节;
接收输入法根据点击操作及干扰操作生成的待输入字节;
删除待输入字节中的输入法根据干扰操作生成的干扰字节,生成目标字节;
将目标字节输入目标应用的输入界面。
一方面,提供了一种用户输入管理装置,包括:检测模块、干扰模块及去干扰模块,其中,
检测模块设置为在输入法被目标应用调用时,检测用户在输入法输入界面的点击操作;
干扰模块设置为在检测到点击操作后,生成干扰操作并传输至输入法,干扰操作用于通过输入法生成干扰字节;
去干扰模块设置为接收输入法根据点击操作及干扰操作生成的待输入字节,删除待输入字节中的输入法根据干扰操作生成的干扰字节,生成目标字节,将目标字节输入目标应用的输入界面。
一方面,提供了一种终端,包括:输入模块、应用目标、输入法模块及处理器,其中,
输入模块设置为接收用户操作,生成点击操作;
应用模块设置为根据用户操作启动目标应用,并在目标应用的输入界面调用输入法;
输入法模块包括至少一个输入法,用于调用输入法根据输入操作生成字节,并输出,输入操作包括点击操作及干扰操作;
处理器设置为在输入法被目标应用调用时,检测用户在输入法输入界面的点击操作,在检测到点击操作后,生成干扰操作并传输至输入法,干扰操作用于通过输入法生成干扰字节,接收输入法根据点击操作及干扰操作生成的待输入字节,删除待输入字节中的输入法根据干扰操作生成的干扰字节,生成目标字节,将目标字节输入目标应用的输入界面。
另一方面,提供了一种计算机存储介质,计算机存储介质中存储有计算机可执行指令,计算机可执行指令用于执行前述的用户输入管理方法。
本发明实施例的有益效果:
本发明实施例提供了一种用户输入管理方法,该方法在检测到用户输入一个点击操作后,生成一个干扰操作,在目标应用界面删除干扰操作对 应的干扰字节;由于点击操作及干扰操作都通过输入法生成对应字节,因此,通过输入法获取的输入记录包括点击操作及干扰操作,这样即便输入法被入侵,也不能通过输入法的记录来非法、准确的获取用户的点击操作,进而也不能根据点击操作推算用户的输入内容,也不能非法获取用户通过输入法输入的隐私信息,解决了相关技术存在的因输入法被入侵导致用户隐私信息被泄露的问题,增强了用户的使用体验。
附图说明
图1为本发明第一实施例提供的用户输入管理方法的流程图;
图2为本发明第二实施例提供的用户输入管理装置的结构示意图;
图3为本发明第三实施例提供的终端的结构示意图;
图4是本发明第四实施例涉及的输入法框架示意图;
图5是相关输入法的实现流程图;
图6是本发明第四实施例提供的输入法工作流程图;
图7是本发明第四实施例涉及的目标程序输入界面的示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例只是本发明中一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
现通过具体实施方式结合附图的方式对本发明做出进一步的诠释说明。
第一实施例:
图1为本发明第一实施例提供的用户输入管理方法的流程图,由图1可知,本实施例提供的用户输入管理方法包括:
S101:在输入法被目标应用调用时,检测用户在输入法输入界面的点击操作;
在实际应用中,输入法输入界面可以是直接使用终端按键来实现,也可以是在触摸屏终端内,通过虚拟按键的方式来实现;点击操作包括用户的按键操作和/或在虚拟键盘上的按压、触碰等操作。
S102:在检测到点击操作后,生成干扰操作并传输至输入法,干扰操作用于通过输入法生成干扰字节;
干扰操作是由终端自主触发的,并非用户点击的,用于保护用户实际输入目的不会被输入法记录。
S103:接收输入法根据点击操作及干扰操作生成的待输入字节;
输入法在接收到输入操作时,会根据预设关系生成对应的字节,这个不是本实施例关注的重点,不再赘述;在本实施例中的,输入操作就包括用户的点击操作及终端生成的干扰操作,这样输入法就不能获知/记录用户的实际输入意图,尤其是银行账户密码等涉及资金安全的隐私信息。
S104:删除待输入字节中的输入法根据干扰操作生成的干扰字节,生成目标字节;
删除干扰字节后,生成的目标字节是用户实际要输入的内容,这样就不会因为干扰操作导致用户输入错误的问题。
S105:将目标字节输入目标应用的输入界面。
在一些实施例中,上述实施例中的在检测到点击操作后,生成干扰操作并传输至输入法包括:
获取输入法输入界面上各字符的位置坐标;
在检测到点击操作后,根据预设的干扰规则,选择待触发的干扰字符,将干扰字符的位置作为干扰操作的位置坐标;
根据干扰操作的位置坐标,生成干扰操作,并传输至输入法。
在实际应用中,干扰规则可以是任意规则,如从输入法输入界面的所有字符中任意选择一个或多个字符作为干扰字符,或者选择用户点击操作对应字符的下一个字符作为干扰字符等等方式;在一些实施例中,若干扰规则为从点击操作对应字符的相邻字符中选择至少一个字符作为干扰字符时,上述实施例中的根据预设的干扰规则,选择待触发的干扰字符包括:
获取点击操作对应字符的位置坐标;
根据输入法输入界面上各字符的位置坐标、以及点击操作对应字符的位置坐标,确定点击操作对应字符的相邻字符;
从相邻字符的选择至少一个字符作为干扰字符。
在一些实施例中,上述实施例中的在检测到点击操作后,生成干扰操作包括:
在检测到点击操作后,输入法根据点击操作生成字节之前,生成干扰操作;和/或,
在检测到点击操作、且输入法根据点击操作生成字节之后,生成干扰操作。
在一些实施例中,上述实施例中的用户输入管理方法,在删除待输入字节中的输入法根据干扰操作生成的干扰字节之前,还包括:
根据输入法根据操作生成字节的映射关系,确定干扰操作对应的干扰字节;
将干扰字节进行标识显示;
删除待输入字节中的输入法根据干扰操作生成的干扰字节包括:删除被标识显示的字节。
在一些实施例中,上述实施例中的删除待输入字节中的输入法根据干扰操作生成的干扰字节包括:
在检测到输入法根据干扰操作生成干扰字节后,立即删除干扰字节; 和/或,
在检测到用户关闭输入法输入界面完成输入后,在输入法根据点击操作及干扰操作生成的所有待输入字节中,删除所有干扰字节。
第二实施例:
图2为本发明第二实施例提供的用户输入管理装置的结构示意图,由图2可知,本实施例提供的用户输入管理装置包括:检测模块21、干扰模块22及去干扰模块23,其中,
检测模块21设置为在输入法被目标应用调用时,检测用户在输入法输入界面的点击操作;
干扰模块22设置为在检测到点击操作后,生成干扰操作并传输至输入法,干扰操作用于通过输入法生成干扰字节;
去干扰模块23设置为接收输入法根据点击操作及干扰操作生成的待输入字节,删除待输入字节中的输入法根据干扰操作生成的干扰字节,生成目标字节,将目标字节输入目标应用的输入界面。
在一些实施例中,上述实施例中的干扰模块22设置为获取输入法输入界面上各字符的位置坐标;在检测到点击操作后,获取点击操作对应字符的位置坐标,根据输入法输入界面上各字符的位置坐标、以及点击操作对应字符的位置坐标,确定点击操作对应字符的相邻字符,从相邻字符的选择至少一个字符作为干扰字符,将干扰字符的位置作为干扰操作的位置坐标,根据干扰操作的位置坐标,生成干扰操作,并传输至输入法。
在一些实施例中,上述实施例中的干扰模块22设置为根据输入法根据操作生成字节的映射关系,确定干扰操作对应的干扰字节,将干扰字节进行标识显示;去干扰模块设置为删除被标识显示的字节。
在一些实施例中,上述实施例中的去干扰模块23设置为在检测到输入法根据干扰操作生成干扰字节后,立即删除干扰字节;和/或,在检测到用户关闭输入法输入界面完成输入后,在输入法根据点击操作及干扰操作生成的所有待输入字节中,删除所有干扰字节。
在实际应用中,图2所示实施例中的所有功能模块,都可以采用处理器、编辑逻辑器件等方式实现。
第三实施例:
图3为本发明第三实施例提供的终端的结构示意图,由图3可知,本实施例提供的终端包括:输入模块31、应用模块32、输入法模块33及处理器34,其中,
输入模块31设置为接收用户操作,生成点击操作;其可以是终端上的实体按键、触摸屏显示的虚拟按键、也可以是外部辅助设备提供的按键等;
应用模块32设置为根据用户操作启动目标应用,并在目标应用的输入界面调用输入法;在调用输入法之后,会向处理器34发送一个触发消息;
输入法模块33包括至少一个输入法,用于调用输入法根据输入操作生成字节,并输出,输入操作包括点击操作及干扰操作;
处理器34设置为在接收到触发消息,认为输入法被目标应用调用时,检测用户在输入法输入界面的点击操作,在检测到点击操作后,生成干扰操作并传输至输入法,干扰操作用于通过输入法生成干扰字节,接收输入法根据点击操作及干扰操作生成的待输入字节,删除待输入字节中的输入法根据干扰操作生成的干扰字节,生成目标字节,将目标字节输入目标应用的输入界面。
在一些实施例中,上述实施例中的处理器34设置为获取输入法输入界面上各字符的位置坐标;在检测到点击操作后,根据预设的干扰规则,选择待触发的干扰字符,将干扰字符的位置作为干扰操作的位置坐标;根据干扰操作的位置坐标,生成干扰操作,并传输至输入法。
在一些实施例中,上若干扰规则为从点击操作对应字符的相邻字符中选择至少一个字符作为干扰字符时,述实施例中的处理器34设置为获取点击操作对应字符的位置坐标;根据输入法输入界面上各字符的位置坐标、 以及点击操作对应字符的位置坐标,确定点击操作对应字符的相邻字符;从相邻字符的选择至少一个字符作为干扰字符。
在一些实施例中,上述实施例中的处理器34设置为在检测到点击操作后,输入法根据点击操作生成字节之前,生成干扰操作;和/或,在检测到点击操作、且输入法根据点击操作生成字节之后,生成干扰操作。
在一些实施例中,上述实施例中的处理器34设置为根据输入法根据操作生成字节的映射关系,确定干扰操作对应的干扰字节;将干扰字节进行标识显示;删除被标识显示的字节。
在一些实施例中,上述实施例中的处理器34设置为在检测到输入法根据干扰操作生成干扰字节后,立即删除干扰字节;和/或,在检测到用户关闭输入法输入界面完成输入后,在输入法根据点击操作及干扰操作生成的所有待输入字节中,删除所有干扰字节。
第四实施例:
现结合具体应用场景对本发明做进一步的诠释说明。
本实施例在用户通过输入法输入字符信息时,终端系统自动在用户输入的字符信息中加入扰码,并在输入内容的目标程序中删除系统自动加入的扰码,这样可以在不影响用户正常输入的情况下,输入法程序无法准确获取到用户输入的真正内容,实现内容的安全输入。
终端系统自动在用户输入的字符信息中加入扰码,是指在用户点击屏幕上输入键盘中某个字符,产生输入坐标时,系统自动在坐标队列中,加入其他坐标,用于生成扰码。
详细地,用户点击屏幕时,系统输入设备文件会记录下用户输入的坐标值,比如在基于Linux的智能系统中,触屏的坐标信息会被记录在输入设备文件/dev/input/event*中。在安全输入的方法下,系统会以用户点击生成的坐标为标准,根据一定规则,生成单个或多个干扰坐标,并写入到输入设备文件/dev/input/event*中。当输入法程序响应这些输入坐标时,会依次生成多个字符,这些字符中包含了用户输入的正常字符和系统加入的干 扰字符,输入法生成的这些字符都会被传送到目标程序。
输入内容的目标程序是指终端系统上安装的一系列软件应用,比如社交软件、手机银行软件等。
当输入法程序生成字符,并将字符传送到目标程序时,终端系统将字符队列中的干扰字符删除,仅保留用户输入的正常字符。
终端系统删除干扰字符的方法是通过解析目标程序界面控件,获取控件的字符,然后将控件上的干扰字符删除。
详细地,解析目标程序界面控件信息的具体方法是通过函数接口获取当前界面控件信息,例如在Android平台终端上可以通过dumpWindowHierarchy接口获取控件信息,或通过UiAutomator dump命令获取控件信息。
进一步地,在获取到界面控件信息后可以通过函数接口改变控件的文字内容。例如在Android平台终端上可以通过UiAutomator类库中的settext方法设置控件的文本信息,从而完成控件文本中干扰字符删除。
基于上述技术方案,在输入法程序被恶意入侵的情况下,恶意程序也无法准确收集到用户输入的真正内容,从而达到安全输入的目的。
具体的,以Android系统的手机为例,如图4所示,智能终端输入法系统框架中包括目标程序、系统进程、输入法进程三部分;当目标程序,如社交软件、手机银行软件需要输入字符内容时,首先向系统进程申请打开输入法程序,系统进程接收到申请时,绑定输入框并显示输入法。比如,在基于Android的系统终端中分别在目标程序、系统进程和输入法进程中分别通过InputMethodManager、InputMethodManagerService、InputMethodService进行协作交互。当绑定输入框并显示输入法后,用户点击触摸屏,输入法进程生成字符,并将字符传送给目标程序,目标程序接收到字符后,显示在相应控件上。
相关的输入法工作流程如图5所示,用户点击触摸屏,输入字符的一般流程包括如下几个步骤:
S502,用户点击屏幕输入法键盘上的某个字符,比如字母a。
S504,触摸屏驱动程序响应点击动作,生成点击位置的坐标,并将坐标内容上报给终端输入子系统。
S506,终端输入子系统将驱动上报的内容写入输入设备文件中,比如在基于linux的智能系统中,输入设备文件在/dev/input/目录下。
S508,终端输入子系统监听输入设备文件中的内容变化,并将原始坐标信息进行封装,以输入事件的方式发送给上层应用程序(即:输入法程序)。
S510,输入法程序响应输入事件,生成字符,比如字母a。
S512,目标程序接收输入程序发送过来的字符,并将字符显示在当前获取焦点的控件上。
以上流程步骤完成字符的输入,在这个流程中,用户期望输入的所有字符均通过输入法程序生成,所以,当输入法程序被入侵,输入法程序不可信时,用户输入的所有内容均可以被直接窃取,安全风险很高。本发明提出的安全输入流程可以解决这个问题。
本实施例提供的输入法的工作方法如图6所示,字符安全输入流程包括如下步骤:
S602,用户点击屏幕输入法键盘上的某个字符,比如字母a。
S604,触摸屏驱动程序响应点击动作,生成点击位置的坐标,并将坐标内容上报给终端输入子系统。
S606,终端输入子系统将驱动上报的内容写入输入设备文件中,比如在基于linux的智能系统中,输入设备文件在/dev/input/目录下。
S608,终端输入子系统监听输入设备文件中的内容变化,并将原始坐标信息进行封装,以输入事件的方式发送给上层应用程序(即:输入法程序)。
S610,输入法程序响应输入事件,生成字符,比如字母a。
S612,目标程序接收输入程序发送过来的字符,并将字符显示在当前获取焦点的控件上。
S614,系统进程记录目标程序中用户已经输入的字符,如字母a,在此基础上,系统生成干扰坐标,写入到/dev/input输入设备文件中。
详细地,系统生成干扰坐标的规则是通过解析当前界面的布局信息,获取各个字母控件的中心坐标位置,然后随机取出其中的若干字母坐标作为干扰坐标。
S616,系统监听输入设备文件中的插入的干扰坐标信息,并进行封装,发送干扰输入事件给输入法程序。
S618,输入法程序响应输入事件,生成干扰字符,比如字母b。
S620,目标程序接收并显示所有字符,比如ab。
S622,终端系统进程获取目标程序中编辑框的字符内容,并和步骤S614中记录的字符内容进行比较,将目标程序编辑框的内容修改为步骤S614中记录的字符内容,从而达到删除干扰字符的目的。
详细地,步骤S620和S622是在短时间内完成,由程序实时自动完成,输入字符和删除字符所占用的时间都在毫秒级,用户正常输入过程中无法感知系统进程所进行的操作。
以上流程步骤完成字符的安全输入,在这个流程中,当用户完成一个字符的输入后,系统快速的自动生成干扰坐标,并通过输入法生成干扰字符,然后系统进程将目标程序中包含了干扰字符的输入内容恢复用户输入的字符,这个过程的示意图如图7所示。
在图7中,用户点击屏幕输入字母a的示意图如S702所示;系统自动生成干扰字符后目标程序输入示意图如S704所示,在S704中,可以将用户输入的字符和系统插入的干扰字符以不同的字体风格显示,给与用户以友好的提示说明,如示意图中的字母b以彩色显示;在S706中,干扰字符b被删除,仅保留用户输入的内容。
本实施例提出了一种安全输入方法,该方法能够在移动终端相关输入系统基础上,对普通输入法程序的输入做安全提升,降低因输入法程序本身带来的安全风险,较大程度的提升产品的安全系数。
综上可知,通过本发明实施例的实施,至少存在以下有益效果:
本发明实施例提供了一种用户输入管理方法,该方法在检测到用户输入一个点击操作后,生成一个干扰操作,在目标应用界面删除干扰操作对应的干扰字节;由于点击操作及干扰操作都通过输入法生成对应字节,因此,通过输入法获取的输入记录包括点击操作及干扰操作,这样即便输入法被入侵,也不能通过输入法的记录来非法、准确的获取用户的点击操作,进而也不能根据点击操作推算用户的输入内容,也不能非法获取用户通过输入法输入的隐私信息,解决了相关技术存在的因输入法被入侵导致用户隐私信息被泄露的问题,增强了用户的使用体验。
本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的程序代码:
S1,在输入法被目标应用调用时,检测用户在输入法输入界面的点击操作;
S2,在检测到点击操作后,生成干扰操作并传输至输入法,干扰操作用于通过输入法生成干扰字节;
S3,接收输入法根据点击操作及干扰操作生成的待输入字节;
S4,将目标字节输入目标应用的输入界面。
可选地,存储介质还被设置为存储用于执行以下步骤的程序代码:
S1,获取输入法输入界面上各字符的位置坐标;
S2,在检测到点击操作后,根据预设的干扰规则,选择待触发的干扰字符,将干扰字符的位置作为干扰操作的位置坐标;
S3,根据干扰操作的位置坐标,生成干扰操作,并传输至输入法。
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。
可选地,本实施例中的具体示例可以参考上述实施例及可选实施方式中所描述的示例,本实施例在此不再赘述。
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的 功能的步骤。
以上仅是本发明的具体实施方式而已,并非对本发明做任何形式上的限制,凡是依据本发明的技术实质对以上实施方式所做的任意简单修改、等同变化、结合或修饰,均仍属于本发明技术方案的保护范围。
工业实用性
本发明实施例提供了一种用户输入管理方法,该方法在检测到用户输入一个点击操作后,生成一个干扰操作,在目标应用界面删除干扰操作对应的干扰字节;由于点击操作及干扰操作都通过输入法生成对应字节,因此,通过输入法获取的输入记录包括点击操作及干扰操作,这样即便输入法被入侵,也不能通过输入法的记录来非法、准确的获取用户的点击操作,进而也不能根据点击操作推算用户的输入内容,也不能非法获取用户通过输入法输入的隐私信息,解决了相关技术存在的因输入法被入侵导致用户隐私信息被泄露的问题,增强了用户的使用体验。

Claims (16)

  1. 一种用户输入管理方法,包括:
    在输入法被目标应用调用时,检测用户在输入法输入界面的点击操作;
    在检测到点击操作后,生成干扰操作并传输至所述输入法,所述干扰操作用于通过所述输入法生成干扰字节;
    接收所述输入法根据所述点击操作及所述干扰操作生成的待输入字节;
    删除待输入字节中的所述输入法根据所述干扰操作生成的干扰字节,生成目标字节;
    将所述目标字节输入所述目标应用的输入界面。
  2. 如权利要求1所述的用户输入管理方法,其中,所述在检测到点击操作后,生成干扰操作并传输至所述输入法包括:
    获取所述输入法输入界面上各字符的位置坐标;
    在检测到点击操作后,根据预设的干扰规则,选择待触发的干扰字符,将干扰字符的位置作为所述干扰操作的位置坐标;
    根据所述干扰操作的位置坐标,生成干扰操作,并传输至所述输入法。
  3. 如权利要求2所述的用户输入管理方法,其中,若所述干扰规则为从点击操作对应字符的相邻字符中选择至少一个字符作为干扰字符时,所述根据预设的干扰规则,选择待触发的干扰字符包括:
    获取所述点击操作对应字符的位置坐标;
    根据所述输入法输入界面上各字符的位置坐标、以及所述点击操作对应字符的位置坐标,确定所述点击操作对应字符的相邻字符;
    从所述相邻字符的选择至少一个字符作为干扰字符。
  4. 如权利要求1所述的用户输入管理方法,其中,所述在检测到点击操作后,生成干扰操作包括:
    在检测到点击操作后,所述输入法根据点击操作生成字节之前,生成所述干扰操作;和/或,
    在检测到点击操作、且所述输入法根据点击操作生成字节之后,生成所述干扰操作。
  5. 如权利要求1所述的用户输入管理方法,其中,在删除待输入字节中的所述输入法根据所述干扰操作生成的干扰字节之前,还包括:
    根据所述输入法根据操作生成字节的映射关系,确定所述干扰操作对应的干扰字节;
    将所述干扰字节进行标识显示;
    所述删除待输入字节中的所述输入法根据所述干扰操作生成的干扰字节包括:删除被标识显示的字节。
  6. 如权利要求1至5任一项所述的用户输入管理方法,其中,所述删除待输入字节中的所述输入法根据所述干扰操作生成的干扰字节包括:
    在检测到所述输入法根据干扰操作生成干扰字节后,立即删除所述干扰字节;和/或,
    在检测到用户关闭所述输入法输入界面完成输入后,在所述输入法根据所述点击操作及所述干扰操作生成的所有待输入字节中,删除所有干扰字节。
  7. 一种用户输入管理装置,包括:检测模块、干扰模块及去干扰模块,其中,
    所述检测模块设置为在输入法被目标应用调用时,检测用户在输入法输入界面的点击操作;
    所述干扰模块设置为在检测到点击操作后,生成干扰操作并传输至所述输入法,所述干扰操作用于通过所述输入法生成干扰字节;
    所述去干扰模块设置为接收所述输入法根据所述点击操作及所述干扰操作生成的待输入字节,删除待输入字节中的所述输入法根据所述干扰操作生成的干扰字节,生成目标字节,将所述目标字节输入所述目标应用的输入界面。
  8. 如权利要求7所述的用户输入管理装置,其中,所述干扰模块设置为获取所述输入法输入界面上各字符的位置坐标;在检测到点击操作后,获取所述点击操作对应字符的位置坐标,根据所述输入法输入界面上各字符的位置坐标、以及所述点击操作对应字符的位置坐标,确定所述点击操作对应字符的相邻字符,从所述相邻字符的选择至少一个字符作为干扰字符,将干扰字符的位置作为所述干扰操作的位置坐标,根据所述干扰操作的位置坐标,生成干扰操作,并传输至所述输入法。
  9. 如权利要求7所述的用户输入管理装置,其中,所述干扰模块设置为根据所述输入法根据操作生成字节的映射关系,确定所述干扰操作对应的干扰字节,将所述干扰字节进行标识显示;所述去干扰模块设置为删除被标识显示的字节。
  10. 如权利要求7至9任一项所述的用户输入管理装置,其中,所述去干扰模块设置为在检测到所述输入法根据干扰操作生成干扰字节后,立即删除所述干扰字节;和/或,在检测到用户关闭所述输入法输入界面完成输入后,在所述输入法根据所述点击操作及所述干扰操作生成的所有待输入字节中,删除所有干扰字节。
  11. 一种终端,包括:输入模块、应用模块、输入法模块及处理器,其中,
    所述输入模块设置为接收用户操作,生成点击操作;
    所述应用模块设置为根据用户操作启动目标应用,并在目标应用的输入界面调用输入法;
    所述输入法模块包括至少一个输入法,用于调用输入法根据输入操作生成字节,并输出,所述输入操作包括点击操作及干扰操作;
    所述处理器设置为在输入法被目标应用调用时,检测用户在输入法输入界面的点击操作,在检测到点击操作后,生成干扰操作并传输至所述输入法,所述干扰操作用于通过所述输入法生成干扰字节,接收所述输入法根据所述点击操作及所述干扰操作生成的待输入字节,删除待输入字节中 的所述输入法根据所述干扰操作生成的干扰字节,生成目标字节,将所述目标字节输入所述目标应用的输入界面。
  12. 如权利要求11所述的终端,其中,所述处理器设置为获取所述输入法输入界面上各字符的位置坐标;在检测到点击操作后,根据预设的干扰规则,选择待触发的干扰字符,将干扰字符的位置作为所述干扰操作的位置坐标;根据所述干扰操作的位置坐标,生成干扰操作,并传输至所述输入法。
  13. 如权利要求12所述的终端,其中,若所述干扰规则为从点击操作对应字符的相邻字符中选择至少一个字符作为干扰字符时,所述处理器设置为获取所述点击操作对应字符的位置坐标;根据所述输入法输入界面上各字符的位置坐标、以及所述点击操作对应字符的位置坐标,确定所述点击操作对应字符的相邻字符;从所述相邻字符的选择至少一个字符作为干扰字符。
  14. 如权利要求11所述的终端,其中,所述处理器设置为在检测到点击操作后,所述输入法根据点击操作生成字节之前,生成所述干扰操作;和/或,在检测到点击操作、且所述输入法根据点击操作生成字节之后,生成所述干扰操作。
  15. 如权利要求11所述的终端,其中,所述处理器设置为根据所述输入法根据操作生成字节的映射关系,确定所述干扰操作对应的干扰字节;将所述干扰字节进行标识显示;删除被标识显示的字节。
  16. 如权利要求11至15任一项所述的终端,其中,所述处理器设置为在检测到所述输入法根据干扰操作生成干扰字节后,立即删除所述干扰字节;和/或,在检测到用户关闭所述输入法输入界面完成输入后,在所述输入法根据所述点击操作及所述干扰操作生成的所有待输入字节中,删除所有干扰字节。
PCT/CN2016/095340 2016-07-18 2016-08-15 一种用户输入管理方法及装置、终端 WO2018014400A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610570352.X 2016-07-18
CN201610570352.XA CN107633174B (zh) 2016-07-18 2016-07-18 一种用户输入管理方法及装置、终端

Publications (1)

Publication Number Publication Date
WO2018014400A1 true WO2018014400A1 (zh) 2018-01-25

Family

ID=60991664

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/095340 WO2018014400A1 (zh) 2016-07-18 2016-08-15 一种用户输入管理方法及装置、终端

Country Status (2)

Country Link
CN (1) CN107633174B (zh)
WO (1) WO2018014400A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110598489A (zh) * 2018-06-13 2019-12-20 北京搜狗科技发展有限公司 一种输入提示信息的隐私保护方法及相关装置

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110188532B (zh) * 2019-05-05 2020-12-15 珠海格力电器股份有限公司 一种密码保护方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309260A (zh) * 2008-06-05 2008-11-19 周红伟 一种基于密码保护的网络认证方法
CN101808077A (zh) * 2009-02-13 2010-08-18 普天信息技术研究院有限公司 信息安全输入处理系统和方法以及智能卡
US20110296299A1 (en) * 2010-05-27 2011-12-01 Microsoft Corporation Concurrent Utilization of a Document by Multiple Threads
CN104143068A (zh) * 2014-07-16 2014-11-12 宇龙计算机通信科技(深圳)有限公司 密码验证方法及系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100485708C (zh) * 2007-08-07 2009-05-06 江雨 一种输入数据的安全处理方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309260A (zh) * 2008-06-05 2008-11-19 周红伟 一种基于密码保护的网络认证方法
CN101808077A (zh) * 2009-02-13 2010-08-18 普天信息技术研究院有限公司 信息安全输入处理系统和方法以及智能卡
US20110296299A1 (en) * 2010-05-27 2011-12-01 Microsoft Corporation Concurrent Utilization of a Document by Multiple Threads
CN104143068A (zh) * 2014-07-16 2014-11-12 宇龙计算机通信科技(深圳)有限公司 密码验证方法及系统

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110598489A (zh) * 2018-06-13 2019-12-20 北京搜狗科技发展有限公司 一种输入提示信息的隐私保护方法及相关装置

Also Published As

Publication number Publication date
CN107633174B (zh) 2020-07-31
CN107633174A (zh) 2018-01-26

Similar Documents

Publication Publication Date Title
US10229410B2 (en) Method and device for end-user verification of an electronic transaction
US10073985B2 (en) Apparatus and method for trusted execution environment file protection
US9231923B1 (en) Secure data destruction in a distributed environment using key protection mechanisms
CN108171025B (zh) 多用户登录模式的实现方法、终端及计算机可读存储介质
US20170193236A1 (en) Data security processing method and apparatus based on switch in dual system
WO2019209630A1 (en) File processing method and system, and data processing method
CN105519038A (zh) 基于在设备引导、用户登录和设备关闭状态期间的用户输入的数据保护
US8645967B2 (en) Efficient secure data marshaling through at least one untrusted intermediate process
US20200272730A1 (en) Fpga cloud host development method and system
US20180359245A1 (en) Communication Method and Apparatus
JP6974604B2 (ja) ユーザインタフェース表示方法及び端末デバイス
EP3176719B1 (en) Methods and devices for acquiring certification document
WO2020244068A1 (zh) 图片处理方法、装置、电子设备及存储介质
WO2016172944A1 (zh) 终端的界面显示方法和终端
CN104091119A (zh) 一种移动终端及其数据的保护方法、保护系统
CN111259382A (zh) 恶意行为识别方法、装置、系统和存储介质
WO2018014400A1 (zh) 一种用户输入管理方法及装置、终端
US11379568B2 (en) Method and system for preventing unauthorized computer processing
CN106127558B (zh) 一种账单生成方法及移动终端
WO2018053988A1 (zh) 安全输入系统、方法及智能终端、存储介质
WO2017129068A1 (zh) 事件执行方法和装置及系统
CN114741727A (zh) 数据发送方法和装置
JP5943045B2 (ja) 情報処理装置、情報処理方法、及びそのプログラム
US9021271B1 (en) Injecting code decrypted by a hardware decryption module into Java applications
CN104866777A (zh) 一种数据保护方法、装置及电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16909327

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16909327

Country of ref document: EP

Kind code of ref document: A1