Operation execution method and device and electronic equipment

A technology of operation execution and target content, applied in the field of communication, can solve the problem of low security of personal information, and achieve the effect of reducing risks, ensuring security, and preventing the leakage of important information

Pending Publication Date: 2021-09-17
VIVO MOBILE COMM HANGZHOU CO LTD
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiment of the present application is to provide an operation execution method, device and electronic equipment, which can solve the problem of low security of verification information and user's personal information in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation execution method and device and electronic equipment
  • Operation execution method and device and electronic equipment
  • Operation execution method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0020] The terms "first", "second" and the like in the specification and claims of the present application are used to distinguish similar objects, and are not used to describe a specific sequence or sequence. It should be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments of the application can be practiced in sequences other than those illustrated or described herein, and that references to "first," "second," etc....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an operation execution method and device and electronic equipment, and belongs to the technical field of communication. The technical problem of low security of verification information and personal information of a user in related technologies can be solved. The method comprises the steps: under the condition that a user interface of a first application is displayed, receiving paste input of a user; and in response to the paste input, displaying the target content in the user interface under the condition that the first application is related to the target content in the clipboard. The method is applied to scenes of identity verification and user personal information input.

Description

technical field [0001] The present application belongs to the technical field of communications, and in particular relates to an operation execution method, device and electronic equipment. Background technique [0002] With the development of electronic technology, users are more and more dependent on electronic equipment, and the functions of electronic equipment are also increasing. At present, most of the application logins and verifications in electronic devices are verified through text messages, and the execution of functions of some applications requires the use of personal information of users. [0003] In related technologies, when receiving a text message carrying verification information, the user can view and copy the verification information in the text message, and then paste the verification information into the verification information input box of the application requiring identity verification to perform identity verification; Alternatively, in the case t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62G06F21/64G06Q20/38
CPCG06F21/602G06F21/6245G06F21/64G06Q20/382
Inventor 韦荣海
Owner VIVO MOBILE COMM HANGZHOU CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products