This application claims priority to Chinese Patent Application No. 201510068416.1 filed on Feb. 9, 2015, the contents of which are incorporated by reference herein.
The subject matter herein generally relates to electronic devices, and particularly to a computing device capable of automatically submitting user information.
Some operations are redundantly repeated every day. The operations include online payment, login applications, and the like. Many redundantly repeated operations require a user to submit personal information.
Implementations of the present technology will now be described, by way of example only, with reference to the attached figures.
It will be appreciated that for simplicity and clarity of illustration, where appropriate, reference numerals have been repeated among the different figures to indicate corresponding or analogous elements. In addition, numerous specific details are set forth in order to provide a thorough understanding of the embodiments described herein. However, it will be understood by those of ordinary skill in the art that the embodiments described herein can be practiced without these specific details. In other instances, methods, procedures, and components have not been described in detail so as not to obscure the related relevant feature being described. The drawings are not necessarily to scale and the proportions of certain parts may be exaggerated to better illustrate details and features. The description is not to be considered as limiting the scope of the embodiments described herein.
Several definitions that apply throughout this disclosure will now be presented.
The term “module” refers to logic embodied in computing or firmware, or to a collection of software instructions, written in a programming language, such as, Java, C, or assembly. One or more software instructions in the modules may be embedded in firmware, such as in an erasable programmable read only memory (EPROM). The modules described herein may be implemented as either software and/or computing modules and may be stored in any type of non-transitory computer-readable medium or other storage device. Some non-limiting examples of non-transitory computer-readable media include CDs, DVDs, BLU-RAY, flash memory, and hard disk drives. The term “comprising” means “including, but not necessarily limited to”; it specifically indicates open-ended inclusion or membership in a so-described combination, group, series and the like.
In at least one embodiment, the storage device 11 and the storage unit 201 can include various types of non-transitory computer-readable storage media. For example, the storage device 11 and the storage unit 201 can be an internal storage system, such as a flash memory, a random access memory (RAM) for temporary storage of information, and/or a read-only memory (ROM) for permanent storage of information. The storage device 11 and the storage unit 201 can also be an external storage system, such as a hard disk, a storage card, or a data storage medium. In the embodiment, the user information submitting system 10 can include a plurality of function modules (shown in
The detecting module 21 detects a preset operation when the computing device 1 is operated. In at least one embodiment, the preset operation may be a login operation, an online payment operation, an unlocking operation, or the like.
When the preset operation is detected, the transmitting module 22 generates a request of obtaining user information related to the preset operation in the computing device 1, and transmits the generated request to the electronic device 2 through the connecting unit 100.
In at least one embodiment, the generated request can include, but is not limited to, a request of obtaining a login identification (ID) and password of an application (e.g., QQ® application or WeChat® application) which is installed in the computing device 1, a request of obtaining an account name and password for online payment, a request of obtaining an unlocking password of the computing device 1, and the like. For example, the generated request can be a request of obtaining a login ID and password of the QQ® application when the QQ® application is operated.
The inquiring module 23 inquires the user information related to the preset operation in the storage unit 201 of the electronic device 2 when receiving the request transmitted by the computing device 1.
In at least one embodiment, information related to various preset operations is pre-stored in the storage unit 201. As shown in
When the user information related to the preset operation is inquired in the storage unit 201, the response module 24 sends the inquired user information to the computing device 1.
When the user information related to the preset operation is not inquired in the storage unit 201, the prompt module 25 displays a prompt on the display screen 13 of the computing device 1 to request the user of the computing device 1 to input the user information manually.
The processing module 26 receives the user information related to the preset operation, and executes the preset operation according to the received user information. In at least one embodiment, the received user information can be the user information inquired in the storage unit 201 of the electronic device 2 or the user information input manually by the user of the computing device 1.
The determining module 27 determines whether the preset operation is executed successfully. If the preset operation is not executed successfully, the prompt module 25 prompts the user of the computing device 1 to input the user information manually on the display screen 13.
If the preset operation is executed successfully, the transmitting module 22 transmits the received user information to the electronic device 2, and the storage module 28 stores the received user information in the storage unit 201 of the electronic device 2. In at least one embodiment, the received user information can be encrypted when stored in the storage unit 201.
At block 31, a detecting module detects a preset operation when a computing device is operated. In at least one embodiment, the preset operation may be a login operation, an online payment operation, an unlocking operation, or the like.
At block 32, when the preset operation is detected, a transmitting module generates a request of obtaining user information related to the preset operation in the computing device, and transmits the generated request to an electronic device. In at least one embodiment, the generated request can include, but is not limited to, a request of obtaining a login ID and password of an application which is installed in the computing device, a request of obtaining an account name and password for online payment, a request of obtaining an unlocking password of the computing device, and the like.
At block 33, an inquiring module inquires the user information related to the preset operation in a storage unit of the electronic device when receiving the request transmitted by the computing device. If the user information related to the preset operation is inquired, block 34 is implemented. If the user information related to the preset operation is not inquired, block 35 is implemented.
At block 34, a response module sends the inquired user information to the computing device.
At block 35, a prompt module displays a prompt on a display screen of the computing device to request the user of the computing device to input the user information manually.
At block 36, a processing module receives the user information related to the preset operation, and executes the preset operation according to the received user information. In at least one embodiment, the received user information can be the user information inquired in the storage unit of the electronic device or the user information input manually by the user of the computing device.
At block 37, a determining module determines whether the preset operation is executed successfully. If the preset operation is not executed successfully, block 35 is repeated; if the preset operation is executed successfully, block 38 is implemented.
At block 38, the transmitting module transmits the received user information to the electronic device.
At block 39, a storage module stores the received user information in the storage unit of the electronic device. In at least one embodiment, the received user information can be encrypted when stored in the storage unit.
At block 51, the detecting module detects a login operation of an application when the computer is operated.
At block 52, when the login operation is detected, the transmitting module generates a request of obtaining a login ID and password of the application in the computer, and transmits the generated request to the smart phone.
At block 53, the inquiring module inquires the login ID and password of the application in the smart phone when receiving the generated request. If the login ID and password of the application is inquired, block 54 is implemented. If the login ID and password of the application is not inquired, block 55 is implemented.
At block 54, the response module sends the inquired login ID and password of the application to the computer.
At block 55, the prompt module displays a prompt on the display screen of the computer to request the user to input the login ID and password of the application manually.
At block 56, the processing module logins to the application when receiving the login ID and password of the application. In the embodiment, the received login ID and password of the application can be inquired in the smart phone or input manually by the user of the computer.
At block 57, the determining module determines whether the login operation is executed successfully. If the login operation is not executed successfully, block 55 is repeated. If the login operation is executed successfully, block 58 is implemented.
At block 58, the transmitting module transmits the received login ID and password of the application to the smart phone.
At block 59, the storage module stores the received login ID and password of the application in the smart phone. In at least one embodiment, the received login ID and password of the application can be encrypted when being stored in the smart phone.
The embodiments shown and described above are only examples. Even though numerous characteristics and advantages of the present technology have been set forth in the foregoing description, together with details of the structure and function of the present disclosure, the disclosure is illustrative only, and changes may be made in the detail, including in particular the matters of shape, size and arrangement of parts within the principles of the present disclosure, up to and including the full extent established by the broad general meaning of the terms used in the claims.
| Number | Date | Country | Kind |
|---|---|---|---|
| 201510068416.1 | Feb 2015 | CN | national |