技术领域technical field
本发明属于密码安全应用技术领域,尤其涉及一种密码输入方法及装置。The invention belongs to the technical field of password security applications, and in particular relates to a password input method and device.
背景技术Background technique
目前,数字密码已成为用户安全认证中不可或缺的一部分,在向智能手机等终端设备输入数字密码进行用户安全认证时,一般需采用相应的安全措施来防止密码被他人窥窃。At present, digital passwords have become an indispensable part of user security authentication. When entering digital passwords into terminal devices such as smartphones for user security authentication, it is generally necessary to take corresponding security measures to prevent passwords from being stolen by others.
现有密码输入方案通过隐藏输入之后的数字密码,例如采用黑点或星型符替代数字进行显示等,来解决输入密码环节用户密码的安全问题。然而此种方式的防窥窃能力有限,仅可确保用户输入密码之后的密码安全,无法解决输入执行过程中的密码安全问题,在密码输入过程中,用户密码极易被他人窥窃盗取,因此,本领域亟需提供一种安全性较高的密码输入方法,来解决输入密码过程中用户密码的安全性问题。The existing password input scheme solves the security problem of the user password in the password input link by hiding the digital password after input, for example, using black dots or asterisks instead of numbers for display. However, this method has limited anti-peeping capabilities, and can only ensure the security of the password after the user enters the password, but cannot solve the problem of password security during the input process. During the password input process, the user's password is easily stolen by others, so Therefore, there is an urgent need in the art to provide a password input method with higher security to solve the security problem of the user password during the password input process.
发明内容SUMMARY OF THE INVENTION
有鉴于此,本发明的目的在于提供一种一种密码输入方法、装置及电子设备,旨在解决输入密码过程中用户密码的安全性问题,从而提升用户密码的安全度。In view of this, the purpose of the present invention is to provide a password input method, device and electronic equipment, aiming at solving the security problem of the user password during the password input process, thereby improving the security of the user password.
为此,本发明公开如下技术方案:For this reason, the present invention discloses following technical scheme:
一种密码输入方法,应用于电子设备,所述方法包括:A password input method applied to an electronic device, the method comprising:
获取用户当前输入的密码字符;Obtain the password characters currently entered by the user;
判断所述电子设备的当前输入模式是否为有效输入模式;judging whether the current input mode of the electronic device is a valid input mode;
如果是有效输入模式,则基于所述密码字符的先后输入次序记录所述密码字符;If it is a valid input mode, recording the password characters based on the input sequence of the password characters;
如果不是有效输入模式,则丢弃所述密码字符。If not a valid input pattern, the password characters are discarded.
上述方法,优选的,所述判断所述电子设备的当前输入模式是否为有效输入模式包括:In the above method, preferably, the judging whether the current input mode of the electronic device is a valid input mode includes:
判断当前所述电子设备是否符合以下条件:侦测到用户手指按压在指纹识别器上,且当前用户指纹通过验证;其中,所述指纹识别器预先集成在所述电子设备中;Judging whether the current electronic device meets the following conditions: it is detected that the user's finger is pressed on the fingerprint reader, and the current user's fingerprint has passed the verification; wherein, the fingerprint reader is pre-integrated in the electronic device;
如果符合,则所述电子设备的当前输入模式为有效输入模式If so, the current input mode of the electronic device is a valid input mode
如果不符合,则所述电子设备的当前输入模式为无效输入模式。If not, the current input mode of the electronic device is an invalid input mode.
上述方法,优选的,还包括:The above method, preferably, also includes:
依据预设的输入结束条件,判断用户的密码输入过程是否结束;如果结束,则基于所记录的各密码字符的先后输入次序拼接所记录的各个所述密码字符,得到用户的输入密码。According to the preset input end condition, it is judged whether the user's password input process is over; if it is over, each of the recorded password characters is spliced based on the recorded input sequence of each password character to obtain the user's input password.
上述方法,优选的,还包括:The above method, preferably, also includes:
基于预先存储的基准密码,验证所述输入密码的合法性,或向服务器提交所述输入密码。Based on the pre-stored reference password, verify the validity of the input password, or submit the input password to the server.
一种密码输入装置,应用于电子设备,所述装置包括:A password input device applied to electronic equipment, said device comprising:
密码字符获取模块,用于获取用户当前输入的密码字符;The password character acquisition module is used to acquire the password character currently input by the user;
判断模块,用于判断所述电子设备的当前输入模式是否为有效输入模式;A judging module, configured to judge whether the current input mode of the electronic device is a valid input mode;
记录模块,用于在判断结果是有效输入模式时,基于所述密码字符的先后输入次序记录所述密码字符;A recording module, configured to record the password characters based on the sequence of input of the password characters when the judgment result is a valid input mode;
丢弃模块,用于在判断结果不是有效输入模式时,丢弃所述密码字符。A discarding module, configured to discard the password characters when the judging result is not a valid input mode.
上述装置,优选的,所述判断模块包括:In the above device, preferably, the judging module includes:
判断单元,用于判断当前所述电子设备是否符合以下条件:侦测到用户手指按压在指纹识别器上,且当前用户指纹通过验证;其中,所述指纹识别器预先集成在所述电子设备中;A judging unit, configured to judge whether the current electronic device meets the following conditions: it is detected that the user's finger is pressed on the fingerprint reader, and the current user's fingerprint has passed the verification; wherein, the fingerprint reader is pre-integrated in the electronic device ;
第一输入模式确定单元,用于在判断结果为符合时,确定出所述电子设备的当前输入模式为有效输入模式The first input mode determination unit is configured to determine that the current input mode of the electronic device is an effective input mode when the judgment result is consistent
第二输入模式确定单元,用于在判断结果为不符合时,确定出所述电子设备的当前输入模式为无效输入模式。The second input mode determination unit is configured to determine that the current input mode of the electronic device is an invalid input mode when the judgment result is inconsistent.
上述装置,优选的,还包括:The above-mentioned device, preferably, also includes:
输入密码获取模块,用于依据预设的输入结束条件,判断用户的密码输入过程是否结束;并在判断出结束时,基于所记录的各密码字符的先后输入次序拼接所记录的各个所述密码字符,得到用户的输入密码。The input password acquisition module is used to judge whether the user's password input process is over according to the preset input end condition; character to get the user's input password.
上述装置,优选的,还包括:The above-mentioned device, preferably, also includes:
密码验证或提交模块,用于基于预先存储的基准密码,验证所述输入密码的合法性,或向服务器提交所述输入密码。The password verification or submission module is configured to verify the legitimacy of the input password based on the pre-stored reference password, or submit the input password to the server.
一种电子设备,包括如上所述的密码输入装置。An electronic device includes the above password input device.
由以上方案可知,本申请公开的密码输入方法,在获取到用户当前输入的密码字符时,通过判断所述电子设备的当前输入模式是否为有效输入模式,来确定是记录还是丢弃所述当前密码字符。可见,本申请针对电子设备的密码输入问题,引入了有效及非有效/无效两种类型的输入模式,在用户输入密码过程中,电子设备可基于对输入每个字符时采用的输入模式进行判断识别,实现对用户所输入的各密码字符进行不同处理(记录或丢弃),从而,本申请中,用户可通过对两种输入模式进行结合应用,来为输入过程产生一些非真实输入的字符,以此来迷惑可能的窥窃者,防止密码在输入过程中被窥窃盗取。从而本申请解决了输入密码过程中用户密码的安全问题。It can be seen from the above scheme that the password input method disclosed in this application determines whether to record or discard the current password by judging whether the current input mode of the electronic device is a valid input mode when the password characters currently input by the user are obtained. character. It can be seen that this application introduces two types of input modes: valid and non-valid/invalid for the password input problem of electronic devices. During the process of user inputting passwords, electronic devices can judge based on the input mode used when entering each character Recognition, to achieve different processing (recording or discarding) of each password character input by the user, thus, in this application, the user can generate some non-real input characters for the input process by combining the two input modes. In this way, possible eavesdroppers are confused and the password is prevented from being stolen by eavesdroppers during the input process. Therefore, the application solves the security problem of the user password in the process of inputting the password.
附图说明Description of drawings
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only It is an embodiment of the present invention, and those skilled in the art can also obtain other drawings according to the provided drawings without creative work.
图1是本发明实施例一提供的密码输入方法流程图;FIG. 1 is a flow chart of a password input method provided by Embodiment 1 of the present invention;
图2是本发明实施例一提供的两种输入模式的判断策略示意图;FIG. 2 is a schematic diagram of judgment strategies for two input modes provided by Embodiment 1 of the present invention;
图3是本发明实施例一提供的本申请方法的一应用示例图;Fig. 3 is an application example diagram of the method of the present application provided by Embodiment 1 of the present invention;
图4是本发明实施例二提供的密码输入方法流程图;FIG. 4 is a flow chart of a password input method provided by Embodiment 2 of the present invention;
图5是本发明实施例三提供的密码输入方法流程图;FIG. 5 is a flow chart of a password input method provided by Embodiment 3 of the present invention;
图6-图8是本发明实施例四提供的密码输入装置的结构示意图。6-8 are schematic structural diagrams of a password input device provided by Embodiment 4 of the present invention.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
为解决输入密码过程中用户密码的安全性问题,本申请通过向电子设备引入有效及无效两种类型的输入模式,实现在用户输入密码过程中,支持用户通过对两种输入模式的结合应用,来为输入过程产生一些非真实输入的字符,以此来迷惑可能的窥窃者,防止密码在输入过程中被窥窃盗取。以下将通过多个实施例对本申请方法进行说明。In order to solve the security problem of the user password in the process of inputting the password, this application introduces two types of input modes, valid and invalid, into the electronic device, so as to realize that in the process of the user inputting the password, the user is supported to combine the two input modes, To generate some non-real input characters for the input process, so as to confuse possible eavesdroppers and prevent passwords from being eavesdropped during the input process. The method of the present application will be described below through multiple embodiments.
实施例一Example 1
本发明实施例一公开一种密码输入方法,所述方法可应用于智能手机、平板电脑等电子设备,参考图1,所述方法可以包括以下步骤:Embodiment 1 of the present invention discloses a method for inputting a password. The method can be applied to electronic devices such as smart phones and tablet computers. Referring to FIG. 1 , the method can include the following steps:
S101:获取用户当前输入的密码字符。S101: Obtain the password characters currently input by the user.
其中,所述密码字符可以是数字、字母或键盘上的各种特殊符号(如下划线、圆点符)等。Wherein, the password characters may be numbers, letters, or various special symbols on the keyboard (such as underline, dot) and the like.
本步骤接收用户通过设备键盘或手写等方式向电子设备输入的当前密码字符,并缓存所述当前密码字符。This step receives the current password characters input by the user to the electronic device through the device keyboard or handwriting, and caches the current password characters.
S102:判断所述电子设备的当前输入模式是否为有效输入模式。S102: Determine whether the current input mode of the electronic device is a valid input mode.
本申请向电子设备引入两种输入模式:有效输入模式及无效输入模式,并基于指纹识别技术提供以上两种输入模式的判断策略,其中,参考图2,当用户手指按压在电子设备的指纹识别器上,且按压操作所输入的指纹通过电子设备的合法性验证(输入指纹与用户预先在电子设备注册的指纹一致,则通过验证),则电子设备的当前模式为有效输入模式,从而,在用户合法注册的手指按压指纹识别器期间,用户向电子设备输入的密码字符可被有效录入;否则,如果用户手指未按压在指纹识别器上,或按压在指纹识别器上时所输入的指纹未通过验证,则电子设备的当前模式为无效输入模式。This application introduces two input modes into the electronic device: valid input mode and invalid input mode, and provides judgment strategies for the above two input modes based on fingerprint identification technology, wherein, referring to Figure 2, when the user's finger presses the fingerprint identification of the electronic device device, and the fingerprint input by the pressing operation passes the legality verification of the electronic device (if the input fingerprint is consistent with the fingerprint registered by the user in the electronic device in advance, then the verification is passed), then the current mode of the electronic device is the valid input mode, thus, in During the period when the user's legally registered finger presses the fingerprint reader, the password characters input by the user to the electronic device can be effectively entered; otherwise, if the user's finger is not pressed on the fingerprint reader, or the input fingerprint is not If the verification is passed, the current mode of the electronic device is an invalid input mode.
基于此,本步骤中,具体可通过判断电子设备是否符合以下条件,来获知其当前模式是否为有效输入模式:侦测到用户手指按压在指纹识别器上,且当前用户指纹通过验证。Based on this, in this step, whether the current mode of the electronic device is a valid input mode can be determined by judging whether the electronic device meets the following conditions: it is detected that the user's finger is pressed on the fingerprint reader, and the current user's fingerprint is verified.
实际应用中,用户可依据其使用习惯预先注册一个或多个验证指纹,从而在输入密码过程中,可依据实际按压操作的便捷性需求,选择任意一个合法注册的指纹所对应的手指执行按压操作,实现将电子设备的输入模式控制为有效输入模式,而一旦用户手指脱离指纹识别器,电子设备随即进入无效输入模式,即用户可通过采用合法注册的手指在指纹识别器进行按压或撤离,控制电子设备进入有效输入模式或无效输入模式。In practical applications, users can pre-register one or more verification fingerprints according to their usage habits, so that in the process of entering passwords, they can select any finger corresponding to a legally registered fingerprint to perform the pressing operation according to the convenience requirements of the actual pressing operation , to control the input mode of the electronic device to an effective input mode, and once the user's finger leaves the fingerprint reader, the electronic device immediately enters the invalid input mode, that is, the user can use a legally registered finger to press or withdraw from the fingerprint reader to control The electronic device enters a valid input mode or an invalid input mode.
本申请方法的实施需预先在电子设备中集成一指纹识别器,其中,技术人员具体可基于电子设备的ID(industrial design,工业设计)需求,并结合密码输入的安全性需求、用户操作的便捷性需求等,对指纹识别器在电子设备中的集成位置进行布局,其中,作为一优选方案,本实施例采用将指纹识别器集成在电子设备背部,此种布局方式为用户操作指纹识别器提供了便利,同时可提升用户手指操作指纹识别器的隐秘性,从而进一步提升了输入密码过程中用户密码的安全程度The implementation of the method of this application needs to integrate a fingerprint reader in the electronic device in advance, wherein, the technical personnel can specifically based on the ID (industrial design, industrial design) requirement of the electronic device, combined with the security requirement of password input and the convenience of user operation In order to meet the specific requirements, etc., the integrated position of the fingerprint reader in the electronic device is laid out. Among them, as a preferred solution, this embodiment adopts the integration of the fingerprint reader on the back of the electronic device. In order to facilitate the operation, it can also improve the privacy of the user's finger to operate the fingerprint reader, thereby further improving the security of the user's password during the password input process.
S103:如果是有效输入模式,则基于所述密码字符的先后输入次序记录所述密码字符。S103: If it is a valid input mode, record the password characters based on the input sequence of the password characters.
如果判断出电子设备的当前模式为有效输入模式,即用户手指当前按压在指纹识别器上,且用户指纹通过合法性验证,则用户当前录入的密码字符有效,此时,电子设备基于该密码字符的先后输入次序记录所述密码字符,确保所述密码字符的有效录入,同时确保所述密码字符在整体密码中相对位置的正确性。If it is judged that the current mode of the electronic device is a valid input mode, that is, the user's finger is currently pressing on the fingerprint reader, and the user's fingerprint has passed the legality verification, then the password character currently entered by the user is valid. At this time, the electronic device is based on the password character Record the password characters in the sequence of input, to ensure the effective entry of the password characters, and at the same time ensure the correctness of the relative positions of the password characters in the overall password.
S104:如果不是有效输入模式,则丢弃所述密码字符。S104: If it is not a valid input mode, discard the password characters.
如果判断出电子设备的当前模式为无效输入模式,则用户当前录入的密码字符无效,从而清除缓存,丢弃所述密码字符。If it is determined that the current mode of the electronic device is an invalid input mode, the password characters currently entered by the user are invalid, thereby clearing the cache and discarding the password characters.
接下来,本实施例提供本申请方法的一具体应用实例。Next, this embodiment provides a specific application example of the method of the present application.
参考图3,用户在输入密码过程中,先后共输入了“8112673”七位数字,其中,仅在输入第二、四、七位数字时,其合法注册的手指按压在了电子设备背部的指纹识别器上,从而最终电子设备记录下来的密码字符分别为所述第二、四、七位数字:“1”、“2”、“3”,且在记录时保持了所述第二、四、七位数字的先后输入次序,而其余数字即第一、三、五、六位数字“8”、“1”、“6”、“7”则作为无效输入被电子设备丢弃,从而即使他人窥窃到用户输入过程中输入了各个数字“8112673”,也无法得知真正的密码“123”。Referring to Figure 3, during the process of entering the password, the user has entered a total of seven digits of "8112673". Among them, only when entering the second, fourth, and seventh digits, his legally registered finger pressed the fingerprint on the back of the electronic device. on the identifier, so that the password characters recorded by the final electronic device are the second, fourth, and seventh digits: "1", "2", and "3", and the second, fourth, and fourth digits are kept when recording. 1. The input sequence of the seven digits, while the remaining digits, namely the first, third, fifth, and sixth digits "8", "1", "6", and "7" are discarded by the electronic device as invalid input, so that even if others It is discovered that the user entered various numbers "8112673" during the input process, and the real password "123" cannot be known.
由以上方案可知,本申请公开的密码输入方法,在获取到用户当前输入的密码字符时,通过判断所述电子设备的当前输入模式是否为有效输入模式,来确定是记录还是丢弃所述当前密码字符。可见,本申请针对电子设备的密码输入问题,引入了有效及非有效/无效两种类型的输入模式,在用户输入密码过程中,电子设备可基于对输入每个字符时采用的输入模式进行判断识别,实现对用户所输入的各密码字符进行不同处理(记录或丢弃),从而,本申请中,用户可通过对两种输入模式进行结合应用,来为输入过程产生一些非真实输入的字符,以此来迷惑可能的窥窃者,防止密码在输入过程中被窥窃盗取。从而本申请解决了输入密码过程中用户密码的安全问题。It can be seen from the above scheme that the password input method disclosed in this application determines whether to record or discard the current password by judging whether the current input mode of the electronic device is a valid input mode when the password characters currently input by the user are obtained. character. It can be seen that this application introduces two types of input modes: valid and non-valid/invalid for the password input problem of electronic devices. During the process of user inputting passwords, electronic devices can judge based on the input mode used when entering each character Recognition, to achieve different processing (recording or discarding) of each password character input by the user, thus, in this application, the user can generate some non-real input characters for the input process by combining the two input modes. In this way, possible eavesdroppers are confused and the password is prevented from being stolen by eavesdroppers during the input process. Therefore, the application solves the security problem of the user password in the process of inputting the password.
实施例二Embodiment 2
本实施例二继续对实施例一的方案进行补充,参考图4,所述方法还可以包括以下步骤:The second embodiment continues to supplement the solution of the first embodiment. With reference to FIG. 4, the method may also include the following steps:
S105:依据预设的输入结束条件,判断用户的密码输入过程是否结束;并在判断出结束时,基于所记录的各密码字符的先后输入次序拼接所记录的各个所述密码字符,得到用户的输入密码。S105: Determine whether the user's password input process is over according to the preset input end condition; enter password.
其中,所述输入结束条件具体可以是用户触发相应的结束按钮,如点击输入按钮或确定按钮,也可以是用户输入密码字符后超过一定时长未有新的字符输入等等。Wherein, the input end condition may specifically be that the user triggers a corresponding end button, such as clicking an input button or a confirmation button, or that no new character is input after a certain period of time after the user enters a password character, and the like.
当依据所述输入结束条件判断出用户的密码输入过程结束时,电子设备可基于所记录的各密码字符的先后输入次序,拼接用户输入的各个有效密码字符,从而得到用户输入的完整密码。When it is judged that the user's password input process is over according to the input end condition, the electronic device may splice each valid password character input by the user based on the recorded input sequence of each password character, thereby obtaining a complete password input by the user.
实施例三Embodiment 3
本实施例中,参考图5,所述密码输入方法还可以包括以下步骤:In this embodiment, referring to FIG. 5, the password input method may also include the following steps:
S106:基于预先存储的基准密码,验证所述输入密码的合法性,或向服务器提交所述输入密码。S106: Based on the pre-stored reference password, verify the validity of the input password, or submit the input password to the server.
当基于各个有效输入字符的先后输入次序,拼接各有效字符得到用户输入的完整密码后,电子设备可依据当前的实际应用场景,对用户输入的密码进行相应处理。After the complete password input by the user is obtained by concatenating each valid character based on the input order of each valid input character, the electronic device can process the password input by the user according to the current actual application scenario.
如果当前场景为由终端执行的安全认证场景,如解锁屏幕进入电子设备等场景,则电子设备可通过获取用户预先注册的基准密码,并通过将用户输入的密码与所述基准密码进行匹配,来验证用户输入密码的正确性,并依据验证结果作出相应响应;如果当前场景为由服务器执行的安全认证场景,例如购物时输入银行卡密码等,则电子设备需将用户输入的密码提交至相应服务器,由服务器完成所述输入密码的合法验证工作。If the current scenario is a security authentication scenario performed by the terminal, such as unlocking the screen to enter the electronic device, the electronic device can acquire the reference password registered in advance by the user and match the password entered by the user with the reference password. Verify the correctness of the password entered by the user, and make a corresponding response based on the verification result; if the current scenario is a security authentication scenario performed by the server, such as entering a bank card password when shopping, the electronic device needs to submit the password entered by the user to the corresponding server , the legal verification of the input password is completed by the server.
实施例四Embodiment 4
本实施例四公开一种密码输入装置,所述装置与以上各实施例公开的密码输入方法相对应。The fourth embodiment discloses a password input device, and the device corresponds to the password input method disclosed in the above embodiments.
相应于实施例一,参考图6,所述装置可以包括密码字符获取模块100、判断模块200、记录模块300和丢弃模块400。Corresponding to Embodiment 1, referring to FIG. 6 , the device may include a password character acquisition module 100 , a judging module 200 , a recording module 300 and a discarding module 400 .
密码字符获取模块100,用于获取用户当前输入的密码字符。The password character obtaining module 100 is configured to obtain the password character currently input by the user.
判断模块200,用于判断所述电子设备的当前输入模式是否为有效输入模式。The judging module 200 is configured to judge whether the current input mode of the electronic device is a valid input mode.
所述判断模块200包括判断单元、第一输入模式确定单元和第二输入模式确定单元。The judging module 200 includes a judging unit, a first input mode determining unit and a second input mode determining unit.
判断单元,用于判断当前所述电子设备是否符合以下条件:侦测到用户手指按压在指纹识别器上,且当前用户指纹通过验证;其中,所述指纹识别器预先集成在所述电子设备中;A judging unit, configured to judge whether the current electronic device meets the following conditions: it is detected that the user's finger is pressed on the fingerprint reader, and the current user's fingerprint has passed the verification; wherein, the fingerprint reader is pre-integrated in the electronic device ;
第一输入模式确定单元,用于在判断结果为符合时,确定出所述电子设备的当前输入模式为有效输入模式The first input mode determination unit is configured to determine that the current input mode of the electronic device is an effective input mode when the judgment result is consistent
第二输入模式确定单元,用于在判断结果为不符合时,确定出所述电子设备的当前输入模式为无效输入模式。The second input mode determination unit is configured to determine that the current input mode of the electronic device is an invalid input mode when the judgment result is inconsistent.
记录模块300,用于在判断结果是有效输入模式时,基于所述密码字符的先后输入次序记录所述密码字符。The recording module 300 is configured to record the password characters based on the input sequence of the password characters when the judging result is a valid input mode.
丢弃模块400,用于在判断结果不是有效输入模式时,丢弃所述密码字符。The discarding module 400 is configured to discard the password characters when the judging result is not a valid input pattern.
相应于实施例二,参考图7,所述密码输入装置还可以包括输入密码获取模块500,用于依据预设的输入结束条件,判断用户的密码输入过程是否结束;并在判断出结束时,基于所记录的各密码字符的先后输入次序拼接所记录的各个所述密码字符,得到用户的输入密码。Corresponding to Embodiment 2, with reference to FIG. 7, the password input device may further include an input password acquisition module 500, which is used to judge whether the user's password input process is over according to the preset input end condition; The recorded password characters are spliced based on the recorded input sequence of the password characters to obtain the user's input password.
相应于实施例三,参考图8,所述密码输入装置还可以包括密码验证或提交模块600,用于基于预先存储的基准密码,验证所述输入密码的合法性,或向服务器提交所述输入密码。Corresponding to Embodiment 3, referring to FIG. 8, the password input device may further include a password verification or submission module 600, configured to verify the legitimacy of the input password based on a pre-stored reference password, or submit the input password to the server. password.
对于本发明实施例四公开的密码输入装置而言,由于其与实施例一至实施例三公开的密码输入方法相对应,所以描述的比较简单,相关相似之处请参见实施例一至实施例三中密码输入方法部分的说明即可,此处不再详述。For the password input device disclosed in Embodiment 4 of the present invention, since it corresponds to the password input method disclosed in Embodiment 1 to Embodiment 3, the description is relatively simple. For related similarities, please refer to Embodiment 1 to Embodiment 3 The description in the password input method part is sufficient, and will not be described in detail here.
实施例五Embodiment five
本实施例五公开一种电子设备,所述电子设备具体可以是智能手机、平板电脑等设备,所述电子设备包括一指纹识别器,且所述电子设备包括如实施例四所提供的密码输入装置。The fifth embodiment discloses an electronic device, the electronic device may specifically be a smart phone, a tablet computer, etc., the electronic device includes a fingerprint reader, and the electronic device includes the password input provided in the fourth embodiment device.
基于所述密码输入装置,所述电子设备可为用户提供两种输入模式:有效输入模式和无效输入模式,在输入密码的过程中,用户可通过对所述两种输入模式进行结合应用,来为输入过程产生一些非真实输入的字符,以此来迷惑可能的窥窃者,防止密码在输入过程中被窥窃盗取。以下将通过多个实施例对本申请方法进行说明。Based on the password input device, the electronic device can provide the user with two input modes: a valid input mode and an invalid input mode. During the process of inputting a password, the user can combine the two input modes to Generate some non-real input characters for the input process, so as to confuse possible eavesdroppers and prevent passwords from being stolen by eavesdroppers during the input process. The method of the present application will be described below through multiple embodiments.
需要说明的是,本说明书中的各个实施例均采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似的部分互相参见即可。It should be noted that each embodiment in this specification is described in a progressive manner, and each embodiment focuses on the differences from other embodiments. For the same and similar parts in each embodiment, refer to each other, that is, Can.
为了描述的方便,描述以上系统或装置时以功能分为各种模块或单元分别描述。当然,在实施本申请时可以把各单元的功能在同一个或多个软件和/或硬件中实现。For the convenience of description, when describing the above system or device, functions are divided into various modules or units and described separately. Of course, when implementing the present application, the functions of each unit can be implemented in one or more pieces of software and/or hardware.
通过以上的实施方式的描述可知,本领域的技术人员可以清楚地了解到本申请可借助软件加必需的通用硬件平台的方式来实现。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例或者实施例的某些部分所述的方法。It can be known from the above description of the implementation manners that those skilled in the art can clearly understand that the present application can be implemented by means of software plus a necessary general-purpose hardware platform. Based on this understanding, the essence of the technical solution of this application or the part that contributes to the prior art can be embodied in the form of software products, and the computer software products can be stored in storage media, such as ROM/RAM, disk , CD, etc., including several instructions to make a computer device (which may be a personal computer, server, or network device, etc.) execute the methods described in various embodiments or some parts of the embodiments of the present application.
最后,还需要说明的是,在本文中,诸如第一、第二、第三和第四等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。Finally, it should also be noted that in this text, relational terms such as first, second, third, and fourth, etc. are only used to distinguish one entity or operation from another entity or operation, and not Any such actual relationship or order between these entities or operations is necessarily required or implied. Moreover, the terms "comprising", "comprising" or any other variation thereof are intended to encompass a non-exclusive inclusion such that a process, method, article or device that includes a list of elements includes not only those elements, but also includes not explicitly listed or other elements inherent to such a process, method, article or apparatus. Without further limitation, an element qualified by the phrase "comprising a..." does not preclude the presence of additional identical elements in a process, method, article or apparatus that includes the element.
以上所述仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。The above is only a preferred embodiment of the present invention, it should be pointed out that, for those of ordinary skill in the art, without departing from the principle of the present invention, some improvements and modifications can also be made, and these improvements and modifications can also be made. It should be regarded as the protection scope of the present invention.
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510860643.8ACN105653993B (en) | 2015-11-30 | 2015-11-30 | A kind of cipher-code input method, device and electronic equipment |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510860643.8ACN105653993B (en) | 2015-11-30 | 2015-11-30 | A kind of cipher-code input method, device and electronic equipment |
| Publication Number | Publication Date |
|---|---|
| CN105653993A CN105653993A (en) | 2016-06-08 |
| CN105653993Btrue CN105653993B (en) | 2019-08-02 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201510860643.8AActiveCN105653993B (en) | 2015-11-30 | 2015-11-30 | A kind of cipher-code input method, device and electronic equipment |
| Country | Link |
|---|---|
| CN (1) | CN105653993B (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP6551352B2 (en)* | 2016-09-28 | 2019-07-31 | 京セラドキュメントソリューションズ株式会社 | Password authentication device |
| JP6926823B2 (en)* | 2017-08-25 | 2021-08-25 | 京セラドキュメントソリューションズ株式会社 | Electronic devices and authentication methods |
| CN110175449B (en)* | 2019-05-20 | 2023-12-19 | 维沃移动通信有限公司 | Password input method and mobile terminal |
| CN113111318A (en)* | 2021-03-29 | 2021-07-13 | 盛林妹 | Authentication method, equipment for realizing authentication and intelligent lock |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102982269A (en)* | 2012-10-25 | 2013-03-20 | 北京大学 | Anti-peeping code authentication method and anti-peeping code authentication system based on biological metering characteristics |
| CN103685232A (en)* | 2013-11-11 | 2014-03-26 | 上海乐今通信技术有限公司 | Mobile terminal and mobile application login method |
| CN104252258A (en)* | 2013-06-27 | 2014-12-31 | 福建省辉锐材料科技有限公司 | Pressure-sensitive lightening method and pressure-sensitive lightening system for touch screen |
| CN104463036A (en)* | 2014-11-22 | 2015-03-25 | 广东欧珀移动通信有限公司 | Password inputting method, mobile terminal and system |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102982269A (en)* | 2012-10-25 | 2013-03-20 | 北京大学 | Anti-peeping code authentication method and anti-peeping code authentication system based on biological metering characteristics |
| CN104252258A (en)* | 2013-06-27 | 2014-12-31 | 福建省辉锐材料科技有限公司 | Pressure-sensitive lightening method and pressure-sensitive lightening system for touch screen |
| CN103685232A (en)* | 2013-11-11 | 2014-03-26 | 上海乐今通信技术有限公司 | Mobile terminal and mobile application login method |
| CN104463036A (en)* | 2014-11-22 | 2015-03-25 | 广东欧珀移动通信有限公司 | Password inputting method, mobile terminal and system |
| Publication number | Publication date |
|---|---|
| CN105653993A (en) | 2016-06-08 |
| Publication | Publication Date | Title |
|---|---|---|
| US11405380B2 (en) | Systems and methods for using imaging to authenticate online users | |
| CN105279405B (en) | Touchscreen user button behavior pattern is built and analysis system and its personal identification method | |
| CN105100108B (en) | A kind of login authentication method based on recognition of face, apparatus and system | |
| US9652633B2 (en) | Systems and methods of verifying an authenticated document biosignature | |
| CN101674184A (en) | Identity recognition method based on user keystroke characteristic | |
| TW201525754A (en) | Method, apparatus and system of identity authentication | |
| CN104298910B (en) | Portable electronic device and interactive face login method | |
| CN105653993B (en) | A kind of cipher-code input method, device and electronic equipment | |
| Koong et al. | A user authentication scheme using physiological and behavioral biometrics for multitouch devices | |
| US11288349B2 (en) | System and method for authentication using biometric hash strings | |
| CN104484942A (en) | Client interaction terminal and counter transaction method thereof | |
| CN110930150A (en) | Voucher generation method, voucher signature device, voucher verification method, voucher generation device, voucher verification device, and storage medium | |
| CN108964921A (en) | Verification System, authentication method and service server | |
| US10693651B1 (en) | System and method for authentication using biometric hash strings | |
| WO2016086708A1 (en) | Payment verification method, apparatus and system | |
| CN103297237A (en) | Identity registration method, identity authentication method, identity registration system, identity authentication system, personal authentication equipment and authentication server | |
| CN104063651B (en) | Authentication and issuing means and authentication and submission method | |
| CN104579690B (en) | High in the clouds KEY systems and application method | |
| CN104680047A (en) | Method and device for electronic authentication | |
| TWM556877U (en) | Login verification device and login verification system | |
| Paul et al. | Fingerprint authentication is here but are we ready for what it brings? | |
| CN105897429A (en) | Authentication method, authentication device and terminal | |
| CN114020391A (en) | Information display method and device, electronic equipment and readable storage medium | |
| CN102314566A (en) | Computer-to-computer authentication and man-to-machine authentication method applied to cloud computing | |
| CN112035819A (en) | Fingerprint unlocking method and device, electronic equipment and computer readable storage medium |
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| TR01 | Transfer of patent right | ||
| TR01 | Transfer of patent right | Effective date of registration:20231212 Address after:518000 floor 21, block a, Kupai building, intersection of Keyuan Avenue and Baoshen Road, north high tech Zone, songpingshan community, Xili street, Nanshan District, Shenzhen, Guangdong Patentee after:YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) Co.,Ltd. Address before:3 / F, plant No.1, phase I project, No.3, Gongye West 1st Road, Songshan Lake high tech Industrial Development Zone, Dongguan City, Guangdong Province 523500 Patentee before:DONGGUAN COOLPAD SOFTWARE TECH Co.,Ltd. | |
| TR01 | Transfer of patent right | ||
| TR01 | Transfer of patent right | Effective date of registration:20250527 Address after:101400 3rd floor, 13 Yanqi street, Yanqi Economic Development Zone, Huairou District, Beijing Patentee after:Shucheng Huilian (Beijing) Technology Co.,Ltd. Country or region after:China Address before:518000 floor 21, block a, Kupai building, intersection of Keyuan Avenue and Baoshen Road, north high tech Zone, songpingshan community, Xili street, Nanshan District, Shenzhen, Guangdong Patentee before:YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) Co.,Ltd. Country or region before:China | |
| TR01 | Transfer of patent right | ||
| TR01 | Transfer of patent right | Effective date of registration:20250702 Address after:102600 No. 176, 1st floor, Building 13, South Gate of Nicun Village, Caiyu Town, Daxing District, Beijing Patentee after:Beijing Xingbang Kaichuang Technology Co.,Ltd. Country or region after:China Address before:101400 3rd floor, 13 Yanqi street, Yanqi Economic Development Zone, Huairou District, Beijing Patentee before:Shucheng Huilian (Beijing) Technology Co.,Ltd. Country or region before:China |