CN104156679A - Electronic equipment, unlocking password setting method thereof and unlocking method thereof - Google Patents

Electronic equipment, unlocking password setting method thereof and unlocking method thereof Download PDF

Info

Publication number
CN104156679A
CN104156679A CN201410339955.XA CN201410339955A CN104156679A CN 104156679 A CN104156679 A CN 104156679A CN 201410339955 A CN201410339955 A CN 201410339955A CN 104156679 A CN104156679 A CN 104156679A
Authority
CN
China
Prior art keywords
unlocking pin
electronic equipment
unlocking
initial number
numeral
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410339955.XA
Other languages
Chinese (zh)
Other versions
CN104156679B (en
Inventor
雷明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weihai Feiya Intelligent Technology Co ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN201410339955.XA priority Critical patent/CN104156679B/en
Publication of CN104156679A publication Critical patent/CN104156679A/en
Application granted granted Critical
Publication of CN104156679B publication Critical patent/CN104156679B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses an electronic equipment, an unlocking password setting method thereof and an unlocking method thereof. The unlocking password setting method includes generating a group of letters and multiple operation symbols positioned among the letters on a screen; selecting one or more of the letters and the operation symbol in front of the selected letter; storing the setting method. The unlocking method includes generating a group of initial numbers on the screen, wherein preset operation symbols are hidden among the numbers; receiving an unlocking password acquired by a user after calculation according to the initial numbers and the hidden operation symbols; judging whether the unlocking password is correct or not for unlocking or maintaining the screen locked, and returning to the first step. By the above mode, other people can be effectively prevented from plagiarizing the password input during unlocking, rules for setting the password can be prevented from being maliciously guessed, and safety in password unlocking is improved greatly.

Description

The method to set up of a kind of electronic equipment and unlocking pin thereof, unlock method
Technical field
The present invention relates to unlock password field, particularly relate to method to set up, the unlock method of a kind of electronic equipment and unlocking pin thereof.
Background technology
Along with the development of smart mobile phone and panel computer, the security of embedded system also more causes user's attention, and the unlocking manner of touch-screen equipment has separately been released in nearly all instrument factory commercial city.Nowadays, typical unlocking screen technology has pattern slip release, track record release, the release of input password box etc.Wherein:
Pattern slip release is from game graph technical development, icon or figure dragged to assigned address and completes unlocking operation, yet this unlock method release cracks probable value, be 1/n, and n is the number of pattern within the scope of screen, cracks rate higher;
Track record release is to record single touch screen track to carry out matching ratio, and the release limited field probability little, that crack likelihood ratio pattern slip unlock method of this unlock method is low, but still higher;
Input password box release is to input numeral or character style is carried out matching ratio by keyboard; its shortcoming is that interface is single, input especially repeatedly; can on screen, stay the digital vestige of input or peeped and obtain by personage intentionally, crack probability very high, confidentiality is poor.
Summary of the invention
The technical matters that the present invention mainly solves is to provide method to set up, the unlock method of a kind of electronic equipment and unlocking pin thereof, it can effectively prevent the password of inputting when other people plagiarize release, and the rule of taking precautions against password setting maliciously guessed, greatly strengthened the security of unlocking pin.
For solving the problems of the technologies described above, the technical scheme that the present invention adopts is: a kind of method to set up of electronic equipment unlocking pin is provided, and it comprises:
On this screen, generate one group of letter and a plurality of sign of operation between letter;
One or more in selected this letter, and a sign of operation before this chosen letter;
Preserve the setting of this electronic equipment unlocking pin.
Wherein, after preserving the arranging of this electronic equipment unlocking pin, verify and confirm the setting of described unlocking pin, comprising:
Generate one and confirm interface, and one group of checking numeral on this confirmation interface, wherein this checking numeral is mutually corresponding with this letter;
The result after reception is calculated according to the setting of the unlocking pin of having set via this checking numeral;
Judge that whether this result is correct, and confirm;
If this result is correct, arranging of this unlocking pin set successfully, confirms and preserve the setting of the unlocking pin setting;
If this result is incorrect, it is unsuccessful that the arranging of this unlocking pin set, and returns to the step of " generate and confirm interface, and this confirms one group of checking numeral on interface ", or return to the step of " a kind of method to set up of electronic equipment unlocking pin ".
Wherein, after preserving the arranging of this electronic equipment unlocking pin, the hiding computation rule hiding numeral and hide numeral and this unlocking pin for calculating this is set; Wherein, this hides numeral for calculating according to this hiding computation rule with this unlocking pin, obtains new unlocking pin.
Wherein, setting at least two checking numerals is identical value.
Wherein, after the checking numeral generating, this checking numeral is carried out to legitimate verification, this legitimate verification is for limiting the figure place length of this unlocking pin.
For solving the problems of the technologies described above, the technical scheme that the present invention adopts is to provide the unlock method of another kind of electronic equipment, and it comprises:
On this screen, generate one group of initial number, and between this initial number, be concealed with default sign of operation;
Receive user according to the unlocking pin after this initial number and the calculating of this hiding sign of operation;
Judge that whether this unlocking pin is correctly to carry out release, or keep screen locking, and return to the step of " generate one group of initial number on this screen, and be concealed with default sign of operation between this initial number ".
For solving the problems of the technologies described above, another technical solution used in the present invention is: a kind of electronic equipment is provided, and this electronic equipment comprises screen, and wherein, this electronic equipment also comprises:
Generation unit, for generate one group of initial number on this screen, and is concealed with default sign of operation between this initial number;
Receiving element, for receiving user according to the unlocking pin after this initial number and the calculating of this hiding sign of operation;
Separate lock unit, for judging that whether this unlocking pin is correctly to carry out release, or keep screen locking.
Wherein, also comprise setup unit, this setup unit, for before release, is set computation rule.
Wherein, also comprise computation rule authentication unit, this computation rule authentication unit is for after the computation rule of preserve setting, and verifies and confirms this computation rule.
Wherein, also comprise legitimate verification unit; This legitimate verification unit, after the initial number generating, carries out legitimate verification to initial number, and this legitimate verification is for limiting the figure place length of unlocking pin.
The invention has the beneficial effects as follows: the situation that is different from prior art, the invention provides method to set up, the unlock method of a kind of electronic equipment and unlocking pin thereof, by computation rule and the unlock method of unlocking pin are set, can effectively prevent the password that other people input while plagiarizing user's release, and the rule of taking precautions against password setting is maliciously guessed, greatly strengthened the confidentiality of unlocking pin, and the user experience can promote unlock password time.
Accompanying drawing explanation
Fig. 1 is the unlocking pin method to set up process flow diagram of embodiment of the present invention one;
Fig. 2 is the unlocking pin method to set up interface schematic diagram of embodiment of the present invention one;
Fig. 3 is embodiment of the present invention two checking unlocking pin method to set up process flow diagrams;
Fig. 4 is the interface schematic diagram of the unlock method of embodiment of the present invention three;
Fig. 5 is the unlocking pin method to set up of embodiment of the present invention three and the process flow diagram of unlock method;
Fig. 6 is the concrete steps process flow diagram of the unlock method of embodiment of the present invention three;
Fig. 7 is the unlocking pin legitimate verification process flow diagram of embodiment of the present invention four;
Fig. 8 is the structural representation of the electronic equipment of embodiment of the present invention five.
Embodiment
Below in conjunction with the accompanying drawing in embodiment of the present invention, the technical scheme in embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiments.Embodiment based in the present invention, those of ordinary skills, not making the every other embodiment obtaining under creative work prerequisite, all belong to the scope of protection of the invention.
Embodiment one
Refer to Fig. 1 and Fig. 2, Fig. 1 is the unlocking pin method to set up process flow diagram of embodiment of the present invention one, and Fig. 2 is the unlocking pin method to set up interface schematic diagram of embodiment of the present invention one.Unlocking pin method to set up step of the present invention comprises:
Step S101: on screen, generate one group of letter, and a plurality of sign of operation between letter;
Step S102: one or more in selected letter, and a sign of operation before chosen letter;
Step S103: the setting of preserving this electronic equipment unlocking pin.
As shown in Figure 2, in its interface schematic diagram, generation has alphabetical A to E5 letter, and between corresponding letter, have "+", "-" two kinds of sign of operation, and be positioned at each letter below, be positioned at the option icons before each sign of operation, wherein in releasing process, what each letter was corresponding is a numeral, by selected letter and corresponding symbol, the numeral occurring while calculating release, to obtain unlocking pin.For user, can select at least one letter wherein and be positioned at the symbol before this letter.Certainly user also can not do any selection, and now the unlocking pin of acquiescence is 0.
In addition, embodiments of the invention have only been listed and have been added and subtracted two kinds of simple calculations symbols the most, but it should be understood that, according to user's needs, also can add multiplication and division algorithm, so can make computation rule become slightly complicated, be applicable to liking pursuing complicated or obtain the user of safer unlocking pin for hope.As for 5 letters are set, be for user experience is considered, if too much letter is set, can make user's calculation procedure more, can affect its Experience Degree, can, according to user's needs, can suitably increase and decrease alphabetical number.Changing also appears in the complexity of calculating like this, is applicable to the crowd of different demands.
Preferably, in Fig. 2, when unlocking pin is set, user is also provided with a hiding numeral, this hiding digital subscriber carries out computing with the unlocking pin obtaining before, certainly, also need between hiding numeral and unlocking pin, another computation rule be set, and be not limited only to the addition shown in Fig. 2.When release, hiding numeral will can not show on screen, and user carries out release again by hiding the new unlocking pin that calculates of numeral and unlocking pin.
Embodiments of the present invention one and preferred implementation thereof are by arranging unlocking pin and hiding numeral, both increased the difficulty of password cracking, also there is certain interest, other people cannot know user to the set computation rule of unlock method and hide numeral, therefore its security is very high, and user can also be according to individual demand, and the letter of selecting number not wait participates in calculating, and its method arranges flexibly.
Embodiment two
Ask for an interview Fig. 3, Fig. 3 is embodiment of the present invention two checking unlocking pin method to set up process flow diagrams, present embodiment is substantially identical with embodiment one, difference is: before the step S103 of unlocking pin method to set up, present embodiment two provides a kind of verification method to this unlocking pin method to set up.Main is like this unlock method that is provided with for fear of user error.After user arranges, do not make immediately done setting come into force, once otherwise user misremembers after this method to set up, to be difficult to electronic equipment release, therefore present embodiment two, before step S103, arranges the step of this method to set up of demonstration validation, only has and according to the step of own method to set up, has inputted after correct unlocking pin as user, just can make it come into force, and can assist and confirm that user has understood this setting party's ratio juris.Specific as follows:
Step S201: generate one and confirm interface, and confirm one group of checking numeral on interface, wherein checking numeral is sequentially mutually corresponding with the letter in method to set up;
Step S202: receive the result after calculating according to the method to set up of having set via checking numeral;
Step S203: judge that whether this result is correct; If correct, continue next step, if the result is incorrect, return to step S201, regenerate and confirm interface and checking numeral, then verify calculating; If user has forgotten, arrange after method to set up, regeneration confirms that interface and checking numeral also cannot obtain correct the result, returns to the step S101 of unlocking pin method to set up, i.e. accent starts to arrange the method for unlocking pin.
Step S204: confirm and preserve the setting of the unlocking pin setting, step S204 is identical with the step S103 essence in embodiment one.
Embodiment three
Refer to Fig. 4, Fig. 5 and Fig. 6, Fig. 4 is the interface schematic diagram of the unlock method of embodiment of the present invention three, Fig. 5 is the unlocking pin method to set up of embodiment of the present invention three and the process flow diagram of unlock method, and Fig. 6 is the concrete steps process flow diagram of the unlock method of embodiment of the present invention three.
After being verified, user has been known and has been understood the method to set up of this unlocking pin, can carry out actual unlocking operation.As shown in Figure 4, what in interface, show is 5 initial number, and unlocking pin input frame.Described in brought forward, the number user of initial number can be self-defined, and be not limited to show in present embodiment 5, and can also arrange and hide numeral, can further strengthen like this security of unlocking pin.And the mode of unlocking pin input can be soft keyboard input or be undertaken by other manner known in the art, again do not need to repeat.
Preferably, it is identical value that at least 2 numerals can be set in the method to set up that user does, in interface as shown in Figure 4, there are two numerals 6, can better take precautions against the unlocking pin method to set up that other people maliciously guess that user does like this, be embodied in: if the numeral of the numeral showing on screen during user's release and input is maliciously seen and is accumulated to certain number of times by other people, for example tens times or up to a hundred times, and method to set up is fairly simple, two or three numerals or alphabetical have wherein for example only been selected, so just likely by other people conjecture, arrived method to set up, thereby crack, but if there is numeral have repetition, the difficulty of that conjecture will increase a lot.
As shown in Figure 5, if during method to set up, arbitrary letter is not elected, unlocking pin is 0; When selecting different letters and the symbol before corresponding letter, can obtain different unlocking pins.
As shown in Figure 6, the concrete steps of the unlock method of embodiment of the present invention three comprise:
Step S301: generate one group of initial number on screen, and be concealed with default sign of operation between initial number.
When user arranges unlock method, select before letter after sign of operation, in actual unlocking operation, these sign of operation all will be hidden, and are known avoiding by other people, affect the security of this unlock method.
Step S302: receive the unlocking pin after user calculates according to this initial number and hiding sign of operation.
Step S303: judge that whether unlocking pin is correct.If correctly carry out unlocking operation; If incorrect, return to step S301, regenerate one group of initial number, then calculate.
Certainly, algorithm is not limited only to two kinds of algorithms the most basic of plus-minus of present embodiment, and user can as required, can select multiplication and division or other algorithm.Preferably, if user is provided with, hide numeral, also need unlocking pin to obtain new unlocking pin with hiding digital calculating, by judging whether new unlocking pin correctly carries out next step operation.
Be different from prior art, embodiments of the present invention three and preferred embodiment in, user arranges after unlocking pin, and in actual release, utilize this method to set up to calculate acquisition unlocking pin and carry out unlocking operation, its security is very high, and has certain interest, increases user experience.
In above-mentioned embodiment of the present invention, 5 letters and corresponding digital number have only been enumerated, algorithm is also selected basic arithmetic simultaneously, should be understood that, the number of letter or number is needed and increase and decrease to some extent according to the release of self by user, be not limited to situation cited in embodiment of the present invention, for algorithm, also can have other to select, as power, evolution, differential, integration, Logarithmic calculation etc. simultaneously.And about digital figure place, what embodiment of the present invention was enumerated is a long numeral, can facilitate like this user to calculate, and the unlocking pin obtaining can be controlled in double figures.Separately, because user carries out with brain while calculating, the calculating of long number may affect user's experience, if be extended to double figures or long number, be also feasible, but during user's release, difficulty in computation can increase a lot, the figure place of unlocking pin can be longer, but simultaneously also safer.
Embodiment four
Refer to as Fig. 7, Fig. 7 is that embodiment of the present invention four is unlocking pin legitimate verification process flow diagram, and present embodiment is substantially identical with embodiment two, and concrete steps comprise:
Step S401: generate one group of checking numeral, step S401 is identical with step S201 essence, then to set at least two checking numerals via step S402 be identical value, like this can be when actual release, and other people that maliciously guess method to set up are had more to fascination.
Step S403, for through calculating the unlocking pin obtaining, carries out legitimate verification to obtained unlocking pin from step S404, is specially:
In step S404, S405: in the time of in obtained unlocking pin falls into-100~100 intervals, represent that unlocking pin is feasible, checking numeral is legal, directly performs step S301; If in step S404, S405, when obtained unlocking pin is not in-100~100 intervals, represent that unlocking pin figure place length is longer, checking numeral is illegal, the absolute value in computation process is subtracted to 1.Be embodied in: when unlocking pin >=100, execution step S406, by all chosen be greater than 1 on the occasion of subtracting 1, the unlocking pin of acquisition can diminish like this, until be less than 100; When unlocking pin≤-100, execution step S407, subtracts 1 by all chosen negative values of 1 of being greater than, and the unlocking pin of acquisition can become greatly like this, until be greater than-100; Make the final unlocking pin obtaining be positioned at-100~100 interval, unlocking pin remains double figures, facilitates user to calculate and inputs.
Certainly, if the numeral for calculating that user selects is double figures or even long number, or selection multiplication and division and other algorithm, the figure place of unlocking pin can be controlled in that within the scope of three figure places or more, long number is proper, in actual legitimate verification, only need ± 100 changing into ± 1000 or other senioritys just passable.Corresponding expansion, user can adjust voluntarily, repeats no more herein, uses the mode of this legitimate verification not only in order in common electronic equipment, can also be useful in the place that level of security is higher, as national defence aspect etc.
Be different from prior art, embodiments of the present invention four-way is crossed the checking to unlocking pin legitimacy, makes this method to set up generate set of number, and this group numeral can need to be adjusted the difficulty of calculating according to user, correspondingly, the figure place of the unlocking pin obtaining is limited, convenient input.
Described in brought forward, as shown in Figure 8, the present invention also provides a kind of electronic equipment 10, comprises screen, and wherein, this electronic equipment also comprises generation unit 14, receiving element 15 and separates lock unit 16.
Generation unit 14 is for generate one group of initial number on this screen, and between this initial number, is concealed with default sign of operation; Receiving element 15 is for receiving user according to the unlocking pin after this initial number and the calculating of this hiding sign of operation; Separate lock unit 16 for judging that whether this unlocking pin is correctly to carry out release, or keep screen locking.
Preferably, this electronic equipment 10 also comprises setup unit 11, and this setup unit 11, for before release, is set computation rule.
Preferably, this electronic equipment 10 also comprises computation rule authentication unit 12, and this computation rule authentication unit 12 is for after the computation rule of preserve setting, and verifies and confirms this computation rule.
Preferably, this electronic equipment 10 also comprises legitimate verification unit 13; This legitimate verification unit 13, after the initial number generating, carries out legitimate verification to initial number, and this legitimate verification is for limiting the figure place length of unlocking pin.
The foregoing is only embodiments of the present invention; not thereby limit the scope of the claims of the present invention; every equivalent structure or conversion of equivalent flow process that utilizes instructions of the present invention and accompanying drawing content to do; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (10)

1. a method to set up for electronic equipment unlocking pin, is characterized in that, comprising:
On described screen, generate one group of letter and a plurality of sign of operation between described letter;
A sign of operation before one or more and chosen described letter in selected described letter;
Preserve the setting of described electronic equipment unlocking pin.
2. method to set up according to claim 1, is characterized in that, after preserving the arranging of described electronic equipment unlocking pin, verifies and confirm the setting of described unlocking pin, comprising:
Generate one and confirm interface, and one group of checking numeral on described confirmation interface, wherein said checking numeral is mutually corresponding with described letter;
The result after reception is calculated according to the setting of the described unlocking pin of having set via described checking numeral;
Judge that whether described the result is correct, and confirm;
If described the result is correct, arranging of described unlocking pin set successfully, confirms and preserve the setting of the unlocking pin setting;
If described the result is incorrect, it is unsuccessful that the arranging of described unlocking pin set, return to the step of described " generate and confirm interface, and one group of checking on described confirmation interface is digital ", or return to the step of described " a kind of method to set up of electronic equipment unlocking pin ".
3. method to set up according to claim 1 and 2, is characterized in that, after preserving the arranging of described electronic equipment unlocking pin, arranges one and hides numeral and for calculating the hiding computation rule of described hiding numeral and described unlocking pin; Wherein, described hiding numeral, for calculating according to described hiding computation rule with described unlocking pin, obtains new unlocking pin.
4. method to set up according to claim 2, is characterized in that, setting at least two described checking numerals is identical value.
5. method according to claim 2, is characterized in that, after the checking numeral generating, described checking numeral is carried out to legitimate verification, and described legitimate verification is for limiting the figure place length of described unlocking pin.
6. a unlock method for electronic equipment, is characterized in that, comprising:
On screen, generate one group of initial number, and between described initial number, be concealed with default sign of operation;
Receive user according to the unlocking pin after described initial number and the calculating of described hiding sign of operation;
Judge that whether described unlocking pin is correctly to carry out release, or keep screen locking, and return to the step of " generate one group of initial number on described screen, and be concealed with default sign of operation between described initial number ".
7. an electronic equipment, comprises screen, it is characterized in that, described electronic equipment also comprises:
Generation unit, for generate one group of initial number on described screen, and is concealed with default sign of operation between described initial number;
Receiving element, for receiving user according to the unlocking pin after described initial number and the calculating of described hiding sign of operation;
Separate lock unit, for judging that whether described unlocking pin is correctly to carry out release, or keep described screen locking.
8. electronic equipment according to claim 7, is characterized in that, also comprises setup unit, and described setup unit, for before release, is set computation rule.
9. electronic equipment according to claim 8, is characterized in that, also comprises computation rule authentication unit, and described computation rule authentication unit is for after the described computation rule of preserve setting, and verifies and confirms described computation rule.
10. electronic equipment according to claim 7, is characterized in that, also comprises legitimate verification unit; Described legitimate verification unit, after the initial number generating, carries out legitimate verification to described initial number, and described legitimate verification is for limiting the figure place length of described unlocking pin.
CN201410339955.XA 2014-07-16 2014-07-16 A kind of electronic equipment and its setting method of unlocking pin, unlocking method Active CN104156679B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410339955.XA CN104156679B (en) 2014-07-16 2014-07-16 A kind of electronic equipment and its setting method of unlocking pin, unlocking method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410339955.XA CN104156679B (en) 2014-07-16 2014-07-16 A kind of electronic equipment and its setting method of unlocking pin, unlocking method

Publications (2)

Publication Number Publication Date
CN104156679A true CN104156679A (en) 2014-11-19
CN104156679B CN104156679B (en) 2018-08-03

Family

ID=51882176

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410339955.XA Active CN104156679B (en) 2014-07-16 2014-07-16 A kind of electronic equipment and its setting method of unlocking pin, unlocking method

Country Status (1)

Country Link
CN (1) CN104156679B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107895105A (en) * 2017-11-03 2018-04-10 广东欧珀移动通信有限公司 A kind of cipher processing method, terminal device and computer-readable recording medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1756152A (en) * 2004-04-05 2006-04-05 王松 Radix algorithm encryption method for dynamic password
CN101355414A (en) * 2007-07-25 2009-01-28 原为民 Authentication system for formulae cipher
CN100561545C (en) * 2006-03-30 2009-11-18 周忠杰 The method to set up of password
CN101976423A (en) * 2010-11-16 2011-02-16 陈绍捷 Cipher anti-theft method for bank accounts
CN102567680A (en) * 2011-12-31 2012-07-11 华为终端有限公司 Unlocking method and device
CN103530582A (en) * 2013-10-15 2014-01-22 广东欧珀移动通信有限公司 Method and system for unlocking dynamic password of mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1756152A (en) * 2004-04-05 2006-04-05 王松 Radix algorithm encryption method for dynamic password
CN100561545C (en) * 2006-03-30 2009-11-18 周忠杰 The method to set up of password
CN101355414A (en) * 2007-07-25 2009-01-28 原为民 Authentication system for formulae cipher
CN101976423A (en) * 2010-11-16 2011-02-16 陈绍捷 Cipher anti-theft method for bank accounts
CN102567680A (en) * 2011-12-31 2012-07-11 华为终端有限公司 Unlocking method and device
CN103530582A (en) * 2013-10-15 2014-01-22 广东欧珀移动通信有限公司 Method and system for unlocking dynamic password of mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107895105A (en) * 2017-11-03 2018-04-10 广东欧珀移动通信有限公司 A kind of cipher processing method, terminal device and computer-readable recording medium
CN107895105B (en) * 2017-11-03 2020-06-09 Oppo广东移动通信有限公司 Password processing method, terminal equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN104156679B (en) 2018-08-03

Similar Documents

Publication Publication Date Title
CN102843236B (en) Generation and authentication method and system for dynamic password
EP3230917B1 (en) System and method for enabling secure authentication
CN104243458B (en) A kind of safe online game login method and system
US9716699B2 (en) Password management system
CN102693380A (en) Password authentication method
CN103971239A (en) Verification method and device
KR20140007470A (en) Password input method and device
EP2890050A1 (en) Electronic device and password authentication method therefor
CN105703901B (en) Encryption data input method and encryption data input unit
CN109167662A (en) A kind of seed generation method and its equipment
CN105897417A (en) Encrypted data input method and encrypted data input device
CN105068733A (en) Terminal unlocking method and apparatus
CN101359987A (en) Algorithm cipher
CN105653054B (en) A kind of cipher processing method and device
CN104318144A (en) Mobile terminal and unlocking method thereof
CN104135371B (en) A kind of password store method and device
CN104156679A (en) Electronic equipment, unlocking password setting method thereof and unlocking method thereof
CN104185167B (en) A kind of method and terminal updating terminal card-locking information
CN101425896B (en) Network account ciphering method
TWI661330B (en) Peep-proof password input method and device
CN103761486A (en) Electronic file encryption method and device
CN104270753B (en) The method and system of network access authentication
CN101355414A (en) Authentication system for formulae cipher
CN113395158B (en) Message authentication key generation method and device and message authentication system
CN106534041B (en) Verification method, verification platform and client

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20211130

Address after: 264200 19th floor, block a, innovation and entrepreneurship base, No. 213, Torch Road, torch high tech Industrial Development Zone, Weihai City, Shandong Province

Patentee after: WEIHAI ELECTRONIC INFORMATION TECHNOLOGY COMPREHENSIVE RESEARCH CENTER, MINISTRY OF INDUSTRY AND INFORMATION TECHNOLOGY

Address before: 516006 Zhongkai hi tech Zone, Huizhou, Guangdong, 86 Chang seven Road West

Patentee before: HUIZHOU TCL MOBILE COMMUNICATION Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221122

Address after: 264200 18th Floor, Building A, Innovation and Entrepreneurship Base, No. 213, Torch Road, Torch Hi tech Industrial Development Zone, Weihai, Shandong

Patentee after: Weihai Shenzhou Information Technology Research Institute Co.,Ltd.

Address before: 264200 19th floor, block a, innovation and entrepreneurship base, No. 213, Torch Road, torch high tech Industrial Development Zone, Weihai City, Shandong Province

Patentee before: WEIHAI ELECTRONIC INFORMATION TECHNOLOGY COMPREHENSIVE RESEARCH CENTER, MINISTRY OF INDUSTRY AND INFORMATION TECHNOLOGY

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240116

Address after: Room 919, block a, Torch Innovation and entrepreneurship base, 213-2 Torch Road, high tech Industrial Development Zone, Weihai City, Shandong Province, 264200

Patentee after: WEIHAI FEIYA INTELLIGENT TECHNOLOGY Co.,Ltd.

Address before: 264200 18th Floor, Building A, Innovation and Entrepreneurship Base, No. 213, Torch Road, Torch Hi tech Industrial Development Zone, Weihai, Shandong

Patentee before: Weihai Shenzhou Information Technology Research Institute Co.,Ltd.