CN105631267A - Password check method and terminal - Google Patents

Password check method and terminal Download PDF

Info

Publication number
CN105631267A
CN105631267A CN201510999851.6A CN201510999851A CN105631267A CN 105631267 A CN105631267 A CN 105631267A CN 201510999851 A CN201510999851 A CN 201510999851A CN 105631267 A CN105631267 A CN 105631267A
Authority
CN
China
Prior art keywords
character
user
code characters
inspection
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510999851.6A
Other languages
Chinese (zh)
Inventor
任广大
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201510999851.6A priority Critical patent/CN105631267A/en
Publication of CN105631267A publication Critical patent/CN105631267A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The embodiment of the invention discloses a password check method and a terminal. The method comprises the steps that N password characters input when a user sets a password are received and concealed, wherein N is a positive integer; check characters input by the user are received; whether the check character Kn is the same as the password character Mn or not is judged, wherein Kn is the nth input check character, Mn is the nth input password character and n is a positive integer smaller than or equal to N; if not, the check character Kn is displayed to be checked by the user. By the adoption of the method, password setting efficiency can be improved.

Description

A kind of close code check method and terminal
Technical field
The present invention relates to safety technique field, particularly relate to a kind of close code check method and terminal.
Background technology
Along with the development of electronic technology is with universal, the terminal such as smart mobile phone, iWatch, iPad has become a part indispensable in people's life, people can browse webpage anywhere or anytime by these terminals, check picture, play games, see e-book etc., it suffices to say that these terminals greatly improve the quality of the life of people. People arrange password frequently by terminal, and such as, for individual privacy protected by terminal setting operation password, on the platforms such as shopping, game, registration individual account stores user data etc. The process arranging password in prior art is: whether the password that user's first time input cryptographic consumer second time input cryptographic consumer confirmation complete terminal of input contrasts twice input is completely the same, if completely the same, prompting user's password is arranged successfully, if not exclusively the same, prompting user arranges password again.
The defect of prior art is, when the password of user's second time input is not exclusively the same with the password of first time input, terminal needs to point out user to input mistake by modes such as vibration, text prompt after user's second time input password, this kind of prompting Method compare is delayed, and efficiency is lower.
Summary of the invention
The embodiment of the invention discloses a kind of close code check method and terminal, it is possible to improve the efficiency of verification password.
First aspect, embodiments provides a kind of close code check method, it is characterised in that, comprising:
N number of code characters that reception user inputs when arranging password is also hidden, and N is positive integer;
Receive the verification character of user's input;
Judge inspection character KnWith code characters MnWhether identical, KnIt is the verification character of the n-th input, MnBeing the code characters of the n-th input, n is the positive integer being less than or equal to N;
If not, then described inspection character K is demonstratedn, veritify for user.
Second aspect, the embodiment of the present invention provides a kind of terminal, and this terminal comprises:
First reception unit, for receiving N number of code characters that user inputs when arranging password and hide, N is positive integer;
2nd reception unit, for receiving the verification character of user's input;
First judging unit, for judging inspection character KnWith code characters MnWhether identical, KnIt is the verification character of the n-th input, MnBeing the code characters of the n-th input, n is the positive integer being less than or equal to N;
First display unit, for when the judged result of described first judging unit is no, it is shown that described inspection character Kn, veritify for user.
By implementing the embodiment of the present invention, after terminal inputs code characters and verification character user, judge that whether whether the verification character of input identical with input code characters, if difference, directly show the verification character different from code characters, so that this verification character is corrected by user immediately, it is to increase the efficiency of verification password.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, it is briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of a kind of close code check method that the embodiment of the present invention provides;
Figure 1A is a kind of scene schematic diagram showing verification character that the embodiment of the present invention provides;
Figure 1B is the scene schematic diagram of another display verification character that the embodiment of the present invention provides
Fig. 2 is the schematic flow sheet of another close code check method that the embodiment of the present invention provides;
Fig. 2 A is a kind of scene schematic diagram showing verification character and code characters that the embodiment of the present invention provides;
Fig. 3 is the schematic flow sheet of another close code check method that the embodiment of the present invention provides;
Fig. 4 is the schematic flow sheet of another close code check method that the embodiment of the present invention provides;
Fig. 5 is the structural representation of a kind of terminal that the embodiment of the present invention provides;
Fig. 6 is the structural representation of another terminal that the embodiment of the present invention provides;
Fig. 7 is the structural representation of another terminal that the embodiment of the present invention provides;
Fig. 8 is the structural representation of another terminal that the embodiment of the present invention provides;
Fig. 8 A is the structural representation of another amendment unit that the embodiment of the present invention provides;
Fig. 9 is the structural representation of another terminal that the embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention, instead of whole embodiments. Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
It should be noted that, the term used in embodiments of the present invention is only for the object describing specific embodiment, and not intended to be limiting the present invention. " one ", " described " and " being somebody's turn to do " of the odd number form used in the embodiment of the present invention and appended claims also is intended to comprise most form, unless context clearly represents other implications. It is further understood that term "and/or" used herein refer to and comprise one or more project of listing being associated any or all may combine. In addition, term " first " in the specification sheets of the present invention and claim book and above-mentioned accompanying drawing, " the 2nd ", " the 3rd " and " the 4th " etc. are for distinguishing different object, instead of for describing particular order. In addition, term " comprising " and " having " and their any distortion, it is intended that cover and do not arrange his comprising. Such as contain the process of series of steps or unit, method, system, product or equipment and it is not defined in the step or unit listed, but selection of land can also comprise the step or unit do not listed, or selection of land can also comprise other step intrinsic for these processes, method, product or equipment or unit.
Referring to Fig. 1, Fig. 1 is the schematic flow sheet of a kind of close code check method that the embodiment of the present invention provides, and the method includes but not limited to following steps.
Step S101: N number of code characters that terminal reception user inputs when arranging password is also hidden, and N is positive integer.
Specifically, terminal described by the embodiment of the present invention comprises mobile phone, computer, mobile internet device (MID, mobileinternetdevice), wearable device (such as intelligent watch (such as iWatch etc.), Intelligent bracelet, passometer etc.) terminating unit. The password of social platform, the game platform account such as platform, shopping platform is set based on terminal, or for terminal arranges secret protection password (as arranged screen locking password for mobile phone, password etc. is logged in for computer is arranged) all belong to " password is set " scene described in the invention, under the scene of " password is set ", user needs first order to input intactly code characters, the quantity of input code characters is at least 1, the quantity of the code characters of the present embodiment hypothesis input is N, N is positive integer; Correspondingly, terminal receives this N number of code characters successively according to the order that user inputs. Code characters is hidden after receiving code characters by terminal, it is possible to then hidden by the character received often receiving a character, it is also possible to hide together after receiving all characters again; The mode hidden includes but not limited to: unifies display by " * " or other certain characters, or not shows this N number of code characters by user interface.
Step S102: terminal receives the verification character of user's input.
Specifically, after user has inputted N number of code characters, input validation character; Correspondingly, terminal receives this verification character of user's input.
Step S103: terminal judges inspection character KnWith code characters MnWhether identical, KnIt is the verification character of the n-th input, MnBeing the code characters of the n-th input, n is the positive integer being less than or equal to N.
Specifically, judgement process herein includes but not limited to following two kinds of situations:
Situation one: terminal is (user can input to terminal notification by clicking the mode of virtual buttons such as " confirmations " after having inputted verification character) after user inputs the verification character of full, starts to judge one by one each verification character K of inputnWhether with the M in N number of code characters of previously inputnOne_to_one corresponding is identical, specifically, sequentially judges K1With M1Whether identical, judge K2With M2Whether identical, judge K3With M3Whether identical, the rest may be inferred, until having judged KNWith MNWhether identical. After having been judged by all verification characters, perform step S104.
Situation two: terminal, when user often inputs a verification character, judges the inspection character K that user now inputsnWith the code characters M in above-mentioned N number of code charactersnWhether identical; Then step S104 is performed.
Step S104: if not, then terminal demonstration goes out to check character Kn, veritify for user.
Specifically, when terminal judges goes out to verify character KnWith code characters MnTime different, character K will be verifiedNShowing, so, user just can based on the verification character K shownnJudge whether oneself inputs mistake, thus to verification character KnOr code characters MnModify so that verifying character KnWith code characters MnIdentical.
It should be noted that, it is possible to the mode of display verification character is set according to the use habit of user, only wherein a kind of optional display mode is introduced below.
For above-mentioned situation one, show this verification character KnMode can as shown in Figure 1A, multiple verification character 12 to be hidden in textview field 11 in the way of " * ", verification character Kn13 are expressly displayed near the plurality of verification character 12; So, user just can carry out just amendment to property according to the inspection character 13 demonstrated.
For above-mentioned situation two, show this verification character KnMode can as shown in Figure 1B, multiple verification character 22 to be hidden in textview field 21 in the way of " * ", verification character Kn23 are expressly displayed near the plurality of verification character 22; So, when the verification character inputted does not mate with code characters, user just can Timeliness coverage, such that it is able to the timely verification character 13 to showing is revised targetedly.
In the method described by Fig. 1, after terminal inputs code characters and verification character user, judge that whether whether the verification character of input identical with input code characters, if difference, directly show the verification character different from code characters, so that this verification character is corrected by user immediately, it is to increase arrange the efficiency of password.
Referring to Fig. 2, Fig. 2 is the schematic flow sheet of another close code check method that the embodiment of the present invention provides, and the method includes but not limited to following steps.
Step S201: N number of code characters that terminal reception user inputs when arranging password is also hidden, and N is positive integer.
Step S202: terminal receives the verification character of user's input.
Step S203: terminal judges inspection character KnWith code characters MnWhether identical, KnIt is the verification character of the n-th input, MnBeing the code characters of the n-th input, n is the positive integer being less than or equal to N.
Step S204: if not, then terminal demonstration goes out to check character Kn, veritify for user.
Specifically, step S201��S204 can be corresponding to step S101��S104, repeats no more herein.
Step S205: if not, then terminal demonstration goes out code characters Mn, veritify for user.
Specifically, if judging inspection character KnWith code characters MnIt is different, at display this inspection character KnWhile, also show code characters Mn, so, user just can control test character KnWith code characters MnDetermine specifically to check character KnMistake or code characters MnMistake, thus modify pointedly.
Ask situation two for above-mentioned, show this verification character KnMode can as shown in Figure 2 A, multiple verification character 32 to be hidden in textview field 31 in the way of " * ", verification character Kn33 are expressly displayed near the plurality of verification character 32; Multiple code characters 42 to be hidden in textview field 41 in the way of " * ", code characters Mn43 are expressly displayed near the plurality of code characters 42.
In the method described by Fig. 2, terminal is after judging that verification character is different from code characters, code characters is also shown while display verification character, so that user judges verification character input mistake or code characters input mistake in conjunction with this verification character and code characters, so, the correction that user is follow-up just has more specific aim.
Referring to Fig. 3, Fig. 3 is the schematic flow sheet of another close code check method that the embodiment of the present invention provides, and the method includes but not limited to following steps.
Step S301: N number of code characters that terminal reception user inputs when arranging password is also hidden, and N is positive integer.
Step S302: terminal receives the verification character of user's input.
Step S303: terminal judges inspection character KnWith code characters MnWhether identical, KnIt is the verification character of the n-th input, MnBeing the code characters of the n-th input, n is the positive integer being less than or equal to N.
Step S304: if not, then terminal demonstration goes out to check character Kn, veritify for user.
Specifically, step S301��S304 can be corresponding to step S101��S104, repeats no more herein.
Step S305: if then terminal hides inspection character Kn��
Specifically, if it is determined that go out to check character KnWith code characters MnIdentical, then this verification character K that terminal will receivenHiding, this is hidden operation and is used for showing that the verification character of this time input is correct to user, such as, correct to represent the verification character of current input at local display " * " character of input validation character.
Step S306: if the one-hundred-percent inspection character received and N number of code characters according to reception order one_to_one corresponding and identical, then one-hundred-percent inspection character or N number of code characters are set to password by terminal.
Specifically, for above-mentioned situation one, if terminal is after the N number of code characters receiving user's input and whole verification character, judges that the code characters that same reception order receives is identical with verification character, then N number of code characters (namely all verification characters) is set to password.
For example, assume that the code characters that terminal order receives is " 2468 ", the verification character being received sequentially is " 2468 ", so terminal can judge the verification character identical (be " 2 ") of first code characters inputted with first input when judging, the code characters of the 2nd input and the 2nd the verification character identical (being " 4 ") inputted, the code characters of the 3rd input and the 3rd the verification character identical (being " 6 ") inputted, the code characters of the 3rd input and the 3rd the verification character identical (being " 8 ") inputted, also that is to say, the one-hundred-percent inspection character that terminal receives and 4 code characters are according to receiving order one_to_one corresponding and identical, so these 4 code characters " 2468 " are set to password. when the verification character inputted does not mate with code characters, demonstrate this verification character to revise pointedly for user, when all verification characters are modified to identical with N number of code characters one_to_one corresponding, code characters is set to password, it is to increase the efficiency of password is set.
Referring to Fig. 4, Fig. 4 is the schematic flow sheet of another close code check method that the embodiment of the present invention provides, and includes but not limited to following steps.
Step S401: N number of code characters that terminal reception user inputs when arranging password is also hidden, and N is positive integer.
Step S402: terminal receives the verification character of user's input.
Step S403: terminal judges inspection character KnWith code characters MnWhether identical, KnIt is the verification character of the n-th input, MnBeing the code characters of the n-th input, n is the positive integer being less than or equal to N.
Step S404: if not, then terminal demonstration goes out to check character Kn, veritify for user.
Specifically, step S401��S404 can be corresponding to step S101��S104, repeats no more herein.
Step S405: the inspection character K that terminal will demonstratenInstruction according to user is modified.
Specifically, inspection character K is being demonstratednAfter, user can also input modify instruction by acoustic control, gesture control, the tactile control mode such as virtual key, operating physical button, to this verification character KnModify.
In the optional scheme of one, the inspection character K that will demonstratenInstruction according to user is modified, and comprising: according to the instruction of user, filters out target character from preliminary election character group, and the character in preliminary election character group is N number of code characters; The inspection character K that will demonstratenReplace as target character.
Specifically, N number of code characters that a certain the block display area display user of terminal in terminal had previously inputted, this N number of code characters of display is above-mentioned preliminary election character group, the display order of this N number of code characters in this display area can be random, the character that user can select from this preliminary election character group is target character, correspondingly, terminal according to the selection of user by this verification character KnReplace as target character. Owing to user needs the verification character of input often identical with the N number of code characters inputted above, therefore show this N number of code characters by preliminary election character group herein to select for user, instead of (preliminary election character group and dummy keyboard can also exist to provide the dummy keyboard showing tens characters to select for user simultaneously, but dummy keyboard is as subsequent use), improve the efficiency of user's input validation character, thus improve the efficiency that password is set.
In another optional scheme, the inspection character K that will demonstratenInstruction according to user is modified, and comprising: according to first operational order of user, the inspection character K that will demonstratenIt is revised as and code characters MnIdentical; Or, according to the 2nd operational order of user, by code characters MnIt is revised as and checks character MnIdentical.
Specifically, one alter mode efficiently, the inspection character K that can directly will demonstrate is provided herenIt is revised as and code characters MnIdentical; Or, by code characters MnIt is revised as and checks character MnIdentical. Such as, when terminal receives the first operational order of user's input, the inspection character K that will demonstratenIt is revised as and code characters MnIdentical; When terminal receive user input the 2nd operational order, by code characters MnIt is revised as and checks character MnIdentical.
Optionally, user can touch one controlling and being arranged in the terminal virtual button (can show this virtual button with the symbol being similar to " �� ") for revising, when terminal detect user touch control this virtual button time dynamics fall into the first preset range time, it is determined that user input be the first operational order; When terminal detect user touch control this virtual button time dynamics fall into the 2nd preset range time, it is determined that user input be the 2nd operational order.
Optionally, user can touch control be arranged in terminal two for the virtual button A that revises and virtual button B, when terminal detects that user touches this virtual button A of control, it is determined that user's input be the first operational order; When terminal detects that user touches this virtual button B of control, it is determined that what user inputted is the 2nd operational order.
Optionally, user can touch the virtual button of control be arranged in terminal for revising, when terminal detects user to touch the number of times of this virtual button of control be odd-times, it is determined that user's input be the first operational order; When terminal detects user to touch the number of times of this virtual button of control is even-times, it is determined that user's input be the 2nd operational order, certainly can also corresponding 2nd operational order of odd-times, corresponding first operational order of even-times.
Can also inputting the first operational order and the 2nd operational order by other means, differ a citing herein.
Step S406: the inspection character K after terminal judges amendmentnWith code characters MnWhether identical, if then hiding the inspection character K after amendmentn��
Specifically, terminal, after amendment completes, judges inspection character K againnWith code characters MnWhether identical, if the same hide this character, such as, by this verification character K after amendmentnIt is shown as " * " character.
In the method described by Fig. 4, terminal is the instant modify instruction receiving user's input after demonstrating verification character, and according to this modify instruction, to verification character or code characters is modified so that the two is identical, and without the need to re-entering all verification characters or all code characters, it is to increase the efficiency of password is set.
The above-mentioned method illustrating the embodiment of the present invention, for the ease of implementing the such scheme of the embodiment of the present invention better, correspondingly, provided below is the device of the embodiment of the present invention.
Refer to Fig. 5, Fig. 5 is the structural representation of a kind of terminal 50 that the embodiment of the present invention provides, this terminal 50 can comprise the first reception unit 501, the 2nd reception unit 502, first judging unit 503 and the first display unit 504, wherein, and being described in detail as follows of each unit.
N number of code characters that first reception unit 501 inputs when arranging password for receiving user is also hidden, and N is positive integer;
2nd reception unit 502 is for receiving the verification character of user's input;
First judging unit 503 is for judging inspection character KnWith code characters MnWhether identical, KnIt is the verification character of the n-th input, MnBeing the code characters of the n-th input, n is the positive integer being less than or equal to N;
First display unit 504 is for when the judged result of the first judging unit 503 is no, it is shown that inspection character Kn, veritify for user.
It should be noted that, in embodiments of the present invention, the specific implementation of each unit can also the corresponding corresponding description with reference to the embodiment of the method shown in Fig. 1.
In the terminal 50 described by Fig. 5, after terminal 50 inputs code characters and verification character user, judge that whether whether the verification character of input identical with input code characters, if difference, directly show the verification character different from code characters, so that this verification character is corrected by user immediately, it is to increase arrange the efficiency of password.
Refer to Fig. 6, Fig. 6 is the structural representation of another terminal 50 that the embodiment of the present invention provides, this terminal 50 except comprise embodiment illustrated in fig. 5 in first reception unit 501, the 2nd reception unit 502, first judging unit 503 and the first display unit 504 except, the 2nd display unit 505 can also be comprised, 2nd display unit 505 is for when the judged result of the first judging unit is no, it is shown that code characters Mn, veritify for user.
It should be noted that, in embodiments of the present invention, the specific implementation of each unit can also the corresponding corresponding description with reference to the embodiment of the method shown in Fig. 6.
In the terminal 50 described by Fig. 6, terminal 50 is after judging that verification character is different from code characters, code characters is also shown while display verification character, so that user judges verification character input mistake or code characters input mistake in conjunction with this verification character and code characters, so, the correction that user is follow-up just has more specific aim.
Refer to Fig. 7, Fig. 7 is the structural representation of another terminal 50 that the embodiment of the present invention provides, this terminal 50 except comprise embodiment illustrated in fig. 5 in first reception unit 501, the 2nd reception unit 502, first judging unit 503 and the first display unit 504 except, hiding unit 506 and setting unit 507 can also be comprised, hide being described in detail as follows of unit 506 and setting unit 507.
Hide unit 506 for when the judged result of the first judging unit 503 is for being, hiding inspection character Kn;
Setting unit 507 for the one-hundred-percent inspection character received and N number of code characters according to reception order one_to_one corresponding and identical, one-hundred-percent inspection character or N number of code characters are set to password.
It should be noted that, in embodiments of the present invention, the specific implementation of each unit can also the corresponding corresponding description with reference to the embodiment of the method shown in Fig. 3.
Refer to Fig. 8, Fig. 8 is the structural representation of another terminal 50 that the embodiment of the present invention provides, this terminal 50 except comprise embodiment illustrated in fig. 5 in first reception unit 501, the 2nd reception unit 502, first judging unit 503 and the first display unit 504 except, amendment unit 508 and the 2nd judging unit 509 can also be comprised, being described in detail as follows of amendment unit 508 and the 2nd judging unit 509.
The inspection character K of amendment unit 508 for demonstratingnInstruction according to user is modified;
2nd judging unit 509 is for judging the inspection character K after revisingnWith code characters MnWhether identical, if then hiding the inspection character K after amendmentn��
It should be noted that, in embodiments of the present invention, the specific implementation of each unit can also the corresponding corresponding description with reference to the embodiment of the method shown in Fig. 4.
In the optional scheme of one, revising unit 508 can be the structure shown in Fig. 8 A, revises unit 508 in fig. 8 a and comprises screening unit 5081 and replace unit 5082, screens unit 5081 and replace being described in detail as follows of unit 5082.
Screening unit 5081, for the instruction according to user, filters out target character from preliminary election character group, and the character in preliminary election character group is N number of code characters;
Replace the inspection character K of unit 5082 for illustratingnReplace as target character.
In another optional scheme, revise unit 508 specifically for the first operational order according to user, the inspection character K that will demonstratenIt is revised as and code characters MnIdentical; Or, according to the 2nd operational order of user, by code characters MnIt is revised as and checks character MnIdentical.
In the terminal 50 described by Fig. 8, terminal 50 is the instant modify instruction receiving user's input after demonstrating verification character, and according to this modify instruction, to verification character or code characters is modified so that the two is identical, and without the need to re-entering all verification characters or all code characters, it is to increase the efficiency of password is set.
Please refer to Fig. 9, Fig. 9 is the structural representation of another terminal 90 that the embodiment of the present invention provides, and this terminal 90 can comprise: at least one storer 901, baseband chip 902, radio frequency module 903, outer peripheral systems 904, sensor 905 and communication bus 906. Wherein, storer 901 is for storing operating system, network communication program, user interface program, sequence of control etc.; Baseband chip 902 comprises at least one treater 9021, such as CPU, clock module 9022 and power supply management module 9023; Outer peripheral systems 904 comprises camera controller 9042, audio frequency control device 9043, touch display screen controller 9044 and sensor management module 9045, correspondingly, also comprises camera 9047, voice frequency circuit 9048 and touch display screen 9049; Further, sensor 905 can comprise light sensor, displacement sensor, acceleration transducer, fingerprint sensing device etc., and generally speaking, sensor 905 can increase depending on actual needs or reduce; Storer 901 can be high-speed RAM storer, it is also possible to be non-labile storer (non-volatilememory), such as at least one multiple head unit. Storer 905 can also be optionally that at least one is positioned at the storing device away from aforementioned processor 9021.
In the terminal 90 shown in Fig. 9, treater 9021 may be used for calling in storer 901 sequence of control stored to perform following operation:
N number of code characters that reception user inputs when arranging password is also hidden, and N is positive integer;
Receive the verification character of user's input;
Judge inspection character KnWith code characters MnWhether identical, KnIt is the verification character of the n-th input, MnBeing the code characters of the n-th input, n is the positive integer being less than or equal to N;
If not, then inspection character K is demonstratedn, veritify for user.
Optionally, inspection character K is judgednWith code characters MnAfter whether identical, also comprise:
If not, then code characters M is demonstratedn, veritify for user.
Optionally, inspection character K is judgednWith code characters MnAfter whether identical, also comprise:
If then hiding inspection character Kn;
If the one-hundred-percent inspection character received and N number of code characters according to reception order one_to_one corresponding and identical, then one-hundred-percent inspection character or N number of code characters are set to password.
Optionally, also comprise:
The inspection character K that will demonstratenInstruction according to user is modified;
Judge the inspection character K after amendmentnWith code characters MnWhether identical, if then hiding the inspection character K after amendmentn��
Optionally, the inspection character K that will demonstratenInstruction according to user is modified, and comprising:
Instruction according to user, filters out target character from preliminary election character group, and the character in preliminary election character group is N number of code characters;
The inspection character K that will illustratenReplace as target character.
Optionally, the inspection character K that will demonstratenInstruction according to user is modified, and comprising:
The first operational order according to user, the inspection character K that will demonstratenIt is revised as and code characters MnIdentical; Or, according to the 2nd operational order of user, by code characters MnIt is revised as and checks character MnIdentical.
In sum, by implementing the embodiment of the present invention, after terminal inputs code characters and verification character user, judge that whether whether the verification character of input identical with input code characters, if difference, directly show the verification character different from code characters, so that this verification character is corrected by user immediately, it is to increase arrange the efficiency of password.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, it is can be completed by the hardware that computer program carrys out instruction relevant, described program can be stored in computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment such as above-mentioned each side method. Wherein, described storage media can be magnetic disc, CD, read-only storage memory body (Read-OnlyMemory, ROM) or random storage and remembers body (RandomAccessMemory, RAM) etc.
Above disclosed it is only the better embodiment of one of the present invention, certainly the interest field of the present invention can not be limited with this, one of ordinary skill in the art will appreciate that all or part of flow process realizing above-described embodiment, and according to the equivalent variations that the claims in the present invention are done, still belong to the scope that invention is contained.

Claims (10)

1. a close code check method, it is characterised in that, comprising:
N number of code characters that reception user inputs when arranging password is also hidden, and N is positive integer;
Receive the verification character of user's input;
Judge inspection character KnWith code characters MnWhether identical, KnIt is the verification character of the n-th input, MnBeing the code characters of the n-th input, n is the positive integer being less than or equal to N;
If not, then described inspection character K is demonstratedn, veritify for user.
2. method according to claim 1, it is characterised in that, described judgement inspection character KnWith code characters MnAfter whether identical, also comprise:
If then hiding described inspection character Kn;
If the one-hundred-percent inspection character received and described N number of code characters according to reception order one_to_one corresponding and identical, then described one-hundred-percent inspection character or described N number of code characters are set to password.
3. method according to claim 1, it is characterised in that, also comprise:
By the described inspection character K demonstratednInstruction according to user is modified;
Judge the inspection character K after described amendmentnWith code characters MnWhether identical, if then hiding the inspection character K after described amendmentn��
4. method according to claim 3, it is characterised in that, described by the described inspection character K demonstratednInstruction according to user is modified, and comprising:
Instruction according to user, filters out target character from preliminary election character group, and the character in described preliminary election character group is N number of code characters;
By the described inspection character K demonstratednReplace as described target character.
5. method according to claim 3, it is characterised in that, described by the described inspection character K demonstratednInstruction according to user is modified, and comprising:
The first operational order according to user, by the described inspection character K demonstratednIt is revised as and described code characters MnIdentical; Or, according to the 2nd operational order of user, by described code characters MnIt is revised as and described inspection character MnIdentical.
6. a terminal, it is characterised in that, comprising:
First reception unit, for receiving N number of code characters that user inputs when arranging password and hide, N is positive integer;
2nd reception unit, for receiving the verification character of user's input;
First judging unit, for judging inspection character KnWith code characters MnWhether identical, KnIt is the verification character of the n-th input, MnBeing the code characters of the n-th input, n is the positive integer being less than or equal to N;
First display unit, for when the judged result of described first judging unit is no, it is shown that described inspection character Kn, veritify for user.
7. terminal according to claim 6, it is characterised in that, also comprise:
Hide unit, for when the judged result of described first judging unit is for being, hiding described inspection character Kn;
Setting unit, for the one-hundred-percent inspection character received and described N number of code characters according to reception order one_to_one corresponding and identical, described one-hundred-percent inspection character or described N number of code characters are set to password.
8. terminal according to claim 6, it is characterised in that, also comprise:
Amendment unit, for by the described inspection character K demonstratednInstruction according to user is modified;
2nd judging unit, for judging the inspection character K after described amendmentnWith code characters MnWhether identical, if then hiding the inspection character K after described amendmentn��
9. terminal according to claim 8, it is characterised in that, described amendment unit comprises:
Screening unit, for the instruction according to user, filters out target character from preliminary election character group, and the character in described preliminary election character group is N number of code characters;
Replace unit, for by the described inspection character K demonstratednReplace as described target character.
10. terminal according to claim 8, it is characterised in that, described amendment unit specifically for the first operational order according to user, by the described inspection character K demonstratednIt is revised as and described code characters MnIdentical; Or, according to the 2nd operational order of user, by described code characters MnIt is revised as and described inspection character MnIdentical.
CN201510999851.6A 2015-12-26 2015-12-26 Password check method and terminal Pending CN105631267A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510999851.6A CN105631267A (en) 2015-12-26 2015-12-26 Password check method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510999851.6A CN105631267A (en) 2015-12-26 2015-12-26 Password check method and terminal

Publications (1)

Publication Number Publication Date
CN105631267A true CN105631267A (en) 2016-06-01

Family

ID=56046194

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510999851.6A Pending CN105631267A (en) 2015-12-26 2015-12-26 Password check method and terminal

Country Status (1)

Country Link
CN (1) CN105631267A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111949192A (en) * 2020-08-21 2020-11-17 维沃移动通信有限公司 Password input prompting method and device and electronic equipment
CN113294033A (en) * 2020-02-24 2021-08-24 宽丰工业股份有限公司 Coded lock system and operation method thereof
US11341226B2 (en) 2020-03-24 2022-05-24 Real Locks & Security Co., Ltd. Combination lock system and method of operating the same

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102411682A (en) * 2011-08-01 2012-04-11 吴成贵 Password setting and authentication method
CN102622554A (en) * 2011-12-19 2012-08-01 广东步步高电子工业有限公司 Touch screen mobile device, and method and system for soft locking password setup and unlocking for touch screen mobile device
CN103365581A (en) * 2012-03-31 2013-10-23 百度在线网络技术(北京)有限公司 User equipment touch unlocking method and device based on unlocking password
CN103455740A (en) * 2013-08-30 2013-12-18 深圳创维数字技术股份有限公司 Cipher processing method, device and terminal
CN103632070A (en) * 2013-12-09 2014-03-12 上海分维智能科技有限公司 Any handwriting graphical password method used for payment system
CN103886244A (en) * 2014-03-18 2014-06-25 上海分维智能科技有限公司 Method for conducting any graphical password handwriting for intelligent terminal starting-up system
US20150312040A1 (en) * 2014-04-24 2015-10-29 Smart Electronic Industrial (Dong Guan) Co., Ltd. Password verifying device and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102411682A (en) * 2011-08-01 2012-04-11 吴成贵 Password setting and authentication method
CN102622554A (en) * 2011-12-19 2012-08-01 广东步步高电子工业有限公司 Touch screen mobile device, and method and system for soft locking password setup and unlocking for touch screen mobile device
CN103365581A (en) * 2012-03-31 2013-10-23 百度在线网络技术(北京)有限公司 User equipment touch unlocking method and device based on unlocking password
CN103455740A (en) * 2013-08-30 2013-12-18 深圳创维数字技术股份有限公司 Cipher processing method, device and terminal
CN103632070A (en) * 2013-12-09 2014-03-12 上海分维智能科技有限公司 Any handwriting graphical password method used for payment system
CN103886244A (en) * 2014-03-18 2014-06-25 上海分维智能科技有限公司 Method for conducting any graphical password handwriting for intelligent terminal starting-up system
US20150312040A1 (en) * 2014-04-24 2015-10-29 Smart Electronic Industrial (Dong Guan) Co., Ltd. Password verifying device and method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113294033A (en) * 2020-02-24 2021-08-24 宽丰工业股份有限公司 Coded lock system and operation method thereof
CN113294033B (en) * 2020-02-24 2022-05-27 宽丰工业股份有限公司 Coded lock system and operation method thereof
US11341226B2 (en) 2020-03-24 2022-05-24 Real Locks & Security Co., Ltd. Combination lock system and method of operating the same
CN111949192A (en) * 2020-08-21 2020-11-17 维沃移动通信有限公司 Password input prompting method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN102981627B (en) Password inputting method and password inputting device
TW201241759A (en) Prediction-based touch contact tracking
US10732823B2 (en) User interface and method for the protected input of characters
CN102968602A (en) Setting method and device for keyboard
CN103873455B (en) A kind of method and device of information checking
CN104123001A (en) Display method and electronic device
CN107885823B (en) Audio information playing method and device, storage medium and electronic equipment
CN101770340A (en) Electronic device and input method thereof
EP2927834A1 (en) Information processing apparatus, information processing method, and recording medium
CN106470109A (en) A kind of personal identification method and equipment
CN105631267A (en) Password check method and terminal
CN105184126A (en) Password setting method, authentication method and terminal
CN107765853A (en) Using method for closing, device, storage medium and electronic equipment
CN106055965A (en) Device and method for unlocking pattern of touch screen
KR20190102869A (en) Method for trustzone graphic rendering and display apparatus thereof
CN105989485A (en) Business management method and device
CN106126993A (en) A kind of application controls method and terminal
CN106776039A (en) A kind of data processing method and device
CN105607917B (en) A kind of page loading method and device
CN114205364A (en) Data backup method and equipment
KR101267229B1 (en) Method and system for authenticating using input pattern
CN103136462A (en) Method and system of password authentication
CN101118738B (en) Display device and display method
EP3528151A1 (en) Method and apparatus for user authentication
KR20150000634A (en) Key input method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20190409

AD01 Patent right deemed abandoned