CN106127062A - unlocking method and device - Google Patents
unlocking method and device Download PDFInfo
- Publication number
- CN106127062A CN106127062A CN201610462832.4A CN201610462832A CN106127062A CN 106127062 A CN106127062 A CN 106127062A CN 201610462832 A CN201610462832 A CN 201610462832A CN 106127062 A CN106127062 A CN 106127062A
- Authority
- CN
- China
- Prior art keywords
- password
- sequence
- mapping ruler
- pseudo
- real
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The disclosure is directed to a kind of unlocking method and device.The method includes: show interface for password input on a display screen, receive the pseudo-keying sequence that user inputs in interface for password input, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determine the real password sequence that user inputs, when achieving that user inputs password in public, merely enter pseudo-keying sequence, terminal unit is further according to this puppet keying sequence and password mapping ruler, this puppet keying sequence is converted to real password sequence, to complete follow-up operation, the pseudo-keying sequence that other people can peep, and real password sequence only just can obtain after conversion, thus, when user inputs password, stop other people and peep the probability of password, improve user and input the safety of password, and then, improve the safety of unblock.
Description
Technical field
It relates to computer technology, particularly relate to unlocking method and device.
Background technology
Along with the development of communication technology, the terminal unit such as mobile phone, panel computer is widely applied.User is using eventually
Needing the scene inputting password to get more and more during end equipment, such as, when logging in Mobile banking, input password, uses mobile phone
The mobile payment services such as bank carry out input password during the payment of ecommerce.In in public, when user uses terminal to set
For when carrying out Password Input, may be peeped by other people and obtain account and the password of user, thus, threaten the information peace of user
Entirely.Therefore, improve safety issue when user uses terminal unit to carry out Password Input in public and become extremely important.
In correlation technique, when user uses terminal unit to carry out Password Input, terminal unit does not has corresponding method
The password preventing user is peeped by other people.
Summary of the invention
For overcoming problem present in correlation technique, the disclosure provides a kind of unlocking method and device.
First aspect according to disclosure embodiment, it is provided that a kind of unlocking method, including:
Show interface for password input on a display screen;
Receive the pseudo-keying sequence that user inputs in described interface for password input;
According to described pseudo-keying sequence and the password mapping ruler that pre-sets, determine the real password sequence that described user inputs
Row;Wherein, described password mapping ruler is for indicating the mapping one by one between described pseudo-keying sequence and described real password sequence
Relation.
In conjunction with first aspect, in the first possible implementation of first aspect, described method also includes:
Receive many groups of password mapping rulers to be verified of described user input;
The described password mapping ruler to be verified of many groups is verified, and the password mapping ruler to be verified passed through will be verified
It is defined as described password mapping ruler.
In conjunction with the first possible implementation of first aspect, the implementation that the second in first aspect is possible
In, described method also includes:
Described the password mapping ruler to be verified that passes through of verification is defined as described password mapping ruler after, to described close
Code mapping ruler is encrypted, and generates the password mapping ruler after described encryption, and to the password mapping ruler after described encryption
Store;
Correspondingly, described according to described pseudo-keying sequence and the password mapping ruler that pre-sets, determine that described user is defeated
Before the real password sequence entered, described method also includes:
Password mapping ruler after described encryption is decrypted, generates described password mapping ruler.
In conjunction with first aspect, in the third possible implementation of first aspect, if described pseudo-keying sequence and institute
Stating real password sequence and be Serial No., the most described password mapping ruler is: the pseudo-password position in described pseudo-keying sequence and institute
The real password position sum stated in real password sequence is default numerical value.
In conjunction with first aspect, in the 4th kind of possible implementation of first aspect, if described pseudo-keying sequence and institute
Stating real password sequence and be Serial No., the most described password mapping ruler is: the pseudo-password position and 10 in described pseudo-keying sequence
It is default numerical value to 10 remainder numbers that sum deducts the difference of the real password position in described real password sequence again.
Second aspect according to disclosure embodiment, it is provided that a kind of tripper, including:
Display module, is configured to show on a display screen interface for password input;
First receiver module, is configured to receive the pseudo-keying sequence that user inputs in described interface for password input;
First determines module, is configured to, according to described pseudo-keying sequence and the password mapping ruler that pre-sets, determine
The real password sequence of described user input;Wherein, described password mapping ruler be used for indicating described pseudo-keying sequence with described very
Mapping relations one by one between keying sequence.
In conjunction with second aspect, in the first possible implementation of second aspect, described device also includes:
Second receiver module, is configured to receive many groups of password mapping rulers to be verified of described user input;
Correction verification module, is configured to verify the described password mapping ruler to be verified of many groups;
Second determines module, is configured to that the password mapping ruler to be verified that verification is passed through is defined as described password and maps
Rule.
In conjunction with the first possible implementation of second aspect, the implementation that the second in second aspect is possible
In, described device also includes:
Encrypting module, is configured to the password mapping ruler to be verified by verification is passed through and is defined as described password mapping ruler
Afterwards, described password mapping ruler is encrypted, generates the password mapping ruler after described encryption;
Memory module, is configured to store the password mapping ruler after described encryption;
Deciphering module, is configured to be decrypted the password mapping ruler after described encryption, generates described password and maps
Rule.
In conjunction with second aspect, in the third possible implementation of second aspect, if described pseudo-keying sequence and institute
Stating real password sequence and be Serial No., the most described password mapping ruler is: the pseudo-password position in described pseudo-keying sequence and institute
The real password position sum stated in real password sequence is default numerical value.
In conjunction with second aspect, in the 4th kind of possible implementation of second aspect, if described pseudo-keying sequence and institute
Stating real password sequence and be Serial No., the most described password mapping ruler is: the pseudo-password position and 10 in described pseudo-keying sequence
It is default numerical value to 10 remainder numbers that sum deducts the difference of the real password position in described real password sequence again.
The third aspect according to disclosure embodiment, it is provided that a kind of tripper, including:
Processor;
For storing the memorizer of described processor executable;
Wherein, described processor is configured to:
Show interface for password input on a display screen;
Receive the pseudo-keying sequence that user inputs in described interface for password input;
According to described pseudo-keying sequence and the password mapping ruler that pre-sets, determine the real password sequence that described user inputs
Row;Wherein, described password mapping ruler is for indicating the mapping one by one between described pseudo-keying sequence and described real password sequence
Relation.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect:
In one embodiment, by showing interface for password input on a display screen, receive user in interface for password input
The pseudo-keying sequence of input, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determines the real password that user inputs
Sequence, it is achieved that when user inputs password in public, merely enters pseudo-keying sequence, and terminal unit is further according to this puppet cipher component
Row and password mapping ruler, be converted to real password sequence by this puppet keying sequence, and to complete follow-up operation, other people can peep
Simply pseudo-keying sequence, and real password sequence only just can obtain after conversion, thus, when user inputs password,
Stop other people and peeped the probability of password, improve user and input the safety of password, and then, improve the safety of unblock
Property.
In another embodiment, by receiving many groups of password mapping rulers to be verified of user's input, to be verified to many groups
Password mapping ruler verifies, and the password mapping ruler to be verified that verification is passed through is defined as password mapping ruler, to close
Code mapping ruler is encrypted, and generates the password mapping ruler after encryption, and stores the password mapping ruler after encryption,
Show interface for password input on a display screen, receive the pseudo-keying sequence that user inputs in interface for password input, after encryption
Password mapping ruler be decrypted, generate password mapping ruler, map rule according to pseudo-keying sequence and the password that pre-sets
Then, the real password sequence that user inputs is determined, it is achieved that many groups of password mapping rulers to be verified of user's input can be carried out
Verification, is only encrypted the password mapping ruler to be verified that verification is passed through, stores, according to pseudo-keying sequence and pre-set
Password mapping ruler, before determining the real password sequence that user inputs, first to encryption after password mapping ruler be decrypted,
Determine real password sequence again, user can be avoided to input the password mapping ruler that can not pass through verification, thus, improve password defeated
The stability entered, and, password mapping ruler is encrypted again, improves the safety of password mapping ruler, and then, enter one
Step improves the safety of Password Input.
It should be appreciated that it is only exemplary and explanatory, not that above general description and details hereinafter describe
The disclosure can be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the disclosure
Example, and for explaining the principle of the disclosure together with description.
Fig. 1 is the flow chart according to a kind of unlocking method shown in an exemplary embodiment;
Fig. 2 is the flow chart according to a kind of unlocking method shown in another exemplary embodiment;
Fig. 3 is the display schematic diagram of a kind of user interface;
Fig. 4 is the display schematic diagram of another kind of user interface;
Fig. 5 is the block diagram according to a kind of tripper shown in an exemplary embodiment;
Fig. 6 is the block diagram according to a kind of tripper shown in another exemplary embodiment;
Fig. 7 is the block diagram according to a kind of tripper shown in another exemplary embodiment;
Fig. 8 is the block diagram according to a kind of tripper shown in further example embodiment;
Fig. 9 is the block diagram according to a kind of tripper shown in another exemplary embodiment.
By above-mentioned accompanying drawing, it has been shown that the embodiment that the disclosure is clear and definite, hereinafter will be described in more detail.These accompanying drawings
With word, the scope being not intended to be limited disclosure design by any mode is described, but by with reference to specific embodiment being
Those skilled in the art illustrate the concept of the disclosure.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Explained below relates to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they are only with the most appended
The example of the apparatus and method that some aspects that described in detail in claims, the disclosure are consistent.
Fig. 1 is the flow chart according to a kind of unlocking method shown in an exemplary embodiment.As it is shown in figure 1, the disclosure is real
The unlocking method that executing example provides comprises the following steps:
In a step 101, interface for password input is shown on a display screen.
The unlocking method that disclosure embodiment provides can be performed by terminal unit.Terminal unit can be handheld device,
Mobile unit, wearable device, calculating equipment, and various forms of subscriber equipment (User Equipment;It is called for short: UE),
Mobile station (Mobile Station;MS) and terminal (terminal) etc. it is called for short:.The unlocking method tool that disclosure embodiment provides
In the scene of the real password sequence that body inputs for determining user according to the pseudo-keying sequence of user's input.
In one implementation, terminal unit can receive user input Password Input enabled instruction after,
Display screen display interface for password input.Such as, " input password " option in the user interface of terminal unit is carried out by user
Choose operation.In another kind of implementation, terminal unit can start at the input password receiving application program transmission and refer to
After order, show interface for password input on a display screen.Such as, Mobile banking's program is receiving the transfer request of user's input
After, needing again password to be verified, then Mobile banking's program can send input password enabled instruction to terminal unit.
It should be noted that in the scene that display screen is touch screen, interface for password input can include Password Input hurdle
And cipher inputting keyboard.Cipher inputting keyboard can be the input keyboard that terminal unit system carries, it is also possible to be third party's journey
The input keyboard that sequence provides.Optionally, third party's program can be input method procedure.It not the scene of touch screen at display screen
In, interface for password input can only include Password Input hurdle.
In a step 102, the pseudo-keying sequence that user inputs in interface for password input is received.
Pseudo-keying sequence in disclosure embodiment refers to the cipher component that user directly inputs in interface for password input
Row.For example, user have input sequence 85369 by the cipher inputting keyboard in interface for password input, and puppet the most now is close
Code sequence is exactly 85369.When user carries out Password Input in public, puppet that user inputs that what other people can peep is i.e.
Keying sequence.
In one implementation, user can be by the pseudo-keying sequence of touch screen input.Terminal unit receives user and leads to
Cross the pseudo-keying sequence of touch screen input.
In another kind of implementation, user can be by the pseudo-keying sequence of physical button input.
In another implementation, user can input voice puppet keying sequence by mike.Terminal unit passes through
Mike receives the voice puppet keying sequence of user's input, and identifies pseudo-keying sequence by speech recognition technology.
In step 103, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determine that user inputs the closeest
Code sequence.
Wherein, password mapping ruler is for indicating the mapping relations one by one between pseudo-keying sequence and real password sequence.
Password mapping ruler is that user pre-sets.When user cipher includes letter, symbol and numeral, password maps
Rule can be letter, symbol and digital and its most corresponding actual letter, symbol sum that whole users may input
Mapping relations one by one between word.Real password sequence is the keying sequence that user actually enters, that is, can be used for successfully carrying out
The correct keying sequence of the operations such as follow-up such as mobile payment, account login.
Each in pseudo-keying sequence is pseudo-password position.Each in real password sequence is real password position.Password reflects
Penetrating the mapping relations one by one between the rule pseudo-keying sequence of instruction and real password sequence, mean in pseudo-keying sequence is different
Pseudo-password position one_to_one corresponding to real password position different in real password sequence.That is, in password mapping ruler, it is impossible to many
The individual pseudo-password position differed corresponds to same real password position, can not correspond to multiple real password in same pseudo-password position
Position.
In a kind of concrete implementation mode, password mapping ruler may is that a be mapped to b (below with " → " represent and " reflect
It is mapped to "), b → c, c → d, d → e ..., y → z, z → a, →.. → #, # →, 0 → 1,1 → 2,2 → 3 ..., 8 → 9,
9→0.Wherein, the arrow left side represents letter, symbol and the numeral that whole users may input, and represents that it is actual on the right of arrow
The most corresponding letter, symbol and numeral.When using this kind of password mapping ruler, when terminal unit receives user at password
When on inputting interface, the pseudo-keying sequence of input is 5968hgm@, then can be true according to this puppet keying sequence and password mapping ruler
Determining real password sequence is 6079ihn..It is understood that in this kind of implementation, alphabetical, permissible between symbol and numeral
Mutually mapping, such as, password mapping ruler may is that a part for letter is mapped to numeral, and another part of letter is mapped to
Symbol, another part mapping of letter to letter, a part for numeral is mapped to numeral, and another part of numeral is mapped to symbol
Number, symbol is mapped to letter.
Password mapping ruler can be stored by terminal unit in the form of a list, it needs to be determined that real password sequence
Time, both can directly determine the real password sequence corresponding with this puppet keying sequence by inquiring about this list.
In another kind of concrete implementation mode, if pseudo-keying sequence and real password sequence are Serial No., then password
Mapping ruler can be: the pseudo-password position in pseudo-keying sequence is default number with the real password position sum in real password sequence
Value.For example, password mapping ruler may is that A+B=9.Wherein, A represents a pseudo-password position in pseudo-keying sequence, B
Represent a real password position in real password sequence.In this kind of implementation, password mapping ruler specifically: 0 → 9,1 → 8,
2 → 7 ..., 8 → 1,9 → 0.Terminal unit, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determines the closeest
During code sequence, each in real password sequence can be determined according to formula B=9-A.As an example it is assumed that pseudo-keying sequence
It is: 8421 that then real password sequence is: 1578.
In another concrete implementation mode, if pseudo-keying sequence and real password sequence are Serial No., then password
Mapping ruler can be: the pseudo-password position in pseudo-keying sequence and 10 sums deduct the difference of the real password position in real password sequence again
It is default numerical value to 10 remainder numbers.This means, (C+10-D) mod10=n.Wherein, a puppet during C represents pseudo-keying sequence is close
Code bit, D represents a real password position in real password sequence, and n is the integer more than or equal to 0 and less than or equal to 9.Mod represents C+
10-D is to 10 remainders.When n is 3, password mapping ruler specifically: 0 → 7,1 → 8,2 → 9,3 → 0,4 → 1,5 → 2,6 → 3,7
→ 4,8 → 5,9 → 6.Terminal unit, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determines real password sequence
Time, each in real password sequence can be determined according to formula (C+10-D) mod10=n.As an example it is assumed that pseudo-cipher component
Row are: 8421, then real password sequence is: 5198.It should be noted that the numeral in formula (C+10-D) mod10=n is 10,
It is to ensure that this password mapping ruler meets principle one to one.When for other numerals, when C is mapped to D, when C divides
Do not take between 0-9 digital time, it is impossible to realizing D is also between 0-9 and unduplicated numeral.
After determining real password sequence, terminal unit can complete follow-up such as moving according to this real password sequence
Payment, account login etc. operate.
The unlocking method that disclosure embodiment provides, by showing interface for password input on a display screen, receives user and exists
The pseudo-keying sequence of input in interface for password input, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determines use
The real password sequence of family input, it is achieved that when user inputs password in public, merely enters pseudo-keying sequence, and terminal unit is again
According to this puppet keying sequence and password mapping ruler, this puppet keying sequence is converted to real password sequence, to complete follow-up behaviour
Make, the pseudo-keying sequence that other people can peep, and real password sequence only just can obtain after conversion, thus,
When user inputs password, stop other people and peeped the probability of password, improve user and input the safety of password, and then,
Improve the safety of unblock.
Fig. 2 is the flow chart according to a kind of unlocking method shown in another exemplary embodiment.The solution that the present embodiment provides
Step before step 101 and the step before step 102, on the basis of embodiment illustrated in fig. 1, are carried out in detail by locking method
Explanation.As in figure 2 it is shown, the unlocking method that the present embodiment provides comprises the following steps:
In step 201, many groups of password mapping rulers to be verified of user's input are received.
Terminal unit can receive many groups of password mapping rulers to be verified of user's input.Fig. 3 is a kind of user interface
Display schematic diagram.As it is shown on figure 3, user can input password mapping ruler to be verified on the user interface.Fig. 3 shows use
Family can input many groups password mapping ruler to be verified.Wherein one group inputted after, click completes, and can input next group and treat
Verification password mapping ruler.
In step 202., many groups password mapping ruler to be verified is verified, and the password to be verified passed through will be verified
Mapping ruler is defined as password mapping ruler.
In actual applications, may there is the carelessness due to user, the password mapping ruler of input does not meets 1 a pair
Answer principle.At this time, it may be necessary to many groups password mapping ruler to be verified is verified.
A kind of possible method of calibration can be to judge that whether whole user may letter, symbol and the numeral of input be
Whole can as the letter of password, symbol and digital and different, and, judge the word of its actual correspondence respectively simultaneously
Female, symbol and numeral be whole can be as the letter of password, symbol and digital and different.Shown in i.e., in step 103
Password mapping ruler in, it is judged that the arrow left side be whether all can be as the complete or collected works of the letter of password, symbol and numeral and each
Differ, it is judged that on the right of arrow be whether all can be as the complete or collected works of the letter of password, symbol and numeral and different.Only
On the arrow left side be all can as the complete or collected works of the letter of password, symbol and numeral and different, and, be institute on the right of arrow
Have can as the complete or collected works of the letter of password, symbol and numeral and different time, determine that this password mapping ruler to be verified is school
Test the password mapping ruler to be verified passed through.The password mapping ruler to be verified that verification is passed through is defined as the password pre-set
Mapping ruler.
In a kind of possible implementation, the type of the password of user's input, example can also be received in step 201
As, user selects the type of password can be pure digi-tal password, or, it is also possible to the password mixed with letter for numeral, or,
Can also be numeral, symbol and the alphabetical password mixed.
When the password type of user's input is pure digi-tal password, the password mapping ruler of user's input can be that mathematics is public
Formula.But in such cases, method of calibration is similar with above-mentioned method of calibration principle, and here is omitted.
It should be noted that user have input organize password mapping ruler to be verified after, if verification pass through treat school
Testing password mapping ruler is many groups, and the most final password mapping ruler is also many groups.
In step 203, after the password mapping ruler to be verified that verification is passed through is defined as password mapping ruler, to close
Code mapping ruler is encrypted, and generates the password mapping ruler after encryption, and stores the password mapping ruler after encryption.
After determining password mapping ruler, password mapping ruler can be encrypted by terminal unit, generates encryption
After password mapping ruler, to improve further the safety of Password Input.Password after encryption can be mapped by terminal unit
Rule is stored in locally stored space.
Terminal unit can use data encryption standards (Data Encryption Standard;It is called for short: DES) to password
Mapping ruler is encrypted, and generates the password mapping ruler after encryption.Or, terminal unit can also use Advanced Encryption Standard
(Advanced Encryption Standard;Be called for short: AES) password mapping ruler is encrypted, generate encryption after close
Code mapping ruler.
When there being multiple cipher mapping ruler, each group of password mapping ruler is all encrypted, generate encryption after close
Code mapping ruler, and store.Now, this multiple cipher mapping ruler makes a distinction by different marks.
In step 204, interface for password input is shown on a display screen.
The process that realizes of step 204 and know-why are similar with step 101, and here is omitted.
Fig. 4 is the display schematic diagram of another kind of user interface.As shown in Figure 4, on the user interface, user can input
Password.
In step 205, the pseudo-keying sequence that user inputs in interface for password input is received.
The process that realizes of step 205 and know-why are similar with step 102, and here is omitted.
It should be noted that when password mapping ruler is organized more, now, also included before step 205: receive user
The mark of the password mapping ruler of input.Such as, what reception user inputted is designated the password mapping ruler of 1.
In step 206, the password mapping ruler after encryption is decrypted, generates password mapping ruler.
Password mapping ruler after encryption can be decrypted, to generate password mapping ruler by terminal unit.Deciphering is
The inverse process of the ciphering process shown in step 203.
During the execution of step 206, terminal unit can will be stored in the password after the encryption in locally stored space
Mapping ruler reads in internal memory, and is decrypted, in case follow-up use, performs effect with improve the unlocking method of the present embodiment
Rate.
It should be noted that there is no sequential relationship between step 206 and step 205.
In step 207, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determine that user inputs the closeest
Code sequence.
Wherein, password mapping ruler is for indicating the mapping relations one by one between pseudo-keying sequence and real password sequence.
Step 207 and step 103 to realize process similar with know-why, here is omitted.
Correspondingly, also have input the mark of password mapping ruler before user is in step 205, now, step 207 is concrete
For:
According to password mapping ruler corresponding with mark in pseudo-keying sequence and the password mapping ruler that pre-sets, determine
The real password sequence of user's input.
The unlocking method that the present embodiment provides, by receiving many groups of password mapping rulers to be verified of user's input, to many
Organize password mapping ruler to be verified to verify, and the password mapping ruler to be verified that verification is passed through is defined as password mapping rule
Then, password mapping ruler is encrypted, generates the password mapping ruler after encryption, and the password mapping ruler after encryption is entered
Row storage, shows interface for password input on a display screen, receives the pseudo-keying sequence that user inputs in interface for password input, right
Password mapping ruler after encryption is decrypted, and generates password mapping ruler, according to pseudo-keying sequence and the password that pre-sets
Mapping ruler, determines the real password sequence that user inputs, it is achieved that many groups of passwords to be verified of user's input can be mapped rule
Then verify, only the password mapping ruler to be verified that verification is passed through is encrypted, stores, according to pseudo-keying sequence and pre-
The password mapping ruler first arranged, before determining the real password sequence that user inputs, first enters the password mapping ruler after encryption
Row deciphering, then determine real password sequence, user can be avoided to input the password mapping ruler that can not pass through verification, thus, improve
The stability of Password Input, and, password mapping ruler be encrypted again, improve the safety of password mapping ruler,
And then, further increase the safety of Password Input.
Following for disclosure device embodiment, may be used for performing method of disclosure embodiment.Real for disclosure device
Execute the details not disclosed in example, refer to method of disclosure embodiment.
Fig. 5 is the block diagram according to a kind of tripper shown in an exemplary embodiment.This tripper can be by soft
Part, hardware or both be implemented in combination with become the some or all of of the tripper that comprises display screen.As it is shown in figure 5, this
The tripper that embodiment provides includes: display module the 51, first receiver module 52 and first determines module 53.Wherein,
With display module 51 and first, one receiver module 52 determines that module 53 is connected respectively.
Display module 51 is configured to show on a display screen interface for password input.
Tripper in the present embodiment can be terminal unit.
First receiver module 52 is configured to receive user by the interface for password input of display on display module 51
The pseudo-keying sequence of input.
First determines that module 53 is configured to according to the pseudo-keying sequence received by the first receiver module 52 and sets in advance
The password mapping ruler put, determines the real password sequence that described user inputs.
Wherein, described password mapping ruler is used for indicating between described pseudo-keying sequence and described real password sequence one by one
Mapping relations.
In another kind of concrete implementation mode, if pseudo-keying sequence and real password sequence are Serial No., then password
Mapping ruler can be: the pseudo-password position in pseudo-keying sequence is default number with the real password position sum in real password sequence
Value.For example, password mapping ruler may is that A+B=9.Wherein, A represents a pseudo-password position in pseudo-keying sequence, B
Represent a real password position in real password sequence.In this kind of implementation, password mapping ruler specifically: 0 → 9,1 → 8,
2 → 7 ..., 8 → 1,9 → 0.Terminal unit, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determines the closeest
During code sequence, each in real password sequence can be determined according to formula B=9-A.As an example it is assumed that pseudo-keying sequence
It is: 8421 that then real password sequence is: 1578.
In another concrete implementation mode, if pseudo-keying sequence and real password sequence are Serial No., then password
Mapping ruler can be: the pseudo-password position in pseudo-keying sequence and 10 sums deduct the difference of the real password position in real password sequence again
It is default numerical value to 10 remainder numbers.This means, (C+10-D) mod10=n.Wherein, a puppet during C represents pseudo-keying sequence is close
Code bit, B represents a real password position in real password sequence, and n is the integer more than or equal to 0 and less than or equal to 9.Mod represents C+
10-D is to 10 remainders.When n is 3, password mapping ruler specifically: 0 → 7,1 → 8,2 → 9,3 → 0,4 → 1,5 → 2,6 → 3,7
→ 4,8 → 5,9 → 6.Terminal unit, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determines real password sequence
Time, each in real password sequence can be determined according to formula (C+10-D) mod10=n.As an example it is assumed that pseudo-cipher component
Row are: 8421, then real password sequence is: 5198.It should be noted that the numeral in formula (C+10-D) mod10=n is 10,
It is to ensure that this password mapping ruler meets principle one to one.When for other numerals, when C is mapped to D, when C divides
Do not take between 0-9 digital time, it is impossible to realizing D is also between 0-9 and unduplicated numeral.
The tripper that disclosure embodiment provides, by arranging display module, is configured to show on a display screen close
Code inputting interface, the first receiver module, it is configured to receive the pseudo-keying sequence that inputs in interface for password input of user, first
Determine module, be configured to, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determine the real password that user inputs
Sequence, it is achieved that when user inputs password in public, merely enters pseudo-keying sequence, and tripper is further according to this puppet cipher component
Row and password mapping ruler, be converted to real password sequence by this puppet keying sequence, and to complete follow-up operation, other people can peep
Simply pseudo-keying sequence, and real password sequence only just can obtain after conversion, thus, when user inputs password,
Stop other people and peeped the probability of password, improve user and input the safety of password, and then, improve the safety of unblock
Property.
Fig. 6 is the block diagram according to a kind of tripper shown in another exemplary embodiment.As shown in Figure 6, the present embodiment
The tripper provided, on the basis of tripper shown in Fig. 5, also includes: the second receiver module 61, inspection module 62, second
Determine module 63, encrypting module 64, memory module 65 and deciphering module 66.Wherein, the second receiver module 61, correction verification module
62, second determines that module 63, encrypting module 64, memory module 65 are sequentially connected with display module 51, display module 51, first connects
Receive module 52, with first, deciphering module 66 determines that module 53 is sequentially connected with.
Second receiver module 61 is configured to receive many groups of password mapping rulers to be verified of user's input.
The many groups of password mapping rulers to be verified that correction verification module 62 is configured to being received by the second receiver module 61 enter
Row verification.
Second to determine that module 63 is configured to being verified the password mapping ruler to be verified passed through by inspection module 62 true
It is set to password mapping ruler.
Encrypting module 64 be configured to be defined as the password mapping ruler to be verified that passes through of verification password mapping ruler it
After, determine that the password mapping ruler that module 63 determines is encrypted to by second, generate the password mapping ruler after encryption.
Memory module 65 is configured to store the password mapping ruler after the encryption generated by encrypting module 64.
Deciphering module 66 is configured to be decrypted the password mapping ruler after the encryption generated by encrypting module 64,
Generate password mapping ruler.
The tripper that the present embodiment provides, by arranging the second receiver module, is configured to receive user's input many
Organizing password mapping ruler to be verified, correction verification module, be configured to verify many groups password mapping ruler to be verified, second is true
Cover half block, is configured to the password mapping ruler to be verified by verification is passed through and is defined as password mapping ruler, encrypting module, joined
It is set to password mapping ruler is encrypted, generates the password mapping ruler after encryption, memory module, after being configured to encryption
Password mapping ruler store, display module, be configured to show on a display screen interface for password input, first receives mould
Block, is configured to receive the pseudo-keying sequence that user inputs in interface for password input, deciphering module, after being configured to encryption
Password mapping ruler be decrypted, generate password mapping ruler, first determines module, be configured to according to pseudo-keying sequence and
The password mapping ruler pre-set, determines the real password sequence that user inputs, it is achieved that can treat many groups of user's input
Verification password mapping ruler verifies, and only the password mapping ruler to be verified that verification is passed through is encrypted, is stored, in basis
Pseudo-keying sequence and the password mapping ruler pre-set, before determining the real password sequence that user inputs, first to encryption after
Password mapping ruler is decrypted, then determines real password sequence, and user can be avoided to input can not be mapped by the password of verification
Rule, thus, improve the stability of Password Input, and, password mapping ruler is encrypted again, improves password and map
The safety of rule, and then, further increase the safety of Password Input.
Fig. 7 is the block diagram according to a kind of tripper shown in another exemplary embodiment.As it is shown in fig. 7, the present embodiment
The tripper provided, on the basis of tripper shown in Fig. 5, also includes: the 3rd receiver module 71.Dress is being unlocked shown in Fig. 5
On the basis of putting, first determines that module 53 comprises determining that submodule 531.Wherein, the 3rd receiver module 71 and the first receiver module
52 connect.
3rd receiver module 71 is configured to receive the mark of the password mapping ruler of user's input.
Determine submodule 531 be configured to according in pseudo-keying sequence and the password mapping ruler that pre-sets with by the
The password mapping ruler of the mark correspondence that three receiver modules 71 receive, determines the real password sequence that user inputs.
The tripper that disclosure embodiment provides, by arranging the 3rd receiver module, is configured to receive user's input
The mark of password mapping ruler, then first determines that module includes determining submodule, is configured to according to pseudo-keying sequence and pre-
Password mapping ruler corresponding with mark in the password mapping ruler first arranged, determines the real password sequence that user inputs, it is achieved
The mark of password mapping ruler can be selected by user, true with the password mapping ruler that user selectes further according to pseudo-keying sequence
Determining the real password sequence of user's input, user in different situations, can select the mark of different password mapping rulers, from
And, improve motility and the safety of Password Input.
The foregoing describing built-in function and the structure of tripper, Fig. 8 is according to shown in further example embodiment
Plant the block diagram of tripper.As shown in Figure 8, this tripper can be embodied as:
Processor 81;
For storing the memorizer 82 of processor 81 executable instruction;
Wherein, processor 81 is configured to:
Show interface for password input on a display screen;
Receive the pseudo-keying sequence that user inputs in interface for password input;
According to pseudo-keying sequence and the password mapping ruler that pre-sets, determine the real password sequence that user inputs;Wherein,
Password mapping ruler is for indicating the mapping relations one by one between pseudo-keying sequence and real password sequence.
Fig. 9 is the block diagram according to a kind of tripper shown in another exemplary embodiment.Such as, device 800 can be
Mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, armarium, body-building sets
Standby, personal digital assistant etc..
With reference to Fig. 9, device 800 can include following one or more assembly: processes assembly 802, memorizer 804, power supply
Assembly 806, multimedia groupware 808, audio-frequency assembly 810, input/output (I/O) interface 812, sensor cluster 814, Yi Jitong
Letter assembly 816.
Process assembly 802 and generally control the integrated operation of device 800, such as with display, call, data communication, phase
The operation that machine operation and record operation are associated.Process assembly 802 and can include that one or more processor 820 performs to refer to
Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or more module, just
Mutual in process between assembly 802 and other assemblies.Such as, process assembly 802 and can include multi-media module, many to facilitate
Media component 808 and process between assembly 802 mutual.
Memorizer 804 is configured to store various types of data to support the operation at device 800.Showing of these data
Example includes any application program for operation on device 800 or the instruction of method, contact data, telephone book data, disappears
Breath, picture, video etc..Memorizer 804 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable compile
Journey read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash
Device, disk or CD.
The various assemblies that power supply module 806 is device 800 provide electric power.Power supply module 806 can include power management system
System, one or more power supplys, and other generate, manage and distribute, with for device 800, the assembly that electric power is associated.
The screen of one output interface of offer that multimedia groupware 808 is included between described device 800 and user.One
In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Curtain may be implemented as touch screen, to receive the input signal from user.Touch panel includes one or more touch sensing
Device is with the gesture on sensing touch, slip and touch panel.Described touch sensor can not only sense touch or sliding action
Border, but also detect the persistent period relevant to described touch or slide and pressure.In certain embodiments, many matchmakers
Body assembly 808 includes a front-facing camera and/or post-positioned pick-up head.When device 800 is in operator scheme, such as screening-mode or
During video mode, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each front-facing camera and
Post-positioned pick-up head can be a fixing optical lens system or have focal length and optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.Such as, audio-frequency assembly 810 includes a Mike
Wind (MIC), when device 800 is in operator scheme, during such as call model, logging mode and speech recognition mode, mike is joined
It is set to receive external audio signal.The audio signal received can be further stored at memorizer 804 or via communication set
Part 816 sends.In certain embodiments, audio-frequency assembly 810 also includes a speaker, is used for exporting audio signal.
I/O interface 812 provides interface for processing between assembly 802 and peripheral interface module, above-mentioned peripheral interface module can
To be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, start button and lock
Set button.
Sensor cluster 814 includes one or more sensor, for providing the state of various aspects to comment for device 800
Estimate.Such as, what sensor cluster 814 can detect device 800 opens/closed mode, the relative localization of assembly, such as described
Assembly is display and the keypad of device 800, and sensor cluster 814 can also detect device 800 or 800 1 assemblies of device
Position change, the presence or absence that user contacts with device 800, device 800 orientation or acceleration/deceleration and device 800
Variations in temperature.Sensor cluster 814 can include proximity transducer, is configured to when not having any physical contact detect
The existence of neighbouring object.Sensor cluster 814 can also include optical sensor, such as CMOS or ccd image sensor, is used for becoming
Use as in application.In certain embodiments, this sensor cluster 814 can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 816 is configured to facilitate the communication of wired or wireless mode between device 800 and other equipment.Device
800 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.An exemplary enforcement
In example, communications component 816 receives the broadcast singal from external broadcasting management system or broadcast related information via broadcast channel.
In one exemplary embodiment, described communications component 816 also includes near-field communication (NFC) module, to promote junction service.Example
As, can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology,
Bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 800 can be by one or more application specific integrated circuits (ASIC), numeral letter
Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components realize, be used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction, example are additionally provided
As included the memorizer 804 of instruction, above-mentioned instruction can have been performed said method by the processor 820 of device 800.Such as,
Non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and light
Data storage device etc..
A kind of non-transitory computer-readable recording medium, when the instruction in storage medium is held by the processor of terminal unit
During row so that terminal unit is able to carry out a kind of unlocking method, and the method includes:
Show interface for password input on a display screen;
Receive the pseudo-keying sequence that user inputs in interface for password input;
According to pseudo-keying sequence and the password mapping ruler that pre-sets, determine the real password sequence that user inputs;Wherein,
Password mapping ruler is for indicating the mapping relations one by one between pseudo-keying sequence and real password sequence.
The method also includes:
Receive many groups of password mapping rulers to be verified of user's input;
Many groups password mapping ruler to be verified is verified, and the password mapping ruler to be verified that verification is passed through is determined
For password mapping ruler.
The method also includes:
After the password mapping ruler to be verified that verification is passed through is defined as password mapping ruler, password mapping ruler is entered
Row encryption, generates the password mapping ruler after encryption, and stores the password mapping ruler after encryption;
Correspondingly, according to pseudo-keying sequence and the password mapping ruler that pre-sets, the real password sequence that user inputs is determined
Before row, method also includes:
Password mapping ruler after encryption is decrypted, generates password mapping ruler.
If pseudo-keying sequence and real password sequence are Serial No., then password mapping ruler is: described pseudo-keying sequence
In pseudo-password position and described real password sequence in real password position sum be default numerical value.
If pseudo-keying sequence and real password sequence are Serial No., then password mapping ruler is: described pseudo-keying sequence
In pseudo-password position and 10 sums to deduct the difference of the real password position in described real password sequence again be default number to 10 remainder numbers
Value.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to its of the disclosure
Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modification, purposes or
Person's adaptations is followed the general principle of the disclosure and includes the undocumented common knowledge in the art of the disclosure
Or conventional techniques means.Description and embodiments is considered only as exemplary, and the true scope of the disclosure and spirit are by following
Claims are pointed out.
It should be appreciated that the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and
And various modifications and changes can carried out without departing from the scope.The scope of the present disclosure is only limited by appending claims
System.
Claims (11)
1. a unlocking method, it is characterised in that including:
Show interface for password input on a display screen;
Receive the pseudo-keying sequence that user inputs in described interface for password input;
According to described pseudo-keying sequence and the password mapping ruler that pre-sets, determine the real password sequence that described user inputs;
Wherein, described password mapping ruler is for indicating the mapping one by one between described pseudo-keying sequence and described real password sequence to close
System.
Method the most according to claim 1, it is characterised in that described method also includes:
Receive many groups of password mapping rulers to be verified of described user input;
The described password mapping ruler to be verified of many groups is verified, and the password mapping ruler to be verified that verification is passed through is determined
For described password mapping ruler.
Method the most according to claim 2, it is characterised in that described method also includes:
Described the password mapping ruler to be verified that passes through of verification is defined as described password mapping ruler after, described password is reflected
Penetrate rule to be encrypted, generate the password mapping ruler after described encryption, and the password mapping ruler after described encryption is carried out
Storage;
Correspondingly, described according to described pseudo-keying sequence and the password mapping ruler that pre-sets, determine what described user inputted
Before real password sequence, described method also includes:
Password mapping ruler after described encryption is decrypted, generates described password mapping ruler.
Method the most according to claim 1, it is characterised in that if described pseudo-keying sequence and described real password sequence are
Serial No., the most described password mapping ruler is: the pseudo-password position in described pseudo-keying sequence with in described real password sequence
Real password position sum is default numerical value.
Method the most according to claim 1, it is characterised in that if described pseudo-keying sequence and described real password sequence are
Serial No., the most described password mapping ruler is: the pseudo-password position in described pseudo-keying sequence and 10 sums deduct again described very
The difference of the real password position in keying sequence is default numerical value to 10 remainder numbers.
6. a tripper, it is characterised in that including:
Display module, is configured to show on a display screen interface for password input;
First receiver module, is configured to receive the pseudo-keying sequence that user inputs in described interface for password input;
First determines module, is configured to, according to described pseudo-keying sequence and the password mapping ruler that pre-sets, determine described
The real password sequence of user's input;Wherein, described password mapping ruler is used for indicating described pseudo-keying sequence and described real password
Mapping relations one by one between sequence.
Device the most according to claim 6, it is characterised in that described device also includes:
Second receiver module, is configured to receive many groups of password mapping rulers to be verified of described user input;
Correction verification module, is configured to verify the described password mapping ruler to be verified of many groups;
Second determines module, is configured to that the password mapping ruler to be verified that verification is passed through is defined as described password and maps rule
Then.
Device the most according to claim 7, it is characterised in that described device also includes:
Encrypting module, be configured to be defined as the password mapping ruler to be verified that passes through of verification described password mapping ruler it
After, described password mapping ruler is encrypted, generates the password mapping ruler after described encryption;
Memory module, is configured to store the password mapping ruler after described encryption;
Deciphering module, is configured to be decrypted the password mapping ruler after described encryption, generates described password mapping ruler.
Device the most according to claim 6, it is characterised in that if described pseudo-keying sequence and described real password sequence are
Serial No., the most described password mapping ruler is: the pseudo-password position in described pseudo-keying sequence with in described real password sequence
Real password position sum is default numerical value.
Device the most according to claim 6, it is characterised in that if described pseudo-keying sequence and described real password sequence are equal
For Serial No., the most described password mapping ruler is: the pseudo-password position in described pseudo-keying sequence deducts described with 10 sums again
The difference of the real password position in real password sequence is default numerical value to 10 remainder numbers.
11. 1 kinds of trippers, it is characterised in that including:
Processor;
For storing the memorizer of described processor executable;
Wherein, described processor is configured to:
Show interface for password input on a display screen;
Receive the pseudo-keying sequence that user inputs in described interface for password input;
According to described pseudo-keying sequence and the password mapping ruler that pre-sets, determine the real password sequence that described user inputs;
Wherein, described password mapping ruler is for indicating the mapping one by one between described pseudo-keying sequence and described real password sequence to close
System.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610462832.4A CN106127062A (en) | 2016-06-23 | 2016-06-23 | unlocking method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610462832.4A CN106127062A (en) | 2016-06-23 | 2016-06-23 | unlocking method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106127062A true CN106127062A (en) | 2016-11-16 |
Family
ID=57269383
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610462832.4A Pending CN106127062A (en) | 2016-06-23 | 2016-06-23 | unlocking method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106127062A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453802A (en) * | 2016-11-30 | 2017-02-22 | 努比亚技术有限公司 | Cipher verification method and device, and terminal |
CN106650397A (en) * | 2016-12-28 | 2017-05-10 | 深圳天珑无线科技有限公司 | Password generation method, device and terminal based on pattern lock |
CN109544149A (en) * | 2018-09-28 | 2019-03-29 | 珠海横琴现联盛科技发展有限公司 | Payment information method for anti-counterfeit based on optical character identification |
CN110084009A (en) * | 2019-04-22 | 2019-08-02 | 惠州Tcl移动通信有限公司 | Digital unlocking method, device, storage medium and mobile terminal |
CN111949957A (en) * | 2020-08-11 | 2020-11-17 | 深圳传音控股股份有限公司 | Privacy protection method, device and storage medium |
CN112733106A (en) * | 2021-01-22 | 2021-04-30 | 珠海格力电器股份有限公司 | Screen unlocking method and device, storage medium and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101454786A (en) * | 2006-03-28 | 2009-06-10 | Hsbc私标公司 | User selectable functionality facilitator |
CN201577098U (en) * | 2009-09-28 | 2010-09-08 | 北京深思洛克软件技术股份有限公司 | Information security verification equipment |
CN102117393A (en) * | 2011-01-04 | 2011-07-06 | 惠州Tcl移动通信有限公司 | Mobile terminal and password input method thereof |
EP2584490A1 (en) * | 2011-10-21 | 2013-04-24 | Research In Motion Limited | Displaying private information using alternate frame sequencing |
-
2016
- 2016-06-23 CN CN201610462832.4A patent/CN106127062A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101454786A (en) * | 2006-03-28 | 2009-06-10 | Hsbc私标公司 | User selectable functionality facilitator |
CN201577098U (en) * | 2009-09-28 | 2010-09-08 | 北京深思洛克软件技术股份有限公司 | Information security verification equipment |
CN102117393A (en) * | 2011-01-04 | 2011-07-06 | 惠州Tcl移动通信有限公司 | Mobile terminal and password input method thereof |
EP2584490A1 (en) * | 2011-10-21 | 2013-04-24 | Research In Motion Limited | Displaying private information using alternate frame sequencing |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453802A (en) * | 2016-11-30 | 2017-02-22 | 努比亚技术有限公司 | Cipher verification method and device, and terminal |
CN106650397A (en) * | 2016-12-28 | 2017-05-10 | 深圳天珑无线科技有限公司 | Password generation method, device and terminal based on pattern lock |
CN106650397B (en) * | 2016-12-28 | 2019-12-13 | 深圳市忆捷创新科技有限公司 | password generation method and device based on pattern lock and terminal |
CN109544149A (en) * | 2018-09-28 | 2019-03-29 | 珠海横琴现联盛科技发展有限公司 | Payment information method for anti-counterfeit based on optical character identification |
CN110084009A (en) * | 2019-04-22 | 2019-08-02 | 惠州Tcl移动通信有限公司 | Digital unlocking method, device, storage medium and mobile terminal |
CN111949957A (en) * | 2020-08-11 | 2020-11-17 | 深圳传音控股股份有限公司 | Privacy protection method, device and storage medium |
CN112733106A (en) * | 2021-01-22 | 2021-04-30 | 珠海格力电器股份有限公司 | Screen unlocking method and device, storage medium and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104219058B (en) | Authentication, identification authorization method and device | |
CN103916233B (en) | A kind of information ciphering method and device | |
CN106127062A (en) | unlocking method and device | |
CN104852911B (en) | Safe verification method, apparatus and system | |
CN104283876A (en) | Operation authorization method and device | |
CN104391870B (en) | Logistics information acquisition methods and device | |
CN104573550A (en) | Method and device for protecting data | |
CN104093119B (en) | unlocking method and device | |
CN106097494A (en) | The method for unlocking of smart lock and device | |
CN104933351A (en) | Information security processing method and information security processing device | |
CN106453052A (en) | Message interaction method and apparatus thereof | |
CN104376248A (en) | Method and device for carrying out user authentication on password input interface | |
CN104318177A (en) | Protection method and protection device for data of terminal equipment | |
CN104468581B (en) | The method and device of login application program | |
CN104331228A (en) | Screen locking method and device | |
CN106296170A (en) | The method of Quick Response Code payment, Apparatus and system | |
CN106060098A (en) | Processing method, processing device and processing system for verification codes | |
CN106778225A (en) | The method and apparatus for processing password | |
CN106126986A (en) | Lock unlocking processing method and the device of data partition | |
CN106535190A (en) | Network connection method and apparatus | |
CN106789070A (en) | The decryption method of data, device and terminal | |
CN106471513A (en) | Authority control method and device | |
CN105046127A (en) | Encryption and decryption method and apparatus | |
CN106791088B (en) | Method and device for inputting application verification code | |
CN106534083B (en) | Brush machine Tool validation method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161116 |
|
RJ01 | Rejection of invention patent application after publication |