CN106127062A - unlocking method and device - Google Patents

unlocking method and device Download PDF

Info

Publication number
CN106127062A
CN106127062A CN201610462832.4A CN201610462832A CN106127062A CN 106127062 A CN106127062 A CN 106127062A CN 201610462832 A CN201610462832 A CN 201610462832A CN 106127062 A CN106127062 A CN 106127062A
Authority
CN
China
Prior art keywords
password
sequence
mapping ruler
pseudo
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610462832.4A
Other languages
Chinese (zh)
Inventor
乜聚科
刘立伟
王智勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610462832.4A priority Critical patent/CN106127062A/en
Publication of CN106127062A publication Critical patent/CN106127062A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The disclosure is directed to a kind of unlocking method and device.The method includes: show interface for password input on a display screen, receive the pseudo-keying sequence that user inputs in interface for password input, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determine the real password sequence that user inputs, when achieving that user inputs password in public, merely enter pseudo-keying sequence, terminal unit is further according to this puppet keying sequence and password mapping ruler, this puppet keying sequence is converted to real password sequence, to complete follow-up operation, the pseudo-keying sequence that other people can peep, and real password sequence only just can obtain after conversion, thus, when user inputs password, stop other people and peep the probability of password, improve user and input the safety of password, and then, improve the safety of unblock.

Description

Unlocking method and device
Technical field
It relates to computer technology, particularly relate to unlocking method and device.
Background technology
Along with the development of communication technology, the terminal unit such as mobile phone, panel computer is widely applied.User is using eventually Needing the scene inputting password to get more and more during end equipment, such as, when logging in Mobile banking, input password, uses mobile phone The mobile payment services such as bank carry out input password during the payment of ecommerce.In in public, when user uses terminal to set For when carrying out Password Input, may be peeped by other people and obtain account and the password of user, thus, threaten the information peace of user Entirely.Therefore, improve safety issue when user uses terminal unit to carry out Password Input in public and become extremely important.
In correlation technique, when user uses terminal unit to carry out Password Input, terminal unit does not has corresponding method The password preventing user is peeped by other people.
Summary of the invention
For overcoming problem present in correlation technique, the disclosure provides a kind of unlocking method and device.
First aspect according to disclosure embodiment, it is provided that a kind of unlocking method, including:
Show interface for password input on a display screen;
Receive the pseudo-keying sequence that user inputs in described interface for password input;
According to described pseudo-keying sequence and the password mapping ruler that pre-sets, determine the real password sequence that described user inputs Row;Wherein, described password mapping ruler is for indicating the mapping one by one between described pseudo-keying sequence and described real password sequence Relation.
In conjunction with first aspect, in the first possible implementation of first aspect, described method also includes:
Receive many groups of password mapping rulers to be verified of described user input;
The described password mapping ruler to be verified of many groups is verified, and the password mapping ruler to be verified passed through will be verified It is defined as described password mapping ruler.
In conjunction with the first possible implementation of first aspect, the implementation that the second in first aspect is possible In, described method also includes:
Described the password mapping ruler to be verified that passes through of verification is defined as described password mapping ruler after, to described close Code mapping ruler is encrypted, and generates the password mapping ruler after described encryption, and to the password mapping ruler after described encryption Store;
Correspondingly, described according to described pseudo-keying sequence and the password mapping ruler that pre-sets, determine that described user is defeated Before the real password sequence entered, described method also includes:
Password mapping ruler after described encryption is decrypted, generates described password mapping ruler.
In conjunction with first aspect, in the third possible implementation of first aspect, if described pseudo-keying sequence and institute Stating real password sequence and be Serial No., the most described password mapping ruler is: the pseudo-password position in described pseudo-keying sequence and institute The real password position sum stated in real password sequence is default numerical value.
In conjunction with first aspect, in the 4th kind of possible implementation of first aspect, if described pseudo-keying sequence and institute Stating real password sequence and be Serial No., the most described password mapping ruler is: the pseudo-password position and 10 in described pseudo-keying sequence It is default numerical value to 10 remainder numbers that sum deducts the difference of the real password position in described real password sequence again.
Second aspect according to disclosure embodiment, it is provided that a kind of tripper, including:
Display module, is configured to show on a display screen interface for password input;
First receiver module, is configured to receive the pseudo-keying sequence that user inputs in described interface for password input;
First determines module, is configured to, according to described pseudo-keying sequence and the password mapping ruler that pre-sets, determine The real password sequence of described user input;Wherein, described password mapping ruler be used for indicating described pseudo-keying sequence with described very Mapping relations one by one between keying sequence.
In conjunction with second aspect, in the first possible implementation of second aspect, described device also includes:
Second receiver module, is configured to receive many groups of password mapping rulers to be verified of described user input;
Correction verification module, is configured to verify the described password mapping ruler to be verified of many groups;
Second determines module, is configured to that the password mapping ruler to be verified that verification is passed through is defined as described password and maps Rule.
In conjunction with the first possible implementation of second aspect, the implementation that the second in second aspect is possible In, described device also includes:
Encrypting module, is configured to the password mapping ruler to be verified by verification is passed through and is defined as described password mapping ruler Afterwards, described password mapping ruler is encrypted, generates the password mapping ruler after described encryption;
Memory module, is configured to store the password mapping ruler after described encryption;
Deciphering module, is configured to be decrypted the password mapping ruler after described encryption, generates described password and maps Rule.
In conjunction with second aspect, in the third possible implementation of second aspect, if described pseudo-keying sequence and institute Stating real password sequence and be Serial No., the most described password mapping ruler is: the pseudo-password position in described pseudo-keying sequence and institute The real password position sum stated in real password sequence is default numerical value.
In conjunction with second aspect, in the 4th kind of possible implementation of second aspect, if described pseudo-keying sequence and institute Stating real password sequence and be Serial No., the most described password mapping ruler is: the pseudo-password position and 10 in described pseudo-keying sequence It is default numerical value to 10 remainder numbers that sum deducts the difference of the real password position in described real password sequence again.
The third aspect according to disclosure embodiment, it is provided that a kind of tripper, including:
Processor;
For storing the memorizer of described processor executable;
Wherein, described processor is configured to:
Show interface for password input on a display screen;
Receive the pseudo-keying sequence that user inputs in described interface for password input;
According to described pseudo-keying sequence and the password mapping ruler that pre-sets, determine the real password sequence that described user inputs Row;Wherein, described password mapping ruler is for indicating the mapping one by one between described pseudo-keying sequence and described real password sequence Relation.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect:
In one embodiment, by showing interface for password input on a display screen, receive user in interface for password input The pseudo-keying sequence of input, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determines the real password that user inputs Sequence, it is achieved that when user inputs password in public, merely enters pseudo-keying sequence, and terminal unit is further according to this puppet cipher component Row and password mapping ruler, be converted to real password sequence by this puppet keying sequence, and to complete follow-up operation, other people can peep Simply pseudo-keying sequence, and real password sequence only just can obtain after conversion, thus, when user inputs password, Stop other people and peeped the probability of password, improve user and input the safety of password, and then, improve the safety of unblock Property.
In another embodiment, by receiving many groups of password mapping rulers to be verified of user's input, to be verified to many groups Password mapping ruler verifies, and the password mapping ruler to be verified that verification is passed through is defined as password mapping ruler, to close Code mapping ruler is encrypted, and generates the password mapping ruler after encryption, and stores the password mapping ruler after encryption, Show interface for password input on a display screen, receive the pseudo-keying sequence that user inputs in interface for password input, after encryption Password mapping ruler be decrypted, generate password mapping ruler, map rule according to pseudo-keying sequence and the password that pre-sets Then, the real password sequence that user inputs is determined, it is achieved that many groups of password mapping rulers to be verified of user's input can be carried out Verification, is only encrypted the password mapping ruler to be verified that verification is passed through, stores, according to pseudo-keying sequence and pre-set Password mapping ruler, before determining the real password sequence that user inputs, first to encryption after password mapping ruler be decrypted, Determine real password sequence again, user can be avoided to input the password mapping ruler that can not pass through verification, thus, improve password defeated The stability entered, and, password mapping ruler is encrypted again, improves the safety of password mapping ruler, and then, enter one Step improves the safety of Password Input.
It should be appreciated that it is only exemplary and explanatory, not that above general description and details hereinafter describe The disclosure can be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the disclosure Example, and for explaining the principle of the disclosure together with description.
Fig. 1 is the flow chart according to a kind of unlocking method shown in an exemplary embodiment;
Fig. 2 is the flow chart according to a kind of unlocking method shown in another exemplary embodiment;
Fig. 3 is the display schematic diagram of a kind of user interface;
Fig. 4 is the display schematic diagram of another kind of user interface;
Fig. 5 is the block diagram according to a kind of tripper shown in an exemplary embodiment;
Fig. 6 is the block diagram according to a kind of tripper shown in another exemplary embodiment;
Fig. 7 is the block diagram according to a kind of tripper shown in another exemplary embodiment;
Fig. 8 is the block diagram according to a kind of tripper shown in further example embodiment;
Fig. 9 is the block diagram according to a kind of tripper shown in another exemplary embodiment.
By above-mentioned accompanying drawing, it has been shown that the embodiment that the disclosure is clear and definite, hereinafter will be described in more detail.These accompanying drawings With word, the scope being not intended to be limited disclosure design by any mode is described, but by with reference to specific embodiment being Those skilled in the art illustrate the concept of the disclosure.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Explained below relates to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they are only with the most appended The example of the apparatus and method that some aspects that described in detail in claims, the disclosure are consistent.
Fig. 1 is the flow chart according to a kind of unlocking method shown in an exemplary embodiment.As it is shown in figure 1, the disclosure is real The unlocking method that executing example provides comprises the following steps:
In a step 101, interface for password input is shown on a display screen.
The unlocking method that disclosure embodiment provides can be performed by terminal unit.Terminal unit can be handheld device, Mobile unit, wearable device, calculating equipment, and various forms of subscriber equipment (User Equipment;It is called for short: UE), Mobile station (Mobile Station;MS) and terminal (terminal) etc. it is called for short:.The unlocking method tool that disclosure embodiment provides In the scene of the real password sequence that body inputs for determining user according to the pseudo-keying sequence of user's input.
In one implementation, terminal unit can receive user input Password Input enabled instruction after, Display screen display interface for password input.Such as, " input password " option in the user interface of terminal unit is carried out by user Choose operation.In another kind of implementation, terminal unit can start at the input password receiving application program transmission and refer to After order, show interface for password input on a display screen.Such as, Mobile banking's program is receiving the transfer request of user's input After, needing again password to be verified, then Mobile banking's program can send input password enabled instruction to terminal unit.
It should be noted that in the scene that display screen is touch screen, interface for password input can include Password Input hurdle And cipher inputting keyboard.Cipher inputting keyboard can be the input keyboard that terminal unit system carries, it is also possible to be third party's journey The input keyboard that sequence provides.Optionally, third party's program can be input method procedure.It not the scene of touch screen at display screen In, interface for password input can only include Password Input hurdle.
In a step 102, the pseudo-keying sequence that user inputs in interface for password input is received.
Pseudo-keying sequence in disclosure embodiment refers to the cipher component that user directly inputs in interface for password input Row.For example, user have input sequence 85369 by the cipher inputting keyboard in interface for password input, and puppet the most now is close Code sequence is exactly 85369.When user carries out Password Input in public, puppet that user inputs that what other people can peep is i.e. Keying sequence.
In one implementation, user can be by the pseudo-keying sequence of touch screen input.Terminal unit receives user and leads to Cross the pseudo-keying sequence of touch screen input.
In another kind of implementation, user can be by the pseudo-keying sequence of physical button input.
In another implementation, user can input voice puppet keying sequence by mike.Terminal unit passes through Mike receives the voice puppet keying sequence of user's input, and identifies pseudo-keying sequence by speech recognition technology.
In step 103, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determine that user inputs the closeest Code sequence.
Wherein, password mapping ruler is for indicating the mapping relations one by one between pseudo-keying sequence and real password sequence.
Password mapping ruler is that user pre-sets.When user cipher includes letter, symbol and numeral, password maps Rule can be letter, symbol and digital and its most corresponding actual letter, symbol sum that whole users may input Mapping relations one by one between word.Real password sequence is the keying sequence that user actually enters, that is, can be used for successfully carrying out The correct keying sequence of the operations such as follow-up such as mobile payment, account login.
Each in pseudo-keying sequence is pseudo-password position.Each in real password sequence is real password position.Password reflects Penetrating the mapping relations one by one between the rule pseudo-keying sequence of instruction and real password sequence, mean in pseudo-keying sequence is different Pseudo-password position one_to_one corresponding to real password position different in real password sequence.That is, in password mapping ruler, it is impossible to many The individual pseudo-password position differed corresponds to same real password position, can not correspond to multiple real password in same pseudo-password position Position.
In a kind of concrete implementation mode, password mapping ruler may is that a be mapped to b (below with " → " represent and " reflect It is mapped to "), b → c, c → d, d → e ..., y → z, z → a, →.. → #, # →, 0 → 1,1 → 2,2 → 3 ..., 8 → 9, 9→0.Wherein, the arrow left side represents letter, symbol and the numeral that whole users may input, and represents that it is actual on the right of arrow The most corresponding letter, symbol and numeral.When using this kind of password mapping ruler, when terminal unit receives user at password When on inputting interface, the pseudo-keying sequence of input is 5968hgm@, then can be true according to this puppet keying sequence and password mapping ruler Determining real password sequence is 6079ihn..It is understood that in this kind of implementation, alphabetical, permissible between symbol and numeral Mutually mapping, such as, password mapping ruler may is that a part for letter is mapped to numeral, and another part of letter is mapped to Symbol, another part mapping of letter to letter, a part for numeral is mapped to numeral, and another part of numeral is mapped to symbol Number, symbol is mapped to letter.
Password mapping ruler can be stored by terminal unit in the form of a list, it needs to be determined that real password sequence Time, both can directly determine the real password sequence corresponding with this puppet keying sequence by inquiring about this list.
In another kind of concrete implementation mode, if pseudo-keying sequence and real password sequence are Serial No., then password Mapping ruler can be: the pseudo-password position in pseudo-keying sequence is default number with the real password position sum in real password sequence Value.For example, password mapping ruler may is that A+B=9.Wherein, A represents a pseudo-password position in pseudo-keying sequence, B Represent a real password position in real password sequence.In this kind of implementation, password mapping ruler specifically: 0 → 9,1 → 8, 2 → 7 ..., 8 → 1,9 → 0.Terminal unit, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determines the closeest During code sequence, each in real password sequence can be determined according to formula B=9-A.As an example it is assumed that pseudo-keying sequence It is: 8421 that then real password sequence is: 1578.
In another concrete implementation mode, if pseudo-keying sequence and real password sequence are Serial No., then password Mapping ruler can be: the pseudo-password position in pseudo-keying sequence and 10 sums deduct the difference of the real password position in real password sequence again It is default numerical value to 10 remainder numbers.This means, (C+10-D) mod10=n.Wherein, a puppet during C represents pseudo-keying sequence is close Code bit, D represents a real password position in real password sequence, and n is the integer more than or equal to 0 and less than or equal to 9.Mod represents C+ 10-D is to 10 remainders.When n is 3, password mapping ruler specifically: 0 → 7,1 → 8,2 → 9,3 → 0,4 → 1,5 → 2,6 → 3,7 → 4,8 → 5,9 → 6.Terminal unit, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determines real password sequence Time, each in real password sequence can be determined according to formula (C+10-D) mod10=n.As an example it is assumed that pseudo-cipher component Row are: 8421, then real password sequence is: 5198.It should be noted that the numeral in formula (C+10-D) mod10=n is 10, It is to ensure that this password mapping ruler meets principle one to one.When for other numerals, when C is mapped to D, when C divides Do not take between 0-9 digital time, it is impossible to realizing D is also between 0-9 and unduplicated numeral.
After determining real password sequence, terminal unit can complete follow-up such as moving according to this real password sequence Payment, account login etc. operate.
The unlocking method that disclosure embodiment provides, by showing interface for password input on a display screen, receives user and exists The pseudo-keying sequence of input in interface for password input, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determines use The real password sequence of family input, it is achieved that when user inputs password in public, merely enters pseudo-keying sequence, and terminal unit is again According to this puppet keying sequence and password mapping ruler, this puppet keying sequence is converted to real password sequence, to complete follow-up behaviour Make, the pseudo-keying sequence that other people can peep, and real password sequence only just can obtain after conversion, thus, When user inputs password, stop other people and peeped the probability of password, improve user and input the safety of password, and then, Improve the safety of unblock.
Fig. 2 is the flow chart according to a kind of unlocking method shown in another exemplary embodiment.The solution that the present embodiment provides Step before step 101 and the step before step 102, on the basis of embodiment illustrated in fig. 1, are carried out in detail by locking method Explanation.As in figure 2 it is shown, the unlocking method that the present embodiment provides comprises the following steps:
In step 201, many groups of password mapping rulers to be verified of user's input are received.
Terminal unit can receive many groups of password mapping rulers to be verified of user's input.Fig. 3 is a kind of user interface Display schematic diagram.As it is shown on figure 3, user can input password mapping ruler to be verified on the user interface.Fig. 3 shows use Family can input many groups password mapping ruler to be verified.Wherein one group inputted after, click completes, and can input next group and treat Verification password mapping ruler.
In step 202., many groups password mapping ruler to be verified is verified, and the password to be verified passed through will be verified Mapping ruler is defined as password mapping ruler.
In actual applications, may there is the carelessness due to user, the password mapping ruler of input does not meets 1 a pair Answer principle.At this time, it may be necessary to many groups password mapping ruler to be verified is verified.
A kind of possible method of calibration can be to judge that whether whole user may letter, symbol and the numeral of input be Whole can as the letter of password, symbol and digital and different, and, judge the word of its actual correspondence respectively simultaneously Female, symbol and numeral be whole can be as the letter of password, symbol and digital and different.Shown in i.e., in step 103 Password mapping ruler in, it is judged that the arrow left side be whether all can be as the complete or collected works of the letter of password, symbol and numeral and each Differ, it is judged that on the right of arrow be whether all can be as the complete or collected works of the letter of password, symbol and numeral and different.Only On the arrow left side be all can as the complete or collected works of the letter of password, symbol and numeral and different, and, be institute on the right of arrow Have can as the complete or collected works of the letter of password, symbol and numeral and different time, determine that this password mapping ruler to be verified is school Test the password mapping ruler to be verified passed through.The password mapping ruler to be verified that verification is passed through is defined as the password pre-set Mapping ruler.
In a kind of possible implementation, the type of the password of user's input, example can also be received in step 201 As, user selects the type of password can be pure digi-tal password, or, it is also possible to the password mixed with letter for numeral, or, Can also be numeral, symbol and the alphabetical password mixed.
When the password type of user's input is pure digi-tal password, the password mapping ruler of user's input can be that mathematics is public Formula.But in such cases, method of calibration is similar with above-mentioned method of calibration principle, and here is omitted.
It should be noted that user have input organize password mapping ruler to be verified after, if verification pass through treat school Testing password mapping ruler is many groups, and the most final password mapping ruler is also many groups.
In step 203, after the password mapping ruler to be verified that verification is passed through is defined as password mapping ruler, to close Code mapping ruler is encrypted, and generates the password mapping ruler after encryption, and stores the password mapping ruler after encryption.
After determining password mapping ruler, password mapping ruler can be encrypted by terminal unit, generates encryption After password mapping ruler, to improve further the safety of Password Input.Password after encryption can be mapped by terminal unit Rule is stored in locally stored space.
Terminal unit can use data encryption standards (Data Encryption Standard;It is called for short: DES) to password Mapping ruler is encrypted, and generates the password mapping ruler after encryption.Or, terminal unit can also use Advanced Encryption Standard (Advanced Encryption Standard;Be called for short: AES) password mapping ruler is encrypted, generate encryption after close Code mapping ruler.
When there being multiple cipher mapping ruler, each group of password mapping ruler is all encrypted, generate encryption after close Code mapping ruler, and store.Now, this multiple cipher mapping ruler makes a distinction by different marks.
In step 204, interface for password input is shown on a display screen.
The process that realizes of step 204 and know-why are similar with step 101, and here is omitted.
Fig. 4 is the display schematic diagram of another kind of user interface.As shown in Figure 4, on the user interface, user can input Password.
In step 205, the pseudo-keying sequence that user inputs in interface for password input is received.
The process that realizes of step 205 and know-why are similar with step 102, and here is omitted.
It should be noted that when password mapping ruler is organized more, now, also included before step 205: receive user The mark of the password mapping ruler of input.Such as, what reception user inputted is designated the password mapping ruler of 1.
In step 206, the password mapping ruler after encryption is decrypted, generates password mapping ruler.
Password mapping ruler after encryption can be decrypted, to generate password mapping ruler by terminal unit.Deciphering is The inverse process of the ciphering process shown in step 203.
During the execution of step 206, terminal unit can will be stored in the password after the encryption in locally stored space Mapping ruler reads in internal memory, and is decrypted, in case follow-up use, performs effect with improve the unlocking method of the present embodiment Rate.
It should be noted that there is no sequential relationship between step 206 and step 205.
In step 207, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determine that user inputs the closeest Code sequence.
Wherein, password mapping ruler is for indicating the mapping relations one by one between pseudo-keying sequence and real password sequence.
Step 207 and step 103 to realize process similar with know-why, here is omitted.
Correspondingly, also have input the mark of password mapping ruler before user is in step 205, now, step 207 is concrete For:
According to password mapping ruler corresponding with mark in pseudo-keying sequence and the password mapping ruler that pre-sets, determine The real password sequence of user's input.
The unlocking method that the present embodiment provides, by receiving many groups of password mapping rulers to be verified of user's input, to many Organize password mapping ruler to be verified to verify, and the password mapping ruler to be verified that verification is passed through is defined as password mapping rule Then, password mapping ruler is encrypted, generates the password mapping ruler after encryption, and the password mapping ruler after encryption is entered Row storage, shows interface for password input on a display screen, receives the pseudo-keying sequence that user inputs in interface for password input, right Password mapping ruler after encryption is decrypted, and generates password mapping ruler, according to pseudo-keying sequence and the password that pre-sets Mapping ruler, determines the real password sequence that user inputs, it is achieved that many groups of passwords to be verified of user's input can be mapped rule Then verify, only the password mapping ruler to be verified that verification is passed through is encrypted, stores, according to pseudo-keying sequence and pre- The password mapping ruler first arranged, before determining the real password sequence that user inputs, first enters the password mapping ruler after encryption Row deciphering, then determine real password sequence, user can be avoided to input the password mapping ruler that can not pass through verification, thus, improve The stability of Password Input, and, password mapping ruler be encrypted again, improve the safety of password mapping ruler, And then, further increase the safety of Password Input.
Following for disclosure device embodiment, may be used for performing method of disclosure embodiment.Real for disclosure device Execute the details not disclosed in example, refer to method of disclosure embodiment.
Fig. 5 is the block diagram according to a kind of tripper shown in an exemplary embodiment.This tripper can be by soft Part, hardware or both be implemented in combination with become the some or all of of the tripper that comprises display screen.As it is shown in figure 5, this The tripper that embodiment provides includes: display module the 51, first receiver module 52 and first determines module 53.Wherein, With display module 51 and first, one receiver module 52 determines that module 53 is connected respectively.
Display module 51 is configured to show on a display screen interface for password input.
Tripper in the present embodiment can be terminal unit.
First receiver module 52 is configured to receive user by the interface for password input of display on display module 51 The pseudo-keying sequence of input.
First determines that module 53 is configured to according to the pseudo-keying sequence received by the first receiver module 52 and sets in advance The password mapping ruler put, determines the real password sequence that described user inputs.
Wherein, described password mapping ruler is used for indicating between described pseudo-keying sequence and described real password sequence one by one Mapping relations.
In another kind of concrete implementation mode, if pseudo-keying sequence and real password sequence are Serial No., then password Mapping ruler can be: the pseudo-password position in pseudo-keying sequence is default number with the real password position sum in real password sequence Value.For example, password mapping ruler may is that A+B=9.Wherein, A represents a pseudo-password position in pseudo-keying sequence, B Represent a real password position in real password sequence.In this kind of implementation, password mapping ruler specifically: 0 → 9,1 → 8, 2 → 7 ..., 8 → 1,9 → 0.Terminal unit, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determines the closeest During code sequence, each in real password sequence can be determined according to formula B=9-A.As an example it is assumed that pseudo-keying sequence It is: 8421 that then real password sequence is: 1578.
In another concrete implementation mode, if pseudo-keying sequence and real password sequence are Serial No., then password Mapping ruler can be: the pseudo-password position in pseudo-keying sequence and 10 sums deduct the difference of the real password position in real password sequence again It is default numerical value to 10 remainder numbers.This means, (C+10-D) mod10=n.Wherein, a puppet during C represents pseudo-keying sequence is close Code bit, B represents a real password position in real password sequence, and n is the integer more than or equal to 0 and less than or equal to 9.Mod represents C+ 10-D is to 10 remainders.When n is 3, password mapping ruler specifically: 0 → 7,1 → 8,2 → 9,3 → 0,4 → 1,5 → 2,6 → 3,7 → 4,8 → 5,9 → 6.Terminal unit, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determines real password sequence Time, each in real password sequence can be determined according to formula (C+10-D) mod10=n.As an example it is assumed that pseudo-cipher component Row are: 8421, then real password sequence is: 5198.It should be noted that the numeral in formula (C+10-D) mod10=n is 10, It is to ensure that this password mapping ruler meets principle one to one.When for other numerals, when C is mapped to D, when C divides Do not take between 0-9 digital time, it is impossible to realizing D is also between 0-9 and unduplicated numeral.
The tripper that disclosure embodiment provides, by arranging display module, is configured to show on a display screen close Code inputting interface, the first receiver module, it is configured to receive the pseudo-keying sequence that inputs in interface for password input of user, first Determine module, be configured to, according to pseudo-keying sequence and the password mapping ruler that pre-sets, determine the real password that user inputs Sequence, it is achieved that when user inputs password in public, merely enters pseudo-keying sequence, and tripper is further according to this puppet cipher component Row and password mapping ruler, be converted to real password sequence by this puppet keying sequence, and to complete follow-up operation, other people can peep Simply pseudo-keying sequence, and real password sequence only just can obtain after conversion, thus, when user inputs password, Stop other people and peeped the probability of password, improve user and input the safety of password, and then, improve the safety of unblock Property.
Fig. 6 is the block diagram according to a kind of tripper shown in another exemplary embodiment.As shown in Figure 6, the present embodiment The tripper provided, on the basis of tripper shown in Fig. 5, also includes: the second receiver module 61, inspection module 62, second Determine module 63, encrypting module 64, memory module 65 and deciphering module 66.Wherein, the second receiver module 61, correction verification module 62, second determines that module 63, encrypting module 64, memory module 65 are sequentially connected with display module 51, display module 51, first connects Receive module 52, with first, deciphering module 66 determines that module 53 is sequentially connected with.
Second receiver module 61 is configured to receive many groups of password mapping rulers to be verified of user's input.
The many groups of password mapping rulers to be verified that correction verification module 62 is configured to being received by the second receiver module 61 enter Row verification.
Second to determine that module 63 is configured to being verified the password mapping ruler to be verified passed through by inspection module 62 true It is set to password mapping ruler.
Encrypting module 64 be configured to be defined as the password mapping ruler to be verified that passes through of verification password mapping ruler it After, determine that the password mapping ruler that module 63 determines is encrypted to by second, generate the password mapping ruler after encryption.
Memory module 65 is configured to store the password mapping ruler after the encryption generated by encrypting module 64.
Deciphering module 66 is configured to be decrypted the password mapping ruler after the encryption generated by encrypting module 64, Generate password mapping ruler.
The tripper that the present embodiment provides, by arranging the second receiver module, is configured to receive user's input many Organizing password mapping ruler to be verified, correction verification module, be configured to verify many groups password mapping ruler to be verified, second is true Cover half block, is configured to the password mapping ruler to be verified by verification is passed through and is defined as password mapping ruler, encrypting module, joined It is set to password mapping ruler is encrypted, generates the password mapping ruler after encryption, memory module, after being configured to encryption Password mapping ruler store, display module, be configured to show on a display screen interface for password input, first receives mould Block, is configured to receive the pseudo-keying sequence that user inputs in interface for password input, deciphering module, after being configured to encryption Password mapping ruler be decrypted, generate password mapping ruler, first determines module, be configured to according to pseudo-keying sequence and The password mapping ruler pre-set, determines the real password sequence that user inputs, it is achieved that can treat many groups of user's input Verification password mapping ruler verifies, and only the password mapping ruler to be verified that verification is passed through is encrypted, is stored, in basis Pseudo-keying sequence and the password mapping ruler pre-set, before determining the real password sequence that user inputs, first to encryption after Password mapping ruler is decrypted, then determines real password sequence, and user can be avoided to input can not be mapped by the password of verification Rule, thus, improve the stability of Password Input, and, password mapping ruler is encrypted again, improves password and map The safety of rule, and then, further increase the safety of Password Input.
Fig. 7 is the block diagram according to a kind of tripper shown in another exemplary embodiment.As it is shown in fig. 7, the present embodiment The tripper provided, on the basis of tripper shown in Fig. 5, also includes: the 3rd receiver module 71.Dress is being unlocked shown in Fig. 5 On the basis of putting, first determines that module 53 comprises determining that submodule 531.Wherein, the 3rd receiver module 71 and the first receiver module 52 connect.
3rd receiver module 71 is configured to receive the mark of the password mapping ruler of user's input.
Determine submodule 531 be configured to according in pseudo-keying sequence and the password mapping ruler that pre-sets with by the The password mapping ruler of the mark correspondence that three receiver modules 71 receive, determines the real password sequence that user inputs.
The tripper that disclosure embodiment provides, by arranging the 3rd receiver module, is configured to receive user's input The mark of password mapping ruler, then first determines that module includes determining submodule, is configured to according to pseudo-keying sequence and pre- Password mapping ruler corresponding with mark in the password mapping ruler first arranged, determines the real password sequence that user inputs, it is achieved The mark of password mapping ruler can be selected by user, true with the password mapping ruler that user selectes further according to pseudo-keying sequence Determining the real password sequence of user's input, user in different situations, can select the mark of different password mapping rulers, from And, improve motility and the safety of Password Input.
The foregoing describing built-in function and the structure of tripper, Fig. 8 is according to shown in further example embodiment Plant the block diagram of tripper.As shown in Figure 8, this tripper can be embodied as:
Processor 81;
For storing the memorizer 82 of processor 81 executable instruction;
Wherein, processor 81 is configured to:
Show interface for password input on a display screen;
Receive the pseudo-keying sequence that user inputs in interface for password input;
According to pseudo-keying sequence and the password mapping ruler that pre-sets, determine the real password sequence that user inputs;Wherein, Password mapping ruler is for indicating the mapping relations one by one between pseudo-keying sequence and real password sequence.
Fig. 9 is the block diagram according to a kind of tripper shown in another exemplary embodiment.Such as, device 800 can be Mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, armarium, body-building sets Standby, personal digital assistant etc..
With reference to Fig. 9, device 800 can include following one or more assembly: processes assembly 802, memorizer 804, power supply Assembly 806, multimedia groupware 808, audio-frequency assembly 810, input/output (I/O) interface 812, sensor cluster 814, Yi Jitong Letter assembly 816.
Process assembly 802 and generally control the integrated operation of device 800, such as with display, call, data communication, phase The operation that machine operation and record operation are associated.Process assembly 802 and can include that one or more processor 820 performs to refer to Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or more module, just Mutual in process between assembly 802 and other assemblies.Such as, process assembly 802 and can include multi-media module, many to facilitate Media component 808 and process between assembly 802 mutual.
Memorizer 804 is configured to store various types of data to support the operation at device 800.Showing of these data Example includes any application program for operation on device 800 or the instruction of method, contact data, telephone book data, disappears Breath, picture, video etc..Memorizer 804 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable compile Journey read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash Device, disk or CD.
The various assemblies that power supply module 806 is device 800 provide electric power.Power supply module 806 can include power management system System, one or more power supplys, and other generate, manage and distribute, with for device 800, the assembly that electric power is associated.
The screen of one output interface of offer that multimedia groupware 808 is included between described device 800 and user.One In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch screen, to receive the input signal from user.Touch panel includes one or more touch sensing Device is with the gesture on sensing touch, slip and touch panel.Described touch sensor can not only sense touch or sliding action Border, but also detect the persistent period relevant to described touch or slide and pressure.In certain embodiments, many matchmakers Body assembly 808 includes a front-facing camera and/or post-positioned pick-up head.When device 800 is in operator scheme, such as screening-mode or During video mode, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each front-facing camera and Post-positioned pick-up head can be a fixing optical lens system or have focal length and optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.Such as, audio-frequency assembly 810 includes a Mike Wind (MIC), when device 800 is in operator scheme, during such as call model, logging mode and speech recognition mode, mike is joined It is set to receive external audio signal.The audio signal received can be further stored at memorizer 804 or via communication set Part 816 sends.In certain embodiments, audio-frequency assembly 810 also includes a speaker, is used for exporting audio signal.
I/O interface 812 provides interface for processing between assembly 802 and peripheral interface module, above-mentioned peripheral interface module can To be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, start button and lock Set button.
Sensor cluster 814 includes one or more sensor, for providing the state of various aspects to comment for device 800 Estimate.Such as, what sensor cluster 814 can detect device 800 opens/closed mode, the relative localization of assembly, such as described Assembly is display and the keypad of device 800, and sensor cluster 814 can also detect device 800 or 800 1 assemblies of device Position change, the presence or absence that user contacts with device 800, device 800 orientation or acceleration/deceleration and device 800 Variations in temperature.Sensor cluster 814 can include proximity transducer, is configured to when not having any physical contact detect The existence of neighbouring object.Sensor cluster 814 can also include optical sensor, such as CMOS or ccd image sensor, is used for becoming Use as in application.In certain embodiments, this sensor cluster 814 can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 816 is configured to facilitate the communication of wired or wireless mode between device 800 and other equipment.Device 800 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.An exemplary enforcement In example, communications component 816 receives the broadcast singal from external broadcasting management system or broadcast related information via broadcast channel. In one exemplary embodiment, described communications component 816 also includes near-field communication (NFC) module, to promote junction service.Example As, can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, Bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 800 can be by one or more application specific integrated circuits (ASIC), numeral letter Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components realize, be used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction, example are additionally provided As included the memorizer 804 of instruction, above-mentioned instruction can have been performed said method by the processor 820 of device 800.Such as, Non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and light Data storage device etc..
A kind of non-transitory computer-readable recording medium, when the instruction in storage medium is held by the processor of terminal unit During row so that terminal unit is able to carry out a kind of unlocking method, and the method includes:
Show interface for password input on a display screen;
Receive the pseudo-keying sequence that user inputs in interface for password input;
According to pseudo-keying sequence and the password mapping ruler that pre-sets, determine the real password sequence that user inputs;Wherein, Password mapping ruler is for indicating the mapping relations one by one between pseudo-keying sequence and real password sequence.
The method also includes:
Receive many groups of password mapping rulers to be verified of user's input;
Many groups password mapping ruler to be verified is verified, and the password mapping ruler to be verified that verification is passed through is determined For password mapping ruler.
The method also includes:
After the password mapping ruler to be verified that verification is passed through is defined as password mapping ruler, password mapping ruler is entered Row encryption, generates the password mapping ruler after encryption, and stores the password mapping ruler after encryption;
Correspondingly, according to pseudo-keying sequence and the password mapping ruler that pre-sets, the real password sequence that user inputs is determined Before row, method also includes:
Password mapping ruler after encryption is decrypted, generates password mapping ruler.
If pseudo-keying sequence and real password sequence are Serial No., then password mapping ruler is: described pseudo-keying sequence In pseudo-password position and described real password sequence in real password position sum be default numerical value.
If pseudo-keying sequence and real password sequence are Serial No., then password mapping ruler is: described pseudo-keying sequence In pseudo-password position and 10 sums to deduct the difference of the real password position in described real password sequence again be default number to 10 remainder numbers Value.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to its of the disclosure Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modification, purposes or Person's adaptations is followed the general principle of the disclosure and includes the undocumented common knowledge in the art of the disclosure Or conventional techniques means.Description and embodiments is considered only as exemplary, and the true scope of the disclosure and spirit are by following Claims are pointed out.
It should be appreciated that the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and And various modifications and changes can carried out without departing from the scope.The scope of the present disclosure is only limited by appending claims System.

Claims (11)

1. a unlocking method, it is characterised in that including:
Show interface for password input on a display screen;
Receive the pseudo-keying sequence that user inputs in described interface for password input;
According to described pseudo-keying sequence and the password mapping ruler that pre-sets, determine the real password sequence that described user inputs; Wherein, described password mapping ruler is for indicating the mapping one by one between described pseudo-keying sequence and described real password sequence to close System.
Method the most according to claim 1, it is characterised in that described method also includes:
Receive many groups of password mapping rulers to be verified of described user input;
The described password mapping ruler to be verified of many groups is verified, and the password mapping ruler to be verified that verification is passed through is determined For described password mapping ruler.
Method the most according to claim 2, it is characterised in that described method also includes:
Described the password mapping ruler to be verified that passes through of verification is defined as described password mapping ruler after, described password is reflected Penetrate rule to be encrypted, generate the password mapping ruler after described encryption, and the password mapping ruler after described encryption is carried out Storage;
Correspondingly, described according to described pseudo-keying sequence and the password mapping ruler that pre-sets, determine what described user inputted Before real password sequence, described method also includes:
Password mapping ruler after described encryption is decrypted, generates described password mapping ruler.
Method the most according to claim 1, it is characterised in that if described pseudo-keying sequence and described real password sequence are Serial No., the most described password mapping ruler is: the pseudo-password position in described pseudo-keying sequence with in described real password sequence Real password position sum is default numerical value.
Method the most according to claim 1, it is characterised in that if described pseudo-keying sequence and described real password sequence are Serial No., the most described password mapping ruler is: the pseudo-password position in described pseudo-keying sequence and 10 sums deduct again described very The difference of the real password position in keying sequence is default numerical value to 10 remainder numbers.
6. a tripper, it is characterised in that including:
Display module, is configured to show on a display screen interface for password input;
First receiver module, is configured to receive the pseudo-keying sequence that user inputs in described interface for password input;
First determines module, is configured to, according to described pseudo-keying sequence and the password mapping ruler that pre-sets, determine described The real password sequence of user's input;Wherein, described password mapping ruler is used for indicating described pseudo-keying sequence and described real password Mapping relations one by one between sequence.
Device the most according to claim 6, it is characterised in that described device also includes:
Second receiver module, is configured to receive many groups of password mapping rulers to be verified of described user input;
Correction verification module, is configured to verify the described password mapping ruler to be verified of many groups;
Second determines module, is configured to that the password mapping ruler to be verified that verification is passed through is defined as described password and maps rule Then.
Device the most according to claim 7, it is characterised in that described device also includes:
Encrypting module, be configured to be defined as the password mapping ruler to be verified that passes through of verification described password mapping ruler it After, described password mapping ruler is encrypted, generates the password mapping ruler after described encryption;
Memory module, is configured to store the password mapping ruler after described encryption;
Deciphering module, is configured to be decrypted the password mapping ruler after described encryption, generates described password mapping ruler.
Device the most according to claim 6, it is characterised in that if described pseudo-keying sequence and described real password sequence are Serial No., the most described password mapping ruler is: the pseudo-password position in described pseudo-keying sequence with in described real password sequence Real password position sum is default numerical value.
Device the most according to claim 6, it is characterised in that if described pseudo-keying sequence and described real password sequence are equal For Serial No., the most described password mapping ruler is: the pseudo-password position in described pseudo-keying sequence deducts described with 10 sums again The difference of the real password position in real password sequence is default numerical value to 10 remainder numbers.
11. 1 kinds of trippers, it is characterised in that including:
Processor;
For storing the memorizer of described processor executable;
Wherein, described processor is configured to:
Show interface for password input on a display screen;
Receive the pseudo-keying sequence that user inputs in described interface for password input;
According to described pseudo-keying sequence and the password mapping ruler that pre-sets, determine the real password sequence that described user inputs; Wherein, described password mapping ruler is for indicating the mapping one by one between described pseudo-keying sequence and described real password sequence to close System.
CN201610462832.4A 2016-06-23 2016-06-23 unlocking method and device Pending CN106127062A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610462832.4A CN106127062A (en) 2016-06-23 2016-06-23 unlocking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610462832.4A CN106127062A (en) 2016-06-23 2016-06-23 unlocking method and device

Publications (1)

Publication Number Publication Date
CN106127062A true CN106127062A (en) 2016-11-16

Family

ID=57269383

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610462832.4A Pending CN106127062A (en) 2016-06-23 2016-06-23 unlocking method and device

Country Status (1)

Country Link
CN (1) CN106127062A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453802A (en) * 2016-11-30 2017-02-22 努比亚技术有限公司 Cipher verification method and device, and terminal
CN106650397A (en) * 2016-12-28 2017-05-10 深圳天珑无线科技有限公司 Password generation method, device and terminal based on pattern lock
CN109544149A (en) * 2018-09-28 2019-03-29 珠海横琴现联盛科技发展有限公司 Payment information method for anti-counterfeit based on optical character identification
CN110084009A (en) * 2019-04-22 2019-08-02 惠州Tcl移动通信有限公司 Digital unlocking method, device, storage medium and mobile terminal
CN111949957A (en) * 2020-08-11 2020-11-17 深圳传音控股股份有限公司 Privacy protection method, device and storage medium
CN112733106A (en) * 2021-01-22 2021-04-30 珠海格力电器股份有限公司 Screen unlocking method and device, storage medium and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101454786A (en) * 2006-03-28 2009-06-10 Hsbc私标公司 User selectable functionality facilitator
CN201577098U (en) * 2009-09-28 2010-09-08 北京深思洛克软件技术股份有限公司 Information security verification equipment
CN102117393A (en) * 2011-01-04 2011-07-06 惠州Tcl移动通信有限公司 Mobile terminal and password input method thereof
EP2584490A1 (en) * 2011-10-21 2013-04-24 Research In Motion Limited Displaying private information using alternate frame sequencing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101454786A (en) * 2006-03-28 2009-06-10 Hsbc私标公司 User selectable functionality facilitator
CN201577098U (en) * 2009-09-28 2010-09-08 北京深思洛克软件技术股份有限公司 Information security verification equipment
CN102117393A (en) * 2011-01-04 2011-07-06 惠州Tcl移动通信有限公司 Mobile terminal and password input method thereof
EP2584490A1 (en) * 2011-10-21 2013-04-24 Research In Motion Limited Displaying private information using alternate frame sequencing

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453802A (en) * 2016-11-30 2017-02-22 努比亚技术有限公司 Cipher verification method and device, and terminal
CN106650397A (en) * 2016-12-28 2017-05-10 深圳天珑无线科技有限公司 Password generation method, device and terminal based on pattern lock
CN106650397B (en) * 2016-12-28 2019-12-13 深圳市忆捷创新科技有限公司 password generation method and device based on pattern lock and terminal
CN109544149A (en) * 2018-09-28 2019-03-29 珠海横琴现联盛科技发展有限公司 Payment information method for anti-counterfeit based on optical character identification
CN110084009A (en) * 2019-04-22 2019-08-02 惠州Tcl移动通信有限公司 Digital unlocking method, device, storage medium and mobile terminal
CN111949957A (en) * 2020-08-11 2020-11-17 深圳传音控股股份有限公司 Privacy protection method, device and storage medium
CN112733106A (en) * 2021-01-22 2021-04-30 珠海格力电器股份有限公司 Screen unlocking method and device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
CN104219058B (en) Authentication, identification authorization method and device
CN103916233B (en) A kind of information ciphering method and device
CN106127062A (en) unlocking method and device
CN104852911B (en) Safe verification method, apparatus and system
CN104283876A (en) Operation authorization method and device
CN104391870B (en) Logistics information acquisition methods and device
CN104573550A (en) Method and device for protecting data
CN104093119B (en) unlocking method and device
CN106097494A (en) The method for unlocking of smart lock and device
CN104933351A (en) Information security processing method and information security processing device
CN106453052A (en) Message interaction method and apparatus thereof
CN104376248A (en) Method and device for carrying out user authentication on password input interface
CN104318177A (en) Protection method and protection device for data of terminal equipment
CN104468581B (en) The method and device of login application program
CN104331228A (en) Screen locking method and device
CN106296170A (en) The method of Quick Response Code payment, Apparatus and system
CN106060098A (en) Processing method, processing device and processing system for verification codes
CN106778225A (en) The method and apparatus for processing password
CN106126986A (en) Lock unlocking processing method and the device of data partition
CN106535190A (en) Network connection method and apparatus
CN106789070A (en) The decryption method of data, device and terminal
CN106471513A (en) Authority control method and device
CN105046127A (en) Encryption and decryption method and apparatus
CN106791088B (en) Method and device for inputting application verification code
CN106534083B (en) Brush machine Tool validation method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161116

RJ01 Rejection of invention patent application after publication