CN108108112A - A kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing - Google Patents

A kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing Download PDF

Info

Publication number
CN108108112A
CN108108112A CN201711347330.8A CN201711347330A CN108108112A CN 108108112 A CN108108112 A CN 108108112A CN 201711347330 A CN201711347330 A CN 201711347330A CN 108108112 A CN108108112 A CN 108108112A
Authority
CN
China
Prior art keywords
password
present bit
present
input
bit password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711347330.8A
Other languages
Chinese (zh)
Inventor
吴显锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201711347330.8A priority Critical patent/CN108108112A/en
Publication of CN108108112A publication Critical patent/CN108108112A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the invention discloses a kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing, for improving the accuracy of the Password Input of the small screen touch control device and efficiency.Present invention method includes:Obtain present bit password input by user;Whether correct detect present bit password;If so, the preset touch response region of the next bit password according to the first preset rules increase present bit password.

Description

A kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing
Technical field
The present invention relates to field of terminal technology more particularly to a kind of cipher-code input methods and device, computer installation, readable Storage medium.
Background technology
At present, when inputting password on the smaller electronic equipment in some touch areas, such as smartwatch is defeated due to password Entering touch area will not occur to change relatively, and the touch-control area of electronic equipment in itself is smaller, then is easy to cause password in electronics Input error in equipment, meanwhile, some limitation users input password number electronic equipment in, when user repeatedly input it is close After code mistake, it will cause electronic equipment that can not continue to unlock whithin a period of time and use, seriously affected user experience.
The content of the invention
An embodiment of the present invention provides a kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing, are used for Improve the accuracy and efficiency of the Password Input of the small screen touch control device.
In view of this, first aspect present invention provides a kind of cipher-code input method, applied to terminal, it may include:
Obtain present bit password input by user;
Whether correct detect present bit password;
If so, the preset touch response region of the next bit password according to the first preset rules increase present bit password.
Further, after whether detection present bit password is correct, method further includes:
When present bit password mistake, and when present bit password is the first password, then keep all positions after the first password close The preset touch response region of code is constant or, according to the default of all passwords after the first password of the second preset rules reduction Touch-control response region.
Further, before present bit password input by user is obtained, method further includes:
When present bit password is the first password, keep the preset touch response region of the first password constant or, according to the The preset touch response region of the first password of one preset rules increase.
Further, method further includes:
Present bit password is converted into invisible form;
Present bit password is shown according to invisible form.
Further, before present bit password is converted to invisible form, method further includes:
Authentication is carried out to user;
If authentication is not by triggering the step of present bit password is converted to invisible form.
Second aspect of the present invention provides a kind of cipher input, applied to terminal, it may include:
Acquiring unit, for obtaining present bit password input by user;
Whether detection unit is correct for detecting present bit password;
Increasing unit, for when current password is correct, then increasing the next of present bit password according to the first preset rules The preset touch response region of position password.
Further, device further includes:
First processing units for working as present bit password mistake, and when present bit password is the first password, then keep the first The preset touch response region of all passwords after password is constant or, after reducing the first password according to the second preset rules The preset touch response region of all passwords.
Further, device further includes:
Second processing unit, for when present bit password is the first password, keeping the preset touch response of the first password Region is constant or, increases the preset touch response region of the first password according to the first preset rules.
Further, device further includes:
Converting unit, for present bit password to be converted to invisible form;
Display unit, for showing present bit password according to invisible form.
Further, device further includes:
Authentication unit, for carrying out authentication to user;
Trigger element, for when authentication not by when, then triggering that converting unit is converted to present bit password can not See form.
Third aspect present invention provides a kind of computer installation, and computer installation includes processor, and processor is used to perform During the computer program stored in memory, following steps are realized:
Obtain present bit password input by user;
Whether correct detect present bit password;
If so, the preset touch response region of the next bit password according to the first preset rules increase present bit password.
Fourth aspect present invention provides a kind of computer readable storage medium, is stored thereon with computer program, computer When program is executed by processor, following steps are realized:
Obtain present bit password input by user;
Whether correct detect present bit password;
If so, the preset touch response region of the next bit password according to the first preset rules increase present bit password.
As can be seen from the above technical solutions, the embodiment of the present invention has the following advantages:
An embodiment of the present invention provides a kind of cipher-code input method, the correctness of the present bit password by detecting input, The preset touch response region of the next bit password of present bit password when present bit password is correct, can be increased, so as to significantly Increase the serious forgiveness of the next bit password for present bit password of knowing clearly, and improve the click accuracy of Password Input, also avoid Password input efficiency caused by due to multiple input error it is low.
Description of the drawings
Fig. 1 is cipher-code input method one embodiment schematic diagram in the embodiment of the present invention;
Fig. 2 is another embodiment schematic diagram of cipher-code input method in the embodiment of the present invention;
Fig. 3 is another embodiment schematic diagram of cipher-code input method in the embodiment of the present invention;
Fig. 4 is cipher input one embodiment schematic diagram in the embodiment of the present invention;
Fig. 5 is another embodiment schematic diagram of cipher input in the embodiment of the present invention;
Fig. 6 is another embodiment schematic diagram of cipher input in the embodiment of the present invention;
Fig. 7 is another embodiment schematic diagram of cipher input in the embodiment of the present invention;
Fig. 8 is another embodiment schematic diagram of cipher input in the embodiment of the present invention;
Fig. 9 is Computer device one embodiment schematic diagram of the embodiment of the present invention.
Specific embodiment
An embodiment of the present invention provides a kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing, are used for Improve the accuracy and efficiency of the Password Input of the small screen touch control device.
In order to which those skilled in the art is made to more fully understand the present invention program, below in conjunction in the embodiment of the present invention The technical solution in the embodiment of the present invention is clearly and completely described in attached drawing, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people Member's all other embodiments obtained without making creative work should all belong to the model that the present invention protects It encloses.
Term " first ", " second ", " the 3rd " in description and claims of this specification and above-mentioned attached drawing, " The (if present)s such as four " are the objects for distinguishing similar, without being used to describe specific order or precedence.It should manage The data that solution so uses can exchange in the appropriate case, so that the embodiments described herein can be with except illustrating herein Or the order beyond the content of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that Cover it is non-exclusive include, for example, containing the process of series of steps or unit, method, system, product or equipment need not limit In those steps or unit for clearly listing, but may include not list clearly or for these processes, method, production The intrinsic other steps of product or equipment or unit.
For ease of understanding, the idiographic flow in the embodiment of the present invention is described below, referring to Fig. 1, the present invention is real Applying cipher-code input method one embodiment in example includes:
101st, present bit password input by user is obtained;
In the present embodiment, terminal is equipped with the display screen of user's touch control operation, which can include but is not limited to mobile phone, puts down Plate, wearable device etc. are particularly suitable for when carrying out Password Input, the smaller terminal in touch area of Password Input.When with Family need to input password in terminal with carry out unlock, payment, into application program when operations when, can on the display screen of terminal To show Password Input region and the code keyboard for input, user, can by clicking on the respective symbols on code keyboard To realize input of the password in terminal.For user after mobile terminal inputs present bit password by touch control operation, terminal can as a result, To obtain the present bit password input by user, and the present bit password can be shown in Password Input region.
102nd, whether correct present bit password is detected, if so, step 103 is performed, if it is not, then performing step 104;
In the present embodiment, after obtaining present bit password input by user, it is whether correct that present bit password can be detected.
Specifically, user can pre-set preset password before password is inputted, so as to being needed in user in terminal Input password, when operations, can test password input by user to carry out unlock, payment, into application program Card.It, can be by present bit password and correspondence position in corresponding preset password after obtaining present bit password input by user as a result, Password compared, if present bit password is identical with the password of correspondence position in corresponding preset password, illustrate that user is defeated The present bit password entered is correct, conversely, then illustrating present bit password mistake input by user.
103rd, the preset touch response region of the next bit password of present bit password is increased according to the first preset rules;
In the present embodiment, if detection present bit password is correct, present bit password can be increased according to the first preset rules Next bit password preset touch region.
Specifically, if present bit password input by user is correct, illustrate the accuracy of all passwords input by user It is improved, terminal may can be supported to perform unlock, payment, into functions such as application programs, then in order to improve The accuracy of Password Input, to prevent the touch area due to Password Input it is smaller and caused by Password Input mistake, can increase The preset touch response region of the next bit password of present bit password, reach increase present bit password next bit password it is fault-tolerant The purpose of rate.
Assuming that the password of input is numerical ciphers, designed for the code keyboard of input for nine grids, if present bit password For 6 and correct, then the next bit password of present bit password, such as 9, preset touch region can be according to the first preset rules Increased accordingly, for example, can be centered on 9 original touch-control response region to one circle of outside increase, with increase 9 Original touch-control response region, for another example can toward 9 original touch-control response region to the right or to the left its broadening original touch-control response area Domain can specifically set the first preset rules according to actual needs, make so that the preset touch region after increase can meet With needs, do not limit herein.Wherein, which can be the gap between 9 and other numbers.
It should be noted that in the present embodiment, the next bit password of present bit password is correspondence position in preset password Proper password, and any password that non-user inputs after present bit password is inputted, if for example, 9 be to correspond to position in preset password The proper password put, then only can correspondingly increase 9 preset touch region, the preset touch region of other numbers will not increase Greatly.
It is understood that in the present embodiment, after user inputs present bit password, such as second password, if having been carried out The input of 3rd password, the preset touch region of that the 3rd corresponding proper password of password after increase, can recover to The size in preset touch region originally, can be according to the correctness of present bit password, really with when inputting password next time The preset touch response region of the fixed next bit password for whether needing to increase present bit password.
104th, other flows are performed.
In the present embodiment, if detection present bit password mistake, can not perform other operations, so that keeping currently Password input mode.
It is understood that in the present embodiment, after present bit password mistake is detected, it is meant that all positions currently inputted Password will be unable to that terminal is supported to perform corresponding function, then can also perform other operations, to change after present bit password extremely The input mode of a few password so that user can rapidly input all passwords, and carry out the prompting of Password Input mistake, Concrete mode does not limit herein.
In the present embodiment, the correctness of the present bit password by detecting input can increase when present bit password is correct The preset touch response region of the next bit password of big present bit password, it is close so as to considerably increase the next bit of present bit password The serious forgiveness of code, and improves the click accuracy of Password Input, also avoid password due to multiple input error and caused by Input efficiency it is low.
Referring to Fig. 2, another embodiment of cipher-code input method includes in the embodiment of the present invention:
201st, when present bit password is the first password, keep the preset touch response region of the first password constant or, press Increase the preset touch response region of the first password according to the first preset rules;
In the present embodiment, when user carries out Password Input using the smaller terminal in touch area, if user needs to input Present bit password be the first password, then the preset touch response region that can keep the first password is constant, alternatively, can also be by Increase the preset touch response region of the first password according to the first preset rules.
Specifically, the initiation codon of the first password all passwords as input, on the one hand, since the front is not close Code input, thus can not decide whether to increase the preset touch response region of the first password, then the default of the first password touches Control response region can remain unchanged, on the other hand, since its correctness determines the accuracy of all passwords of input, If i.e. the first password input error, inputs password by mistake, and if the first Password Input is correct, input password have it is certain Probability may be correct, then in order to further improve the accuracy of Password Input and efficiency, can correspondingly increase the first password Preset touch response region, to improve the serious forgiveness of the first password, so that correct in the first Password Input, use Family can input next bit may correct password.
In the present embodiment, the method for increasing the preset touch response region of the first password is referred to embodiment illustrated in fig. 1 The content that middle step 103 illustrates, details are not described herein again.
202nd, present bit password input by user is obtained;
203rd, whether correct present bit password is detected, if so, step 204 is performed, if it is not, then performing step 205;
204th, the preset touch response region of the next bit password of present bit password is increased according to the first preset rules;
Step 202 in the present embodiment is identical to step 103 with the step 101 in embodiment illustrated in fig. 1 to step 204, Details are not described herein again.
205th, keep the preset touch response region of all passwords after the first password constant or, default according to second The preset touch response region of all passwords after the first password of rule reduction.
In the present embodiment, when present bit password mistake, and when present bit password is the first password, the first password can be kept The preset touch response region of all passwords afterwards is constant or, according to all after the first password of the second preset rules reduction The preset touch response region of position password.
Specifically, after present bit password is as the first Password Input mistake, it is meant that all passwords of input by mistake, No matter whether all passwords after present bit password input correctly for that, and will not all change all passwords input by user can not Support terminal perform corresponding function as a result, the preset touch response area of all passwords after can then keeping the first password Domain is constant, so that, it is necessary to follow the smaller terminal in touch area during other password of the user after the first password of input Touch control operation, and after all Password Inputs, can send in time all password useless of input prompting or Person can reduce the preset touch response region of all passwords after the first password further according to the second preset rules, with Reducing the serious forgiveness of all passwords after the first password so that the input that user can quickly carry out next round password is attempted, So as to improve the efficiency of Password Input.
Assuming that the password of input is numerical ciphers, designed for the code keyboard of input for nine grids, if present bit password For 7 and mistake, then all passwords of present bit password, such as 14679, preset touch region can be default according to second Rule reduced accordingly, illustrated by taking second password as an example, can centered on 1 original touch-control response region to Inner periphery reduce one circle, with reduce 1 original touch-control response region, for another example can toward 1 original touch-control response region to the right or Subtract its narrow original touch-control response region to the left, the second preset rules can be specifically set according to actual needs, so that after reducing Preset touch region can meet using needs, do not limit herein.Wherein, the region of the reduction can be former for 1 part Beginning touch-control response region.
It is understood that in the present embodiment, all passwords after the first password is reduced according to the second preset rules Preset touch response region when, the preset touch response regions of all passwords after the first password can be sequentially reduced, i.e., Reduce the preset touch response region of next bit password after one password of input, can also reduce simultaneously all after the first password The preset touch response region of position password, as long as determine the first password mistake of input, then all passwords are preset below Touch-control response region synchronously reduces, and is not specifically limited herein.
Referring to Fig. 3, another embodiment of cipher-code input method includes in the embodiment of the present invention:
301st, when present bit password is the first password, keep the preset touch response region of the first password constant or, press Increase the preset touch response region of the first password according to the first preset rules;
302nd, present bit password input by user is obtained;
Step 301 in the present embodiment is identical to step 202 with the step 201 in embodiment illustrated in fig. 2 to step 302, Details are not described herein again.
303rd, authentication is carried out to user;
In the present embodiment, after user inputs present bit password, present bit password can be shown in Password Input region Show, wherein, the display format of password has visible form (i.e. in plain text) and invisible form (i.e. dark text), and corresponding password is default Touch-control response region can be increased or reduced accordingly, if being shown in a visible form, when the actual touch-control 3 of user and mistake By mistake, when but being shown as 2 due to the preset touch response region increase of proper password 2, extracting for password may be caused, then be Ensure the security of Password Input, prevent password from revealing or stealing, can to the user using terminal progress Password Input into Row authentication, to determine display format of the present bit password in terminal.
For example, authentication can be carried out to user using the biological characteristics such as fingerprint, iris mode, can also pass through The form of Questions carries out authentication to user.
It is understood that when carrying out authentication to user, verification mode can be used alone, and can also combine It uses, is not specifically limited herein.
The 304th, if authentication by present bit password by not being converted to invisible form;
In the present embodiment, if present bit password can be converted to invisible form by user not by authentication.
Specifically, when user does not pass through authentication, then it is not the owner of terminal to mean user, nonterminal yet Owner set other trust users, in order to ensure the security of Password Input, present bit password can be converted to not Visible form, when such as current plane is numerical ciphers, present bit password can be shown with the character style of *.Wherein, at end After end obtains present bit password input by user, present bit password directly in the form of invisible can show rather than It is shown in a visible form temporary, then invisible shape is converted to after the next bit Password Input of present bit password Formula.
305th, present bit password is shown according to invisible form;
In the present embodiment, after present bit password is converted to invisible form, it can be shown currently according to invisible form Position password.
Step 303 to step 305 in the present embodiment can perform before step 302, can also be with step 305 simultaneously It performs, is not specifically limited herein.
306th, whether correct present bit password is detected, if so, step 307 is performed, if it is not, then performing step 308;
307th, the preset touch response region of the next bit password of present bit password is increased according to the first preset rules;
308th, when present bit password mistake, and when present bit password is the first password, then keep all after the first password The preset touch response region of position password is constant or, according to all passwords after the first password of the second preset rules reduction Preset touch response region.
Step 306 in the present embodiment is identical to step 205 with the step 203 in embodiment illustrated in fig. 2 to step 308, Details are not described herein again.
The cipher-code input method in the embodiment of the present invention is illustrated above, below to close in the embodiment of the present invention Code input unit illustrates:
Referring to Fig. 4, cipher input one embodiment in the embodiment of the present invention includes:
Acquiring unit 401, for obtaining present bit password input by user;
Whether detection unit 402 is correct for detecting present bit password;
Increasing unit 403, for when current password is correct, then increasing according to the first preset rules under present bit password The preset touch response region of one password.
In the present embodiment, detection unit 402 passes through the correctness for the present bit password that detection inputs so that increasing unit 403 when present bit password is correct, can increase the preset touch response region of the next bit password of present bit password, so as to big The serious forgiveness of the big next bit password for increasing present bit password of knowing clearly, and the click accuracy of Password Input is improved, also avoid Password due to multiple input error and caused by input efficiency it is low.
Optionally, in some embodiments of the invention, based on Fig. 4, referring to Fig. 5, device can further include:
First processing units 404 for working as present bit password mistake, and when present bit password is the first password, are then kept The preset touch response region of all passwords after the first password is constant or, reduces the first password according to the second preset rules The preset touch response region of all passwords afterwards.
Optionally, in some embodiments of the invention, based on Fig. 5, referring to Fig. 6, device can further include:
Second processing unit 405, for when present bit password is the first password, the preset touch of the first password being kept to ring It answers region constant or, increases the preset touch response region of the first password according to the first preset rules.
Optionally, in some embodiments of the invention, based on Fig. 6, referring to Fig. 7, device can further include:
Converting unit 406, for present bit password to be converted to invisible form;
Display unit 407, for showing present bit password according to invisible form.
Optionally, in some embodiments of the invention, based on Fig. 7, referring to Fig. 8, device can further include:
Authentication unit 408, for carrying out authentication to user;
Trigger element 409, for when authentication not by when, then trigger converting unit and be converted to present bit password not Visible form.
The cipher input in the embodiment of the present invention is described in the angle of slave module functional entity above, under Face is described the computer installation in the embodiment of the present invention from the angle of hardware handles:
Referring to Fig. 9, Computer device one embodiment of the embodiment of the present invention includes:
Processor 901 and memory 902;
For storing computer program, processor 901 is used to perform the computer stored in memory 902 memory 902 During program, following steps can be realized:
Obtain present bit password input by user;
Whether correct detect present bit password;
If so, the preset touch response region of the next bit password according to the first preset rules increase present bit password.
In some embodiments of the invention, processor 901 is used to perform the computer program stored in memory 902 When, it can also realize following steps:
When present bit password mistake, and when present bit password is the first password, then keep all positions after the first password close The preset touch response region of code is constant or, according to the default of all passwords after the first password of the second preset rules reduction Touch-control response region.
In some embodiments of the invention, processor 901 is used to perform the computer program stored in memory 902 When, it can also realize following steps:
When present bit password is the first password, keep the preset touch response region of the first password constant or, according to the The preset touch response region of the first password of one preset rules increase.
In some embodiments of the invention, processor 901 is used to perform the computer program stored in memory 902 When, it can also realize following steps:
Present bit password is converted into invisible form;
Present bit password is shown according to invisible form.
In some embodiments of the invention, processor 901 is used to perform the computer program stored in memory 902 When, it can also realize following steps:
Authentication is carried out to user;
If authentication is not by triggering the step of present bit password is converted to invisible form.
It is understood that when the processor in the computer installation of above description performs the computer program, also may be used To realize the function of each unit in above-mentioned corresponding each device embodiment, details are not described herein again.Illustratively, the computer journey Sequence can be divided into one or more module/units, and one or more of module/units are stored in the memory In, and performed by the processor, to complete the present invention.One or more of module/units can be can complete it is specific The series of computation machine program instruction section of function, the instruction segment are used to describe the computer program in such as described Password Input Implementation procedure in device.For example, the computer program can be divided into each unit in above-mentioned cipher input, respectively Unit can realize the concrete function as described in above-mentioned corresponding cipher input.
The computer installation can be that the calculating such as desktop PC, notebook, palm PC and cloud server are set It is standby.The computer installation may include but be not limited only to processor, memory.It will be understood by those skilled in the art that processor, Memory is only the example of computer installation, does not form the restriction to computer installation, can be included more or fewer Component either combines some components or different components, such as the computer installation can also be set including input and output Standby, network access equipment, bus etc..
The processor can be central processing unit (Central Processing Unit, CPU), can also be it His general processor, digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable GateArray, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor Deng the processor is the control centre of the computer installation, utilizes various interfaces and the entire computer installation of connection Various pieces.
The memory can be used for storing the computer program and/or module, and the processor is by running or performing The computer program and/or module that are stored in the memory and the data being stored in memory are called, described in realization The various functions of computer installation.The memory can mainly include storing program area and storage data field, wherein, store program It area can storage program area, application program needed at least one function etc.;Storage data field can store the use according to terminal Data created etc..In addition, memory can include high-speed random access memory, non-volatile memories can also be included Device, such as hard disk, memory, plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card), at least one disk memory, flush memory device or other volatibility are consolidated State memory device.
The present invention also provides a kind of computer readable storage medium, calculating is stored on the computer readable storage medium Machine program when computer program is executed by processor, can realize following steps:
Obtain present bit password input by user;
Whether correct detect present bit password;
If so, the preset touch response region of the next bit password according to the first preset rules increase present bit password.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor When, it can also realize following steps:
When present bit password mistake, and when present bit password is the first password, then keep all positions after the first password close The preset touch response region of code is constant or, according to the default of all passwords after the first password of the second preset rules reduction Touch-control response region.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor When, it can also realize following steps:
When present bit password is the first password, keep the preset touch response region of the first password constant or, according to the The preset touch response region of the first password of one preset rules increase.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor When, it can also realize following steps:
Present bit password is converted into invisible form;
Present bit password is shown according to invisible form.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor When, it can also realize following steps:
Authentication is carried out to user;
If authentication is not by triggering the step of present bit password is converted to invisible form.
If it is understood that the integrated unit is realized in the form of SFU software functional unit and is independent production Product are sold or in use, can be stored in a corresponding computer read/write memory medium.Based on such understanding, this hair The bright all or part of flow realized in above-mentioned corresponding embodiment method, can also be instructed relevant by computer program Hardware is completed, and the computer program can be stored in a computer readable storage medium, which is being located It manages when device performs, it can be achieved that the step of above-mentioned each embodiment of the method.Wherein, the computer program includes computer program generation Code, the computer program code can be source code form, object identification code form, executable file or some intermediate forms Deng.The computer-readable medium can include:Any entity of the computer program code or device, record can be carried It is medium, USB flash disk, mobile hard disk, magnetic disc, CD, computer storage, read-only memory (ROM, Read-OnlyMemory), random Access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It needs It is noted that the content that includes of the computer-readable medium can be according to legislation in jurisdiction and patent practice will It asks and carries out appropriate increase and decrease, such as in some jurisdictions, do not included according to legislation and patent practice, computer-readable medium Electric carrier signal and telecommunication signal.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit may be referred to the corresponding process in preceding method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit Division is only a kind of division of logic function, can there is other dividing mode, such as multiple units or component in actual implementation It may be combined or can be integrated into another system or some features can be ignored or does not perform.It is another, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be the indirect coupling by some interfaces, device or unit It closes or communicates to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit The component shown may or may not be physical location, you can be located at a place or can also be distributed to multiple In network element.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also That unit is individually physically present, can also two or more units integrate in a unit.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to before Embodiment is stated the present invention is described in detail, it will be understood by those of ordinary skill in the art that:It still can be to preceding The technical solution recorded in each embodiment is stated to modify or carry out equivalent substitution to which part technical characteristic;And these Modification is replaced, and the essence of appropriate technical solution is not made to depart from the spirit and scope of various embodiments of the present invention technical solution.

Claims (10)

1. a kind of cipher-code input method, applied to terminal, which is characterized in that including:
Obtain present bit password input by user;
Whether correct detect the present bit password;
If so, increase the preset touch response region of the next bit password of the present bit password according to the first preset rules.
2. according to the method described in claim 1, it is characterized in that, the detection present bit password it is whether correct it Afterwards, the method further includes:
When the present bit password mistake, and when the present bit password is the first password, then after keeping the first password The preset touch response region of all passwords is constant or, according to all after the second preset rules reduction the first password The preset touch response region of position password.
3. method according to claim 1 or 2, which is characterized in that it is described obtain present bit password input by user it Before, the method further includes:
When the present bit password is the first password, keeps the preset touch response region of the first password constant or, press According to the preset touch response region of the first preset rules increase the first password.
4. according to the method described in claim 3, it is characterized in that, the method further includes:
The present bit password is converted into invisible form;
The present bit password is shown according to the invisible form.
5. according to the method described in claim 4, it is characterized in that, by the present bit password be converted to invisible form it Before, the method further includes:
Authentication is carried out to the user;
If the authentication is not by triggering the described the step of present bit password is converted to invisible form.
6. a kind of cipher input, applied to terminal, which is characterized in that including:
Acquiring unit, for obtaining present bit password input by user;
Whether detection unit is correct for detecting the present bit password;
Increasing unit, for when the current password is correct, then increasing the present bit password according to the first preset rules The preset touch response region of next bit password.
7. device according to claim 6, which is characterized in that described device further includes:
First processing units for working as the present bit password mistake, and when the present bit password is the first password, are then kept The preset touch response region of all passwords after the first place password is constant or, according to described in the reduction of the second preset rules The preset touch response region of all passwords after the first password.
8. the device according to claim 6 or 7, which is characterized in that described device further includes:
Second processing unit, for when the present bit password is the first password, keeping the preset touch of the first password Response region is constant or, increases the preset touch response region of the first password according to first preset rules.
9. a kind of computer installation, it is characterised in that:The computer installation includes processor, and the processor is deposited for performing It is realized during the computer program stored in reservoir as described in any one in claim 1 to 5 the step of cipher-code input method.
10. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that:The computer program It is realized when being executed by processor as described in claim 1 to 5 any one the step of cipher-code input method.
CN201711347330.8A 2017-12-15 2017-12-15 A kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing Pending CN108108112A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711347330.8A CN108108112A (en) 2017-12-15 2017-12-15 A kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711347330.8A CN108108112A (en) 2017-12-15 2017-12-15 A kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing

Publications (1)

Publication Number Publication Date
CN108108112A true CN108108112A (en) 2018-06-01

Family

ID=62216226

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711347330.8A Pending CN108108112A (en) 2017-12-15 2017-12-15 A kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing

Country Status (1)

Country Link
CN (1) CN108108112A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110321692A (en) * 2019-07-12 2019-10-11 网易(杭州)网络有限公司 Cipher-code input method, device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110072510A1 (en) * 2009-09-23 2011-03-24 At&T Intellectual Property I.L.P. Apparatus, methods, and computer program products for entering secure passwords
CN104182678A (en) * 2014-04-24 2014-12-03 东莞盛世科技电子实业有限公司 Password verifying device and password verifying method
CN106293439A (en) * 2015-06-04 2017-01-04 阿里巴巴集团控股有限公司 Interface alternation method and device
CN106570366A (en) * 2016-11-09 2017-04-19 深圳怡化电脑股份有限公司 Password input method and device based on touch screen

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110072510A1 (en) * 2009-09-23 2011-03-24 At&T Intellectual Property I.L.P. Apparatus, methods, and computer program products for entering secure passwords
CN104182678A (en) * 2014-04-24 2014-12-03 东莞盛世科技电子实业有限公司 Password verifying device and password verifying method
CN106293439A (en) * 2015-06-04 2017-01-04 阿里巴巴集团控股有限公司 Interface alternation method and device
CN106570366A (en) * 2016-11-09 2017-04-19 深圳怡化电脑股份有限公司 Password input method and device based on touch screen

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110321692A (en) * 2019-07-12 2019-10-11 网易(杭州)网络有限公司 Cipher-code input method, device and storage medium

Similar Documents

Publication Publication Date Title
US10496804B2 (en) Fingerprint authentication method and system, and terminal supporting fingerprint authentication
CN103200011B (en) A kind of cipher authentication method and device
US20190073457A1 (en) Touch-screen user key-press behavior pattern construction and analysis system and identity recognition method thereof
CN107340966A (en) Terminal control method and device, computer installation and storage medium
CN104636649A (en) Electronic equipment and guiding method thereof
CN103366107A (en) Method, device and mobile phone for protecting access permission of application program
JP5985632B2 (en) Information processing apparatus, information processing method, and information processing program
CN107657156A (en) User ID authentication method and device based on user operation habits and contact pressure area
EP3779765B1 (en) Radio frequency card function calling method and device
CN107895105A (en) A kind of cipher processing method, terminal device and computer-readable recording medium
CN104992089A (en) Security verification method and system based on touch screen technology
CN105929974A (en) Password input management method and mobile terminal
CN107943401A (en) A kind of function triggering method and device, computer installation, readable storage medium storing program for executing
CN108124490A (en) Smart lock and unlocking method
CN106779722A (en) The method of payment and mobile terminal of a kind of mobile terminal
CN106991343A (en) Secure payment device and its safe payment method
CN103714457A (en) Method for validating a transaction
CN109688150A (en) A kind of multi-platform account interoperability methods and device
CN102880305A (en) Keyboard input encryption method and mobile terminal thereof
CN107769928A (en) A kind of terminal and computer-readable recording medium
CN108171048A (en) Password prompt method, apparatus, storage medium and terminal
CN107274174A (en) The auth method and mobile terminal of a kind of mobile payment
CN108108112A (en) A kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing
CN106778344B (en) A kind of data permission control method and terminal
CN105653054A (en) Code processing method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180601