CN109446794B - Password input method and mobile terminal thereof - Google Patents

Password input method and mobile terminal thereof Download PDF

Info

Publication number
CN109446794B
CN109446794B CN201811195514.1A CN201811195514A CN109446794B CN 109446794 B CN109446794 B CN 109446794B CN 201811195514 A CN201811195514 A CN 201811195514A CN 109446794 B CN109446794 B CN 109446794B
Authority
CN
China
Prior art keywords
password
user
screen
mobile terminal
original
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811195514.1A
Other languages
Chinese (zh)
Other versions
CN109446794A (en
Inventor
余维杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201811195514.1A priority Critical patent/CN109446794B/en
Publication of CN109446794A publication Critical patent/CN109446794A/en
Application granted granted Critical
Publication of CN109446794B publication Critical patent/CN109446794B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Abstract

The invention discloses a password input method and a mobile terminal thereof, which are used for solving the problem that the existing password input is difficult to avoid peeping or recording of others so that the security of password input is low. The method comprises the following steps: acquiring an original password input by a user at a first screen side of a mobile terminal, wherein the first screen is a display screen at one side of the mobile terminal departing from the sight of the user; encrypting the original password based on a preset password mapping relation table; and feeding back the information encrypted by the original password to the user.

Description

Password input method and mobile terminal thereof
Technical Field
The invention relates to the technical field of computers, in particular to a password input method and a mobile terminal thereof.
Background
With the development of the mobile internet, the role played by the mobile terminal in life is more and more important, and the user can perform operations such as payment and shopping through the mobile terminal, so that the security of the mobile terminal is more and more important.
At present, the fingerprint identification technology is rapidly popularized in application scenes such as mobile payment and identity identification due to the characteristics of convenient operation, rapid identification, high safety and the like. However, in some mobile payment and identity recognition scenarios, the fingerprint recognition technology cannot completely replace password recognition, for example, after a user fails to input fingerprint recognition for many times, the user still needs to input a password for authentication, such as password recognition, fingerprint entry or modification. Thus, password identification, as the most primitive way of authentication, still has irreplaceable role and meaning.
However, as the display screen of the mobile terminal is larger and larger, when the user inputs the password in the subway, the public transport or other public places, the problem that the user is peeped by others or the password is recorded by theft is difficult to avoid. Therefore, there is still a need for a solution to increase the security level of a user entering a password.
Disclosure of Invention
The embodiment of the invention provides a password input method and a mobile terminal thereof, which aim to solve the problem that the existing password input is difficult to avoid peeping or recording of others so that the security of password input is low.
In order to solve the technical problem, the invention is realized as follows: in a first aspect, an embodiment of the present invention provides a password input method, including:
acquiring an original password input by a user at a first screen side of a mobile terminal, wherein the first screen is a display screen at one side of the mobile terminal departing from the sight of the user;
encrypting the original password based on a preset password mapping relation table;
and feeding back the information encrypted by the original password to the user.
In a second aspect, an embodiment of the present invention provides a mobile terminal, including:
the mobile terminal comprises an acquisition unit, a processing unit and a display unit, wherein the acquisition unit is used for acquiring an original password input by a user at a first screen side of the mobile terminal, and the first screen is a display screen at one side of the mobile terminal, which deviates from the sight of the user;
the encryption unit is used for encrypting the original password based on a preset password mapping relation table;
and the feedback unit is used for feeding back the information encrypted by the original password to the user.
In a third aspect, an embodiment of the present invention provides a mobile terminal, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the method according to the first aspect.
In a fourth aspect, the embodiments of the present invention also provide a readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the method according to the first aspect.
In the embodiment of the invention, the original password input by the user at the first screen side of the mobile terminal can be obtained, the first screen is a display screen at the side of the mobile terminal departing from the sight line of the user, then the original password is encrypted based on the preset password mapping relation table, and finally the information after the encryption of the original password is fed back to the user. Therefore, when the user inputs the password, the password can be input on the screen deviating from the sight of the user by utilizing the characteristic of the mobile terminal with the double-sided screen, and because the display screen on the side of inputting the password is not in the sight range of the user, other people around the user cannot peep or steal the password input by the user, so that the security level of inputting the password by the user can be improved. In addition, the corresponding feedback can be carried out based on the ciphertext password input by the user, so that the user can know whether the input password is correct or not.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
Fig. 1 is a schematic flowchart illustrating an embodiment of a password input method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a password input method applied in an actual scene according to an embodiment of the present invention;
fig. 3 is a schematic view of a virtual keyboard for inputting a password generated in the password input method according to the embodiment of the present invention;
fig. 4 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The technical solutions provided by the embodiments of the present invention are described in detail below with reference to the accompanying drawings.
In order to solve the problem that the existing password input is difficult to avoid peeping or recording of others, so that the password input security is low, the invention provides a password input method, and an execution main body of the method can be configured to execute at least one of user terminals of the method provided by the embodiment of the invention, such as but not limited to a mobile phone, a tablet computer and the like.
For convenience of description, the following description will be made on embodiments of the method, taking as an example that the execution subject of the method is a mobile terminal capable of executing the method. It is understood that the mobile terminal is used as the main body of the method and is only an exemplary illustration, and should not be construed as a limitation of the method.
Specifically, the password input method provided by the invention comprises the following steps: firstly, acquiring an original password input by a user at a first screen side of a mobile terminal, wherein the first screen is a display screen at one side of the mobile terminal departing from the sight of the user; then, based on a preset password mapping relation table, encrypting the original password; and finally, feeding back the information encrypted by the original password to the user.
In the embodiment of the invention, the original password input by the user at the first screen side of the mobile terminal can be obtained, the first screen is a display screen at the side of the mobile terminal departing from the sight line of the user, then the original password is encrypted based on the preset password mapping relation table, and finally the information after the encryption of the original password is fed back to the user. Therefore, when the user inputs the password, the password can be input on the screen deviating from the sight of the user by utilizing the characteristic of the mobile terminal with the double-sided screen, and because the display screen on the side of inputting the password is not in the sight range of the user, other people around the user cannot peep or steal the password input by the user, so that the security level of inputting the password by the user can be improved. In addition, the corresponding feedback can be carried out based on the ciphertext password input by the user, so that the user can know whether the input password is correct or not.
The following describes in detail an implementation process of the password input method shown in fig. 1 with reference to a schematic flow chart of a specific implementation of the method, including:
step 101, acquiring an original password input by a user at a first screen side of the mobile terminal, wherein the first screen is a display screen at a side of the mobile terminal departing from the sight of the user.
As described in the background art, the display screen of the existing mobile terminal is increasingly large, so that when a user inputs a password in a public place with many people, the user is difficult to avoid peeping or even recording by others, which creates an opportunity for lawless persons to embezzle the password of others. Obviously, the existing password input mode has some potential safety hazards, and in order to solve the problem, the embodiment of the invention utilizes the characteristic of the mobile terminal with the double-sided screen, namely the mobile terminal with the double-sided screen comprises the first screen and the second screen which are respectively positioned at two sides of the mobile terminal, so that a user can input the password on the display screen at one side departing from the sight of the user, thereby avoiding the peeping of other people.
Therefore, when the user performs the operation of inputting the password on the first screen side away from the sight of the user, the original password input by the user on the first screen side of the mobile terminal can be acquired.
Optionally, when the original password only includes numbers, for example, the setting range of the transaction password of the bank is 1 to 9, and the numeric keyboard 1 to 9 may be displayed on the first screen in a form of a squared figure, then acquiring the original password input by the user on the first screen side of the mobile terminal may specifically include:
firstly, if the target operation of a user is detected, displaying a virtual keyboard on a first screen based on the target operation; wherein the virtual keyboard may be in the form of a squared figure, as shown in fig. 3.
Then, displaying an input auxiliary line corresponding to the virtual keyboard in the first screen on a second screen of the mobile terminal to assist a user to input an original password in the virtual keyboard in the first screen; in order to avoid frequent input errors of the user, since the display content of the first screen is not in the sight of the user, an input auxiliary line corresponding to the virtual keyboard in the first screen may be displayed on the second screen, for example, a squared figure auxiliary line corresponding to the squared figure position shown in fig. 3 may be displayed to assist the user in inputting the original password in the squared figure keyboard in the first screen.
And finally, acquiring an original password input by the user in the virtual keyboard of the first screen.
And 102, encrypting the original password based on a preset password mapping relation table.
Because the user can not directly see the input password when inputting the password on the first screen, in order to avoid the problem that the user consumes time because the user finds that the password is not verified after finishing inputting the password, the embodiment of the invention can encrypt the original password based on the preset password mapping relation table to feed back the encrypted password to the user after the user inputs one password character.
Optionally, when the preset password mapping relationship table includes a mapping relationship between an original password and a plaintext password, and the original password includes letters, numbers or other special characters, since the original password is relatively complex, the original password is encrypted based on the preset password mapping relationship table, which specifically includes the following two cases:
in the first case: if the target plaintext password corresponding to the original password exists in the preset password mapping relation table, the original password can be encrypted based on the mapping relation between the target plaintext password and the original password in the preset password mapping relation table.
In the second case, if the target plaintext password corresponding to the original password does not exist in the preset password mapping relationship table, the original password may be encrypted based on the preset characters.
As shown in fig. 2, which is a schematic view illustrating an implementation flow of a password input method implemented by a preset password mapping relationship table according to an embodiment of the present invention, a specific application scenario of the implementation flow schematic view shown in fig. 2 is a scenario in which a user inputs a password by holding a mobile terminal with a dual-sided screen, where a first screen is a display screen on a side of the mobile terminal away from a line of sight of the user, and a second screen is a display screen facing the user in the mobile terminal.
Taking the transaction password of the bank as an example, it should be understood that the transaction password (i.e. the original password) and the preset password mapping table, i.e. the plaintext password having a one-to-one correspondence relationship with the transaction password, are preset by the user before the user inputs the transaction password, as shown in table 1 below, the transaction password preset for the user and the plaintext password corresponding to the transaction password. As can be seen from table 1, the transaction password preset by the user is "4 a7 dek", and the plaintext password corresponding to the transaction password is "ybrbfa".
When a user inputs a transaction password through the first screen and inputs a transaction password of "4", the plaintext password "y" corresponding to the transaction password of "4" is determined based on the preset password mapping relation table, the plaintext password "y" is displayed on the second screen, and after the user sees the feedback of the plaintext password "y", the user can determine that the input transaction password of "4" is correct … …, and so on until the input of the transaction password is completed. If a certain character in the transaction password input by the user is wrong in the process, a certain preset character can be displayed on the second screen to prompt the user that the password is wrong. In this case, the user may delete the input wrong password by double-clicking the first screen or other preset operation.
TABLE 1 Preset Cryptographic mapping relationship Table
Transaction password 4 a 7 d e k
Plain text cipher y b R b f a
When the preset password mapping relation table contains the corresponding relation between the numbers and the vibration levels and the original password only contains the numbers, for example, the setting range of the transaction password of the bank is 1-9, and the numeric keyboard of 1-9 can be displayed on the first screen in a form of a nine-square grid, that is, the nine-square grid shown in fig. 3. Since the user enters the password on the nine-grid keyboard shown in fig. 3, the area prone to error and confusion is often confused between adjacent areas, such as the number 2 and number 3 areas, and not between the number 1 and number 9 areas. The numbers located on the diagonal of the nine-grid keyboard, i.e. number 1, number 3, number 7 and number 9, may be assigned to the same vibration level a, the numbers located in the four side areas of the nine-grid keyboard, i.e. number 2, number 4, number 6 and number 8, may be assigned to the same vibration level B, and the number 5 located in the central area of the nine-grid keyboard may be assigned to a vibration level C.
Then, encrypting the original password based on a preset password mapping relationship table specifically includes:
firstly, acquiring a target vibration level corresponding to an original password from a preset password mapping relation table, wherein the preset password mapping relation table comprises a mapping relation between the vibration level and the original password;
and then, encrypting the original password based on the mapping relation between the target vibration level and the original password in the password mapping relation table.
And 103, feeding back the information encrypted by the original password to the user.
Optionally, when the preset password mapping relationship table includes a mapping relationship between an original password and a plaintext password, and the original password includes letters, numbers or other special characters, feeding back information encrypted by the original password to the user, where the two cases include:
if the target plaintext password corresponding to the original password exists in the preset password mapping relation table, feeding back the target plaintext password corresponding to the original password on a second screen of the mobile terminal;
if the target plaintext password corresponding to the original password does not exist in the preset password mapping relation table, feeding back preset characters on a second screen of the mobile terminal to prompt that the password input of the user is wrong; and the second screen is a display screen facing the user in the mobile terminal.
Optionally, when the preset password mapping relationship table includes a correspondence between the numbers and the vibration levels and the original password only includes the numbers, the vibration feedback may be performed on the user based on the target vibration level corresponding to the original password. As shown in fig. 3, when a user inputs a password through a first screen, if a number 1 is input, a vibration level corresponding to the number 1 may be determined to be a through a preset password mapping table, and based on the vibration level a, vibration is fed back to the user, so that the user knows that the user touches the number 1.
As shown in fig. 2, the process of inputting a password by a user includes the following main steps:
step 201, a user enters a password input interface of a first screen;
when the mobile terminal is held by a user, the first screen is a password on the side of the mobile terminal departing from the sight of the user.
Step 202, a user inputs an original password through a first screen;
it should be understood that since the contents displayed in the first screen are not in the user's sight, the original password input by the user through the first screen cannot be seen by the user, and other people around the user cannot see the original password input by the user.
Step 203, determining whether the original password input by the user is correct;
since the original password input by the user through the first screen cannot be seen by the user, it is necessary to determine whether the original password input by the user is correct or not, so as to give corresponding feedback to the user.
Step 204, if the original password input by the user is determined to be correct, displaying a plaintext password corresponding to the original password on a second screen;
step 205, if it is determined that the original password input by the user is wrong, displaying a random character on a second screen to prompt the user that the original password input by the user is wrong;
step 206, the user deletes the wrong password by double-clicking the first screen;
the user may delete the wrong password by double-clicking the first screen, or may delete the wrong password by other manners, such as sliding or clicking, which is not specifically limited in this embodiment of the present invention.
Step 207, determining whether the user completes the input;
assuming that the original password input by the user includes 6 characters, the user input can be determined to be completed after determining that the user has completed inputting the 6 characters, otherwise, the user is determined not to have completed inputting, and the process continues to step 202.
And step 208, finishing the input if the user input is determined to be finished.
In the embodiment of the invention, the original password input by the user at the first screen side of the mobile terminal can be obtained, the first screen is a display screen at the side of the mobile terminal departing from the sight line of the user, then the original password is encrypted based on the preset password mapping relation table, and finally the information after the encryption of the original password is fed back to the user. Therefore, when the user inputs the password, the password can be input on the screen deviating from the sight of the user by utilizing the characteristic of the mobile terminal with the double-sided screen, and because the display screen on the side of inputting the password is not in the sight range of the user, other people around the user cannot peep or steal the password input by the user, so that the security level of inputting the password by the user can be improved. In addition, the corresponding feedback can be carried out based on the ciphertext password input by the user, so that the user can know whether the input password is correct or not.
Referring to fig. 4, a schematic structural diagram of a mobile terminal 400 according to an embodiment of the present invention is shown in fig. 4, which includes an obtaining unit 401, an encrypting unit 402, and a feedback unit 403, where:
an obtaining unit 401, configured to obtain an original password input by a user on a first screen side of a mobile terminal, where the first screen is a display screen on a side of the mobile terminal away from a line of sight of the user;
an encrypting unit 402, configured to encrypt the original password based on a preset password mapping relationship table;
a feedback unit 403, configured to feed back the information obtained by encrypting the original password to the user.
Optionally, in an embodiment, the encryption unit 402 is configured to:
if a target plaintext password corresponding to the original password exists in the preset password mapping relation table, encrypting the original password based on the mapping relation between the target plaintext password and the original password in the preset password mapping table;
if the target plaintext password corresponding to the original password does not exist in the preset password mapping relation table, encrypting the original password based on preset characters;
the preset password mapping relation table comprises the mapping relation between the original password and the plaintext password.
Optionally, in an embodiment, the feedback unit 403 is configured to:
if a target plaintext password corresponding to the original password exists in the preset password mapping relation table, feeding back the target plaintext password on a second screen of the mobile terminal;
if the target plaintext password corresponding to the original password does not exist in the preset password mapping relation table, feeding back preset characters on a second screen of the mobile terminal to prompt that the password input of the user is wrong;
the second screen is a display screen facing the user in the mobile terminal.
Optionally, in an embodiment, the obtaining unit 401 is configured to:
if the target operation of the user is detected, displaying a virtual keyboard on the first screen based on the target operation;
displaying an input auxiliary line corresponding to the virtual keyboard in the first screen on a second screen of the mobile terminal to assist the user to input an original password in the virtual keyboard in the first screen;
and acquiring an original password input by the user in a virtual keyboard of the first screen.
Optionally, in an embodiment, the encryption unit 402 is configured to:
acquiring a vibration level corresponding to the original password from the preset password mapping relation table, wherein the preset password mapping relation table comprises a mapping relation between the vibration level and the original password;
and encrypting the original password based on the mapping relation between the target vibration level and the original password in the password mapping relation table.
The mobile terminal 400 provided in the embodiment of the present invention can implement each process implemented by the mobile terminal in the method embodiments of fig. 1 to fig. 3, and is not described herein again to avoid repetition.
Figure 5 is a diagram of a hardware configuration of a mobile terminal 500 implementing various embodiments of the present invention,
the mobile terminal 500 includes, but is not limited to: a radio frequency unit 501, a network module 502, an audio output unit 503, an input unit 504, a sensor 505, a display unit 506, a user input unit 507, an interface unit 508, a memory 509, a processor 510, and a power supply 511. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 5 is not intended to be limiting of mobile terminals, and that a mobile terminal may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the mobile terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 510 is configured to obtain an original password input by a user on a first screen side of the mobile terminal, where the first screen is a display screen on a side of the mobile terminal away from a line of sight of the user; encrypting the original password based on a preset password mapping relation table; and feeding back the encrypted original password to the user.
In the embodiment of the invention, the original password input by the user at the first screen side of the mobile terminal can be obtained, the first screen is a display screen at the side of the mobile terminal departing from the sight line of the user, then the original password is encrypted based on the preset password mapping relation table, and finally the encrypted original password is fed back to the user. Therefore, when the user inputs the password, the password can be input on the screen deviating from the sight of the user by utilizing the characteristic of the mobile terminal with the double-sided screen, and because the display screen on the side of inputting the password is not in the sight range of the user, other people around the user cannot peep or steal the password input by the user, so that the security level of inputting the password by the user can be improved. In addition, the corresponding feedback can be carried out based on the ciphertext password input by the user, so that the user can know whether the input password is correct or not.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 501 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 510; in addition, the uplink data is transmitted to the base station. In general, radio frequency unit 501 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 501 can also communicate with a network and other devices through a wireless communication system.
The mobile terminal provides the user with wireless broadband internet access through the network module 502, such as helping the user send and receive e-mails, browse webpages, access streaming media, and the like.
The audio output unit 503 may convert audio data received by the radio frequency unit 501 or the network module 502 or stored in the memory 509 into an audio signal and output as sound. Also, the audio output unit 503 may also provide audio output related to a specific function performed by the mobile terminal 500 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 503 includes a speaker, a buzzer, a receiver, and the like.
The input unit 504 is used to receive an audio or video signal. The input Unit 504 may include a Graphics Processing Unit (GPU) 5041 and a microphone 5042, and the Graphics processor 5041 processes image data of a still picture or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 503. The image frames processed by the graphic processor 5041 may be stored in the memory 509 (or other storage medium) or transmitted via the radio frequency unit 501 or the network module 502. The microphone 5042 may receive sounds and may be capable of processing such sounds into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 501 in case of the phone call mode.
The mobile terminal 500 also includes at least one sensor 505, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that adjusts the brightness of the display panel 5061 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 5061 and/or a backlight when the mobile terminal 500 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of the mobile terminal (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 505 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 506 is used to display information input by the user or information provided to the user. The Display unit 506 may include a Display panel 5061, and the Display panel 5061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 507 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 507 includes a touch panel 5071 and other input devices 5072. Touch panel 5071, also referred to as a touch screen, may collect touch operations by a user on or near it (e.g., operations by a user on or near touch panel 5071 using a finger, stylus, or any suitable object or attachment). The touch panel 5071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 510, and receives and executes commands sent by the processor 510. In addition, the touch panel 5071 may be implemented in various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 5071, the user input unit 507 may include other input devices 5072. In particular, other input devices 5072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, the touch panel 5071 may be overlaid on the display panel 5061, and when the touch panel 5071 detects a touch operation thereon or nearby, the touch operation is transmitted to the processor 510 to determine the type of the touch event, and then the processor 510 provides a corresponding visual output on the display panel 5061 according to the type of the touch event. Although in fig. 5, the touch panel 5071 and the display panel 5061 are two independent components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 5071 and the display panel 5061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 508 is an interface through which an external device is connected to the mobile terminal 500. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 508 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 500 or may be used to transmit data between the mobile terminal 500 and external devices.
The memory 509 may be used to store software programs as well as various data. The memory 509 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 509 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The processor 510 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 509 and calling data stored in the memory 509, thereby performing overall monitoring of the mobile terminal. Processor 510 may include one or more processing units; preferably, the processor 510 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 510.
The mobile terminal 500 may further include a power supply 511 (e.g., a battery) for supplying power to various components, and preferably, the power supply 511 may be logically connected to the processor 510 via a power management system, so that functions of managing charging, discharging, and power consumption are performed via the power management system.
In addition, the mobile terminal 500 includes some functional modules that are not shown, and thus, are not described in detail herein.
Preferably, an embodiment of the present invention further provides a mobile terminal, which includes a processor 510, a memory 509, and a computer program that is stored in the memory 509 and can be run on the processor 510, and when the computer program is executed by the processor 510, the processes of the voice drawing method embodiment are implemented, and the same technical effect can be achieved, and in order to avoid repetition, details are not described here again.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the embodiment of the voice drawing method, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (9)

1. A password input method, comprising:
acquiring an original password input by a user at a first screen side of a mobile terminal, wherein the first screen is a display screen at one side of the mobile terminal departing from the sight of the user;
encrypting the original password based on a preset password mapping relation table;
feeding back the information encrypted by the original password to the user in a second screen of the mobile terminal, wherein the preset password mapping relation table comprises the mapping relation between the original password and a plaintext password;
the acquiring of the original password input by the user at the first screen side of the mobile terminal includes:
if the target operation of the user is detected, displaying a virtual keyboard on the first screen based on the target operation; displaying an input auxiliary line corresponding to the virtual keyboard in the first screen on a second screen of the mobile terminal to assist the user to input an original password in the virtual keyboard in the first screen; and acquiring an original password input by the user in a virtual keyboard of the first screen.
2. The method of claim 1, wherein encrypting the original password based on a preset password mapping relationship table comprises:
if a target plaintext password corresponding to the original password exists in the preset password mapping relation table, encrypting the original password based on the mapping relation between the target plaintext password and the original password in the preset password mapping relation table;
and if the target plaintext password corresponding to the original password does not exist in the preset password mapping relation table, encrypting the original password based on preset characters.
3. The method of claim 2, wherein feeding back the encrypted information of the original password to the user comprises:
if a target plaintext password corresponding to the original password exists in the preset password mapping relation table, feeding back the target plaintext password on a second screen of the mobile terminal;
if the target plaintext password corresponding to the original password does not exist in the preset password mapping relation table, feeding back preset characters on a second screen of the mobile terminal to prompt that the password input of the user is wrong;
the second screen is a display screen facing the user in the mobile terminal.
4. The method of claim 1, wherein encrypting the original password based on a preset password mapping relationship table comprises:
acquiring a target vibration level corresponding to the original password from the preset password mapping relation table, wherein the preset password mapping relation table comprises a mapping relation between the vibration level and the original password;
and encrypting the original password based on the mapping relation between the target vibration level and the original password in the password mapping relation table.
5. A mobile terminal, comprising:
the mobile terminal comprises an acquisition unit, a processing unit and a display unit, wherein the acquisition unit is used for acquiring an original password input by a user at a first screen side of the mobile terminal, and the first screen is a display screen at one side of the mobile terminal, which deviates from the sight of the user;
the encryption unit is used for encrypting the original password based on a preset password mapping relation table;
the feedback unit is used for feeding back the information encrypted by the original password to the user in a second screen of the mobile terminal, wherein the preset password mapping relation table comprises the mapping relation between the original password and the plaintext password;
the acquisition unit is configured to: if the target operation of the user is detected, displaying a virtual keyboard on the first screen based on the target operation; displaying an input auxiliary line corresponding to the virtual keyboard in the first screen on a second screen of the mobile terminal to assist the user to input an original password in the virtual keyboard in the first screen; and acquiring an original password input by the user in a virtual keyboard of the first screen.
6. The mobile terminal of claim 5, wherein the encryption unit is to:
if a target plaintext password corresponding to the original password exists in the preset password mapping relation table, encrypting the original password based on the mapping relation between the target plaintext password and the original password in the preset password mapping table;
and if the target plaintext password corresponding to the original password does not exist in the preset password mapping relation table, encrypting the original password based on preset characters.
7. The mobile terminal of claim 6, wherein the feedback unit is configured to:
if the plaintext password corresponding to the original password exists in the preset password mapping relation table, feeding back the plaintext password corresponding to the original password on a second screen of the mobile terminal;
if the plaintext password corresponding to the original password does not exist in the preset password mapping relation table, feeding back preset characters on a second screen of the mobile terminal to prompt that the password input of the user is wrong;
the second screen is a display screen facing the user in the mobile terminal.
8. The mobile terminal of claim 6, wherein the encryption unit is to:
acquiring a target vibration level corresponding to the original password from the preset password mapping relation table, wherein the preset password mapping relation table comprises a mapping relation between the vibration level and the original password;
and encrypting the original password based on the mapping relation between the target vibration level and the original password in the password mapping table.
9. A mobile terminal, comprising: memory, processor and computer program stored on the memory and executable on the processor, the computer program when executed by the processor implementing the steps of the password input method as claimed in any one of claims 1 to 4.
CN201811195514.1A 2018-10-15 2018-10-15 Password input method and mobile terminal thereof Active CN109446794B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811195514.1A CN109446794B (en) 2018-10-15 2018-10-15 Password input method and mobile terminal thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811195514.1A CN109446794B (en) 2018-10-15 2018-10-15 Password input method and mobile terminal thereof

Publications (2)

Publication Number Publication Date
CN109446794A CN109446794A (en) 2019-03-08
CN109446794B true CN109446794B (en) 2020-06-02

Family

ID=65545288

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811195514.1A Active CN109446794B (en) 2018-10-15 2018-10-15 Password input method and mobile terminal thereof

Country Status (1)

Country Link
CN (1) CN109446794B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110879896B (en) * 2019-11-13 2022-06-03 维沃移动通信有限公司 Encryption and decryption method for folding screen terminal and electronic equipment
CN113139174B (en) * 2021-04-02 2023-07-28 维沃移动通信有限公司 Identity verification method and device

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4087074B2 (en) * 2001-02-05 2008-05-14 株式会社島津製作所 Data processing equipment for analytical instruments
CN200947201Y (en) * 2006-04-07 2007-09-12 鲍道民 Dual-purpose cipher anti-peeping keyboard
CN103995667A (en) * 2014-05-14 2014-08-20 宇龙计算机通信科技(深圳)有限公司 Terminal and terminal screen unlocking method
CN204576659U (en) * 2015-05-06 2015-08-19 福建睿矽微电子科技有限公司 A kind of payment devices
CN105353838A (en) * 2015-09-28 2016-02-24 淄博环能海臣环保技术服务有限公司 Notebook computer with U touch control screen holding gesture input self-setting keyboard
CN105827774A (en) * 2016-05-10 2016-08-03 潘爱松 Mobile phone capable of preventing password from being peeped
CN106161474B (en) * 2016-09-05 2020-03-27 努比亚技术有限公司 Password determination device and method
CN106815534B (en) * 2017-01-17 2020-02-14 Oppo广东移动通信有限公司 Method and device for protecting user privacy and mobile terminal

Also Published As

Publication number Publication date
CN109446794A (en) 2019-03-08

Similar Documents

Publication Publication Date Title
CN109194818B (en) Information processing method and terminal
CN108629171B (en) Unread message processing method and terminal
CN108595946B (en) Privacy protection method and terminal
CN107835286B (en) Method for preventing mistaken unlocking and mobile terminal
CN109145552B (en) Information encryption method and terminal equipment
CN110188524B (en) Information encryption method, information decryption method and terminal
CN109343788B (en) Operation control method of mobile terminal and mobile terminal
CN110457888B (en) Verification code input method and device, electronic equipment and storage medium
CN107609363B (en) Unlocking method and mobile terminal
CN109544172B (en) Display method and terminal equipment
CN110149628B (en) Information processing method and terminal equipment
CN108664818B (en) Unlocking control method and device
CN110990849A (en) Encryption and decryption method for private data and terminal
CN109446794B (en) Password input method and mobile terminal thereof
CN107835297B (en) Information updating method, mobile terminal and computer readable storage medium
CN110929238B (en) Information processing method and device
CN110795746B (en) Information processing method and electronic equipment
CN109753776B (en) Information processing method and device and mobile terminal
CN109992939B (en) Login method and terminal equipment
CN109451011B (en) Information storage method based on block chain and mobile terminal
CN109547330B (en) Information sharing method and device
CN109451143B (en) Call method and mobile terminal
WO2019206224A1 (en) Screen unlocking method and mobile terminal
CN107491685B (en) Face recognition method and mobile terminal
CN110032861B (en) Password setting method and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant