CN110188532A - A kind of cipher code protection method and device - Google Patents
A kind of cipher code protection method and device Download PDFInfo
- Publication number
- CN110188532A CN110188532A CN201910366166.8A CN201910366166A CN110188532A CN 110188532 A CN110188532 A CN 110188532A CN 201910366166 A CN201910366166 A CN 201910366166A CN 110188532 A CN110188532 A CN 110188532A
- Authority
- CN
- China
- Prior art keywords
- character
- abscissa
- location
- click location
- determined
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
Abstract
The application discloses a kind of cipher code protection method and device, belong to field of information security technology, this method comprises: detecting that cursor is located at for inputting in the control of password, if it is determined that the Position Number of current cursor position is located in the predetermined Position Number set to interference position, then after the character that will be received is added to cursor position, determine the location information of simulation click location, location information is sent to currently used input method application, triggering input method applies the character for determining according to location information and simulating click on the input interface currently shown;Receive the information for the character that input method application is sent, the character is not added in the control by control, in this way, it is inserted into some characters during inputting password and is not added to the character of insertion in the control of input password, the password string that third party's input method is remembered can be upset and do not influence normal Password Input, therefore, the safety of terminal can be improved.
Description
Technical field
This application involves field of information security technology more particularly to a kind of cipher code protection methods and device.
Background technique
Currently, the type of terminal is more and more, such as mobile phone, iPad, miscellaneous terminal has become the daily life of people
Essential electronic product in work.
Generally, third party's input method, such as search dog input method, Baidu's input method, these thirds can be all installed in terminal
Square input method has a feature: will record the character string that user often inputs, as long as the first character of subsequent user input will
Automatic prompt goes out the character string headed by the character that user often inputs, and referring to Fig. 1, Fig. 1 is the user that the prior art provides
Input that the user that third party's input method is reminded after first character often inputs in the control for inputting password with the character
Headed by character string schematic diagram, in Fig. 1, the screen-lock password of user setting is " qwe147 ", after repeatedly inputting, the
Tripartite's input method can record the character string, once subsequent user inputs initial " q ", third party in the password input box
Input method will prompt conventional characters string " qwe147 ", though facilitating user in this way inputs password, by third party's input method
Remember that the password of user can be there is great security risk, if terminal loses third party's input method and is also easy to remind to other people
Correct screen-lock password out.
As it can be seen that the peace that third party's input method in terminal can remember the password of user and lead to terminal exists in the prior art
The lower problem of full property.
Summary of the invention
The embodiment of the present application provides a kind of cipher code protection method and device, to solve third party in terminal in the prior art
Input method can remember the password of user and the problem that causes the safety of terminal lower.
In a first aspect, a kind of cipher code protection method provided by the embodiments of the present application, comprising:
Detect that cursor is located at for inputting in the control of password;
It is compiled if it is determined that the Position Number of presently described cursor position is located at the predetermined position to interference position
Number set in, then after the character that will be received is added to the cursor position, determine simulation click location
Location information, the location information is sent to currently used input method application, trigger the input method apply according to institute
It states location information and determines the character for simulating click on the input interface currently shown;
The information for the character that the input method application is sent is received, the character is not added to the control by control
In.
In the embodiment of the present application, detect that cursor is located at for inputting in the control of password, however, it is determined where current cursor
The Position Number of position is located in the predetermined Position Number set to interference position, then in the character that will be received
It is added to after cursor position, determines the location information of simulation click location, location information is sent to currently used
Input method application, triggering input method applies the word for determining according to location information and simulating on the input interface currently shown click
Symbol receives the information for the character that input method application is sent, which is not added in control by control, in this way, close inputting
It is inserted into some characters during code and is not added to the character of insertion in the control of input password, will not influence normal
Password Input, and the character string for the composition password that third party's input method is remembered can be upset, even if third party's input method has
Therefore the safety of terminal can be improved in the encrypted message that input character prompting function is also not easy to reveal user.
Optionally it is determined that the location information of simulation click location, comprising:
Determine that position is clicked in simulation according to the location information of the click location for the character for being added to the cursor position
The location information set.
Optionally, it is determined and is simulated according to the location information of the click location for the character for being added to the cursor position
The location information of click location, comprising:
The ordinate for being added to the click location of the character of the cursor position is determined as the simulation and clicks
The ordinate of position;And
If it is determined that the abscissa for being added to the click location of the character of the cursor position is more than or equal to institute
The half of terminal screen width is stated, then determines the abscissa of the simulation click location according to the abscissa;If it is determined that addition
It is less than the half of the terminal screen width to the abscissa of the click location of the character of the cursor position, then basis
The width of the abscissa and the terminal screen determines the abscissa of the simulation click location.
Using the above scheme, the position that simulation can be made to click is located in input interface, and the authenticity for simulating click is higher.
Optionally, the abscissa of the simulation click location is determined according to the abscissa, comprising:
M/mono- of the abscissa is determined as to the abscissa of the simulation click location, M is the integer greater than 1.
Optionally, the horizontal seat of the simulation click location is determined according to the width of the abscissa and the terminal screen
Mark, comprising:
N/mono- of the sum of the width of the abscissa and the terminal screen is determined as the simulation click location
Abscissa, N are the integer greater than 1.
Optionally it is determined that the location information of simulation click location, comprising:
One character of selection is concentrated from target character, each character that the target character is concentrated meets the conduct of setting
The requirement of code characters in the control;
According to the corresponding relationship between the character of storage and the location information of click location, determine that the character of selection is corresponding
The location information of click location.
Using the above scheme, the position one that simulation can be made to click is positioned in input interface, simulates the authenticity of click more
It is high.
Second aspect, a kind of cipher protection apparatus provided by the embodiments of the present application, comprising:
Detection module, for detecting that cursor is located at for inputting in the control of password;
Analog module, for if it is determined that presently described cursor position Position Number be located at it is predetermined wait interfere
In the Position Number set of position, then after the character that will be received is added to the cursor position, determine
The location information, is sent to currently used input method application, triggers the input by the location information for simulating click location
Method application determines the character that click is simulated on the input interface currently shown according to the positional information;
Control module is controlled for receiving the information for the character that the input method application is sent not by the character
It is added in the control.
Optionally, the analog module is specifically used for:
Determine that position is clicked in simulation according to the location information of the click location for the character for being added to the cursor position
The location information set.
Optionally, the analog module is specifically used for:
The ordinate for being added to the click location of the character of the cursor position is determined as the simulation and clicks
The ordinate of position;And
If it is determined that the abscissa for being added to the click location of the character of the cursor position is more than or equal to institute
The half of terminal screen width is stated, then determines the abscissa of the simulation click location according to the abscissa;If it is determined that addition
It is less than the half of the terminal screen width to the abscissa of the click location of the character of the cursor position, then basis
The width of the abscissa and the terminal screen determines the abscissa of the simulation click location.
Optionally, the analog module is specifically used for:
M/mono- of the abscissa is determined as to the abscissa of the simulation click location, M is the integer greater than 1.
Optionally, the analog module is specifically used for:
N/mono- of the sum of the width of the abscissa and the terminal screen is determined as the simulation click location
Abscissa, N are the integer greater than 1.
Optionally, the analog module is specifically used for:
One character of selection is concentrated from target character, each character that the target character is concentrated meets the conduct of setting
The requirement of code characters in the control;
According to the corresponding relationship between the character of storage and the location information of click location, determine that the character of selection is corresponding
The location information of click location.
The third aspect, a kind of electronic equipment provided by the embodiments of the present application, comprising: at least one processor, and with institute
State the memory of at least one processor communication connection, in which:
Memory is stored with the instruction that can be executed by least one processor, which is held by least one described processor
Row, so that at least one described processor is able to carry out above-mentioned cipher code protection method.
A kind of fourth aspect, computer-readable medium provided by the embodiments of the present application, is stored with computer executable instructions,
The computer executable instructions are for executing above-mentioned cipher code protection method.
In addition, second aspect technical effect brought by any design method into fourth aspect can be found in first aspect
Technical effect brought by middle difference implementation, details are not described herein again.
These aspects or other aspects of the application can more straightforward in the following description.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen
Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is that third party inputs after the user that the prior art provides inputs first character in the control for inputting password
The schematic diagram for the character string headed by the character that the user that method is reminded often inputs;
Fig. 2 is the structural schematic diagram of the terminal provided by the embodiments of the present application for realizing cipher code protection method;
Fig. 3 is the flow chart of cipher code protection method provided by the embodiments of the present application;
Fig. 4 is that the location information for the click location that basis provided by the embodiments of the present application is added to the character in control determines
Simulate the schematic diagram of the location information of click location;
Fig. 5 is that user provided by the embodiments of the present application inputs third party after first character in the control for inputting password
The schematic diagram for the character string headed by the character that the user that input method is reminded often inputs;
Fig. 6 is that the hardware configuration of the electronic equipment provided by the embodiments of the present application for realizing cipher code protection method is illustrated
Figure;
Fig. 7 is the structural schematic diagram of cipher protection apparatus provided by the embodiments of the present application.
Specific embodiment
The password of user can be remembered in order to solve third party's input method in terminal in the prior art and leads to the safety of terminal
The lower problem of property, the embodiment of the present application provide a kind of cipher code protection method and device.
Preferred embodiment of the present application is illustrated below in conjunction with Figure of description, it should be understood that described herein
Preferred embodiment is only used for describing and explaining the application, is not used to limit the application, and in the absence of conflict, this Shen
Please in embodiment and embodiment in feature can be combined with each other.
In the embodiment of the present application, detect that cursor is located at for inputting in the control of password, however, it is determined where current cursor
The Position Number of position is located in the predetermined Position Number set to interference position, then in the character that will be received
It is added to after cursor position, determines the location information of simulation click location, location information is sent to currently used
Input method application, triggering input method applies the word for determining according to location information and simulating on the input interface currently shown click
Symbol receives the information for the character that input method application is sent, which is not added in control by control, in this way, close inputting
It is inserted into some characters during code and is not added to the character of insertion in the control of input password, will not influence normal
Password Input, and the character string for the composition password that third party's input method is remembered can be upset, even if third party's input method has
Therefore the safety of terminal can be improved in the encrypted message that input character prompting function is also not easy to reveal user.
Terminal in the embodiment of the present application can be mobile terminal, such as mobile phone, IPad, and Fig. 2 shows a kind of terminals 200
Structural schematic diagram.Referring to shown in Fig. 2, terminal 200 includes: processor 210, memory 220, display unit 230, input unit
240, sensor 250, radio frequency (radio frequency, RF) circuit 260 and power supply 270 etc..
Wherein, processor 210 is the control centre of terminal device 200, using various interfaces and connection all parts,
By running or execute the software program and/or data that are stored in memory 220, the various functions of terminal device 200 are executed,
To carry out integral monitoring to terminal device.
Memory 220 can mainly include storing program area and storage data area, wherein storing program area can store operation system
System, various application programs etc.;Storage data area, which can be stored, uses created data etc. according to terminal device 200.In addition, depositing
Reservoir 220 may include high-speed random access memory, can also include nonvolatile memory, and a for example, at least disk is deposited
Memory device, flush memory device or other volatile solid-state parts etc..
Display unit 230 can be used for showing information input by user or the information and terminal device that are supplied to user
200 various menus etc., display unit 230 may include display panel 231, and display panel 231 can use liquid crystal display
(Liquid Crystal Display, LCD), Organic Light Emitting Diode (OrganicLight-Emitting Diode, OLED)
Etc. forms configure.
Input unit 240 can be used for receiving the information such as number or the character of user's input.Input unit 240 may include touch-control
Panel 241 and other input equipments 242, wherein it is on it or attached to collect user for touch panel 241, also referred to as touch screen
Close touch operation (such as user using any suitable objects or attachment such as finger, felt pens on touch panel 241 or
Operation near touch panel 241).Specifically, touch panel 241 can detecte the touch operation of user, and detect touch behaviour
Make bring signal, convert the signals into contact coordinate, be sent to processor 220, and receives the life that processor 220 is sent
It enables and is executed.Furthermore, it is possible to realize touch-control using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
Panel 241.Other input equipments 242 can include but is not limited to physical keyboard, function key (such as volume control button, switch
Machine key etc.), trace ball, mouse, one of operating stick etc. or a variety of.
Certainly, touch panel 241 can cover display panel 231, when touch panel 241 detects touching on it or nearby
After touching operation, processor 220 is sent to determine the type of touch event, is followed by subsequent processing device 220 according to the type of touch event
Corresponding visual output is provided on display panel 231.Although touch panel 241 and display panel 231 are conducts in Fig. 2
Two independent components realize the function that outputs and inputs of terminal device 200, but in some embodiments it is possible to by touch-control
Panel 241 and display panel 231 are integrated and that realizes terminal device 200 output and input function.
Terminal 200 may also include one or more sensors 250, such as acceleration transducer, light sensor and distance
Sensor etc..
Terminal 200 may also include RF circuit 260, can be used for being received and sent messages with base station or data.In general, the RF electricity
Road 260 includes but is not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (low noise
Amplifier, LNA), duplexer etc..In the embodiment of the present application, the RF circuit 260 can by wireless communication with network and
Any communication standard or agreement can be used in the communication of other electronic equipments, the wireless communication.
Terminal 200 further includes the power supply 270 (such as battery) powered to all parts, and power supply can pass through power management system
It unites logically contiguous with processor 220, to realize the functions such as management charging, electric discharge and power consumption by power-supply management system.
Certainly, according to the needs in concrete application, above-mentioned terminal 200 can also include earpiece, camera, voicefrequency circuit,
Other components such as loudspeaker, these components are not shown in Fig. 2, are also no longer described in detail herein.
Referring to Fig. 3, Fig. 3 is a kind of flow chart of cipher code protection method provided by the present application, during introduction below,
For applying the method in terminal 200 shown in Fig. 2, the specific implementation process of this method is as follows:
S301: detect that cursor is located at for inputting in the control of password.
S302: judge whether the Position Number of current cursor position is located at the predetermined position to interference position
In number set, if so, into S303;Otherwise, into S306.
It is default to each position number remainder in the Position Number set of interference position under a kind of possible embodiment
Value after value is identical, wherein preset value is the integer for being less than Q greater than 1, and Q is total position number in control, and general Q is even number.
For example, preset value is 2, the value after each position number remainder 2 in the Position Number set of interference position is
0, then it is combined into { 2,4,6,8 ... Q } to the Position Number collection of interference position, to everybody in the Position Number set of interference position
Value after setting number remainder 2 is 1, then is combined into { 1,3,5,7 ... Q-1 } to the Position Number collection of interference position.
Under alternatively possible embodiment, it is also possible to each number in the Position Number set of interference position
From be located at 1 into the integer Q it is randomly selected, for example, the Position Number collection to interference position is combined into { 1,2,4,5 ...
Q-1 }, or be { 1,2,3 }.
S303: after the character that will be received is added to cursor position, simulation click location is determined
Location information.
In the specific implementation, terminal detects that user, can be by the position of the position on the screen after the click of some position
Information is sent to input method application, and input method, which is applied, determines word that user clicks on current input interface according to the location information
Symbol, and the character is sent to terminal, then added the character in the control for being used to input password by terminal, to complete one
The input of a character analyzes the process it is found that directly can to the location information that input method application sends click location from terminal
The process of analog subscriber input character, the embodiment of the present application are based on this and interfere come the character remembered to input method application
's.
It, can be according to the click location for the character for being added to cursor position under a kind of possible embodiment
Location information determines the location information of simulation click location.
For example, be added to the click location of the character of cursor position coordinate be (x, y), two neighboring character it
Between between be divided into (Δ x, Δ y), it is possible to by (x+ Δ x, y) as simulation click location coordinate information, can also be by (x-
Δ x, y) as the coordinate information for simulating click location.
For another example, when coordinate origin is located in the long side of terminal screen, cursor position can be added to
The ordinate of the click location of character is determined as simulating the ordinate of click location;If it is determined that being added to cursor position
The abscissa of the click location of character is more than or equal to the half of terminal screen width W, then can determine mould according to the abscissa
The abscissa of quasi- click location, for example, M/mono- of abscissa is determined as to simulate the abscissa of click location, M is greater than 1
Integer;If it is determined that being added to the abscissa of the click location of the character of cursor position less than terminal screen width W's
Half can then determine the abscissa of simulation click location, for example, by abscissa according to the width W of the abscissa and terminal screen
It is determined as simulating the abscissa of click location with N/mono- of the sum of the width of terminal screen, N is the integer greater than 1.
Specifically, referring to fig. 4, Fig. 4 is the click position that basis provided by the embodiments of the present application is added to the character in control
The location information set determines the schematic diagram of the location information of simulation click location, wherein coordinate origin is located at a left side for terminal screen
Upper apex, it is assumed that the coordinate information for being added to the click location of the character of cursor position is (x, y), if x < W,
The coordinate for simulating click location can be (x+ (W-x)/2, y);If x > W/2, the coordinate for simulating click location can be (x/
2, y), wherein if simulation click location abscissa x/2, x+ (W-x)/2 just between two character keys, can be by horizontal seat
Mark x/2 deviates to the right default pixel, such as 5 pixels, to guarantee that a character can be got.
With continued reference to Fig. 4, if the character of certain input is q, the coordinate of the click location of q is (x1, y1), because of x1 < W,
So the coordinate for simulating click location is (x1+ (W-x1)/2, y1), if the character of certain input is k, the seat of the click location of k
It is designated as (x2, y2), because of x2 > W/2, the coordinate for simulating click location is (x2/2, y2).
Generally, the character that can be used as password is alphabetical, digital and underscore, so, it can also be from these characters
It selects some character composition target character collection and then the character for selecting click to be simulated is concentrated from target character, therefore, one
Under the possible embodiment of kind, the location information of simulation click location is determined also according to following steps: being concentrated and is selected from target character
A character is selected, according to the corresponding relationship between the character of storage and the location information of click location, determines the character pair of selection
The location information for the click location answered, wherein target character concentrate each character meet setting as close in control
The requirement of code character.
Location information: being sent to currently used input method application by S304, and triggering input method is applied according to location information
Determine the character that click is simulated on the input interface currently shown.
In the specific implementation, input method application can not perception terminal screen whether be clicked, only according to terminal send
The location information of click location come determine user click character, therefore, when input method application receive terminal transmission position
When information, the character for simulating click on the input interface currently shown can be determined according to location information, records the character, and
Determining character is sent to terminal.
S305: receiving the information for the character that the simulation that input method application is sent is clicked, which is not added to control by control
In part.
In the specific implementation, the character for simulating click is not wrapped to upset the encrypted message that input method application is remembered
It is contained in the code characters of user setting, therefore, can control the word that do not click the simulation that the input method received application is sent
Symbol is added in control, in this way, would not influence user normally inputs password, user experience is also preferable.
S306: receive character is added to cursor position.
It is subsequent, if receiving password submits request, submit character all in control.
The above process is introduced below with reference to specific embodiment.
Assuming that for input screen-lock password control total number of positions be 8, Position Number be successively from left to right position 1,
Position 2 ... position 8, the predetermined Position Number collection to interference position is combined into { 1,3,5,7 }, and assumes user setting
Screen-lock password is " qwe147 ".
In the specific implementation, when cursor is located at for inputting in the control of password, cursor is located at position 1, position 1 at first
In the Position Number set { 1,3,5,7 } to interference position, then, terminal is in a word for inputting the user received
After according at the position 1 where " q " is added to cursor, it may be determined that simulate the location information of click location, wherein the click of " q "
The coordinate information of position is (x1, y1), and x1 < W, therefore, the coordinate information for simulating click location is (x1+ (W-x1)/2, y1), it
Afterwards, coordinate information (x1+ (W-x1)/2, y1) can be sent to currently used input method application by terminal, trigger input method application
The character for simulating click on the input interface currently shown is determined according to (x1+ (W-x1)/2, y1), which is sent to end
End, terminal controls after receiving the character is not added to the character in control, it is assumed that the word at (x1+ (W-x1)/2, y1)
Symbol is " y ", then, third party's input method will remember " qy ".
Further, cursor is moved at the position 2 in control, and position 2 is not located at the Position Number collection to interference position
It closes in { 1,3,5,7 }, therefore, terminal only needs a character " w " for inputting the user received to be added to cursor position 2
Place, at this point, third party's input method can remember " qyw ".
Further, cursor is moved to the position 3 in control, position 3 be located to interference position Position Number set 1,
3,5,7 } in, at this point, terminal redefines mould after the character " e " that will be received is added at cursor position 3
The location information of quasi- click location, wherein the coordinate information of the click location of " e " is (x3, y3), and x3 < W, therefore, simulation are clicked
The coordinate information of position is (x3+ (W-x3)/2, y3), coordinate information (x3+ (W-x3)/2, y3) is sent to currently used defeated
Enter method application, triggering input method, which is applied, determines that simulation is clicked on the input interface currently shown according to (x3+ (W-x3)/2, y3)
Character, which is sent to terminal, terminal controls after receiving the character is not added to the character in control, it is assumed that
Character at (x3+ (W-x3)/2, y3) is " u ", then, third party's input method will remember " qyweu ".
Further, cursor is moved at the position 4 in control, and position 4 is not located at the Position Number collection to interference position
It closes in { 1,3,5,7 }, terminal only needs a character " 1 " for inputting the user received to be added at cursor position 4 i.e.
Can, at this point, third party's input method can remember " qyweu1 ".
Further, cursor is moved at the position 5 in control, and position 5 is located at the Position Number set to interference position
In { 1,3,5,7 }, GC group connector needs after the character " 4 " that will be received is added at cursor position 5, again
Determine simulation click location location information, wherein the coordinate information of the click location of " 4 " be (x4, y4), x4 < W, therefore, mould
The coordinate information of quasi- click location is (x4+ (W-x4)/2, y4), and later, terminal sends out coordinate information (x4+ (W-x4)/2, y4)
Currently used input method application is given, triggering input method is applied defeated what is currently shown according to (x4+ (W-x4)/2, y4) determination
The character is sent to terminal by the character for entering to simulate click on interface, and terminal is controlled not after receiving the character by the character
It is added in control, it is assumed that the character at (x4+ (W-x4)/2, y4) is " 6 ", then, third party's input method will be remembered
“qyweu146”。
Further, cursor is moved at the position 6 in control, and position 6 is not located at the Position Number collection to interference position
It closes in { 1,3,5,7 }, terminal only needs a character " 7 " for inputting the user received to be added at cursor position 6 i.e.
Can, at this point, third party's input method can remember " qyweu1467 ".
So far, user completes the input of screen-lock password, and by the process, third party's input method eventually remembers character string
" qyweu1467 ", then, subsequent, once detecting that user inputs initial character " q ", the prompt of third party's input method will be
" qyweu1467 ", as shown in Figure 5.
The password that the embodiment of the present application can allow third party's input method to be remembered is inserted into some characters, and such tripartite's input method is just
As soon as a character string correctly relevant to user password can not be prompted, naturally also can not carry out relevant operation therefore can
Improve the safety of terminal.
It is shown in Figure 6, it is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application, the electronic equipment packet
Include the physical devices such as transceiver 601 and processor 602, wherein processor 602 can be a central processing unit
(central processing unit, CPU), microprocessor, specific integrated circuit, programmable logic circuit, large-scale integrated
Circuit or for digital processing element etc..Transceiver 601 carries out data transmit-receive for electronic equipment and other equipment.
The electronic equipment can also include that memory 603 is used for the software instruction that storage processor 602 executes, and may be used also certainly
To store some other data of electronic equipment needs, such as the identification information of electronic equipment, the encryption information of electronic equipment, user
Data etc..Memory 603 can be volatile memory (volatile memory), such as random access memory
(random-access memory, RAM);Memory 603 is also possible to nonvolatile memory (non-volatile
Memory), such as read-only memory (read-onlymemory, ROM), flash memory (flash memory), hard disk
(hard disk drive, HDD) or solid state hard disk (solid-state drive, SSD) or memory 603 are can to use
In carry or storage have instruction or data structure form desired program code and can by computer access it is any its
His medium, but not limited to this.Memory 603 can be the combination of above-mentioned memory.
Specifically connecting between above-mentioned processor 602, memory 603 and transceiver 601 is not limited in the embodiment of the present application
Connect medium.The embodiment of the present application in Fig. 6 only between memory 603, processor 602 and transceiver 601 pass through bus 604
It is illustrated for connection, bus is indicated in Fig. 6 with thick line, the connection type between other components, is only to carry out schematically
Illustrate, does not regard it as and be limited.The bus can be divided into address bus, data/address bus, control bus etc..For convenient for expression, Fig. 6
In only indicated with a thick line, it is not intended that an only bus or a type of bus.
Processor 602 can be the processor of specialized hardware or runs software, when processor 602 can be with runs software,
Processor 602 reads the software instruction that memory 603 stores, and under the driving of the software instruction, executes previous embodiment
Involved in cipher code protection method.
When the method provided in the embodiment of the present application is realized with software or hardware or software and hardware combining, electronic equipment
In may include multiple functional modules, each functional module may include software, hardware or its combination.Specifically, referring to Fig. 7 institute
Show, be cipher protection apparatus provided by the embodiments of the present application structural schematic diagram, including detection module 701, analog module 702,
Control module 703.
Detection module 701, for detecting that cursor is located at for inputting in the control of password;
Analog module 702, for if it is determined that presently described cursor position Position Number be located at it is predetermined to
In the Position Number set of interference position, then after the character that will be received is added to the cursor position,
The location information, is sent to currently used input method application by the location information for determining simulation click location, described in triggering
Input method application determines the character that click is simulated on the input interface currently shown according to the positional information;
Control module 703 is controlled for receiving the information for the character that the input method application is sent not by the word
Symbol is added in the control.
Optionally, the analog module 702 is specifically used for:
Determine that position is clicked in simulation according to the location information of the click location for the character for being added to the cursor position
The location information set.
Optionally, the analog module 702 is specifically used for:
The ordinate for being added to the click location of the character of the cursor position is determined as the simulation and clicks
The ordinate of position;And
If it is determined that the abscissa for being added to the click location of the character of the cursor position is more than or equal to institute
The half of terminal screen width is stated, then determines the abscissa of the simulation click location according to the abscissa;If it is determined that addition
It is less than the half of the terminal screen width to the abscissa of the click location of the character of the cursor position, then basis
The width of the abscissa and the terminal screen determines the abscissa of the simulation click location.
Optionally, the analog module 702 is specifically used for:
M/mono- of the abscissa is determined as to the abscissa of the simulation click location, M is the integer greater than 1.
Optionally, the analog module 702 is specifically used for:
N/mono- of the sum of the width of the abscissa and the terminal screen is determined as the simulation click location
Abscissa, N are the integer greater than 1.
Optionally, the analog module 702 is specifically used for:
One character of selection is concentrated from target character, each character that the target character is concentrated meets the conduct of setting
The requirement of code characters in the control;
According to the corresponding relationship between the character of storage and the location information of click location, determine that the character of selection is corresponding
The location information of click location.
It is schematical, only a kind of logical function partition to the division of module in the embodiment of the present application, it is practical to realize
When there may be another division manner, in addition, each functional module in each embodiment of the application can integrate at one
It manages in device, is also possible to physically exist alone, can also be integrated in two or more modules in a module.Modules
Mutual coupling can be to be realized through some interfaces, these interfaces are usually electrical communication interface, but are also not excluded for
It may be mechanical interface or other form interfaces.Therefore, module can be or can not also as illustrated by the separation member
It is to be physically separated, both can be located in one place, may be distributed on same or distinct device different location.On
It states integrated module both and can take the form of hardware realization, can also be realized in the form of software function module.
The embodiment of the present application also provides a kind of terminal, including the device under any of the above embodiment.
The embodiment of the present application also provides a kind of computer readable storage medium, it is stored as holding needed for executing above-mentioned processor
Capable computer executable instructions, it includes the programs for execution needed for executing above-mentioned processor.
In some possible embodiments, the various aspects of cipher code protection method provided by the present application are also implemented as
A kind of form of program product comprising program code, when described program product is run on an electronic device, described program generation
Code is for making the electronic equipment execute the password according to the various illustrative embodiments of the application of this specification foregoing description
Step in guard method.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter
Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example may be-but not limited to-electricity, magnetic, optical, electromagnetic, red
The system of outside line or semiconductor, device or device, or any above combination.The more specific example of readable storage medium storing program for executing
(non exhaustive list) includes: the electrical connection with one or more conducting wires, portable disc, hard disk, random access memory
(RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc
Read memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The program product for cryptoguard of presently filed embodiment can use the read-only storage of portable compact disc
Device (CD-ROM) and including program code, and can run on the computing device.However, the program product of the application is not limited to
This, in this document, readable storage medium storing program for executing can be any tangible medium for including or store program, which can be commanded
Execution system, device or device use or in connection.
Readable signal medium may include in a base band or as the data-signal that carrier wave a part is propagated, wherein carrying
Readable program code.The data-signal of this propagation can take various forms, including --- but being not limited to --- electromagnetism letter
Number, optical signal or above-mentioned any appropriate combination.Readable signal medium can also be other than readable storage medium storing program for executing it is any can
Read medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or
Program in connection.
The program code for including on readable medium can transmit with any suitable medium, including --- but being not limited to ---
Wirelessly, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the application operation program
Code, described program design language include object oriented program language-Java, C++ etc., further include conventional
Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user
It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating
Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far
Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind --- including local area network (LAN) or extensively
Domain net (WAN)-be connected to user calculating equipment, or, it may be connected to external computing device (such as utilize Internet service
Provider is connected by internet).
It should be noted that although being referred to several unit or sub-units of device in the above detailed description, this stroke
It point is only exemplary not enforceable.In fact, according to presently filed embodiment, it is above-described two or more
The feature and function of unit can embody in a unit.Conversely, the feature and function of an above-described unit can
It is to be embodied by multiple units with further division.
In addition, although describing the operation of the application method in the accompanying drawings with particular order, this do not require that or
Hint must execute these operations in this particular order, or have to carry out shown in whole operation be just able to achieve it is desired
As a result.Additionally or alternatively, it is convenient to omit multiple steps are merged into a step and executed by certain steps, and/or by one
Step is decomposed into execution of multiple steps.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The application is process of the reference according to method, apparatus (system) and computer program product of the embodiment of the present application
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the application range.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application
Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies
Within, then the application is also intended to include these modifications and variations.
Claims (15)
1. a kind of cipher code protection method characterized by comprising
Detect that cursor is located at for inputting in the control of password;
If it is determined that the Position Number of presently described cursor position is located at the predetermined Position Number collection to interference position
In conjunction, then after the character that will be received is added to the cursor position, the position of simulation click location is determined
The location information, is sent to currently used input method application by confidence breath, is triggered the input method and is applied according to institute's rheme
Confidence breath determines the character that click is simulated on the input interface currently shown;
The information for the character that the input method application is sent is received, the character is not added in the control by control.
2. the method as described in claim 1, which is characterized in that determine the location information of simulation click location, comprising:
Simulation click location is determined according to the location information of the click location for the character for being added to the cursor position
Location information.
3. method according to claim 2, which is characterized in that according to the point for the character for being added to the cursor position
The location information for hitting position determines the location information of simulation click location, comprising:
The ordinate for being added to the click location of the character of the cursor position is determined as the simulation click location
Ordinate;And
If it is determined that the abscissa for being added to the click location of the character of the cursor position is more than or equal to the end
The half of screen width is held, then determines the abscissa of the simulation click location according to the abscissa;If it is determined that being added to institute
The abscissa for stating the click location of the character of cursor position is less than the half of the terminal screen width, then according to
The width of abscissa and the terminal screen determines the abscissa of the simulation click location.
4. method as claimed in claim 3, which is characterized in that determine the cross of the simulation click location according to the abscissa
Coordinate, comprising:
M/mono- of the abscissa is determined as to the abscissa of the simulation click location, M is the integer greater than 1.
5. method as claimed in claim 3, which is characterized in that determined according to the width of the abscissa and the terminal screen
The abscissa of the simulation click location, comprising:
N/mono- of the sum of the width of the abscissa and the terminal screen is determined as to the horizontal seat of the simulation click location
Mark, N are the integer greater than 1.
6. the method as described in claim 1, which is characterized in that determine the location information of simulation click location, comprising:
One character of selection is concentrated from target character, each character that the target character is concentrated meets described in the conduct of setting
The requirement of code characters in control;
According to the corresponding relationship between the character of storage and the location information of click location, the corresponding click of the character of selection is determined
The location information of position.
7. a kind of cipher protection apparatus characterized by comprising
Detection module, for detecting that cursor is located at for inputting in the control of password;
Analog module, for if it is determined that presently described cursor position Position Number be located at it is predetermined to interference position
Position Number set in, then after the character that will be received is added to the cursor position, determine simulation
The location information is sent to currently used input method application by the location information of click location, is triggered the input method and is answered
With the determining character for simulating click on the input interface currently shown according to the positional information;
Control module, for receiving the information for the character that the input method application is sent, control is not added the character
Into the control.
8. device as claimed in claim 7, which is characterized in that the analog module is specifically used for:
Simulation click location is determined according to the location information of the click location for the character for being added to the cursor position
Location information.
9. device as claimed in claim 8, which is characterized in that the analog module is specifically used for:
The ordinate for being added to the click location of the character of the cursor position is determined as the simulation click location
Ordinate;And
If it is determined that the abscissa for being added to the click location of the character of the cursor position is more than or equal to the end
The half of screen width is held, then determines the abscissa of the simulation click location according to the abscissa;If it is determined that being added to institute
The abscissa for stating the click location of the character of cursor position is less than the half of the terminal screen width, then according to
The width of abscissa and the terminal screen determines the abscissa of the simulation click location.
10. device as claimed in claim 9, which is characterized in that the analog module is specifically used for:
M/mono- of the abscissa is determined as to the abscissa of the simulation click location, M is the integer greater than 1.
11. device as claimed in claim 9, which is characterized in that the analog module is specifically used for:
N/mono- of the sum of the width of the abscissa and the terminal screen is determined as to the horizontal seat of the simulation click location
Mark, N are the integer greater than 1.
12. device as claimed in claim 7, which is characterized in that the analog module is specifically used for:
One character of selection is concentrated from target character, each character that the target character is concentrated meets described in the conduct of setting
The requirement of code characters in control;
According to the corresponding relationship between the character of storage and the location information of click location, the corresponding click of the character of selection is determined
The location information of position.
13. a kind of electronic equipment characterized by comprising at least one processor, and it is logical at least one described processor
Believe the memory of connection, in which:
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one
It manages device to execute, so that at least one described processor is able to carry out the method as described in claim 1 to 6 any claim.
14. a kind of computer-readable medium, is stored with computer executable instructions, which is characterized in that the computer is executable
Instruction is for executing the method as described in claim 1 to 6 any claim.
15. a kind of terminal, which is characterized in that including the device as described in claim 7~12 is any.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910366166.8A CN110188532B (en) | 2019-05-05 | 2019-05-05 | Password protection method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910366166.8A CN110188532B (en) | 2019-05-05 | 2019-05-05 | Password protection method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110188532A true CN110188532A (en) | 2019-08-30 |
CN110188532B CN110188532B (en) | 2020-12-15 |
Family
ID=67715673
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910366166.8A Active CN110188532B (en) | 2019-05-05 | 2019-05-05 | Password protection method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110188532B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111914248A (en) * | 2020-08-18 | 2020-11-10 | 科大讯飞股份有限公司 | Password input method, device, equipment and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040075773A1 (en) * | 2002-10-21 | 2004-04-22 | Junichi Kimura | Scrambler, descrambler and the program for scrambling or descrambling |
CN101101625A (en) * | 2007-08-07 | 2008-01-09 | 江雨 | Input data safe treatment method and device |
CN103400059A (en) * | 2006-07-19 | 2013-11-20 | 先进追踪和寻踪公司 | Method and device for securing and authenticating document |
CN104143068A (en) * | 2014-07-16 | 2014-11-12 | 宇龙计算机通信科技(深圳)有限公司 | Password authentication method and system |
KR20150072679A (en) * | 2013-12-20 | 2015-06-30 | 노틸러스효성 주식회사 | Method of providing personal password input pad at ATM |
CN105160215A (en) * | 2015-06-30 | 2015-12-16 | 努比亚技术有限公司 | Digital unlocking method and apparatus |
US20170220790A1 (en) * | 2005-08-01 | 2017-08-03 | Danilo E. Fonseca | Password/encryption protection |
CN107633174A (en) * | 2016-07-18 | 2018-01-26 | 中兴通讯股份有限公司 | A kind of user inputs management method and device, terminal |
CN108280374A (en) * | 2018-02-27 | 2018-07-13 | 惠州Tcl移动通信有限公司 | A kind of safe input control method of Mobile terminal keyboard, system and storage medium |
-
2019
- 2019-05-05 CN CN201910366166.8A patent/CN110188532B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040075773A1 (en) * | 2002-10-21 | 2004-04-22 | Junichi Kimura | Scrambler, descrambler and the program for scrambling or descrambling |
US20170220790A1 (en) * | 2005-08-01 | 2017-08-03 | Danilo E. Fonseca | Password/encryption protection |
CN103400059A (en) * | 2006-07-19 | 2013-11-20 | 先进追踪和寻踪公司 | Method and device for securing and authenticating document |
CN101101625A (en) * | 2007-08-07 | 2008-01-09 | 江雨 | Input data safe treatment method and device |
KR20150072679A (en) * | 2013-12-20 | 2015-06-30 | 노틸러스효성 주식회사 | Method of providing personal password input pad at ATM |
CN104143068A (en) * | 2014-07-16 | 2014-11-12 | 宇龙计算机通信科技(深圳)有限公司 | Password authentication method and system |
CN105160215A (en) * | 2015-06-30 | 2015-12-16 | 努比亚技术有限公司 | Digital unlocking method and apparatus |
CN107633174A (en) * | 2016-07-18 | 2018-01-26 | 中兴通讯股份有限公司 | A kind of user inputs management method and device, terminal |
CN108280374A (en) * | 2018-02-27 | 2018-07-13 | 惠州Tcl移动通信有限公司 | A kind of safe input control method of Mobile terminal keyboard, system and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111914248A (en) * | 2020-08-18 | 2020-11-10 | 科大讯飞股份有限公司 | Password input method, device, equipment and storage medium |
CN111914248B (en) * | 2020-08-18 | 2023-10-27 | 科大讯飞股份有限公司 | Password input method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110188532B (en) | 2020-12-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104796385B (en) | Terminal binding method, apparatus and system | |
CN105378624A (en) | Showing interactions as they occur on a whiteboard | |
KR20150079829A (en) | Gesture-based conversation processing method, apparatus, and terminal device | |
CN106462283A (en) | Character recognition on a computing device | |
CN103634717B (en) | A kind of method, device and the terminal device of the control of utilization earphone | |
CN104735657B (en) | Security terminal verification method, wireless access point binding method, apparatus and system | |
CN103425736A (en) | Web information recognition method, device and system | |
US9658770B2 (en) | Method and apparatus for processing inputting of character | |
CN109118160A (en) | A kind of information sharing method, device, terminal device and medium | |
CN104866226A (en) | Terminal device and method for controlling same | |
CN109246027A (en) | A kind of method, apparatus and terminal device of network operation | |
CN106469113A (en) | Applied program testing method and system | |
CN109451130B (en) | Mobile terminal testing method and device, mobile terminal and storage medium | |
CN103685231B (en) | Location-based operation demonstration method and server, client | |
CN106101463A (en) | Verification method based on gesture, mobile terminal and system in a kind of Mobile solution | |
CN107369017A (en) | Quick payment implementation method and Related product | |
CN107817988A (en) | The management method and Related product of PUSH message | |
CN106372488A (en) | Device control method and apparatus | |
CN110188532A (en) | A kind of cipher code protection method and device | |
WO2016131181A1 (en) | Fingerprint event processing method, apparatus, and terminal | |
CN105339946A (en) | Apparatus and method for providing security environment | |
CN103189821B (en) | Key input error reduces | |
CN106897164A (en) | A kind of fingerprint typing control method and equipment | |
WO2015018277A1 (en) | Methods and apparatus for implementing sound events | |
CN103838466B (en) | Information processing method, device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |