CN110188532A - A kind of cipher code protection method and device - Google Patents

A kind of cipher code protection method and device Download PDF

Info

Publication number
CN110188532A
CN110188532A CN201910366166.8A CN201910366166A CN110188532A CN 110188532 A CN110188532 A CN 110188532A CN 201910366166 A CN201910366166 A CN 201910366166A CN 110188532 A CN110188532 A CN 110188532A
Authority
CN
China
Prior art keywords
character
abscissa
location
click location
determined
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910366166.8A
Other languages
Chinese (zh)
Other versions
CN110188532B (en
Inventor
吕滨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201910366166.8A priority Critical patent/CN110188532B/en
Publication of CN110188532A publication Critical patent/CN110188532A/en
Application granted granted Critical
Publication of CN110188532B publication Critical patent/CN110188532B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses a kind of cipher code protection method and device, belong to field of information security technology, this method comprises: detecting that cursor is located at for inputting in the control of password, if it is determined that the Position Number of current cursor position is located in the predetermined Position Number set to interference position, then after the character that will be received is added to cursor position, determine the location information of simulation click location, location information is sent to currently used input method application, triggering input method applies the character for determining according to location information and simulating click on the input interface currently shown;Receive the information for the character that input method application is sent, the character is not added in the control by control, in this way, it is inserted into some characters during inputting password and is not added to the character of insertion in the control of input password, the password string that third party's input method is remembered can be upset and do not influence normal Password Input, therefore, the safety of terminal can be improved.

Description

A kind of cipher code protection method and device
Technical field
This application involves field of information security technology more particularly to a kind of cipher code protection methods and device.
Background technique
Currently, the type of terminal is more and more, such as mobile phone, iPad, miscellaneous terminal has become the daily life of people Essential electronic product in work.
Generally, third party's input method, such as search dog input method, Baidu's input method, these thirds can be all installed in terminal Square input method has a feature: will record the character string that user often inputs, as long as the first character of subsequent user input will Automatic prompt goes out the character string headed by the character that user often inputs, and referring to Fig. 1, Fig. 1 is the user that the prior art provides Input that the user that third party's input method is reminded after first character often inputs in the control for inputting password with the character Headed by character string schematic diagram, in Fig. 1, the screen-lock password of user setting is " qwe147 ", after repeatedly inputting, the Tripartite's input method can record the character string, once subsequent user inputs initial " q ", third party in the password input box Input method will prompt conventional characters string " qwe147 ", though facilitating user in this way inputs password, by third party's input method Remember that the password of user can be there is great security risk, if terminal loses third party's input method and is also easy to remind to other people Correct screen-lock password out.
As it can be seen that the peace that third party's input method in terminal can remember the password of user and lead to terminal exists in the prior art The lower problem of full property.
Summary of the invention
The embodiment of the present application provides a kind of cipher code protection method and device, to solve third party in terminal in the prior art Input method can remember the password of user and the problem that causes the safety of terminal lower.
In a first aspect, a kind of cipher code protection method provided by the embodiments of the present application, comprising:
Detect that cursor is located at for inputting in the control of password;
It is compiled if it is determined that the Position Number of presently described cursor position is located at the predetermined position to interference position Number set in, then after the character that will be received is added to the cursor position, determine simulation click location Location information, the location information is sent to currently used input method application, trigger the input method apply according to institute It states location information and determines the character for simulating click on the input interface currently shown;
The information for the character that the input method application is sent is received, the character is not added to the control by control In.
In the embodiment of the present application, detect that cursor is located at for inputting in the control of password, however, it is determined where current cursor The Position Number of position is located in the predetermined Position Number set to interference position, then in the character that will be received It is added to after cursor position, determines the location information of simulation click location, location information is sent to currently used Input method application, triggering input method applies the word for determining according to location information and simulating on the input interface currently shown click Symbol receives the information for the character that input method application is sent, which is not added in control by control, in this way, close inputting It is inserted into some characters during code and is not added to the character of insertion in the control of input password, will not influence normal Password Input, and the character string for the composition password that third party's input method is remembered can be upset, even if third party's input method has Therefore the safety of terminal can be improved in the encrypted message that input character prompting function is also not easy to reveal user.
Optionally it is determined that the location information of simulation click location, comprising:
Determine that position is clicked in simulation according to the location information of the click location for the character for being added to the cursor position The location information set.
Optionally, it is determined and is simulated according to the location information of the click location for the character for being added to the cursor position The location information of click location, comprising:
The ordinate for being added to the click location of the character of the cursor position is determined as the simulation and clicks The ordinate of position;And
If it is determined that the abscissa for being added to the click location of the character of the cursor position is more than or equal to institute The half of terminal screen width is stated, then determines the abscissa of the simulation click location according to the abscissa;If it is determined that addition It is less than the half of the terminal screen width to the abscissa of the click location of the character of the cursor position, then basis The width of the abscissa and the terminal screen determines the abscissa of the simulation click location.
Using the above scheme, the position that simulation can be made to click is located in input interface, and the authenticity for simulating click is higher.
Optionally, the abscissa of the simulation click location is determined according to the abscissa, comprising:
M/mono- of the abscissa is determined as to the abscissa of the simulation click location, M is the integer greater than 1.
Optionally, the horizontal seat of the simulation click location is determined according to the width of the abscissa and the terminal screen Mark, comprising:
N/mono- of the sum of the width of the abscissa and the terminal screen is determined as the simulation click location Abscissa, N are the integer greater than 1.
Optionally it is determined that the location information of simulation click location, comprising:
One character of selection is concentrated from target character, each character that the target character is concentrated meets the conduct of setting The requirement of code characters in the control;
According to the corresponding relationship between the character of storage and the location information of click location, determine that the character of selection is corresponding The location information of click location.
Using the above scheme, the position one that simulation can be made to click is positioned in input interface, simulates the authenticity of click more It is high.
Second aspect, a kind of cipher protection apparatus provided by the embodiments of the present application, comprising:
Detection module, for detecting that cursor is located at for inputting in the control of password;
Analog module, for if it is determined that presently described cursor position Position Number be located at it is predetermined wait interfere In the Position Number set of position, then after the character that will be received is added to the cursor position, determine The location information, is sent to currently used input method application, triggers the input by the location information for simulating click location Method application determines the character that click is simulated on the input interface currently shown according to the positional information;
Control module is controlled for receiving the information for the character that the input method application is sent not by the character It is added in the control.
Optionally, the analog module is specifically used for:
Determine that position is clicked in simulation according to the location information of the click location for the character for being added to the cursor position The location information set.
Optionally, the analog module is specifically used for:
The ordinate for being added to the click location of the character of the cursor position is determined as the simulation and clicks The ordinate of position;And
If it is determined that the abscissa for being added to the click location of the character of the cursor position is more than or equal to institute The half of terminal screen width is stated, then determines the abscissa of the simulation click location according to the abscissa;If it is determined that addition It is less than the half of the terminal screen width to the abscissa of the click location of the character of the cursor position, then basis The width of the abscissa and the terminal screen determines the abscissa of the simulation click location.
Optionally, the analog module is specifically used for:
M/mono- of the abscissa is determined as to the abscissa of the simulation click location, M is the integer greater than 1.
Optionally, the analog module is specifically used for:
N/mono- of the sum of the width of the abscissa and the terminal screen is determined as the simulation click location Abscissa, N are the integer greater than 1.
Optionally, the analog module is specifically used for:
One character of selection is concentrated from target character, each character that the target character is concentrated meets the conduct of setting The requirement of code characters in the control;
According to the corresponding relationship between the character of storage and the location information of click location, determine that the character of selection is corresponding The location information of click location.
The third aspect, a kind of electronic equipment provided by the embodiments of the present application, comprising: at least one processor, and with institute State the memory of at least one processor communication connection, in which:
Memory is stored with the instruction that can be executed by least one processor, which is held by least one described processor Row, so that at least one described processor is able to carry out above-mentioned cipher code protection method.
A kind of fourth aspect, computer-readable medium provided by the embodiments of the present application, is stored with computer executable instructions, The computer executable instructions are for executing above-mentioned cipher code protection method.
In addition, second aspect technical effect brought by any design method into fourth aspect can be found in first aspect Technical effect brought by middle difference implementation, details are not described herein again.
These aspects or other aspects of the application can more straightforward in the following description.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is that third party inputs after the user that the prior art provides inputs first character in the control for inputting password The schematic diagram for the character string headed by the character that the user that method is reminded often inputs;
Fig. 2 is the structural schematic diagram of the terminal provided by the embodiments of the present application for realizing cipher code protection method;
Fig. 3 is the flow chart of cipher code protection method provided by the embodiments of the present application;
Fig. 4 is that the location information for the click location that basis provided by the embodiments of the present application is added to the character in control determines Simulate the schematic diagram of the location information of click location;
Fig. 5 is that user provided by the embodiments of the present application inputs third party after first character in the control for inputting password The schematic diagram for the character string headed by the character that the user that input method is reminded often inputs;
Fig. 6 is that the hardware configuration of the electronic equipment provided by the embodiments of the present application for realizing cipher code protection method is illustrated Figure;
Fig. 7 is the structural schematic diagram of cipher protection apparatus provided by the embodiments of the present application.
Specific embodiment
The password of user can be remembered in order to solve third party's input method in terminal in the prior art and leads to the safety of terminal The lower problem of property, the embodiment of the present application provide a kind of cipher code protection method and device.
Preferred embodiment of the present application is illustrated below in conjunction with Figure of description, it should be understood that described herein Preferred embodiment is only used for describing and explaining the application, is not used to limit the application, and in the absence of conflict, this Shen Please in embodiment and embodiment in feature can be combined with each other.
In the embodiment of the present application, detect that cursor is located at for inputting in the control of password, however, it is determined where current cursor The Position Number of position is located in the predetermined Position Number set to interference position, then in the character that will be received It is added to after cursor position, determines the location information of simulation click location, location information is sent to currently used Input method application, triggering input method applies the word for determining according to location information and simulating on the input interface currently shown click Symbol receives the information for the character that input method application is sent, which is not added in control by control, in this way, close inputting It is inserted into some characters during code and is not added to the character of insertion in the control of input password, will not influence normal Password Input, and the character string for the composition password that third party's input method is remembered can be upset, even if third party's input method has Therefore the safety of terminal can be improved in the encrypted message that input character prompting function is also not easy to reveal user.
Terminal in the embodiment of the present application can be mobile terminal, such as mobile phone, IPad, and Fig. 2 shows a kind of terminals 200 Structural schematic diagram.Referring to shown in Fig. 2, terminal 200 includes: processor 210, memory 220, display unit 230, input unit 240, sensor 250, radio frequency (radio frequency, RF) circuit 260 and power supply 270 etc..
Wherein, processor 210 is the control centre of terminal device 200, using various interfaces and connection all parts, By running or execute the software program and/or data that are stored in memory 220, the various functions of terminal device 200 are executed, To carry out integral monitoring to terminal device.
Memory 220 can mainly include storing program area and storage data area, wherein storing program area can store operation system System, various application programs etc.;Storage data area, which can be stored, uses created data etc. according to terminal device 200.In addition, depositing Reservoir 220 may include high-speed random access memory, can also include nonvolatile memory, and a for example, at least disk is deposited Memory device, flush memory device or other volatile solid-state parts etc..
Display unit 230 can be used for showing information input by user or the information and terminal device that are supplied to user 200 various menus etc., display unit 230 may include display panel 231, and display panel 231 can use liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode (OrganicLight-Emitting Diode, OLED) Etc. forms configure.
Input unit 240 can be used for receiving the information such as number or the character of user's input.Input unit 240 may include touch-control Panel 241 and other input equipments 242, wherein it is on it or attached to collect user for touch panel 241, also referred to as touch screen Close touch operation (such as user using any suitable objects or attachment such as finger, felt pens on touch panel 241 or Operation near touch panel 241).Specifically, touch panel 241 can detecte the touch operation of user, and detect touch behaviour Make bring signal, convert the signals into contact coordinate, be sent to processor 220, and receives the life that processor 220 is sent It enables and is executed.Furthermore, it is possible to realize touch-control using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves Panel 241.Other input equipments 242 can include but is not limited to physical keyboard, function key (such as volume control button, switch Machine key etc.), trace ball, mouse, one of operating stick etc. or a variety of.
Certainly, touch panel 241 can cover display panel 231, when touch panel 241 detects touching on it or nearby After touching operation, processor 220 is sent to determine the type of touch event, is followed by subsequent processing device 220 according to the type of touch event Corresponding visual output is provided on display panel 231.Although touch panel 241 and display panel 231 are conducts in Fig. 2 Two independent components realize the function that outputs and inputs of terminal device 200, but in some embodiments it is possible to by touch-control Panel 241 and display panel 231 are integrated and that realizes terminal device 200 output and input function.
Terminal 200 may also include one or more sensors 250, such as acceleration transducer, light sensor and distance Sensor etc..
Terminal 200 may also include RF circuit 260, can be used for being received and sent messages with base station or data.In general, the RF electricity Road 260 includes but is not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (low noise Amplifier, LNA), duplexer etc..In the embodiment of the present application, the RF circuit 260 can by wireless communication with network and Any communication standard or agreement can be used in the communication of other electronic equipments, the wireless communication.
Terminal 200 further includes the power supply 270 (such as battery) powered to all parts, and power supply can pass through power management system It unites logically contiguous with processor 220, to realize the functions such as management charging, electric discharge and power consumption by power-supply management system.
Certainly, according to the needs in concrete application, above-mentioned terminal 200 can also include earpiece, camera, voicefrequency circuit, Other components such as loudspeaker, these components are not shown in Fig. 2, are also no longer described in detail herein.
Referring to Fig. 3, Fig. 3 is a kind of flow chart of cipher code protection method provided by the present application, during introduction below, For applying the method in terminal 200 shown in Fig. 2, the specific implementation process of this method is as follows:
S301: detect that cursor is located at for inputting in the control of password.
S302: judge whether the Position Number of current cursor position is located at the predetermined position to interference position In number set, if so, into S303;Otherwise, into S306.
It is default to each position number remainder in the Position Number set of interference position under a kind of possible embodiment Value after value is identical, wherein preset value is the integer for being less than Q greater than 1, and Q is total position number in control, and general Q is even number.
For example, preset value is 2, the value after each position number remainder 2 in the Position Number set of interference position is 0, then it is combined into { 2,4,6,8 ... Q } to the Position Number collection of interference position, to everybody in the Position Number set of interference position Value after setting number remainder 2 is 1, then is combined into { 1,3,5,7 ... Q-1 } to the Position Number collection of interference position.
Under alternatively possible embodiment, it is also possible to each number in the Position Number set of interference position From be located at 1 into the integer Q it is randomly selected, for example, the Position Number collection to interference position is combined into { 1,2,4,5 ... Q-1 }, or be { 1,2,3 }.
S303: after the character that will be received is added to cursor position, simulation click location is determined Location information.
In the specific implementation, terminal detects that user, can be by the position of the position on the screen after the click of some position Information is sent to input method application, and input method, which is applied, determines word that user clicks on current input interface according to the location information Symbol, and the character is sent to terminal, then added the character in the control for being used to input password by terminal, to complete one The input of a character analyzes the process it is found that directly can to the location information that input method application sends click location from terminal The process of analog subscriber input character, the embodiment of the present application are based on this and interfere come the character remembered to input method application 's.
It, can be according to the click location for the character for being added to cursor position under a kind of possible embodiment Location information determines the location information of simulation click location.
For example, be added to the click location of the character of cursor position coordinate be (x, y), two neighboring character it Between between be divided into (Δ x, Δ y), it is possible to by (x+ Δ x, y) as simulation click location coordinate information, can also be by (x- Δ x, y) as the coordinate information for simulating click location.
For another example, when coordinate origin is located in the long side of terminal screen, cursor position can be added to The ordinate of the click location of character is determined as simulating the ordinate of click location;If it is determined that being added to cursor position The abscissa of the click location of character is more than or equal to the half of terminal screen width W, then can determine mould according to the abscissa The abscissa of quasi- click location, for example, M/mono- of abscissa is determined as to simulate the abscissa of click location, M is greater than 1 Integer;If it is determined that being added to the abscissa of the click location of the character of cursor position less than terminal screen width W's Half can then determine the abscissa of simulation click location, for example, by abscissa according to the width W of the abscissa and terminal screen It is determined as simulating the abscissa of click location with N/mono- of the sum of the width of terminal screen, N is the integer greater than 1.
Specifically, referring to fig. 4, Fig. 4 is the click position that basis provided by the embodiments of the present application is added to the character in control The location information set determines the schematic diagram of the location information of simulation click location, wherein coordinate origin is located at a left side for terminal screen Upper apex, it is assumed that the coordinate information for being added to the click location of the character of cursor position is (x, y), if x < W, The coordinate for simulating click location can be (x+ (W-x)/2, y);If x > W/2, the coordinate for simulating click location can be (x/ 2, y), wherein if simulation click location abscissa x/2, x+ (W-x)/2 just between two character keys, can be by horizontal seat Mark x/2 deviates to the right default pixel, such as 5 pixels, to guarantee that a character can be got.
With continued reference to Fig. 4, if the character of certain input is q, the coordinate of the click location of q is (x1, y1), because of x1 < W, So the coordinate for simulating click location is (x1+ (W-x1)/2, y1), if the character of certain input is k, the seat of the click location of k It is designated as (x2, y2), because of x2 > W/2, the coordinate for simulating click location is (x2/2, y2).
Generally, the character that can be used as password is alphabetical, digital and underscore, so, it can also be from these characters It selects some character composition target character collection and then the character for selecting click to be simulated is concentrated from target character, therefore, one Under the possible embodiment of kind, the location information of simulation click location is determined also according to following steps: being concentrated and is selected from target character A character is selected, according to the corresponding relationship between the character of storage and the location information of click location, determines the character pair of selection The location information for the click location answered, wherein target character concentrate each character meet setting as close in control The requirement of code character.
Location information: being sent to currently used input method application by S304, and triggering input method is applied according to location information Determine the character that click is simulated on the input interface currently shown.
In the specific implementation, input method application can not perception terminal screen whether be clicked, only according to terminal send The location information of click location come determine user click character, therefore, when input method application receive terminal transmission position When information, the character for simulating click on the input interface currently shown can be determined according to location information, records the character, and Determining character is sent to terminal.
S305: receiving the information for the character that the simulation that input method application is sent is clicked, which is not added to control by control In part.
In the specific implementation, the character for simulating click is not wrapped to upset the encrypted message that input method application is remembered It is contained in the code characters of user setting, therefore, can control the word that do not click the simulation that the input method received application is sent Symbol is added in control, in this way, would not influence user normally inputs password, user experience is also preferable.
S306: receive character is added to cursor position.
It is subsequent, if receiving password submits request, submit character all in control.
The above process is introduced below with reference to specific embodiment.
Assuming that for input screen-lock password control total number of positions be 8, Position Number be successively from left to right position 1, Position 2 ... position 8, the predetermined Position Number collection to interference position is combined into { 1,3,5,7 }, and assumes user setting Screen-lock password is " qwe147 ".
In the specific implementation, when cursor is located at for inputting in the control of password, cursor is located at position 1, position 1 at first In the Position Number set { 1,3,5,7 } to interference position, then, terminal is in a word for inputting the user received After according at the position 1 where " q " is added to cursor, it may be determined that simulate the location information of click location, wherein the click of " q " The coordinate information of position is (x1, y1), and x1 < W, therefore, the coordinate information for simulating click location is (x1+ (W-x1)/2, y1), it Afterwards, coordinate information (x1+ (W-x1)/2, y1) can be sent to currently used input method application by terminal, trigger input method application The character for simulating click on the input interface currently shown is determined according to (x1+ (W-x1)/2, y1), which is sent to end End, terminal controls after receiving the character is not added to the character in control, it is assumed that the word at (x1+ (W-x1)/2, y1) Symbol is " y ", then, third party's input method will remember " qy ".
Further, cursor is moved at the position 2 in control, and position 2 is not located at the Position Number collection to interference position It closes in { 1,3,5,7 }, therefore, terminal only needs a character " w " for inputting the user received to be added to cursor position 2 Place, at this point, third party's input method can remember " qyw ".
Further, cursor is moved to the position 3 in control, position 3 be located to interference position Position Number set 1, 3,5,7 } in, at this point, terminal redefines mould after the character " e " that will be received is added at cursor position 3 The location information of quasi- click location, wherein the coordinate information of the click location of " e " is (x3, y3), and x3 < W, therefore, simulation are clicked The coordinate information of position is (x3+ (W-x3)/2, y3), coordinate information (x3+ (W-x3)/2, y3) is sent to currently used defeated Enter method application, triggering input method, which is applied, determines that simulation is clicked on the input interface currently shown according to (x3+ (W-x3)/2, y3) Character, which is sent to terminal, terminal controls after receiving the character is not added to the character in control, it is assumed that Character at (x3+ (W-x3)/2, y3) is " u ", then, third party's input method will remember " qyweu ".
Further, cursor is moved at the position 4 in control, and position 4 is not located at the Position Number collection to interference position It closes in { 1,3,5,7 }, terminal only needs a character " 1 " for inputting the user received to be added at cursor position 4 i.e. Can, at this point, third party's input method can remember " qyweu1 ".
Further, cursor is moved at the position 5 in control, and position 5 is located at the Position Number set to interference position In { 1,3,5,7 }, GC group connector needs after the character " 4 " that will be received is added at cursor position 5, again Determine simulation click location location information, wherein the coordinate information of the click location of " 4 " be (x4, y4), x4 < W, therefore, mould The coordinate information of quasi- click location is (x4+ (W-x4)/2, y4), and later, terminal sends out coordinate information (x4+ (W-x4)/2, y4) Currently used input method application is given, triggering input method is applied defeated what is currently shown according to (x4+ (W-x4)/2, y4) determination The character is sent to terminal by the character for entering to simulate click on interface, and terminal is controlled not after receiving the character by the character It is added in control, it is assumed that the character at (x4+ (W-x4)/2, y4) is " 6 ", then, third party's input method will be remembered “qyweu146”。
Further, cursor is moved at the position 6 in control, and position 6 is not located at the Position Number collection to interference position It closes in { 1,3,5,7 }, terminal only needs a character " 7 " for inputting the user received to be added at cursor position 6 i.e. Can, at this point, third party's input method can remember " qyweu1467 ".
So far, user completes the input of screen-lock password, and by the process, third party's input method eventually remembers character string " qyweu1467 ", then, subsequent, once detecting that user inputs initial character " q ", the prompt of third party's input method will be " qyweu1467 ", as shown in Figure 5.
The password that the embodiment of the present application can allow third party's input method to be remembered is inserted into some characters, and such tripartite's input method is just As soon as a character string correctly relevant to user password can not be prompted, naturally also can not carry out relevant operation therefore can Improve the safety of terminal.
It is shown in Figure 6, it is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application, the electronic equipment packet Include the physical devices such as transceiver 601 and processor 602, wherein processor 602 can be a central processing unit (central processing unit, CPU), microprocessor, specific integrated circuit, programmable logic circuit, large-scale integrated Circuit or for digital processing element etc..Transceiver 601 carries out data transmit-receive for electronic equipment and other equipment.
The electronic equipment can also include that memory 603 is used for the software instruction that storage processor 602 executes, and may be used also certainly To store some other data of electronic equipment needs, such as the identification information of electronic equipment, the encryption information of electronic equipment, user Data etc..Memory 603 can be volatile memory (volatile memory), such as random access memory (random-access memory, RAM);Memory 603 is also possible to nonvolatile memory (non-volatile Memory), such as read-only memory (read-onlymemory, ROM), flash memory (flash memory), hard disk (hard disk drive, HDD) or solid state hard disk (solid-state drive, SSD) or memory 603 are can to use In carry or storage have instruction or data structure form desired program code and can by computer access it is any its His medium, but not limited to this.Memory 603 can be the combination of above-mentioned memory.
Specifically connecting between above-mentioned processor 602, memory 603 and transceiver 601 is not limited in the embodiment of the present application Connect medium.The embodiment of the present application in Fig. 6 only between memory 603, processor 602 and transceiver 601 pass through bus 604 It is illustrated for connection, bus is indicated in Fig. 6 with thick line, the connection type between other components, is only to carry out schematically Illustrate, does not regard it as and be limited.The bus can be divided into address bus, data/address bus, control bus etc..For convenient for expression, Fig. 6 In only indicated with a thick line, it is not intended that an only bus or a type of bus.
Processor 602 can be the processor of specialized hardware or runs software, when processor 602 can be with runs software, Processor 602 reads the software instruction that memory 603 stores, and under the driving of the software instruction, executes previous embodiment Involved in cipher code protection method.
When the method provided in the embodiment of the present application is realized with software or hardware or software and hardware combining, electronic equipment In may include multiple functional modules, each functional module may include software, hardware or its combination.Specifically, referring to Fig. 7 institute Show, be cipher protection apparatus provided by the embodiments of the present application structural schematic diagram, including detection module 701, analog module 702, Control module 703.
Detection module 701, for detecting that cursor is located at for inputting in the control of password;
Analog module 702, for if it is determined that presently described cursor position Position Number be located at it is predetermined to In the Position Number set of interference position, then after the character that will be received is added to the cursor position, The location information, is sent to currently used input method application by the location information for determining simulation click location, described in triggering Input method application determines the character that click is simulated on the input interface currently shown according to the positional information;
Control module 703 is controlled for receiving the information for the character that the input method application is sent not by the word Symbol is added in the control.
Optionally, the analog module 702 is specifically used for:
Determine that position is clicked in simulation according to the location information of the click location for the character for being added to the cursor position The location information set.
Optionally, the analog module 702 is specifically used for:
The ordinate for being added to the click location of the character of the cursor position is determined as the simulation and clicks The ordinate of position;And
If it is determined that the abscissa for being added to the click location of the character of the cursor position is more than or equal to institute The half of terminal screen width is stated, then determines the abscissa of the simulation click location according to the abscissa;If it is determined that addition It is less than the half of the terminal screen width to the abscissa of the click location of the character of the cursor position, then basis The width of the abscissa and the terminal screen determines the abscissa of the simulation click location.
Optionally, the analog module 702 is specifically used for:
M/mono- of the abscissa is determined as to the abscissa of the simulation click location, M is the integer greater than 1.
Optionally, the analog module 702 is specifically used for:
N/mono- of the sum of the width of the abscissa and the terminal screen is determined as the simulation click location Abscissa, N are the integer greater than 1.
Optionally, the analog module 702 is specifically used for:
One character of selection is concentrated from target character, each character that the target character is concentrated meets the conduct of setting The requirement of code characters in the control;
According to the corresponding relationship between the character of storage and the location information of click location, determine that the character of selection is corresponding The location information of click location.
It is schematical, only a kind of logical function partition to the division of module in the embodiment of the present application, it is practical to realize When there may be another division manner, in addition, each functional module in each embodiment of the application can integrate at one It manages in device, is also possible to physically exist alone, can also be integrated in two or more modules in a module.Modules Mutual coupling can be to be realized through some interfaces, these interfaces are usually electrical communication interface, but are also not excluded for It may be mechanical interface or other form interfaces.Therefore, module can be or can not also as illustrated by the separation member It is to be physically separated, both can be located in one place, may be distributed on same or distinct device different location.On It states integrated module both and can take the form of hardware realization, can also be realized in the form of software function module.
The embodiment of the present application also provides a kind of terminal, including the device under any of the above embodiment.
The embodiment of the present application also provides a kind of computer readable storage medium, it is stored as holding needed for executing above-mentioned processor Capable computer executable instructions, it includes the programs for execution needed for executing above-mentioned processor.
In some possible embodiments, the various aspects of cipher code protection method provided by the present application are also implemented as A kind of form of program product comprising program code, when described program product is run on an electronic device, described program generation Code is for making the electronic equipment execute the password according to the various illustrative embodiments of the application of this specification foregoing description Step in guard method.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example may be-but not limited to-electricity, magnetic, optical, electromagnetic, red The system of outside line or semiconductor, device or device, or any above combination.The more specific example of readable storage medium storing program for executing (non exhaustive list) includes: the electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc Read memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The program product for cryptoguard of presently filed embodiment can use the read-only storage of portable compact disc Device (CD-ROM) and including program code, and can run on the computing device.However, the program product of the application is not limited to This, in this document, readable storage medium storing program for executing can be any tangible medium for including or store program, which can be commanded Execution system, device or device use or in connection.
Readable signal medium may include in a base band or as the data-signal that carrier wave a part is propagated, wherein carrying Readable program code.The data-signal of this propagation can take various forms, including --- but being not limited to --- electromagnetism letter Number, optical signal or above-mentioned any appropriate combination.Readable signal medium can also be other than readable storage medium storing program for executing it is any can Read medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or Program in connection.
The program code for including on readable medium can transmit with any suitable medium, including --- but being not limited to --- Wirelessly, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the application operation program Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind --- including local area network (LAN) or extensively Domain net (WAN)-be connected to user calculating equipment, or, it may be connected to external computing device (such as utilize Internet service Provider is connected by internet).
It should be noted that although being referred to several unit or sub-units of device in the above detailed description, this stroke It point is only exemplary not enforceable.In fact, according to presently filed embodiment, it is above-described two or more The feature and function of unit can embody in a unit.Conversely, the feature and function of an above-described unit can It is to be embodied by multiple units with further division.
In addition, although describing the operation of the application method in the accompanying drawings with particular order, this do not require that or Hint must execute these operations in this particular order, or have to carry out shown in whole operation be just able to achieve it is desired As a result.Additionally or alternatively, it is convenient to omit multiple steps are merged into a step and executed by certain steps, and/or by one Step is decomposed into execution of multiple steps.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The application is process of the reference according to method, apparatus (system) and computer program product of the embodiment of the present application Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the application range.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies Within, then the application is also intended to include these modifications and variations.

Claims (15)

1. a kind of cipher code protection method characterized by comprising
Detect that cursor is located at for inputting in the control of password;
If it is determined that the Position Number of presently described cursor position is located at the predetermined Position Number collection to interference position In conjunction, then after the character that will be received is added to the cursor position, the position of simulation click location is determined The location information, is sent to currently used input method application by confidence breath, is triggered the input method and is applied according to institute's rheme Confidence breath determines the character that click is simulated on the input interface currently shown;
The information for the character that the input method application is sent is received, the character is not added in the control by control.
2. the method as described in claim 1, which is characterized in that determine the location information of simulation click location, comprising:
Simulation click location is determined according to the location information of the click location for the character for being added to the cursor position Location information.
3. method according to claim 2, which is characterized in that according to the point for the character for being added to the cursor position The location information for hitting position determines the location information of simulation click location, comprising:
The ordinate for being added to the click location of the character of the cursor position is determined as the simulation click location Ordinate;And
If it is determined that the abscissa for being added to the click location of the character of the cursor position is more than or equal to the end The half of screen width is held, then determines the abscissa of the simulation click location according to the abscissa;If it is determined that being added to institute The abscissa for stating the click location of the character of cursor position is less than the half of the terminal screen width, then according to The width of abscissa and the terminal screen determines the abscissa of the simulation click location.
4. method as claimed in claim 3, which is characterized in that determine the cross of the simulation click location according to the abscissa Coordinate, comprising:
M/mono- of the abscissa is determined as to the abscissa of the simulation click location, M is the integer greater than 1.
5. method as claimed in claim 3, which is characterized in that determined according to the width of the abscissa and the terminal screen The abscissa of the simulation click location, comprising:
N/mono- of the sum of the width of the abscissa and the terminal screen is determined as to the horizontal seat of the simulation click location Mark, N are the integer greater than 1.
6. the method as described in claim 1, which is characterized in that determine the location information of simulation click location, comprising:
One character of selection is concentrated from target character, each character that the target character is concentrated meets described in the conduct of setting The requirement of code characters in control;
According to the corresponding relationship between the character of storage and the location information of click location, the corresponding click of the character of selection is determined The location information of position.
7. a kind of cipher protection apparatus characterized by comprising
Detection module, for detecting that cursor is located at for inputting in the control of password;
Analog module, for if it is determined that presently described cursor position Position Number be located at it is predetermined to interference position Position Number set in, then after the character that will be received is added to the cursor position, determine simulation The location information is sent to currently used input method application by the location information of click location, is triggered the input method and is answered With the determining character for simulating click on the input interface currently shown according to the positional information;
Control module, for receiving the information for the character that the input method application is sent, control is not added the character Into the control.
8. device as claimed in claim 7, which is characterized in that the analog module is specifically used for:
Simulation click location is determined according to the location information of the click location for the character for being added to the cursor position Location information.
9. device as claimed in claim 8, which is characterized in that the analog module is specifically used for:
The ordinate for being added to the click location of the character of the cursor position is determined as the simulation click location Ordinate;And
If it is determined that the abscissa for being added to the click location of the character of the cursor position is more than or equal to the end The half of screen width is held, then determines the abscissa of the simulation click location according to the abscissa;If it is determined that being added to institute The abscissa for stating the click location of the character of cursor position is less than the half of the terminal screen width, then according to The width of abscissa and the terminal screen determines the abscissa of the simulation click location.
10. device as claimed in claim 9, which is characterized in that the analog module is specifically used for:
M/mono- of the abscissa is determined as to the abscissa of the simulation click location, M is the integer greater than 1.
11. device as claimed in claim 9, which is characterized in that the analog module is specifically used for:
N/mono- of the sum of the width of the abscissa and the terminal screen is determined as to the horizontal seat of the simulation click location Mark, N are the integer greater than 1.
12. device as claimed in claim 7, which is characterized in that the analog module is specifically used for:
One character of selection is concentrated from target character, each character that the target character is concentrated meets described in the conduct of setting The requirement of code characters in control;
According to the corresponding relationship between the character of storage and the location information of click location, the corresponding click of the character of selection is determined The location information of position.
13. a kind of electronic equipment characterized by comprising at least one processor, and it is logical at least one described processor Believe the memory of connection, in which:
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one It manages device to execute, so that at least one described processor is able to carry out the method as described in claim 1 to 6 any claim.
14. a kind of computer-readable medium, is stored with computer executable instructions, which is characterized in that the computer is executable Instruction is for executing the method as described in claim 1 to 6 any claim.
15. a kind of terminal, which is characterized in that including the device as described in claim 7~12 is any.
CN201910366166.8A 2019-05-05 2019-05-05 Password protection method and device Active CN110188532B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910366166.8A CN110188532B (en) 2019-05-05 2019-05-05 Password protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910366166.8A CN110188532B (en) 2019-05-05 2019-05-05 Password protection method and device

Publications (2)

Publication Number Publication Date
CN110188532A true CN110188532A (en) 2019-08-30
CN110188532B CN110188532B (en) 2020-12-15

Family

ID=67715673

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910366166.8A Active CN110188532B (en) 2019-05-05 2019-05-05 Password protection method and device

Country Status (1)

Country Link
CN (1) CN110188532B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111914248A (en) * 2020-08-18 2020-11-10 科大讯飞股份有限公司 Password input method, device, equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040075773A1 (en) * 2002-10-21 2004-04-22 Junichi Kimura Scrambler, descrambler and the program for scrambling or descrambling
CN101101625A (en) * 2007-08-07 2008-01-09 江雨 Input data safe treatment method and device
CN103400059A (en) * 2006-07-19 2013-11-20 先进追踪和寻踪公司 Method and device for securing and authenticating document
CN104143068A (en) * 2014-07-16 2014-11-12 宇龙计算机通信科技(深圳)有限公司 Password authentication method and system
KR20150072679A (en) * 2013-12-20 2015-06-30 노틸러스효성 주식회사 Method of providing personal password input pad at ATM
CN105160215A (en) * 2015-06-30 2015-12-16 努比亚技术有限公司 Digital unlocking method and apparatus
US20170220790A1 (en) * 2005-08-01 2017-08-03 Danilo E. Fonseca Password/encryption protection
CN107633174A (en) * 2016-07-18 2018-01-26 中兴通讯股份有限公司 A kind of user inputs management method and device, terminal
CN108280374A (en) * 2018-02-27 2018-07-13 惠州Tcl移动通信有限公司 A kind of safe input control method of Mobile terminal keyboard, system and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040075773A1 (en) * 2002-10-21 2004-04-22 Junichi Kimura Scrambler, descrambler and the program for scrambling or descrambling
US20170220790A1 (en) * 2005-08-01 2017-08-03 Danilo E. Fonseca Password/encryption protection
CN103400059A (en) * 2006-07-19 2013-11-20 先进追踪和寻踪公司 Method and device for securing and authenticating document
CN101101625A (en) * 2007-08-07 2008-01-09 江雨 Input data safe treatment method and device
KR20150072679A (en) * 2013-12-20 2015-06-30 노틸러스효성 주식회사 Method of providing personal password input pad at ATM
CN104143068A (en) * 2014-07-16 2014-11-12 宇龙计算机通信科技(深圳)有限公司 Password authentication method and system
CN105160215A (en) * 2015-06-30 2015-12-16 努比亚技术有限公司 Digital unlocking method and apparatus
CN107633174A (en) * 2016-07-18 2018-01-26 中兴通讯股份有限公司 A kind of user inputs management method and device, terminal
CN108280374A (en) * 2018-02-27 2018-07-13 惠州Tcl移动通信有限公司 A kind of safe input control method of Mobile terminal keyboard, system and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111914248A (en) * 2020-08-18 2020-11-10 科大讯飞股份有限公司 Password input method, device, equipment and storage medium
CN111914248B (en) * 2020-08-18 2023-10-27 科大讯飞股份有限公司 Password input method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN110188532B (en) 2020-12-15

Similar Documents

Publication Publication Date Title
CN104796385B (en) Terminal binding method, apparatus and system
CN105378624A (en) Showing interactions as they occur on a whiteboard
KR20150079829A (en) Gesture-based conversation processing method, apparatus, and terminal device
CN106462283A (en) Character recognition on a computing device
CN103634717B (en) A kind of method, device and the terminal device of the control of utilization earphone
CN104735657B (en) Security terminal verification method, wireless access point binding method, apparatus and system
CN103425736A (en) Web information recognition method, device and system
US9658770B2 (en) Method and apparatus for processing inputting of character
CN109118160A (en) A kind of information sharing method, device, terminal device and medium
CN104866226A (en) Terminal device and method for controlling same
CN109246027A (en) A kind of method, apparatus and terminal device of network operation
CN106469113A (en) Applied program testing method and system
CN109451130B (en) Mobile terminal testing method and device, mobile terminal and storage medium
CN103685231B (en) Location-based operation demonstration method and server, client
CN106101463A (en) Verification method based on gesture, mobile terminal and system in a kind of Mobile solution
CN107369017A (en) Quick payment implementation method and Related product
CN107817988A (en) The management method and Related product of PUSH message
CN106372488A (en) Device control method and apparatus
CN110188532A (en) A kind of cipher code protection method and device
WO2016131181A1 (en) Fingerprint event processing method, apparatus, and terminal
CN105339946A (en) Apparatus and method for providing security environment
CN103189821B (en) Key input error reduces
CN106897164A (en) A kind of fingerprint typing control method and equipment
WO2015018277A1 (en) Methods and apparatus for implementing sound events
CN103838466B (en) Information processing method, device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant