CN115080946A - Password input method and input device - Google Patents

Password input method and input device Download PDF

Info

Publication number
CN115080946A
CN115080946A CN202210686229.XA CN202210686229A CN115080946A CN 115080946 A CN115080946 A CN 115080946A CN 202210686229 A CN202210686229 A CN 202210686229A CN 115080946 A CN115080946 A CN 115080946A
Authority
CN
China
Prior art keywords
image
password input
password
target image
character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210686229.XA
Other languages
Chinese (zh)
Inventor
张兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202210686229.XA priority Critical patent/CN115080946A/en
Publication of CN115080946A publication Critical patent/CN115080946A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses a password input method and a password input device, and belongs to the technical field of electronic equipment. The password input method comprises the following steps: displaying a first password input interface, wherein the first password input interface comprises N first image identifications, the image types of the N first image identifications are different, and N is a positive integer; receiving a first input of first target image identifiers, wherein the N first image identifiers comprise the first target image identifiers; in response to the first input, a first character corresponding to the first target image identification is generated in the first password input interface.

Description

Password input method and input device
Technical Field
The application belongs to the technical field of electronic equipment, and particularly relates to a password input method and a password input device.
Background
In the prior art, the unlocking operation of the electronic equipment can be realized by fingerprint identification, face identification and keyboard input passwords, wherein the fingerprint identification and the face identification can be realized only by arranging an independent sensor, the cost is high, and the unlocking operation is limited by scenes, such as wearing gloves or masks, the identification rate is not high.
The keyboard has the best universality and convenience for inputting the password, but the password is possibly leaked due to the fact that a person peeps the screen.
Disclosure of Invention
The embodiment of the application aims to provide a password input method and a password input device, which can solve the problem that a password input by a keyboard is leaked by peeping a screen.
In a first aspect, an embodiment of the present application provides a password input method, including: displaying a first password input interface, wherein the first password input interface comprises N first image identifications, the image types of the N first image identifications are different, and N is a positive integer; receiving a first input of first target image identifiers, wherein the N first image identifiers comprise the first target image identifiers; in response to the first input, a first character corresponding to the first target image identification is generated in the first password input interface.
In a second aspect, an embodiment of the present application provides a password input apparatus, including: the password input interface comprises N first image identifications, the image types of the N first image identifications are different, and N is a positive integer; the receiving module is used for receiving first input of first target image identifications, and the N first image identifications comprise the first target image identifications; the generating module is used for responding to the first input and generating a first character corresponding to the first target image identification in the first password input interface.
In a third aspect, embodiments of the present application provide an electronic device, including a processor and a memory, where the memory stores a program or instructions executable on the processor, and the program or instructions, when executed by the processor, implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first aspect.
In a fifth aspect, embodiments of the present application provide a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the steps of the method according to the first aspect.
In a sixth aspect, embodiments of the present application provide a computer program product, stored on a storage medium, for execution by at least one processor to implement a method as in the first aspect.
In this application embodiment, when inputing the password through the keyboard control, hide the character plaintext on the keyboard control, and replace the character through the image identification that corresponds, and the different character shows with the image identification of different picture types, this corresponding relation only knows by the user oneself, consequently even the operation process of inputing the password has been seen to other people, also can't learn actual password, when can prevent effectively to inpute the password through the keyboard, because of being peeped the password that the screen leads to and revealing, under the prerequisite of the convenience of guaranteeing password input, password input's security has been improved.
Drawings
FIG. 1 shows one of the flow diagrams of a password entry method according to an embodiment of the present application;
FIG. 2 shows a schematic diagram of a password entry interface according to an embodiment of the present application;
FIG. 3 shows a second flowchart of a password entry method according to an embodiment of the present application;
FIG. 4 shows a schematic diagram of a configuration interface according to an embodiment of the present application;
fig. 5 is a block diagram showing a configuration of a password input apparatus according to an embodiment of the present application;
FIG. 6 shows a block diagram of an electronic device according to an embodiment of the application;
fig. 7 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived from the embodiments in the present application by a person skilled in the art, are within the scope of protection of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The password input method and the input device provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
In some embodiments of the present application, a password input method is provided, and fig. 1 shows one of flowcharts of the password input method according to an embodiment of the present application, and as shown in fig. 1, the method includes:
102, displaying a first password input interface;
in step 102, the password input interface includes N first image identifiers, and the image types of the N first image identifiers are different, where N is a positive integer;
step 104, receiving a first input of a first target image identifier;
in step 104, the N first image identifications include a first target image identification;
step 106, responding to the first input, and generating a first character corresponding to the first target image identification in the first password input interface.
In the embodiment of the application, when a user performs operations such as payment or login of an account, a password needs to be input, a corresponding password input interface is displayed on a screen of an electronic device such as a mobile phone, the password input interface comprises a password input box and a password input control, and the control specifically comprises a keyboard control.
Generally, the keyboard control includes a plurality of input keys, each of which displays a character, such as a number, a letter, or a symbol, and when the corresponding key is activated, such as touched or pressed by a user, the corresponding number, letter, or symbol of the key is input in the password input box, so as to input a password.
In the embodiment of the present application, the plaintext of the character is no longer displayed on the key of the keyboard control, but the image identifier associated with the character is displayed, specifically, the image type of each image identifier is different, and each image type represents one character.
For example, fig. 2 shows a schematic diagram of a password input interface according to an embodiment of the present application, as shown in fig. 2, a keyboard control 202 is displayed in a password input interface 200, the keyboard control 202 is specifically a numeric keyboard, and numeric keys 204 with numbers 0 to 9 correspond thereto, when the keyboard control 202 is displayed, a "0" is no longer displayed on the key with number 0, but an image of an apple is displayed, a "1" is no longer displayed on the key with number 1, but an image of a banana is displayed, a "2" is no longer displayed on the key with number 2, but an image of a watermelon is displayed, and so on.
It is understood that all the keys in the keyboard control may be displayed as images, or only some of the keys in the keyboard control may be displayed as images.
That is, the numbers are replaced by the images of different kinds of fruits, and the fruit image is only known by the user himself, and the fruit images are dynamic, and the apple image representing the number 0 is not the same every time the password is input, such as a red apple is displayed on the key of the number 0 when the password is input for the first time, and a green apple is displayed on the key of the number 0 when the password is input for the second time.
When a password needs to be input, a corresponding password input interface is displayed on a screen of an electronic device such as a mobile phone, and in the password input interface displayed each time, the images of the image identifications displayed on the keys of the keyboard control are different, and the image types are the same.
When the user inputs the password, the system generates and inputs the character corresponding to the image type of the image identifier in the password input interface by inputting the corresponding image identifier, for example, if the user clicks the apple, the corresponding character is determined to be the number 0.
This application embodiment is when inputing the password through the keyboard control, hide the character plaintext on the keyboard control, and replace the character through the image identification that corresponds, and the different character shows with the image identification of different picture types, this corresponding relation only knows by the user oneself, even consequently, other people have seen the operation process of inputing the password, also can't learn actual password, when can prevent the keyboard input password effectively, because of being peeped the password that the screen leads to and revealing, under the prerequisite of the convenience of guaranteeing password input, improve password input's security.
In some embodiments of the present application, the first character is associated with an image type of the first target image identification, the N first image identifications correspond to N image types, and the N image types correspond to N characters, respectively.
In the embodiment of the application, each character input as the password, namely the first character, is associated with one image type, and when the user inputs the password, the user finds the image identifier corresponding to the character to be input, that is, the corresponding character can be input.
In the password input interface, the image types of the displayed N first image identifiers are different, that is, the N first image identifiers correspond to N different image types and represent N different characters.
For example, assume that the user needs to use 3 characters, 1, b, and c, respectively, to input the password. Where the character "1" corresponds to the image type "apple", the character "2" corresponds to the image type "car", and the character "3" corresponds to the image type "cat".
Displaying an image identifier of an apple, an image identifier of a car and an image identifier of a cat in the password input interface. When the user wants to input the character 1, the image identifier of the apple is input, when the user wants to input the character 2, the image identifier of the automobile is input, and when the user wants to input the character 3, the image identifier of the cat is input.
The digital characters are replaced by different types of image identifications, and the user only knows what image identifications replace the digital characters, so that the password can be effectively prevented from being leaked, and the password input safety is improved.
In some embodiments of the present application, after entering a first character corresponding to a first target image identification in a first password entry interface, the method further comprises:
displaying a second password input interface, wherein the second password input interface comprises M second image identifiers, and M is a positive integer;
receiving a second input of second target image identifiers, wherein the M second image identifiers comprise the second target image identifiers;
generating a second character corresponding to a second target image identification in a second password input interface in response to a second input;
and under the condition that the first character and the second character are the same, the image types corresponding to the first target image identifier and the second target image identifier are the same, and the first target image identifier and the second target image identifier are different.
In the embodiment of the application, in the password input interface displayed each time, the images themselves of the image identifiers displayed on the keys of the keyboard control are different, and the image types are the same.
Specifically, after the first password input interface is displayed, when the user needs to input the password again, a new second password input interface is displayed, in the second password input interface, characters used for inputting the password are replaced by second image identifiers, and the user can generate and input second characters in the password input interface by inputting the second image identifiers.
And for the same character, the first image identifier in the first password input interface is different from the second image identifier in the second password input interface, but the corresponding image types are the same.
For example, for the number "1", the image type corresponding to the number "1" is apple, in the first password input interface, the first image identifier corresponding to the number 1 is an image of a "green apple", and in the second password input interface, the second image identifier corresponding to the number 1 is a different image of a "red apple". Both are images of apples, but are certainly different images.
By replacing characters with different image identifications and keeping the same image type corresponding to the same characters when the password is input every time, the situation that the password is exposed to bystanders can be further reduced, and password input safety is improved.
In some embodiments of the present application, fig. 3 illustrates a second flowchart of a password input method according to an embodiment of the present application, and as illustrated in fig. 3, before displaying the first password input interface, the method further includes:
step 302, displaying a configuration interface;
in step 302, the configuration interface includes P second characters, where P is a positive integer;
step 304, receiving a third input of the target character;
in step 304, the P third characters include target characters;
step 306, responding to a third input, and displaying at least one preset image type;
step 308, receiving a fourth input of the target image type;
in step 308, the at least one preset image type comprises a target image type;
step 310, in response to the fourth input, establishing an association relationship between the target character and the target image type.
In the embodiment of the application, the user can freely configure the image type of the image identifier displayed instead of different characters.
Specifically, fig. 4 shows a schematic diagram of a configuration interface according to an embodiment of the present application, and as shown in fig. 4, characters from 0 to 9, that is, the second character, are displayed in the configuration interface 400 by taking a configuration numeric keyboard as an example.
The user may configure a corresponding image type for each character, for example, after the user selects the number 0, the system pops up a menu interface, and a plurality of preset image types, such as fruits including apples, bananas, watermelons, etc., or animals, such as cats, dogs, mice, etc., are displayed in the menu interface.
For example, under an image type apple, a plurality of different apple images such as a red apple, a green apple, a yellow apple and the like can be included, under an image type cat, images of a plurality of different cats such as a black cat, a white cat, a three-flower cat and the like can be included, on one hand, understanding by a user is facilitated, and on the other hand, image identifications which may appear are displayed to the user in advance.
In some embodiments, the preset image type may be an image category generated based on an existing image in a mobile phone album of the user, and specifically, the image in the mobile phone album of the user may be recognized and classified by an image recognition algorithm, and at least one preset image type is generated based on the classified image category, where the image in each preset image type is an image in the mobile phone album of the user, for example, multiple image types may be generated based on a person in the album, specifically, "an image of dad", "an image of mom", "an image of friend 1", and each image type may correspond to one character.
In other embodiments, the preset image types may be image types automatically classified by the system, and each image of the preset image type may be an image acquired by the system from a network according to the image type, for example, for an image type "apple", the system automatically acquires and downloads a plurality of different apple pictures on the server for display.
If the user further selects an image type, if the user selects apple, the system automatically establishes the association relationship between the number 0 and the image type apple, and when the user subsequently inputs a password, an image identifier of the apple is displayed on a key corresponding to the number 0 on a keyboard control in a password input interface to replace the character of the number 0, so that the character is hidden, and the password input safety is improved.
It can be understood that when the user selects an image type, a preview image of each image type can be displayed at the same time, for example, when the user selects an apple, an image of an apple is displayed as a preview, and when the user selects a cat, an image of a cat is displayed as a preview. The preview images may be example images stored locally or images acquired through a network, which is not limited in this application.
It can be understood that the user may set an image type for all characters that can be input as a password, and when the keyboard control is displayed on the password input interface, an image identifier is displayed on each key. The user may also set the image type for only a part of the characters, that is, when the keyboard control is displayed on the password input interface, only the characters of the image type set by the user are replaced with the image identifier of the corresponding type.
It can be understood that the image type set by the user may be unique and fixed, for example, set as "apple", and the corresponding image identifier always displays the image of apple. The user may also set the image type to a broader type, such as "fruit", and the corresponding image identification may show apples, and may also show bananas or watermelons.
In some embodiments, the user may also set the image type to "random". Specifically, since not all characters are set as a part of the password, the user may set the image type of the character, which is not called a password component, to be random, and the image identifier set as a random image type is also random every time the password input interface is displayed, for example, when the password input interface is displayed for the first time, the image identifier of the random image type is displayed as a mouse, and when the password input interface is displayed for the second time, the image identifier of the random image type is displayed as a tree. It can be understood that the random image type will not be repeated with the image type set by the user, if the user sets "0" as apple and "9" as random, then the image type of the image identifier corresponding to "9" will not be apple.
By allowing the user to associate the characters and the image types, when the password input interface is displayed, the corresponding relation between the image identification displayed instead of the characters and the corresponding characters is only known by the user, so that the password input safety is further improved, and the risk of password leakage is reduced.
In some embodiments of the present application, prior to displaying the first password input interface, the method further comprises: displaying a first password input interface under the condition that the current scene information is detected to accord with the preset scene information; and displaying a third password input interface under the condition that the current scene information does not accord with the preset scene, wherein the third password input interface comprises N fourth characters.
In the embodiment of the application, whether to hide the plaintext of the characters on the keyboard control can be determined according to the specific scene of the current input password.
Specifically, when it is detected that a password needs to be input, current scene information is detected first before a password input interface is displayed. The scene information comprises important scenes and general scenes, wherein the password security level of the important scenes is higher, such as payment scenes, and the password security level of the general scenes is basically relatively lower, such as when entertainment software is logged in.
Taking a payment scene as a preset scene as an example, when a scene needing password input at present is detected to be the payment scene, if a payment link is detected, a first password input interface is displayed, and in the first password input interface, a character plaintext on a keyboard control is hidden and replaced by an image identifier.
If the current scene needing password input is detected to be a common scene, if the current scene needing password input is detected to be a video website, a third password input interface is displayed, and in the third password input interface, characters on the keyboard control are displayed according to the original plaintext, so that the password input efficiency is improved.
According to the method and the device, whether the character plaintext on the keyboard control is hidden or not is judged according to the scene information of the input password, so that the convenience of inputting the password in an unimportant scene is improved and the password input efficiency is improved on the premise of ensuring the password input safety and preventing the important password from being leaked.
In some embodiments of the present application, a password input apparatus is provided, and fig. 5 shows a block diagram of a password input apparatus according to an embodiment of the present application, and as shown in fig. 5, a password input apparatus 500 includes:
a display module 502, configured to display a first password input interface, where the password input interface includes N first image identifiers, and the image types of the N first image identifiers are different, where N is a positive integer;
a receiving module 504, configured to receive a first input of first target image identifiers, where N first image identifiers include a first target image identifier;
a generating module 506, configured to generate, in response to the first input, a first character generating module corresponding to the first target image identifier in the first password input interface.
This application embodiment is when inputing the password through the keyboard control, hide the character plaintext on the keyboard control, and replace the character through the image identification that corresponds, and the different character shows with the image identification of different picture types, this corresponding relation only knows by the user oneself, even consequently, other people have seen the operation process of inputing the password, also can't learn actual password, when can prevent the keyboard input password effectively, because of being peeped the password that the screen leads to and revealing, under the prerequisite of the convenience of guaranteeing password input, improve password input's security.
In some embodiments of the present application, the first character is associated with an image type of the first target image identification, the N first image identifications correspond to N image types, and the N image types correspond to N characters, respectively.
In the embodiment of the application, the digital characters are replaced by different types of image identifications, and the user knows the image identifications instead of the digital characters, so that the password can be effectively prevented from being leaked, and the password input safety is improved.
In some embodiments of the present application, the display module is further configured to display a second password input interface, where the second password input interface includes M second image identifiers, and M is a positive integer;
the receiving module is further used for receiving a second input of second target image identifications, and the M second image identifications comprise second target image identifications;
the generating module is further used for responding to a second input and generating a second character corresponding to the second target image identification in a second password input interface;
and under the condition that the first character and the second character are the same, the image types corresponding to the first target image identifier and the second target image identifier are the same, and the first target image identifier and the second target image identifier are different.
In the embodiment of the application, when the password is input every time, the characters are replaced by different image identifications, and the image types corresponding to the same characters are kept the same, so that the condition that the password is exposed to bystanders can be further reduced, and the password input safety is improved.
In some embodiments of the present application, the display module is further configured to display a configuration interface, where the configuration interface includes P second characters, and P is a positive integer;
the receiving module is also used for receiving a third input of the target characters, and the P second characters comprise the target characters;
the display module is also used for responding to a third input and displaying at least one preset image type;
the receiving module is further used for receiving a fourth input of a target image type, wherein the at least one-month photographed image type comprises the target image type;
the input device further includes:
and the association module is used for responding to the fourth input and establishing the association relationship between the target character and the target image type.
In the embodiment of the application, the user is allowed to associate the characters and the image types by himself, when the password input interface is displayed, the corresponding relation between the image identification displayed instead of the characters and the corresponding characters is only known by the user himself, the password input safety is further improved, and the risk of password leakage is reduced.
In an embodiment of the present application, the display module is further configured to:
displaying a first password input interface under the condition that the current scene information is detected to accord with the preset scene information;
and displaying a third password input interface under the condition that the current scene information does not accord with the preset scene, wherein the third password input interface comprises N fourth characters.
According to the method and the device, whether the character plaintext on the keyboard control is hidden or not is judged according to the scene information of the input password, so that the convenience of inputting the password in an unimportant scene is improved and the password input efficiency is improved on the premise of ensuring the password input safety and preventing the important password from being leaked.
The password input device in the embodiment of the present application may be an electronic device, and may also be a component in the electronic device, such as an integrated circuit or a chip. The electronic device may be a terminal, or may be a device other than a terminal. The electronic Device may be, for example, a Mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic Device, a Mobile Internet Device (MID), an Augmented Reality (AR)/Virtual Reality (VR) Device, a robot, a wearable Device, an ultra-Mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and may also be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine, a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The password input device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android operating system (Android), an iOS operating system, or other possible operating systems, which is not specifically limited in the embodiments of the present application.
The password input device provided by the embodiment of the application can realize each process realized by the method embodiment, and is not repeated here to avoid repetition.
Optionally, an electronic device is further provided in an embodiment of the present application, fig. 6 shows a block diagram of a structure of the electronic device according to the embodiment of the present application, and as shown in fig. 6, the electronic device 600 includes a processor 602, a memory 604, and a program or an instruction stored in the memory 604 and executable on the processor 602, and when the program or the instruction is executed by the processor 602, the processes of the foregoing method embodiments are implemented, and the same technical effect can be achieved, and details are not repeated here to avoid repetition.
It should be noted that the electronic devices in the embodiments of the present application include the mobile electronic device and the non-mobile electronic device described above.
Fig. 7 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 700 includes, but is not limited to: a radio frequency unit 701, a network module 702, an audio output unit 703, an input unit 704, a sensor 705, a display unit 706, a user input unit 707, an interface unit 708, a memory 709, and a processor 710.
Those skilled in the art will appreciate that the electronic device 700 may also include a power supply (e.g., a battery) for powering the various components, and the power supply may be logically coupled to the processor 710 via a power management system, such that the functions of managing charging, discharging, and power consumption may be performed via the power management system. The electronic device structure shown in fig. 7 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is omitted here.
The display unit 706 is configured to display a first password input interface, where the password input interface includes N first image identifiers, the image types of the N first image identifiers are different, and N is a positive integer;
the user input unit 707 is configured to receive a first input of first target image identifiers, the N first image identifiers including the first target image identifier;
processor 710 is configured to determine, in response to a first input, a corresponding first character according to the image type identified by the first target image; a first character is entered in a first password entry interface.
In this application embodiment, when inputing the password through the keyboard control, hide the character plaintext on the keyboard control, and replace the character through the image identification that corresponds, and the different character shows with the image identification of different picture types, this corresponding relation only knows by the user oneself, consequently even other people have seen the operation process of inputing the password, also can't learn actual password, when can prevent the keyboard input password effectively, because of being peeped the password that the screen leads to and revealing, under the prerequisite of the convenience of guaranteeing password input, improve password input's security.
Optionally, the display unit 706 is further configured to display a second password input interface, where the input interface includes N second image identifiers, the second image identifiers are of the same image type as the first image identifiers, and the second image identifiers are different from the first image identifiers.
In the embodiment of the application, the image identification displayed by the characters is replaced by dynamically updating when the password input interface is displayed at each time, so that the image identification at each time is different, the password input safety is further improved, the password input risk is reduced, the image types are ensured to be the same, a user can determine the characters corresponding to the image identification through the image types, and the password input accuracy and the password input efficiency are ensured.
Optionally, the display unit 706 is further configured to display a configuration interface, where the configuration interface includes M second characters, and M is a positive integer;
the user input unit 707 is further configured to receive a second input for target characters, the M second characters comprising the target character;
the display unit 706 is further configured to display at least one image type in response to a second input;
the user input unit 707 is further configured to receive a third input for a target image type, at least one image type comprising the target image type;
the processor 710 is further operable to establish an association of the target character and the target image type in response to a third input.
In the embodiment of the application, the user is allowed to associate the characters and the image types by himself, when the password input interface is displayed, the corresponding relation between the image identification displayed instead of the characters and the corresponding characters is only known by the user himself, the password input safety is further improved, and the risk of password leakage is reduced.
Optionally, the processor 710 is further configured to detect scene information;
the display unit 706 is further configured to display a first password input interface when the scene information conforms to the preset scene information; and under the condition that the scene information does not accord with the preset scene, displaying a third password input interface, wherein the third password input interface comprises N third characters.
According to the method and the device, whether the character plaintext on the keyboard control is hidden or not is judged according to the scene information of the input password, so that the convenience of inputting the password in an unimportant scene is improved and the password input efficiency is improved on the premise of ensuring the password input safety and preventing the important password from being leaked.
It should be understood that in the embodiment of the present application, the input Unit 704 may include a Graphics Processing Unit (GPU) 7041 and a microphone 7042, and the Graphics Processing Unit 7041 processes image data of still pictures or videos obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The display unit 706 may include a display panel 7061, and the display panel 7061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 707 includes at least one of a touch panel 7071 and other input devices 7072. The touch panel 7071 is also referred to as a touch screen. The touch panel 7071 may include two parts of a touch detection device and a touch controller. Other input devices 7072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
The memory 709 may be used to store software programs as well as various data. The memory 709 may mainly include a first storage area for storing a program or an instruction and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or an instruction (such as a sound playing function, an image playing function, and the like) required by at least one function, and the like. Further, the memory 709 may include volatile memory or nonvolatile memory, or the memory 709 may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. The volatile Memory may be a Random Access Memory (RAM), a Static Random Access Memory (Static RAM, SRAM), a Dynamic Random Access Memory (Dynamic RAM, DRAM), a Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), a Double Data Rate Synchronous Dynamic Random Access Memory (Double Data Rate SDRAM, ddr SDRAM), an Enhanced Synchronous SDRAM (ESDRAM), a Synchronous Link DRAM (SLDRAM), and a Direct bus RAM (DRRAM). The memory 709 in the embodiments of the present application includes, but is not limited to, these and any other suitable types of memory.
Processor 710 may include one or more processing units; optionally, the processor 710 integrates an application processor, which mainly handles operations related to the operating system, user interface, application programs, etc., and a modem processor, which mainly handles wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into processor 710.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements the processes of the foregoing method embodiments, and can achieve the same technical effects, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device in the above embodiment. Readable storage media, including computer-readable storage media, such as Read-Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, etc.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to execute a program or an instruction to implement each process of the foregoing method embodiment, and the same technical effect can be achieved.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
Embodiments of the present application provide a computer program product, where the program product is stored in a storage medium, and the program product is executed by at least one processor to implement the processes of the foregoing method embodiments, and achieve the same technical effects, and in order to avoid repetition, details are not described here again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, or a network device) to execute the method of the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A password input method, comprising:
displaying a first password input interface, wherein the first password input interface comprises N first image identifications, the image types of the N first image identifications are different, and N is a positive integer;
receiving a first input of first target image identifications, wherein N first image identifications comprise the first target image identifications;
in response to the first input, generating a first character in the first password input interface corresponding to the first target image identification.
2. The password input method according to claim 1, wherein the first character is associated with an image type of the first target image identifier, the N first image identifiers correspond to N image types, and the N image types correspond to N characters, respectively.
3. The password input method of claim 1, wherein after entering a first character corresponding to the target image identifier in the first password input interface, the method further comprises:
displaying a second password input interface, wherein the second password input interface comprises M second image identifiers, and M is a positive integer;
receiving a second input of second target image identifications, wherein the M second image identifications comprise the second target image identifications;
generating a second character corresponding to a second target image identification in the second password input interface in response to the second input;
and under the condition that the first character and the second character are the same, the image types corresponding to the first target image identifier and the second target image identifier are the same, and the first target image identifier and the second target image identifier are different.
4. The password input method of claim 1, wherein prior to said displaying the first password input interface, the method further comprises:
displaying a configuration interface, wherein the configuration interface comprises P third characters, and P is a positive integer;
receiving a third input of a target character, P of the third characters comprising the target character;
displaying at least one preset image type in response to the third input;
receiving a fourth input of a target image type, wherein the at least one preset image type comprises the target image type;
and responding to the fourth input, and establishing an association relation between the target character and the target image type.
5. The password entry method of any of claims 1 to 4, wherein prior to said displaying the first password entry interface, the method further comprises:
displaying the first password input interface under the condition that the current scene information is detected to accord with the preset scene information;
or displaying a third password input interface under the condition that the current scene information does not accord with the preset scene, wherein the third password input interface comprises N fourth characters.
6. A password input apparatus, comprising:
the password input device comprises a display module and a password input module, wherein the display module is used for displaying a first password input interface, the first password input interface comprises N first image identifications, the image types of the N first image identifications are different, and N is a positive integer;
a receiving module, configured to receive a first input of first target image identifiers, where N first image identifiers include the first target image identifier;
and the generating module is used for responding to the first input and generating a first character corresponding to the first target image identification in the first password input interface.
7. The password input apparatus of claim 6, wherein the first character is associated with an image type of the first target image identifier, wherein the N first image identifiers correspond to N image types, and wherein the N image types correspond to N characters, respectively.
8. The password input apparatus of claim 6,
the display module is further configured to display a second password input interface, where the second password input interface includes M second image identifiers, and M is a positive integer;
the receiving module is further configured to receive a second input of second target image identifiers, where the M second image identifiers include the second target image identifiers;
the generating module is further used for responding to the second input and generating a second character corresponding to a second target image identifier in the second password input interface;
and under the condition that the first character and the second character are the same, the image types corresponding to the first target image identifier and the second target image identifier are the same, and the first target image identifier and the second target image identifier are different.
9. The password input apparatus of claim 6,
the display module is further configured to display a configuration interface, where the configuration interface includes P third characters, and P is a positive integer;
the receiving module is further configured to receive a third input of a target character, where P third characters include the target character;
the display module is further used for responding to the third input and displaying at least one preset image type;
the receiving module is further configured to receive a fourth input of a target image type, where the at least one preset image type includes the target image type;
the input device further includes:
and the association module is used for responding to the fourth input and establishing the association relationship between the target character and the target image type.
10. The password input apparatus according to any one of claims 6 to 9,
the display module is further configured to:
displaying the first password input interface under the condition that the current scene information is detected to accord with the preset scene information;
and displaying a third password input interface under the condition that the current scene information does not accord with the preset scene, wherein the third password input interface comprises N fourth characters.
CN202210686229.XA 2022-06-17 2022-06-17 Password input method and input device Pending CN115080946A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210686229.XA CN115080946A (en) 2022-06-17 2022-06-17 Password input method and input device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210686229.XA CN115080946A (en) 2022-06-17 2022-06-17 Password input method and input device

Publications (1)

Publication Number Publication Date
CN115080946A true CN115080946A (en) 2022-09-20

Family

ID=83253344

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210686229.XA Pending CN115080946A (en) 2022-06-17 2022-06-17 Password input method and input device

Country Status (1)

Country Link
CN (1) CN115080946A (en)

Similar Documents

Publication Publication Date Title
CN106778130B (en) Message display method, display device and mobile terminal
CN112804445B (en) Display method and device and electronic equipment
CN110414258A (en) Document handling method and system, data processing method
CN105095721A (en) Fingerprint authentication display device and method
CN111783055A (en) Account information management method and device and electronic equipment
CN113486377A (en) Image encryption method and device, electronic equipment and readable storage medium
CN112311795A (en) Account management method and device and electronic equipment
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
US20110154483A1 (en) Electronic device with password protection function and method thereof
CN113282364A (en) Display method, display device and electronic equipment
US10740451B1 (en) Graphical event-based password system
CN111817944A (en) Picture sharing method and device and electronic equipment
CN113138702B (en) Information processing method, device, electronic equipment and storage medium
CN115080946A (en) Password input method and input device
CN113364915B (en) Information display method and device and electronic equipment
US20180124034A1 (en) Image based method, system and computer program product to authenticate user identity
CN114741727A (en) Data sending method and device
CN113672886A (en) Prompting method and device
CN112764700A (en) Image display processing method, device, electronic equipment and storage medium
CN109118551A (en) A kind of image processing method, terminal and storage medium
CN113010918A (en) Information processing method and device
CN111797383A (en) Password verification method and device and electronic equipment
CN107633174B (en) User input management method and device and terminal
CN115134473B (en) Image encryption method and device
CN113282899B (en) Object management method, device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination