CN102142071A - Method and device for verifying mobile terminal - Google Patents

Method and device for verifying mobile terminal Download PDF

Info

Publication number
CN102142071A
CN102142071A CN2011101045646A CN201110104564A CN102142071A CN 102142071 A CN102142071 A CN 102142071A CN 2011101045646 A CN2011101045646 A CN 2011101045646A CN 201110104564 A CN201110104564 A CN 201110104564A CN 102142071 A CN102142071 A CN 102142071A
Authority
CN
China
Prior art keywords
key assignments
order
feedback
music score
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011101045646A
Other languages
Chinese (zh)
Inventor
方晓婕
畅巍
何琪
杨格
赵爱敬
廖志英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hanwang Technology Co Ltd
Original Assignee
Hanwang Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hanwang Technology Co Ltd filed Critical Hanwang Technology Co Ltd
Priority to CN2011101045646A priority Critical patent/CN102142071A/en
Publication of CN102142071A publication Critical patent/CN102142071A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04886Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2203/00Indexing scheme relating to G06F3/00 - G06F3/048
    • G06F2203/048Indexing scheme relating to G06F3/048
    • G06F2203/04808Several contacts: gestures triggering a specific function, e.g. scrolling, zooming, right-click, when the user establishes several contacts with the surface simultaneously; e.g. using several fingers or a combination of fingers and pen

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Electrophonic Musical Instruments (AREA)

Abstract

The invention belongs to the technical field of information, and discloses a method and a device for verifying a mobile terminal. The method comprises the following steps of: displaying an instrument keyboard; detecting trigger key values and trigger orders of keys in the instrument keyboard; and when the trigger values and feedback orders are matched with prestored key values and orders thereof, determining that the verification is passed. The device comprises a display unit, a detection unit and a verification unit, wherein the display unit is used for displaying the instrument keyboard; the detection unit is used for detecting the trigger key values and the feedback orders of the keys in the instrument keyboard; and the verification unit is used for determining that when the trigger values and the feedback orders are matched with the prestored key values and the orders thereof, the verification is passed. Users can memorize verification passwords by a music score file, so the verification passwords are easily memorized by the users; and due to the condition of pressing a plurality of keys in the music score simultaneously, the security coefficients of the verification passwords are also improved.

Description

A kind of verification method of portable terminal and device
Technical field
The present invention relates to areas of information technology, relate in particular to a kind of verification method and device of portable terminal.
Background technology
At present, the verification method general process of portable terminal is, a string character string that is pre-set by user's input in advance when the character string of being stored in character string that the user imported and the portable terminal is complementary, can be determined to verify and pass through.
And character string is difficult to memory usually for the user, and especially in order to make the authentication password safety coefficient higher, what often the figure place of authentication password need be provided with is more, and the situation that often has the user not remember authentication password occurs.And the character in the authentication password all is that order is imported, and is convenient to decode, and can only improve safety coefficient by increasing the authentication password figure place, and its safety coefficient is difficult to effectively improve.
Summary of the invention
The embodiment of the invention provides a kind of verification method and device of portable terminal, to improve the safety coefficient of authentication password, is convenient to user's memory cipher simultaneously.
A kind of verification method of portable terminal comprises:
Show keyboards for musical instruments;
Detect the triggering key assignments and the trigger sequence of button in the described keyboards for musical instruments;
When described triggering key assignments and feedback order is mated with key assignments that prestores and order thereof, determine that checking passes through.
A kind of demo plant of portable terminal comprises:
Display unit is used to show keyboards for musical instruments;
Detecting unit detects the triggering key assignments of button in the described keyboards for musical instruments and feedback order;
Authentication unit, be used for determining when described triggering key assignments and feedback order all with the key assignments that prestores and when mating in proper order, checking is passed through.
The embodiment of the invention provides a kind of verification method and portable terminal of portable terminal, by on portable terminal, showing keyboards for musical instruments, import one section pre-set music score of Chinese operas by the user by this keyboards for musical instruments, when the music score of Chinese operas of storing in the music score of Chinese operas of user input and the portable terminal mates, determine that user rs authentication passes through.Because the user can remember authentication password by the music score of Chinese operas, be convenient to user's memory, simultaneously,, also improved the safety coefficient of authentication password owing to often occur the situation that a plurality of buttons are pressed simultaneously in the music score of Chinese operas.
Description of drawings
The authentication password input method process flow diagram of the portable terminal that Fig. 1 provides for the embodiment of the invention;
Fig. 2 shows synoptic diagram for the authentication password input method median surface of the portable terminal that the embodiment of the invention provides;
Fig. 3 is for being provided with the process flow diagram of authentication password in the embodiment of the invention;
Fig. 4 a and Fig. 4 b are sound control view in the embodiment of the invention;
Fig. 5 a-Fig. 5 d is a piano key view in the embodiment of the invention;
Fig. 6 is the modified flow figure of language in the embodiment of the invention;
Fig. 7 is the demo plant structural representation of portable terminal in the embodiment of the invention;
Fig. 8 is the demo plant structural representation of a kind of concrete portable terminal in the embodiment of the invention;
Fig. 9 is the demo plant structural representation of a kind of preferable portable terminal in the embodiment of the invention.
Embodiment
The embodiment of the invention provides a kind of cipher-code input method and device of portable terminal, by on portable terminal, showing keyboards for musical instruments, import one section pre-set music score of Chinese operas by the user by this keyboards for musical instruments, when the music score of Chinese operas of storing in the music score of Chinese operas of user input and the portable terminal mates, determine that user rs authentication passes through.Because the user can remember authentication password by the music score of Chinese operas, is convenient to user's memory, simultaneously, because the normal situation that a plurality of buttons are pressed simultaneously, the also safety coefficient of the authentication password of Ti Gaoing of occurring in the music score of Chinese operas.
As shown in Figure 1, the cipher-code input method of the portable terminal that the embodiment of the invention provides comprises:
Step S101 shows keyboards for musical instruments.
Call the checking interface in the terminal, show the keyboards for musical instruments that is used to verify, this keyboards for musical instruments can show by the triggering of response user when using authentication function, also can show before checking work such as the user carries out that portable terminal is unblanked always.
Step S102 detects the triggering key assignments of button in the described keyboards for musical instruments and feedback order.
Detect the triggering situation of each button in the described keyboards for musical instruments, and according to the triggering situation of button, the triggering of button is converted to key assignments.When having a plurality of buttons to be triggered simultaneously, then will be converted to corresponding a plurality of triggering key assignments simultaneously to the triggering of a plurality of buttons.
Step S103 when described triggering key assignments and feedback order is mated with key assignments that prestores and order thereof, determines that checking passes through.
By this verification method, the user just can come the needed numerical value of input validation by shoegaze, because the characteristic of music score itself, user's memory also is convenient in the security that has improved password simultaneously.
Generally speaking, as long as it is just passable that simple musical instrument has 7 notes,, then only need seven buttons of do re mi fa so la xi to get final product if musical instrument is a piano, therefore, the keyboards for musical instruments that shows only needs 7 buttons, as shown in Figure 2, and certainly, also can be according to user's selection, show complicated keyboards for musical instruments, thereby can further improve security so that set authentication password is complicated more.
Keyboards for musical instruments in the embodiment of the invention is that piano key is preferable, can certainly be other keyboards for musical instruments of being convenient to the note input.
For example the set music score of Chinese operas of user is: so so do fa si La soRe fa fa si La soRe, wherein the note of underscore is for what play simultaneously, and then the user just need work as input according to the order input of note in the music score of Chinese operas when the input validation password La soThe time, import two notes of la and so simultaneously, when note that the user imported and input sequence all with the music score of Chinese operas file of storage in music score of Chinese operas so so do fa si La soRe fa fa si La soWhen re was identical, the authentication password that then definite user is imported was correct, by checking.
This music score of Chinese operas can be the music score of Chinese operas file that prestores, and the starting position of mark and the part between the end position in the music score of Chinese operas file that perhaps prestores are perhaps by receiving the music score of Chinese operas file that the key assignments imported in the keyboards for musical instruments and input sequence generate.
The music score of Chinese operas file that prestores when use is during as authentication password, and then directly first note from the music score of Chinese operas file that prestores begins as password, and when user's input validation password, first note of file begins to play and gets final product from the music score of Chinese operas.
In the music score of Chinese operas file that will prestore under the starting position of mark and the situation of the part between the end position as authentication password, when the user inputs password, need begin to play from first note of the starting position of specified music score of Chinese operas file, input password for ease of the user, prevent that password is long, can be by User Defined password end position.In fact, the user directly uses the music score of Chinese operas file of storage as password, and the password starting position that promptly is equivalent to user's setting is a note in the music score of Chinese operas file, and the password end position is last note in the music score of Chinese operas file.When detecting the self-defined part that certain music score of Chinese operas file is set of being operating as of user as authentication password, call music score of Chinese operas file and select the interface, in this interface, enumerate out the music score of Chinese operas file of storage in advance, selection according to the user, call and show selected music score of Chinese operas file, detect the starting position and the end position of the music score of Chinese operas file that the user is provided with, with the music score of Chinese operas file between reference position and the end position as authentication password.
By receiving the music score of Chinese operas file that the key assignments imported in the keyboards for musical instruments and input sequence generate, detect the key assignments and the input sequence that trigger the keyboards for musical instruments that shows when the user sets authentication password, generate interim music score of Chinese operas file, provide once more and play the interface, the key assignments of verifying twice input is input sequence when identical, with above-mentioned interim music score of Chinese operas file as authentication password.
Concrete, as shown in Figure 3, the flow process that the user is provided with password comprises:
Step S301, the response user triggering, call musical instrument password setting interface, and in musical instrument password setting interface the selected keyboards for musical instruments of explicit user;
Step S302, detect the triggering situation of each button in the described keyboards for musical instruments, and the key assignments of the button that triggered of feedback; When the user touches in the keyboards for musical instruments the pairing touch location of certain button, think that promptly this button is triggered, and feeds back the key assignments of this button.
Step S303, according to the key assignments that is fed back and feedback order, generate interim music score of Chinese operas file;
Step S304, prompting user re-enter password;
The triggering situation of each button in step S305, the described keyboards for musical instruments of detection, and according to the button feedback key assignments that is triggered;
Step S306, determine the key assignments fed back and feedback order whether all and interim music score of Chinese operas file coupling, if, execution in step S307, if not, execution in step S308;
Step S307, determining password setting success, is music score of Chinese operas file as password with interim music score of Chinese operas file storage;
Step S308, twice input of prompting user do not conform to, and reset password, and delete interim music score of Chinese operas file.
When password was set, the user also can import numbered musical notation by common keyboard, thereby reduced user's password setting difficulty.
In order to guarantee that music is understood few user can access preferable use cognition equally, in step S103, determine to trigger key assignments and feedback thereof order all with the music score of Chinese operas that prestores in key assignments and order when mating thereof, determine that the password that the user inputs is correct, be specially:
In interim storage space, the music score of Chinese operas that relatively triggers key assignments and prestore according to the feedback order triggers key assignments and the matching degree of the music score of Chinese operas that prestores according to the comparative result correction with the triggering key assignments of each feedback and feedback journal thereof;
When the key assignments number of the matching degree of the music score of Chinese operas that triggers key assignments and prestore and feedback all reaches preset value, determine that the password that the user inputs is correct, and empty and write down the interim storage space that triggers key assignments.
Feeding back journal in interim storage space the time, can related feedback sequence valve can certainly be set according to the triggering key assignments of each feedback of feedback journal for the triggering key assignments of each feedback, and record.
Like this, just can not requiring that the user is right-on plays the whole music score of Chinese operas, can can be regarded as the password input correctly as long as the number of notes of its matching degree and input has all reached the standard of setting, this function is applicable to the projects not high to security requirement such as release of portable terminal.
For example, if the user as the music score of Chinese operas of password be: do re Mi faSo la si si la so fa mi re do do re mi Fa soLa si si la so fa mi re do, if being set to import number of notes, the user reaches 6, matching degree reaches 80% and is the password input correctly, so when the user inputs password, if first note do input of user's input is correct, then this moment, matching degree was 100%, but the input number of notes is 1, continue to obtain the signal of user's input, if second note re input of user is incorrect, then this moment, matching degree reduced to 50%, the input number of notes is 2, do not satisfy condition, continue to obtain the signal of user's input, if user the 3rd, four note mi fa import correctly, then this moment, matching degree was upgraded to 75%, the input number of notes is 4, still do not satisfy condition, continue to obtain the signal of user's input, if the 5th note input of user is correct, then this moment, matching degree was 80%, the input number of notes is 5, continue to obtain the signal of user's input, if the 6th note input of user is incorrect, then this moment, matching degree was 66%, the input number of notes is 6, because matching degree does not satisfy condition, thus still continue to obtain the signal of user's input, if user the 7th, eight, nine, ten notes are all imported correctly, then this moment, matching degree was 80%, the input number of notes is 10, satisfies condition, and determines that the password input is correct.
The user re-enters password for convenience, can on the interface, show and re-enter button, when receiving the signal that re-enters that the user sends by this button, empty the interim storage space that record triggers key assignments, that is, delete the triggering key assignments that writes down in the interim storage space.
For the continuity that guarantees that password is imported, thus the security that improves password, can also be after getting access to the triggering key assignments that is fed back at every turn, restart timing, after timing time surpassed setting value, the prompting user re-entered password, and deleted the triggering key assignments that is write down.
In order further to improve the security of password, can further judge user's the input and the matching degree of the music score of Chinese operas according to the rhythm in the music score of Chinese operas, at this moment, record triggers key assignments and feedback order thereof, and and the music score of Chinese operas that prestores in key assignments and order thereof compare, specifically comprise: write down described triggering key assignments and feedback thereof order; Whether the key assignments that relatively triggers relevant position in the key assignments and the music score of Chinese operas mates; Determine that this time feedback triggers the matching degree that key assignments and preceding once feedback trigger the rhythm of time interval of key assignments and the corresponding key assignments of the music score of Chinese operas.And then can calculate user's the input and the matching degree of the music score of Chinese operas according to the matching degree that triggers key assignments and the matching degree of rhythm.
For example, if as the music score of Chinese operas of password be 120 clap/minute, each note all 1 is clapped at interval in the music score of Chinese operas, the music score of Chinese operas is: do re Mi faSo la si si la so fa mi re do do re mi Fa soLa si si la so fa mi re do, then get access to after the user imports the triggering key assignments of first note do feedback, pick up counting, if just get access to the triggering key assignments that the user imports second note re feedback 0.5 second the moment, think that then the rhythm matching degree is 100%, if get access to the triggering key assignments that the user imports second note re feedback in the moment of 0.4 second or 0.6 second, think that then the rhythm matching degree is 80%, if the coupling that the user sets the coupling that triggers key assignments and rhythm respectively accounts for 50% to the influence of the matching degree of user's the input and the music score of Chinese operas, after then the user imports first note do, if it is correct to trigger the key assignments input, then matching degree is 100%, when the user imports second note re, if the rhythm matching degree is 80%, it is correct to trigger the key assignments input, then the whole matching degree of second note is 90%, and at this moment, user's input is 95% with the matching degree of the music score of Chinese operas, equally, if user's input the 3rd in 0.3 second behind second note re of input, four notes Mi fa, and trigger key assignments and all import correctly, then these two the rhythm matching degree that trigger key assignments are 60%, trigger the key value match degree and are 100%, and then the whole matching degree of third and fourth note is 80%, and at this moment, user's input is 87.5% with the matching degree of the music score of Chinese operas.
In addition, for the user provides the self-defined interface that the matching degree preset value of key number and/or rhythm is set, if user's music quality is higher, the preset value of matching degree can be heightened, improve confidentiality, if user's music quality is lower, above-mentioned preset value can be turned down, be convenient to checking and pass through.For example matching degree is carried out five equilibrium several times according to 0 ~ 100%, the matching degree that the big more explanation of number percent requires is high more.Detecting under the situation that the user is provided with matching degree, call matching degree the interface is set, the matching degree grade that shows two or more on the interface is selected the district, the mode that is presented on the interface is selected the district for " high and low " two, or more than the selection district of two representative matching degree grade, according to user's selection, will the corresponding matching degree preset value of saving as of matching degree be set.
Further, show the sound control; According to the sound status in the sound control, play the note of the keyboards for musical instruments correspondence of being pressed.Like this, the playing sound when user just can be by the input of the more convenient control password of sound control, certainly, the playing sound when user also can import password by the sound control mode that portable terminal side switch, sound are provided with routines such as panel controlled.Around the people more for a long time, the user can make by the sound control and not play the note of the keyboards for musical instruments correspondence of being pressed in input during password, and then prevents that other people from eavesdropping password, at this moment, the user can be by reading the input of controlling password silently.
For example, shown in Fig. 4 a and Fig. 4 b, a kind of simple sound control can for: have only two states of A, B, when the button in the sound control slides into the A place, shown in Fig. 4 a, shoegaze carries out sound playing, when the button in the sound control slides into the B place, shown in Fig. 4 b, then do not carry out sound playing during shoegaze.
For the ease of user's shoegaze under mute state, can be when the user inputs password, change the show state of the keys of musical instrument of being pressed, thereby make it be different from other button, as Fig. 5 a, shown in Fig. 5 b and Fig. 5 c, each piano key all is the state of upspringing among Fig. 5 a, among Fig. 5 b, second key re is pressed, and in actual applications, the color that this button can be set by the user is filled, among Fig. 5 c, second key re and the 5th key so are pressed simultaneously, and then all be shown as the color that is set by the user and fill, thus can be so that whether the user determines keys of musical instrument be pressed.
Further, can also on each button on the keyboards for musical instruments, mark the note of this button representative,, for example on piano key, can add the mark as shown in Fig. 5 d so that the user plays.
Simultaneously, user's use for convenience, can be when the needs user passes through this kind mode and inputs password, display reminding language on the interface, the prompting user inputs password by shoegaze, for example, if what show is piano key, then can on the interface, show " play piano and come release " as shown in Figure 2 when needing the release portable terminal.
Further, for the ease of before the user identification password input, during the password input, different conditions such as the correct back of password confirming, especially when quiet input password, make things convenient for these states of User Recognition, can point out the user by the display effect that changes signal language.For example, can be when the user begin to play the original state of piano, make signal language be shown as first default color that the user sets, after the user begins to play piano, the signal language color is a gradual change animation effect loop play, and after the timing time that the user stops to play surpassed setting value, the signal language color restoration was first default color, thereby the prompting user re-enters password, and empties the key assignments that is write down.After the correct requirement of the satisfied password confirming of setting of user's password, then the signal language animation effect stops, and the signal language color becomes second default color that the user sets, and the portable terminal of release simultaneously enters main interface.
As shown in Figure 6, when the user was the portable terminal release, the modified flow of language was specially:
Step S601, demonstration shoegaze release interface are shown as first state with signal language;
Step S602, behind the signal that receives user's shoegaze, signal language is shown as second state;
Step S603, judge whether to reach the requirement of password authentification, if, execution in step S604 then, otherwise execution in step S605;
Step S604, signal language is shown as the third state, simultaneously portable terminal is contacted lock-out state, show main interface;
Step S605, judge whether the timing time that the user stops to play surpasses setting value, if, execution in step S601, otherwise execution in step S602.
The embodiment of the invention also provides a kind of demo plant of portable terminal, as shown in Figure 7, comprising:
Display unit 701 is used to show keyboards for musical instruments;
Detecting unit 702 detects the triggering key assignments of button in the described keyboards for musical instruments and feedback order;
Authentication unit 703, be used for determining when described triggering key assignments and feedback order all with the key assignments that prestores and when mating in proper order, checking is passed through.
In order to guarantee that musical instrument plays the not outstanding user of ability and can access preferable use equally and know from experience, as shown in Figure 8, determining unit 703 specifically comprises:
Relatively subelement 7031 is used to write down each and triggers key assignments and feedback order thereof, and compares with key assignments that prestores and order thereof, according to the matching degree of the described triggering key assignments of comparative result correction and feedback order and key assignments that prestores and order thereof;
Determine subelement 7032, be used for when the triggering key assignments number of described matching degree and feedback all reaches preset value, determine to verify and pass through, and delete triggering key assignments and the feedback order thereof that is write down.
For the continuity that guarantees that password is imported, thereby the security that improves password as shown in Figure 9, also comprises in the detecting unit:
Overtime control sub unit 7021 is used for after detecting the key assignments that is fed back at every turn, reclocking, and after timing time surpassed setting value, the prompting user verified again, and deletes triggering key assignments and the feedback order thereof that is write down.
The embodiment of the invention provides a kind of cipher-code input method and portable terminal of portable terminal, by on portable terminal, showing keyboards for musical instruments, import one section pre-set music score of Chinese operas by the user by this keyboards for musical instruments, when the music score of Chinese operas coupling of storing in the music score of Chinese operas of user input and the portable terminal, determine the user cipher input correctly.Because the user can come memory cipher by the music score of Chinese operas, be convenient to user's memory, simultaneously,, also improved the safety coefficient of password owing to often occur the situation that a plurality of buttons are pressed simultaneously in the music score of Chinese operas.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, if of the present invention these are revised and modification belongs within the scope of claim of the present invention and equivalent technologies thereof, then the present invention also is intended to comprise these changes and modification interior.

Claims (10)

1. the verification method of a portable terminal is characterized in that, comprising:
Show keyboards for musical instruments;
Detect the triggering key assignments and the trigger sequence of button in the described keyboards for musical instruments;
When described triggering key assignments and feedback order is mated with key assignments that prestores and order thereof, determine that checking passes through.
2. method according to claim 1 is characterized in that, described key assignments that prestores and order thereof are preserved with the form of music score of Chinese operas file, and described music score of Chinese operas file comprises:
The complete music score of Chinese operas file that prestores; Perhaps
Fragment in the music score of Chinese operas file that prestores; Perhaps
By receiving the music score of Chinese operas file that the key assignments imported in the described keyboards for musical instruments and input sequence generate.
3. method according to claim 2 is characterized in that, when described triggering key assignments and feedback order all and the key assignments that prestores and order thereof when mating, determine that checking passes through, comprising:
Write down each and trigger key assignments and feedback order thereof, and and the key assignments and the order thereof of the music score of Chinese operas file that prestores compare, according to the key assignments of the described triggering key assignments of comparative result correction and feedback order thereof and the music score of Chinese operas file that prestores and the matching degree of order thereof;
When the triggering key assignments number of described matching degree and feedback all reaches preset value,, and delete triggering key assignments and the feedback order thereof that is write down by checking.
4. method according to claim 3 is characterized in that, each triggers key assignments and feedback order thereof described record, and and the key assignments and the order thereof of the music score of Chinese operas file that prestores compare, comprising:
Write down described triggering key assignments and feedback thereof order;
Whether the key assignments of more described triggering key assignments and the described music score of Chinese operas file that prestores mates;
Determine the matching degree of the rhythm of time interval of triggering key assignments of the triggering key assignments of this time feedback and preceding once feedback and the corresponding key assignments of the described music score of Chinese operas.
5. method according to claim 3 is characterized in that, also comprises:
After getting access to the key assignments that is fed back at every turn, restart timing, after timing time surpasses setting value, show and verify the interface again, and delete triggering key assignments and the feedback order thereof that is write down.
6. method according to claim 3 is characterized in that, described preset value is:
The preset value of default setting; Or
The preset value that the user who preserves manually is provided with.
7. method according to claim 1 is characterized in that, also comprises:
According to the state of described sound control, play the note of the keyboards for musical instruments correspondence of being pressed;
And/or
Triggering situation and checking result according to each button in the described keyboards for musical instruments show dynamic effect.
8. the demo plant of a portable terminal is characterized in that, comprising:
Display unit is used to show keyboards for musical instruments;
Detecting unit detects the triggering key assignments of button in the described keyboards for musical instruments and feedback order;
Authentication unit, be used for determining when described triggering key assignments and feedback order all with the key assignments that prestores and when mating in proper order, checking is passed through.
9. device according to claim 8 is characterized in that, described detecting unit comprises:
Overtime control sub unit is used for after detecting the key assignments that is fed back at every turn, reclocking, and after timing time surpassed setting value, the prompting user verified again, and deletes triggering key assignments and the feedback order thereof that is write down.
10. device according to claim 8 is characterized in that, described authentication unit comprises:
Relatively subelement is used to write down each and triggers key assignments and feedback order thereof, and compares with key assignments that prestores and order thereof, according to the matching degree of the described triggering key assignments of comparative result correction and feedback order and key assignments that prestores and order thereof;
Determine subelement, be used for when the triggering key assignments number of described matching degree and feedback all reaches preset value, determine to verify and pass through, and delete triggering key assignments and the feedback order thereof that is write down.
CN2011101045646A 2011-04-26 2011-04-26 Method and device for verifying mobile terminal Pending CN102142071A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011101045646A CN102142071A (en) 2011-04-26 2011-04-26 Method and device for verifying mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011101045646A CN102142071A (en) 2011-04-26 2011-04-26 Method and device for verifying mobile terminal

Publications (1)

Publication Number Publication Date
CN102142071A true CN102142071A (en) 2011-08-03

Family

ID=44409573

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011101045646A Pending CN102142071A (en) 2011-04-26 2011-04-26 Method and device for verifying mobile terminal

Country Status (1)

Country Link
CN (1) CN102142071A (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102694914A (en) * 2012-05-18 2012-09-26 广东欧珀移动通信有限公司 Unlocking method for mobile phone screen
CN102812427A (en) * 2011-12-28 2012-12-05 华为技术有限公司 Unlocking method of terminal device and terminal device
CN102857615A (en) * 2012-09-24 2013-01-02 武汉大学 Unlocking method for touch screen mobile phone based on dynamic password
CN103002146A (en) * 2012-11-28 2013-03-27 广东欧珀移动通信有限公司 Method and system for unlocking mobile terminal
CN103002139A (en) * 2012-11-22 2013-03-27 广东欧珀移动通信有限公司 Unlocking method of touch screen terminal
CN103116718A (en) * 2013-03-06 2013-05-22 无锡德飞科技有限公司 Password setting and verification method based on spatial position code log-in computer system
WO2013123747A1 (en) * 2012-02-24 2013-08-29 中兴通讯股份有限公司 Method and system for achieving device unlocking based on audio
CN103425421A (en) * 2012-05-23 2013-12-04 纬创资通股份有限公司 Method for touch unlocking by using rhythmic clicking and related electronic device
CN103455738A (en) * 2012-06-04 2013-12-18 国际商业机器公司 Method and computer device for providing time ratio-based password/challenge authentication
CN103577054A (en) * 2012-07-23 2014-02-12 北京三星通信技术研究有限公司 Terminal unlocking method and device
CN103729123A (en) * 2013-12-31 2014-04-16 青岛高校信息产业有限公司 Mapping method and system for application program
CN104424427A (en) * 2013-08-28 2015-03-18 联发科技(新加坡)私人有限公司 Password authentication method and device
CN105260633A (en) * 2015-11-20 2016-01-20 上海斐讯数据通信技术有限公司 Intelligent terminal screen unlocking method and system based on multipoint touch
CN105893825A (en) * 2016-04-25 2016-08-24 广东欧珀移动通信有限公司 Display screen unlocking method, device and mobile terminal based on music identifier
CN105975848A (en) * 2016-04-29 2016-09-28 努比亚技术有限公司 Password unlocking method and apparatus
CN106127021A (en) * 2016-06-30 2016-11-16 北京奇虎科技有限公司 Mobile terminal verification method and device
WO2016192287A1 (en) * 2015-05-29 2016-12-08 上海斐讯数据通信技术有限公司 Method and system for unlocking mobile terminal by playing imitation guitar
US9600653B2 (en) 2011-09-30 2017-03-21 International Business Machines Corporation Providing time ratio-based password/challenge authentication
CN106815513A (en) * 2015-11-27 2017-06-09 北京金山安全软件有限公司 Terminal unlocking method and related device and equipment
EP2720133A3 (en) * 2012-10-12 2017-10-25 Samsung Electronics Co., Ltd Apparatus and method for unlocking screen and executing operation in a portable terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043676A (en) * 2007-03-23 2007-09-26 华为技术有限公司 Method and apparatus for prompting alarm clock stopping of mobile terminal
CN101158882A (en) * 2006-10-02 2008-04-09 三星电子株式会社 Method for unlocking a portable multimedia player and apparatus thereof
CN101404688A (en) * 2008-11-03 2009-04-08 中兴通讯股份有限公司 Method and device for altering left and right press key function of mobile phone
US20100153735A1 (en) * 2008-12-15 2010-06-17 Bull Hn Information Sys. Entering an identifier with security improved by time based randomization of input steps based upon time
CN101996431A (en) * 2009-08-18 2011-03-30 朱利 Music identification lock device using any music player as unlocking basis

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101158882A (en) * 2006-10-02 2008-04-09 三星电子株式会社 Method for unlocking a portable multimedia player and apparatus thereof
CN101043676A (en) * 2007-03-23 2007-09-26 华为技术有限公司 Method and apparatus for prompting alarm clock stopping of mobile terminal
CN101404688A (en) * 2008-11-03 2009-04-08 中兴通讯股份有限公司 Method and device for altering left and right press key function of mobile phone
US20100153735A1 (en) * 2008-12-15 2010-06-17 Bull Hn Information Sys. Entering an identifier with security improved by time based randomization of input steps based upon time
CN101996431A (en) * 2009-08-18 2011-03-30 朱利 Music identification lock device using any music player as unlocking basis

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9600653B2 (en) 2011-09-30 2017-03-21 International Business Machines Corporation Providing time ratio-based password/challenge authentication
CN102812427A (en) * 2011-12-28 2012-12-05 华为技术有限公司 Unlocking method of terminal device and terminal device
WO2013123747A1 (en) * 2012-02-24 2013-08-29 中兴通讯股份有限公司 Method and system for achieving device unlocking based on audio
CN102694914A (en) * 2012-05-18 2012-09-26 广东欧珀移动通信有限公司 Unlocking method for mobile phone screen
CN103425421A (en) * 2012-05-23 2013-12-04 纬创资通股份有限公司 Method for touch unlocking by using rhythmic clicking and related electronic device
CN103455738A (en) * 2012-06-04 2013-12-18 国际商业机器公司 Method and computer device for providing time ratio-based password/challenge authentication
CN103577054A (en) * 2012-07-23 2014-02-12 北京三星通信技术研究有限公司 Terminal unlocking method and device
CN102857615A (en) * 2012-09-24 2013-01-02 武汉大学 Unlocking method for touch screen mobile phone based on dynamic password
EP2720133A3 (en) * 2012-10-12 2017-10-25 Samsung Electronics Co., Ltd Apparatus and method for unlocking screen and executing operation in a portable terminal
CN103002139A (en) * 2012-11-22 2013-03-27 广东欧珀移动通信有限公司 Unlocking method of touch screen terminal
CN103002139B (en) * 2012-11-22 2015-01-14 广东欧珀移动通信有限公司 Unlocking method of touch screen terminal
CN103002146A (en) * 2012-11-28 2013-03-27 广东欧珀移动通信有限公司 Method and system for unlocking mobile terminal
CN103116718A (en) * 2013-03-06 2013-05-22 无锡德飞科技有限公司 Password setting and verification method based on spatial position code log-in computer system
CN104424427A (en) * 2013-08-28 2015-03-18 联发科技(新加坡)私人有限公司 Password authentication method and device
CN103729123A (en) * 2013-12-31 2014-04-16 青岛高校信息产业有限公司 Mapping method and system for application program
WO2016192287A1 (en) * 2015-05-29 2016-12-08 上海斐讯数据通信技术有限公司 Method and system for unlocking mobile terminal by playing imitation guitar
CN105260633A (en) * 2015-11-20 2016-01-20 上海斐讯数据通信技术有限公司 Intelligent terminal screen unlocking method and system based on multipoint touch
CN105260633B (en) * 2015-11-20 2017-12-05 上海斐讯数据通信技术有限公司 A kind of intelligent terminal unlocking screen method and system based on multi-point touch
CN106815513A (en) * 2015-11-27 2017-06-09 北京金山安全软件有限公司 Terminal unlocking method and related device and equipment
CN105893825A (en) * 2016-04-25 2016-08-24 广东欧珀移动通信有限公司 Display screen unlocking method, device and mobile terminal based on music identifier
CN105975848A (en) * 2016-04-29 2016-09-28 努比亚技术有限公司 Password unlocking method and apparatus
CN106127021A (en) * 2016-06-30 2016-11-16 北京奇虎科技有限公司 Mobile terminal verification method and device

Similar Documents

Publication Publication Date Title
CN102142071A (en) Method and device for verifying mobile terminal
CN100549913C (en) The method and the device thereof that are used for the unlock of portable multimedia player
US20090278807A1 (en) Password input using touch duration code
KR101452704B1 (en) Method for setting up and authenticating password for a portable device having a plurality of buttons
US20090144621A1 (en) Recording, playback, and visual representation of macros
JP2017536633A (en) User interface and method for secure entry of character symbols
EP2801905B1 (en) Method and apparatus for unlocking a terminal device
US20120192268A1 (en) Password authentication method
CN102289352A (en) Application program startup method and terminal
US7114077B2 (en) Verification system for confidential data input
CN105354458A (en) Password input verification method and system
US12093364B2 (en) Systems, methods, and media for obfuscated personal identification number entry on media devices
KR20150089104A (en) Method and Device for Unlocking Input using the Combination of Number and Pattern Image at Smartphone
JP2005250530A (en) Character input device
KR20100112739A (en) Remote controller built-in touch screen function and fingerprint recognition function
KR102401127B1 (en) Hidden password input system and password input method using the same
CN106445095A (en) Input method and device and storage equipment
JP2002229563A (en) Electronic equipment
KR102222411B1 (en) Method and Device for Password and Unlocking Input using the Combination of Password Number and Pattern Image
JP5419170B2 (en) Projection type display device, information input method and program
KR20140034651A (en) Method and apparatus for unlocking device equipped with touch screen
KR102390173B1 (en) Ppassword input method
US20230120950A1 (en) Touchscreen lock feature for playback of media content
TW201407461A (en) A method for executing a program on a handheld device with a touch panel
JP2007074027A (en) Image output apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110803