CN102142071A - Method and device for verifying mobile terminal - Google Patents
Method and device for verifying mobile terminal Download PDFInfo
- Publication number
- CN102142071A CN102142071A CN2011101045646A CN201110104564A CN102142071A CN 102142071 A CN102142071 A CN 102142071A CN 2011101045646 A CN2011101045646 A CN 2011101045646A CN 201110104564 A CN201110104564 A CN 201110104564A CN 102142071 A CN102142071 A CN 102142071A
- Authority
- CN
- China
- Prior art keywords
- key assignments
- order
- feedback
- music score
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04886—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2203/00—Indexing scheme relating to G06F3/00 - G06F3/048
- G06F2203/048—Indexing scheme relating to G06F3/048
- G06F2203/04808—Several contacts: gestures triggering a specific function, e.g. scrolling, zooming, right-click, when the user establishes several contacts with the surface simultaneously; e.g. using several fingers or a combination of fingers and pen
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Electrophonic Musical Instruments (AREA)
Abstract
The invention belongs to the technical field of information, and discloses a method and a device for verifying a mobile terminal. The method comprises the following steps of: displaying an instrument keyboard; detecting trigger key values and trigger orders of keys in the instrument keyboard; and when the trigger values and feedback orders are matched with prestored key values and orders thereof, determining that the verification is passed. The device comprises a display unit, a detection unit and a verification unit, wherein the display unit is used for displaying the instrument keyboard; the detection unit is used for detecting the trigger key values and the feedback orders of the keys in the instrument keyboard; and the verification unit is used for determining that when the trigger values and the feedback orders are matched with the prestored key values and the orders thereof, the verification is passed. Users can memorize verification passwords by a music score file, so the verification passwords are easily memorized by the users; and due to the condition of pressing a plurality of keys in the music score simultaneously, the security coefficients of the verification passwords are also improved.
Description
Technical field
The present invention relates to areas of information technology, relate in particular to a kind of verification method and device of portable terminal.
Background technology
At present, the verification method general process of portable terminal is, a string character string that is pre-set by user's input in advance when the character string of being stored in character string that the user imported and the portable terminal is complementary, can be determined to verify and pass through.
And character string is difficult to memory usually for the user, and especially in order to make the authentication password safety coefficient higher, what often the figure place of authentication password need be provided with is more, and the situation that often has the user not remember authentication password occurs.And the character in the authentication password all is that order is imported, and is convenient to decode, and can only improve safety coefficient by increasing the authentication password figure place, and its safety coefficient is difficult to effectively improve.
Summary of the invention
The embodiment of the invention provides a kind of verification method and device of portable terminal, to improve the safety coefficient of authentication password, is convenient to user's memory cipher simultaneously.
A kind of verification method of portable terminal comprises:
Show keyboards for musical instruments;
Detect the triggering key assignments and the trigger sequence of button in the described keyboards for musical instruments;
When described triggering key assignments and feedback order is mated with key assignments that prestores and order thereof, determine that checking passes through.
A kind of demo plant of portable terminal comprises:
Display unit is used to show keyboards for musical instruments;
Detecting unit detects the triggering key assignments of button in the described keyboards for musical instruments and feedback order;
Authentication unit, be used for determining when described triggering key assignments and feedback order all with the key assignments that prestores and when mating in proper order, checking is passed through.
The embodiment of the invention provides a kind of verification method and portable terminal of portable terminal, by on portable terminal, showing keyboards for musical instruments, import one section pre-set music score of Chinese operas by the user by this keyboards for musical instruments, when the music score of Chinese operas of storing in the music score of Chinese operas of user input and the portable terminal mates, determine that user rs authentication passes through.Because the user can remember authentication password by the music score of Chinese operas, be convenient to user's memory, simultaneously,, also improved the safety coefficient of authentication password owing to often occur the situation that a plurality of buttons are pressed simultaneously in the music score of Chinese operas.
Description of drawings
The authentication password input method process flow diagram of the portable terminal that Fig. 1 provides for the embodiment of the invention;
Fig. 2 shows synoptic diagram for the authentication password input method median surface of the portable terminal that the embodiment of the invention provides;
Fig. 3 is for being provided with the process flow diagram of authentication password in the embodiment of the invention;
Fig. 4 a and Fig. 4 b are sound control view in the embodiment of the invention;
Fig. 5 a-Fig. 5 d is a piano key view in the embodiment of the invention;
Fig. 6 is the modified flow figure of language in the embodiment of the invention;
Fig. 7 is the demo plant structural representation of portable terminal in the embodiment of the invention;
Fig. 8 is the demo plant structural representation of a kind of concrete portable terminal in the embodiment of the invention;
Fig. 9 is the demo plant structural representation of a kind of preferable portable terminal in the embodiment of the invention.
Embodiment
The embodiment of the invention provides a kind of cipher-code input method and device of portable terminal, by on portable terminal, showing keyboards for musical instruments, import one section pre-set music score of Chinese operas by the user by this keyboards for musical instruments, when the music score of Chinese operas of storing in the music score of Chinese operas of user input and the portable terminal mates, determine that user rs authentication passes through.Because the user can remember authentication password by the music score of Chinese operas, is convenient to user's memory, simultaneously, because the normal situation that a plurality of buttons are pressed simultaneously, the also safety coefficient of the authentication password of Ti Gaoing of occurring in the music score of Chinese operas.
As shown in Figure 1, the cipher-code input method of the portable terminal that the embodiment of the invention provides comprises:
Step S101 shows keyboards for musical instruments.
Call the checking interface in the terminal, show the keyboards for musical instruments that is used to verify, this keyboards for musical instruments can show by the triggering of response user when using authentication function, also can show before checking work such as the user carries out that portable terminal is unblanked always.
Step S102 detects the triggering key assignments of button in the described keyboards for musical instruments and feedback order.
Detect the triggering situation of each button in the described keyboards for musical instruments, and according to the triggering situation of button, the triggering of button is converted to key assignments.When having a plurality of buttons to be triggered simultaneously, then will be converted to corresponding a plurality of triggering key assignments simultaneously to the triggering of a plurality of buttons.
Step S103 when described triggering key assignments and feedback order is mated with key assignments that prestores and order thereof, determines that checking passes through.
By this verification method, the user just can come the needed numerical value of input validation by shoegaze, because the characteristic of music score itself, user's memory also is convenient in the security that has improved password simultaneously.
Generally speaking, as long as it is just passable that simple musical instrument has 7 notes,, then only need seven buttons of do re mi fa so la xi to get final product if musical instrument is a piano, therefore, the keyboards for musical instruments that shows only needs 7 buttons, as shown in Figure 2, and certainly, also can be according to user's selection, show complicated keyboards for musical instruments, thereby can further improve security so that set authentication password is complicated more.
Keyboards for musical instruments in the embodiment of the invention is that piano key is preferable, can certainly be other keyboards for musical instruments of being convenient to the note input.
For example the set music score of Chinese operas of user is: so so do fa si
La soRe fa fa si
La soRe, wherein the note of underscore is for what play simultaneously, and then the user just need work as input according to the order input of note in the music score of Chinese operas when the input validation password
La soThe time, import two notes of la and so simultaneously, when note that the user imported and input sequence all with the music score of Chinese operas file of storage in music score of Chinese operas so so do fa si
La soRe fa fa si
La soWhen re was identical, the authentication password that then definite user is imported was correct, by checking.
This music score of Chinese operas can be the music score of Chinese operas file that prestores, and the starting position of mark and the part between the end position in the music score of Chinese operas file that perhaps prestores are perhaps by receiving the music score of Chinese operas file that the key assignments imported in the keyboards for musical instruments and input sequence generate.
The music score of Chinese operas file that prestores when use is during as authentication password, and then directly first note from the music score of Chinese operas file that prestores begins as password, and when user's input validation password, first note of file begins to play and gets final product from the music score of Chinese operas.
In the music score of Chinese operas file that will prestore under the starting position of mark and the situation of the part between the end position as authentication password, when the user inputs password, need begin to play from first note of the starting position of specified music score of Chinese operas file, input password for ease of the user, prevent that password is long, can be by User Defined password end position.In fact, the user directly uses the music score of Chinese operas file of storage as password, and the password starting position that promptly is equivalent to user's setting is a note in the music score of Chinese operas file, and the password end position is last note in the music score of Chinese operas file.When detecting the self-defined part that certain music score of Chinese operas file is set of being operating as of user as authentication password, call music score of Chinese operas file and select the interface, in this interface, enumerate out the music score of Chinese operas file of storage in advance, selection according to the user, call and show selected music score of Chinese operas file, detect the starting position and the end position of the music score of Chinese operas file that the user is provided with, with the music score of Chinese operas file between reference position and the end position as authentication password.
By receiving the music score of Chinese operas file that the key assignments imported in the keyboards for musical instruments and input sequence generate, detect the key assignments and the input sequence that trigger the keyboards for musical instruments that shows when the user sets authentication password, generate interim music score of Chinese operas file, provide once more and play the interface, the key assignments of verifying twice input is input sequence when identical, with above-mentioned interim music score of Chinese operas file as authentication password.
Concrete, as shown in Figure 3, the flow process that the user is provided with password comprises:
Step S301, the response user triggering, call musical instrument password setting interface, and in musical instrument password setting interface the selected keyboards for musical instruments of explicit user;
Step S302, detect the triggering situation of each button in the described keyboards for musical instruments, and the key assignments of the button that triggered of feedback; When the user touches in the keyboards for musical instruments the pairing touch location of certain button, think that promptly this button is triggered, and feeds back the key assignments of this button.
Step S303, according to the key assignments that is fed back and feedback order, generate interim music score of Chinese operas file;
Step S304, prompting user re-enter password;
The triggering situation of each button in step S305, the described keyboards for musical instruments of detection, and according to the button feedback key assignments that is triggered;
Step S306, determine the key assignments fed back and feedback order whether all and interim music score of Chinese operas file coupling, if, execution in step S307, if not, execution in step S308;
Step S307, determining password setting success, is music score of Chinese operas file as password with interim music score of Chinese operas file storage;
Step S308, twice input of prompting user do not conform to, and reset password, and delete interim music score of Chinese operas file.
When password was set, the user also can import numbered musical notation by common keyboard, thereby reduced user's password setting difficulty.
In order to guarantee that music is understood few user can access preferable use cognition equally, in step S103, determine to trigger key assignments and feedback thereof order all with the music score of Chinese operas that prestores in key assignments and order when mating thereof, determine that the password that the user inputs is correct, be specially:
In interim storage space, the music score of Chinese operas that relatively triggers key assignments and prestore according to the feedback order triggers key assignments and the matching degree of the music score of Chinese operas that prestores according to the comparative result correction with the triggering key assignments of each feedback and feedback journal thereof;
When the key assignments number of the matching degree of the music score of Chinese operas that triggers key assignments and prestore and feedback all reaches preset value, determine that the password that the user inputs is correct, and empty and write down the interim storage space that triggers key assignments.
Feeding back journal in interim storage space the time, can related feedback sequence valve can certainly be set according to the triggering key assignments of each feedback of feedback journal for the triggering key assignments of each feedback, and record.
Like this, just can not requiring that the user is right-on plays the whole music score of Chinese operas, can can be regarded as the password input correctly as long as the number of notes of its matching degree and input has all reached the standard of setting, this function is applicable to the projects not high to security requirement such as release of portable terminal.
For example, if the user as the music score of Chinese operas of password be: do re
Mi faSo la si si la so fa mi re do do re mi
Fa soLa si si la so fa mi re do, if being set to import number of notes, the user reaches 6, matching degree reaches 80% and is the password input correctly, so when the user inputs password, if first note do input of user's input is correct, then this moment, matching degree was 100%, but the input number of notes is 1, continue to obtain the signal of user's input, if second note re input of user is incorrect, then this moment, matching degree reduced to 50%, the input number of notes is 2, do not satisfy condition, continue to obtain the signal of user's input, if user the 3rd, four note mi fa import correctly, then this moment, matching degree was upgraded to 75%, the input number of notes is 4, still do not satisfy condition, continue to obtain the signal of user's input, if the 5th note input of user is correct, then this moment, matching degree was 80%, the input number of notes is 5, continue to obtain the signal of user's input, if the 6th note input of user is incorrect, then this moment, matching degree was 66%, the input number of notes is 6, because matching degree does not satisfy condition, thus still continue to obtain the signal of user's input, if user the 7th, eight, nine, ten notes are all imported correctly, then this moment, matching degree was 80%, the input number of notes is 10, satisfies condition, and determines that the password input is correct.
The user re-enters password for convenience, can on the interface, show and re-enter button, when receiving the signal that re-enters that the user sends by this button, empty the interim storage space that record triggers key assignments, that is, delete the triggering key assignments that writes down in the interim storage space.
For the continuity that guarantees that password is imported, thus the security that improves password, can also be after getting access to the triggering key assignments that is fed back at every turn, restart timing, after timing time surpassed setting value, the prompting user re-entered password, and deleted the triggering key assignments that is write down.
In order further to improve the security of password, can further judge user's the input and the matching degree of the music score of Chinese operas according to the rhythm in the music score of Chinese operas, at this moment, record triggers key assignments and feedback order thereof, and and the music score of Chinese operas that prestores in key assignments and order thereof compare, specifically comprise: write down described triggering key assignments and feedback thereof order; Whether the key assignments that relatively triggers relevant position in the key assignments and the music score of Chinese operas mates; Determine that this time feedback triggers the matching degree that key assignments and preceding once feedback trigger the rhythm of time interval of key assignments and the corresponding key assignments of the music score of Chinese operas.And then can calculate user's the input and the matching degree of the music score of Chinese operas according to the matching degree that triggers key assignments and the matching degree of rhythm.
For example, if as the music score of Chinese operas of password be 120 clap/minute, each note all 1 is clapped at interval in the music score of Chinese operas, the music score of Chinese operas is: do re
Mi faSo la si si la so fa mi re do do re mi
Fa soLa si si la so fa mi re do, then get access to after the user imports the triggering key assignments of first note do feedback, pick up counting, if just get access to the triggering key assignments that the user imports second note re feedback 0.5 second the moment, think that then the rhythm matching degree is 100%, if get access to the triggering key assignments that the user imports second note re feedback in the moment of 0.4 second or 0.6 second, think that then the rhythm matching degree is 80%, if the coupling that the user sets the coupling that triggers key assignments and rhythm respectively accounts for 50% to the influence of the matching degree of user's the input and the music score of Chinese operas, after then the user imports first note do, if it is correct to trigger the key assignments input, then matching degree is 100%, when the user imports second note re, if the rhythm matching degree is 80%, it is correct to trigger the key assignments input, then the whole matching degree of second note is 90%, and at this moment, user's input is 95% with the matching degree of the music score of Chinese operas, equally, if user's input the 3rd in 0.3 second behind second note re of input, four notes
Mi fa, and trigger key assignments and all import correctly, then these two the rhythm matching degree that trigger key assignments are 60%, trigger the key value match degree and are 100%, and then the whole matching degree of third and fourth note is 80%, and at this moment, user's input is 87.5% with the matching degree of the music score of Chinese operas.
In addition, for the user provides the self-defined interface that the matching degree preset value of key number and/or rhythm is set, if user's music quality is higher, the preset value of matching degree can be heightened, improve confidentiality, if user's music quality is lower, above-mentioned preset value can be turned down, be convenient to checking and pass through.For example matching degree is carried out five equilibrium several times according to 0 ~ 100%, the matching degree that the big more explanation of number percent requires is high more.Detecting under the situation that the user is provided with matching degree, call matching degree the interface is set, the matching degree grade that shows two or more on the interface is selected the district, the mode that is presented on the interface is selected the district for " high and low " two, or more than the selection district of two representative matching degree grade, according to user's selection, will the corresponding matching degree preset value of saving as of matching degree be set.
Further, show the sound control; According to the sound status in the sound control, play the note of the keyboards for musical instruments correspondence of being pressed.Like this, the playing sound when user just can be by the input of the more convenient control password of sound control, certainly, the playing sound when user also can import password by the sound control mode that portable terminal side switch, sound are provided with routines such as panel controlled.Around the people more for a long time, the user can make by the sound control and not play the note of the keyboards for musical instruments correspondence of being pressed in input during password, and then prevents that other people from eavesdropping password, at this moment, the user can be by reading the input of controlling password silently.
For example, shown in Fig. 4 a and Fig. 4 b, a kind of simple sound control can for: have only two states of A, B, when the button in the sound control slides into the A place, shown in Fig. 4 a, shoegaze carries out sound playing, when the button in the sound control slides into the B place, shown in Fig. 4 b, then do not carry out sound playing during shoegaze.
For the ease of user's shoegaze under mute state, can be when the user inputs password, change the show state of the keys of musical instrument of being pressed, thereby make it be different from other button, as Fig. 5 a, shown in Fig. 5 b and Fig. 5 c, each piano key all is the state of upspringing among Fig. 5 a, among Fig. 5 b, second key re is pressed, and in actual applications, the color that this button can be set by the user is filled, among Fig. 5 c, second key re and the 5th key so are pressed simultaneously, and then all be shown as the color that is set by the user and fill, thus can be so that whether the user determines keys of musical instrument be pressed.
Further, can also on each button on the keyboards for musical instruments, mark the note of this button representative,, for example on piano key, can add the mark as shown in Fig. 5 d so that the user plays.
Simultaneously, user's use for convenience, can be when the needs user passes through this kind mode and inputs password, display reminding language on the interface, the prompting user inputs password by shoegaze, for example, if what show is piano key, then can on the interface, show " play piano and come release " as shown in Figure 2 when needing the release portable terminal.
Further, for the ease of before the user identification password input, during the password input, different conditions such as the correct back of password confirming, especially when quiet input password, make things convenient for these states of User Recognition, can point out the user by the display effect that changes signal language.For example, can be when the user begin to play the original state of piano, make signal language be shown as first default color that the user sets, after the user begins to play piano, the signal language color is a gradual change animation effect loop play, and after the timing time that the user stops to play surpassed setting value, the signal language color restoration was first default color, thereby the prompting user re-enters password, and empties the key assignments that is write down.After the correct requirement of the satisfied password confirming of setting of user's password, then the signal language animation effect stops, and the signal language color becomes second default color that the user sets, and the portable terminal of release simultaneously enters main interface.
As shown in Figure 6, when the user was the portable terminal release, the modified flow of language was specially:
Step S601, demonstration shoegaze release interface are shown as first state with signal language;
Step S602, behind the signal that receives user's shoegaze, signal language is shown as second state;
Step S603, judge whether to reach the requirement of password authentification, if, execution in step S604 then, otherwise execution in step S605;
Step S604, signal language is shown as the third state, simultaneously portable terminal is contacted lock-out state, show main interface;
Step S605, judge whether the timing time that the user stops to play surpasses setting value, if, execution in step S601, otherwise execution in step S602.
The embodiment of the invention also provides a kind of demo plant of portable terminal, as shown in Figure 7, comprising:
Detecting unit 702 detects the triggering key assignments of button in the described keyboards for musical instruments and feedback order;
In order to guarantee that musical instrument plays the not outstanding user of ability and can access preferable use equally and know from experience, as shown in Figure 8, determining unit 703 specifically comprises:
Relatively subelement 7031 is used to write down each and triggers key assignments and feedback order thereof, and compares with key assignments that prestores and order thereof, according to the matching degree of the described triggering key assignments of comparative result correction and feedback order and key assignments that prestores and order thereof;
Determine subelement 7032, be used for when the triggering key assignments number of described matching degree and feedback all reaches preset value, determine to verify and pass through, and delete triggering key assignments and the feedback order thereof that is write down.
For the continuity that guarantees that password is imported, thereby the security that improves password as shown in Figure 9, also comprises in the detecting unit:
Overtime control sub unit 7021 is used for after detecting the key assignments that is fed back at every turn, reclocking, and after timing time surpassed setting value, the prompting user verified again, and deletes triggering key assignments and the feedback order thereof that is write down.
The embodiment of the invention provides a kind of cipher-code input method and portable terminal of portable terminal, by on portable terminal, showing keyboards for musical instruments, import one section pre-set music score of Chinese operas by the user by this keyboards for musical instruments, when the music score of Chinese operas coupling of storing in the music score of Chinese operas of user input and the portable terminal, determine the user cipher input correctly.Because the user can come memory cipher by the music score of Chinese operas, be convenient to user's memory, simultaneously,, also improved the safety coefficient of password owing to often occur the situation that a plurality of buttons are pressed simultaneously in the music score of Chinese operas.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, if of the present invention these are revised and modification belongs within the scope of claim of the present invention and equivalent technologies thereof, then the present invention also is intended to comprise these changes and modification interior.
Claims (10)
1. the verification method of a portable terminal is characterized in that, comprising:
Show keyboards for musical instruments;
Detect the triggering key assignments and the trigger sequence of button in the described keyboards for musical instruments;
When described triggering key assignments and feedback order is mated with key assignments that prestores and order thereof, determine that checking passes through.
2. method according to claim 1 is characterized in that, described key assignments that prestores and order thereof are preserved with the form of music score of Chinese operas file, and described music score of Chinese operas file comprises:
The complete music score of Chinese operas file that prestores; Perhaps
Fragment in the music score of Chinese operas file that prestores; Perhaps
By receiving the music score of Chinese operas file that the key assignments imported in the described keyboards for musical instruments and input sequence generate.
3. method according to claim 2 is characterized in that, when described triggering key assignments and feedback order all and the key assignments that prestores and order thereof when mating, determine that checking passes through, comprising:
Write down each and trigger key assignments and feedback order thereof, and and the key assignments and the order thereof of the music score of Chinese operas file that prestores compare, according to the key assignments of the described triggering key assignments of comparative result correction and feedback order thereof and the music score of Chinese operas file that prestores and the matching degree of order thereof;
When the triggering key assignments number of described matching degree and feedback all reaches preset value,, and delete triggering key assignments and the feedback order thereof that is write down by checking.
4. method according to claim 3 is characterized in that, each triggers key assignments and feedback order thereof described record, and and the key assignments and the order thereof of the music score of Chinese operas file that prestores compare, comprising:
Write down described triggering key assignments and feedback thereof order;
Whether the key assignments of more described triggering key assignments and the described music score of Chinese operas file that prestores mates;
Determine the matching degree of the rhythm of time interval of triggering key assignments of the triggering key assignments of this time feedback and preceding once feedback and the corresponding key assignments of the described music score of Chinese operas.
5. method according to claim 3 is characterized in that, also comprises:
After getting access to the key assignments that is fed back at every turn, restart timing, after timing time surpasses setting value, show and verify the interface again, and delete triggering key assignments and the feedback order thereof that is write down.
6. method according to claim 3 is characterized in that, described preset value is:
The preset value of default setting; Or
The preset value that the user who preserves manually is provided with.
7. method according to claim 1 is characterized in that, also comprises:
According to the state of described sound control, play the note of the keyboards for musical instruments correspondence of being pressed;
And/or
Triggering situation and checking result according to each button in the described keyboards for musical instruments show dynamic effect.
8. the demo plant of a portable terminal is characterized in that, comprising:
Display unit is used to show keyboards for musical instruments;
Detecting unit detects the triggering key assignments of button in the described keyboards for musical instruments and feedback order;
Authentication unit, be used for determining when described triggering key assignments and feedback order all with the key assignments that prestores and when mating in proper order, checking is passed through.
9. device according to claim 8 is characterized in that, described detecting unit comprises:
Overtime control sub unit is used for after detecting the key assignments that is fed back at every turn, reclocking, and after timing time surpassed setting value, the prompting user verified again, and deletes triggering key assignments and the feedback order thereof that is write down.
10. device according to claim 8 is characterized in that, described authentication unit comprises:
Relatively subelement is used to write down each and triggers key assignments and feedback order thereof, and compares with key assignments that prestores and order thereof, according to the matching degree of the described triggering key assignments of comparative result correction and feedback order and key assignments that prestores and order thereof;
Determine subelement, be used for when the triggering key assignments number of described matching degree and feedback all reaches preset value, determine to verify and pass through, and delete triggering key assignments and the feedback order thereof that is write down.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011101045646A CN102142071A (en) | 2011-04-26 | 2011-04-26 | Method and device for verifying mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011101045646A CN102142071A (en) | 2011-04-26 | 2011-04-26 | Method and device for verifying mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102142071A true CN102142071A (en) | 2011-08-03 |
Family
ID=44409573
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011101045646A Pending CN102142071A (en) | 2011-04-26 | 2011-04-26 | Method and device for verifying mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102142071A (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102694914A (en) * | 2012-05-18 | 2012-09-26 | 广东欧珀移动通信有限公司 | Unlocking method for mobile phone screen |
CN102812427A (en) * | 2011-12-28 | 2012-12-05 | 华为技术有限公司 | Unlocking method of terminal device and terminal device |
CN102857615A (en) * | 2012-09-24 | 2013-01-02 | 武汉大学 | Unlocking method for touch screen mobile phone based on dynamic password |
CN103002146A (en) * | 2012-11-28 | 2013-03-27 | 广东欧珀移动通信有限公司 | Method and system for unlocking mobile terminal |
CN103002139A (en) * | 2012-11-22 | 2013-03-27 | 广东欧珀移动通信有限公司 | Unlocking method of touch screen terminal |
CN103116718A (en) * | 2013-03-06 | 2013-05-22 | 无锡德飞科技有限公司 | Password setting and verification method based on spatial position code log-in computer system |
WO2013123747A1 (en) * | 2012-02-24 | 2013-08-29 | 中兴通讯股份有限公司 | Method and system for achieving device unlocking based on audio |
CN103425421A (en) * | 2012-05-23 | 2013-12-04 | 纬创资通股份有限公司 | Method for touch unlocking by using rhythmic clicking and related electronic device |
CN103455738A (en) * | 2012-06-04 | 2013-12-18 | 国际商业机器公司 | Method and computer device for providing time ratio-based password/challenge authentication |
CN103577054A (en) * | 2012-07-23 | 2014-02-12 | 北京三星通信技术研究有限公司 | Terminal unlocking method and device |
CN103729123A (en) * | 2013-12-31 | 2014-04-16 | 青岛高校信息产业有限公司 | Mapping method and system for application program |
CN104424427A (en) * | 2013-08-28 | 2015-03-18 | 联发科技(新加坡)私人有限公司 | Password authentication method and device |
CN105260633A (en) * | 2015-11-20 | 2016-01-20 | 上海斐讯数据通信技术有限公司 | Intelligent terminal screen unlocking method and system based on multipoint touch |
CN105893825A (en) * | 2016-04-25 | 2016-08-24 | 广东欧珀移动通信有限公司 | Display screen unlocking method, device and mobile terminal based on music identifier |
CN105975848A (en) * | 2016-04-29 | 2016-09-28 | 努比亚技术有限公司 | Password unlocking method and apparatus |
CN106127021A (en) * | 2016-06-30 | 2016-11-16 | 北京奇虎科技有限公司 | Mobile terminal verification method and device |
WO2016192287A1 (en) * | 2015-05-29 | 2016-12-08 | 上海斐讯数据通信技术有限公司 | Method and system for unlocking mobile terminal by playing imitation guitar |
US9600653B2 (en) | 2011-09-30 | 2017-03-21 | International Business Machines Corporation | Providing time ratio-based password/challenge authentication |
CN106815513A (en) * | 2015-11-27 | 2017-06-09 | 北京金山安全软件有限公司 | Terminal unlocking method and related device and equipment |
EP2720133A3 (en) * | 2012-10-12 | 2017-10-25 | Samsung Electronics Co., Ltd | Apparatus and method for unlocking screen and executing operation in a portable terminal |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101043676A (en) * | 2007-03-23 | 2007-09-26 | 华为技术有限公司 | Method and apparatus for prompting alarm clock stopping of mobile terminal |
CN101158882A (en) * | 2006-10-02 | 2008-04-09 | 三星电子株式会社 | Method for unlocking a portable multimedia player and apparatus thereof |
CN101404688A (en) * | 2008-11-03 | 2009-04-08 | 中兴通讯股份有限公司 | Method and device for altering left and right press key function of mobile phone |
US20100153735A1 (en) * | 2008-12-15 | 2010-06-17 | Bull Hn Information Sys. | Entering an identifier with security improved by time based randomization of input steps based upon time |
CN101996431A (en) * | 2009-08-18 | 2011-03-30 | 朱利 | Music identification lock device using any music player as unlocking basis |
-
2011
- 2011-04-26 CN CN2011101045646A patent/CN102142071A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101158882A (en) * | 2006-10-02 | 2008-04-09 | 三星电子株式会社 | Method for unlocking a portable multimedia player and apparatus thereof |
CN101043676A (en) * | 2007-03-23 | 2007-09-26 | 华为技术有限公司 | Method and apparatus for prompting alarm clock stopping of mobile terminal |
CN101404688A (en) * | 2008-11-03 | 2009-04-08 | 中兴通讯股份有限公司 | Method and device for altering left and right press key function of mobile phone |
US20100153735A1 (en) * | 2008-12-15 | 2010-06-17 | Bull Hn Information Sys. | Entering an identifier with security improved by time based randomization of input steps based upon time |
CN101996431A (en) * | 2009-08-18 | 2011-03-30 | 朱利 | Music identification lock device using any music player as unlocking basis |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9600653B2 (en) | 2011-09-30 | 2017-03-21 | International Business Machines Corporation | Providing time ratio-based password/challenge authentication |
CN102812427A (en) * | 2011-12-28 | 2012-12-05 | 华为技术有限公司 | Unlocking method of terminal device and terminal device |
WO2013123747A1 (en) * | 2012-02-24 | 2013-08-29 | 中兴通讯股份有限公司 | Method and system for achieving device unlocking based on audio |
CN102694914A (en) * | 2012-05-18 | 2012-09-26 | 广东欧珀移动通信有限公司 | Unlocking method for mobile phone screen |
CN103425421A (en) * | 2012-05-23 | 2013-12-04 | 纬创资通股份有限公司 | Method for touch unlocking by using rhythmic clicking and related electronic device |
CN103455738A (en) * | 2012-06-04 | 2013-12-18 | 国际商业机器公司 | Method and computer device for providing time ratio-based password/challenge authentication |
CN103577054A (en) * | 2012-07-23 | 2014-02-12 | 北京三星通信技术研究有限公司 | Terminal unlocking method and device |
CN102857615A (en) * | 2012-09-24 | 2013-01-02 | 武汉大学 | Unlocking method for touch screen mobile phone based on dynamic password |
EP2720133A3 (en) * | 2012-10-12 | 2017-10-25 | Samsung Electronics Co., Ltd | Apparatus and method for unlocking screen and executing operation in a portable terminal |
CN103002139A (en) * | 2012-11-22 | 2013-03-27 | 广东欧珀移动通信有限公司 | Unlocking method of touch screen terminal |
CN103002139B (en) * | 2012-11-22 | 2015-01-14 | 广东欧珀移动通信有限公司 | Unlocking method of touch screen terminal |
CN103002146A (en) * | 2012-11-28 | 2013-03-27 | 广东欧珀移动通信有限公司 | Method and system for unlocking mobile terminal |
CN103116718A (en) * | 2013-03-06 | 2013-05-22 | 无锡德飞科技有限公司 | Password setting and verification method based on spatial position code log-in computer system |
CN104424427A (en) * | 2013-08-28 | 2015-03-18 | 联发科技(新加坡)私人有限公司 | Password authentication method and device |
CN103729123A (en) * | 2013-12-31 | 2014-04-16 | 青岛高校信息产业有限公司 | Mapping method and system for application program |
WO2016192287A1 (en) * | 2015-05-29 | 2016-12-08 | 上海斐讯数据通信技术有限公司 | Method and system for unlocking mobile terminal by playing imitation guitar |
CN105260633A (en) * | 2015-11-20 | 2016-01-20 | 上海斐讯数据通信技术有限公司 | Intelligent terminal screen unlocking method and system based on multipoint touch |
CN105260633B (en) * | 2015-11-20 | 2017-12-05 | 上海斐讯数据通信技术有限公司 | A kind of intelligent terminal unlocking screen method and system based on multi-point touch |
CN106815513A (en) * | 2015-11-27 | 2017-06-09 | 北京金山安全软件有限公司 | Terminal unlocking method and related device and equipment |
CN105893825A (en) * | 2016-04-25 | 2016-08-24 | 广东欧珀移动通信有限公司 | Display screen unlocking method, device and mobile terminal based on music identifier |
CN105975848A (en) * | 2016-04-29 | 2016-09-28 | 努比亚技术有限公司 | Password unlocking method and apparatus |
CN106127021A (en) * | 2016-06-30 | 2016-11-16 | 北京奇虎科技有限公司 | Mobile terminal verification method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102142071A (en) | Method and device for verifying mobile terminal | |
CN100549913C (en) | The method and the device thereof that are used for the unlock of portable multimedia player | |
US20090278807A1 (en) | Password input using touch duration code | |
KR101452704B1 (en) | Method for setting up and authenticating password for a portable device having a plurality of buttons | |
US20090144621A1 (en) | Recording, playback, and visual representation of macros | |
JP2017536633A (en) | User interface and method for secure entry of character symbols | |
EP2801905B1 (en) | Method and apparatus for unlocking a terminal device | |
US20120192268A1 (en) | Password authentication method | |
CN102289352A (en) | Application program startup method and terminal | |
US7114077B2 (en) | Verification system for confidential data input | |
CN105354458A (en) | Password input verification method and system | |
US12093364B2 (en) | Systems, methods, and media for obfuscated personal identification number entry on media devices | |
KR20150089104A (en) | Method and Device for Unlocking Input using the Combination of Number and Pattern Image at Smartphone | |
JP2005250530A (en) | Character input device | |
KR20100112739A (en) | Remote controller built-in touch screen function and fingerprint recognition function | |
KR102401127B1 (en) | Hidden password input system and password input method using the same | |
CN106445095A (en) | Input method and device and storage equipment | |
JP2002229563A (en) | Electronic equipment | |
KR102222411B1 (en) | Method and Device for Password and Unlocking Input using the Combination of Password Number and Pattern Image | |
JP5419170B2 (en) | Projection type display device, information input method and program | |
KR20140034651A (en) | Method and apparatus for unlocking device equipped with touch screen | |
KR102390173B1 (en) | Ppassword input method | |
US20230120950A1 (en) | Touchscreen lock feature for playback of media content | |
TW201407461A (en) | A method for executing a program on a handheld device with a touch panel | |
JP2007074027A (en) | Image output apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20110803 |