CN103034441A - Method and device for unlocking - Google Patents

Method and device for unlocking Download PDF

Info

Publication number
CN103034441A
CN103034441A CN2012105195774A CN201210519577A CN103034441A CN 103034441 A CN103034441 A CN 103034441A CN 2012105195774 A CN2012105195774 A CN 2012105195774A CN 201210519577 A CN201210519577 A CN 201210519577A CN 103034441 A CN103034441 A CN 103034441A
Authority
CN
China
Prior art keywords
terminal
release information
release
appointment
carried out
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012105195774A
Other languages
Chinese (zh)
Other versions
CN103034441B (en
Inventor
祝勇
王利娜
张胜阁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201210519577.4A priority Critical patent/CN103034441B/en
Publication of CN103034441A publication Critical patent/CN103034441A/en
Priority to PCT/CN2013/080322 priority patent/WO2013174348A2/en
Application granted granted Critical
Publication of CN103034441B publication Critical patent/CN103034441B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention provides a method and a device for unlocking. The method comprises the following steps of detecting a specified action which is executed to a terminal; after detecting the specified action, obtaining unlocking information which is prestored in the terminal, wherein the specified action corresponds to the unlocking information; and unlocking a specified application of the terminal by the unlocking information. The method and the device with the technical scheme have the advantage that the technical problems of waste on a great amount of energy to memorize the existing unlocking information and the like in the related techniques are solved, so the energy for memorizing passwords is saved, and the user experience is improved.

Description

Unlock method and device
Technical field
The present invention relates to information security field, in particular to a kind of unlock method and device.
Background technology
Along with popularizing of cyber-net, increasing people can use cyber-net, along with having produced a large amount of places that needs managing personal information and password (or being called release information).According to the significance level of password, usually password can be divided into two kinds, a class is very important, Private Banking's information for example, SSN (social security number) etc.; Another kind of then is not so important, only logs in once forum, network etc. such as some several years.And may be much larger than the former for latter's quantity.Present cipher mechanism has certain requirement (for example require 6,8 or more than) to the figure place of character, usually also needs to add special character etc., like this so that need the user to remember above-mentioned password.Yet because the user is not frequent use to some application, very easily forget Password.Therefore, existing unlocking manner is experienced to the user and is exerted a certain influence.
For the problems referred to above in the correlation technique, effective solution is proposed not yet at present.
Summary of the invention
In correlation technique, existing release informational needs expends great effort and goes the technical matterss such as memory, the invention provides a kind of unlock method and device, to address the above problem at least.
According to an aspect of the present invention, provide a kind of unlock method, having comprised: detected the required movement that terminal is carried out; When detecting required movement, obtain the pre-stored release information of terminal, wherein, required movement is corresponding with release information; By release information release is carried out in the appointment application of terminal.
Preferably, detect the required movement that terminal is carried out, comprising: detect the appointment sliding trace of making at the touch-screen of terminal.
Preferably, detect the appointment sliding trace of making at touch-screen, comprising: detect the appointment sliding trace of making as starting point take the assigned address of touch-screen.
Preferably, by release information the appointment of terminal is used and carry out also comprising: show assigned address before the release.
Preferably, the zone of demonstration assigned address is at random.
Preferably, detect the required movement that terminal is carried out, comprising: detect the button operation that terminal is carried out.
Preferably, button operation is push-button combination operated.
Preferably, by release information the appointment of terminal is used and to carry out release, comprise one of following: release information is shown to the terminal user, carries out release according to release information to specifying to use by the terminal user; Automatically carry out release to specifying to use according to release information.
Preferably, release information is used corresponding to a plurality of appointments, and/or required movement is corresponding to a plurality of release information.
Preferably, obtain before the pre-stored release information of terminal, also comprise: when first release is carried out in the appointment application, storage release information.
According to another aspect of the present invention, provide a kind of tripper, having comprised: detection module, for detection of the required movement that terminal is carried out; Acquisition module is used for obtaining the pre-stored release information of terminal when detecting required movement, and wherein, required movement is corresponding with release information; Separate lock module, be used for by release information release being carried out in the appointment application of terminal.
Preferably, above-mentioned detection module comprises: the first detecting unit is used for detecting the appointment sliding trace of making at touch-screen when terminal comprises touch-screen.
Preferably, above-mentioned detection module also comprises: the second detecting unit, and for detection of the button operation that terminal is carried out.
By the present invention, employing is when detecting the required movement that terminal is carried out, by the release information that the terminal of obtaining is pre-stored the technological means of carrying out release is used in the appointment of terminal, solved in the correlation technique, existing release informational needs expends great effort and goes the technical matterss such as memory, thereby saved the energy of memory cipher, promoted user's experience.
Description of drawings
Accompanying drawing described herein is used to provide a further understanding of the present invention, consists of the application's a part, and illustrative examples of the present invention and explanation thereof are used for explaining the present invention, do not consist of improper restriction of the present invention.In the accompanying drawings:
Fig. 1 is the process flow diagram according to the unlock method of the embodiment of the invention 1;
Fig. 2 is the structured flowchart according to the tripper of the embodiment of the invention 1;
Fig. 3 is another structured flowchart according to the tripper of the embodiment of the invention 1;
Fig. 4 is the synoptic diagram that memory location and gesture (i.e. sliding trace on touch-screen) are set according to the embodiment of the invention 2;
Fig. 5 is for arranging the synoptic diagram of interface location according to the password (or being called release information) of the embodiment of the invention 2;
Fig. 6 is according to the interface for password input synoptic diagram of the embodiment of the invention 2;
Fig. 7 is the synoptic diagram that utilizes gesture input password according to the embodiment of the invention 2.
Embodiment
Hereinafter also describe in conjunction with the embodiments the present invention in detail with reference to accompanying drawing.Need to prove that in the situation of not conflicting, embodiment and the feature among the embodiment among the application can make up mutually.
Consider in the correlation technique that existing release input information is difficulty and need to expend great effort and go the technical matterss such as memory cipher comparatively, provides relevant solution below in conjunction with embodiment, the existing detailed description in detail.
Fig. 1 is the process flow diagram according to the unlock method of the embodiment of the invention.As shown in Figure 1, the method comprises:
Step S102 detects the required movement that terminal is carried out;
Step S104 when detecting required movement, obtains the pre-stored release information of terminal, and wherein, required movement is corresponding with release information;
Step S106 carries out release by release information to the appointment application of terminal.
By above-mentioned each treatment step, owing to can obtain according to the required movement that terminal is carried out the relevant release information of terminal self storage, therefore, omitted the step of memory cipher, promoted user's experience.
In above-mentioned processing procedure, above-mentioned required movement can be multiple way of realization, for example: for the terminal that is provided with gravity sensor or horizon sensor, can trigger the above-mentioned release information of obtaining with the rocking action of different gestures; For the terminal that is provided with touch-screen, can also detect the appointment sliding trace of making at the touch-screen of terminal, in such cases, can detect the above-mentioned appointment sliding trace of making as starting point take the assigned address of touch-screen; In addition, it is also conceivable that and utilize different button operations to be used as above-mentioned required movement: for example, utilize different key combination, namely push-button combination operated.
For the different ways of realization of above-mentioned required movement, when adopt detecting the above-mentioned appointment slip rail of making take the assigned address of touch-screen as starting point, search above-mentioned assigned address for the ease of the user, also need to carry out the step that shows above-mentioned assigned address.
In order further to guarantee the security of release information, the zone of above-mentioned demonstration assigned address can be set at random.
The form of expression of step S106 can include but not limited to following two kinds: the first, above-mentioned release information is shown to the terminal user, and carry out release according to release information to specifying to use by the terminal user; The second carries out release to above-mentioned appointment application automatically according to above-mentioned release information.
Above-mentioned release information can be used a plurality of appointments and carry out release, and same required movement also can obtain a plurality of release information, and in other words, above-mentioned release information is used corresponding to a plurality of appointments, and/or required movement is corresponding to a plurality of release information.
For the storage of above-mentioned release information, can by realization is set in advance, also can when first release is carried out in the appointment application of terminal, store above-mentioned release information in terminal.
A kind of tripper also is provided in the present embodiment, has been used for realizing above-described embodiment and preferred implementation, carried out repeating no more of explanation, the below describes the module that relates in this device.As used below, the combination of software and/or the hardware of predetermined function can be realized in term " module ".Although the described device of following examples is preferably realized with software, hardware, perhaps the realization of the combination of software and hardware also may and be conceived.Fig. 2 is the structured flowchart according to the tripper of the embodiment of the invention 1.As shown in Figure 2, this device comprises:
Detection module 20 is connected to acquisition module 22, for detection of the required movement that terminal is carried out;
Acquisition module 22 is connected to and separates lock module 24, is used for obtaining the pre-stored release information of terminal when detecting required movement, and wherein, required movement is corresponding with release information;
Separate lock module 24, be used for by release information release being carried out in the appointment application of terminal.
By the function that above-mentioned modules is realized, can obtain according to the required movement that terminal is carried out the relevant release information of terminal self storage equally, therefore, can realize omitting the step of memory cipher, promote the user and experience.
In the present embodiment, as shown in Figure 3, above-mentioned detection module 20 comprises: the first detecting unit 200 is used for detecting the appointment sliding trace of making at touch-screen when terminal comprises touch-screen.
In the present embodiment, as shown in Figure 3, above-mentioned detection module 20 can also comprise: the second detecting unit 202, and for detection of the button operation that terminal is carried out
In order to understand better above-described embodiment 1, describe in detail below in conjunction with embodiment 2 and relevant drawings.The main design idea of following examples is that the user will preserve this field at a region of memory of system after inputting password first, and provides a dominant position indicating in certain zone of screen simultaneously.When needing to use password, the user, takes out password by means such as special gesture or combination buttons at this position (or near zone), then carries out subsequent operation next time.
Embodiment 2
Present embodiment provides a kind of method of utilizing a kind of concealed method input release information (password) in having the equipment of display screen.
Present embodiment goes for multiple screen, multiple layout and multiple application program, is not limited to the input of password, and some is needed the input of enciphered message, and is still effective.The input of above-mentioned release information can be divided into two steps, and the first step is a position of selecting on the interface, and second step is to initiate from this position, and the user initiates means that a system can detect as input action.The means that this system can detect can be the combinations of several buttons, also can be gesture operations on the touch-screen etc.In the present embodiment, describe as an example with the gesture operation on Android and the touch-screen.Specific as follows:
Memory location and gesture are set
As shown in Figure 4, this programme first step need to arrange a memory location and gesture, arrange by the step among Fig. 4: select a position as the memory location at 1.1 empty places, namely 1.2, this position does not need to be accurate to Pixel-level, in fact, and in order to reduce user's memory burden, can enlarge on the location-appropriate ground that the user clicks effective coverage (when need to use this position next time, in this panel region, all can be regarded as effectively).Then select next step to arrive 1.3.In 1.3, be that starting point draws a gesture from the memory location of selecting, system identification and memory (1.4).System will preserve this starting point and gesture, when needing to input password, need to use memory location and the gesture of this step next time.
Password arranges interface location and reminds
As shown in Figure 5, (or website log in etc.) will be in the time of will producing password in certain is used, system will monitor this process, after input password point is determined, system can be in certain position of screen with the memory point of certain dominant prompt cipher, just current password stores in a certain file on a certain field in the internal memory or the disk (in fact password is stored in internal memory or the hardware file, is exactly that to be stored in this of this interface locational but give user's mental model here) into.Need to prove, it is not necessary giving the memory point of the dominant prompt cipher of user, because the step on Fig. 4 can arrange position and gesture, so flow process shown in Figure 5, mainly play the effect of prompting user " password is by system log (SYSLOG), and can directly take out use next time ".
Interface for password input
Figure 6 shows that a typical interface for password input, need the user that password is inputted, in fact the password that needs here to input refers to the password that preservation is got up in the scheme shown in Figure 5.
Utilize gesture input password
Such as Fig. 7, the user moves to finger first original cryptographic zone (being the password position of dominant prompting among the user arranges among Fig. 4 position or Fig. 5), then certain gesture (gesture that the user arranges among Fig. 4) take this zone as starting point marks is seen shown in the middle graph.After gesture was finished, at first system compared the gesture of storing among the gesture of user input and Fig. 4, if correctly, then extracted password from the internal memory of original preservation password or file, and was filled in the input frame, as shown at right.In this process, if when any one is not inconsistent among the initial position of user selection or the gesture that draws and Fig. 4, then thinks and make mistakes, do not input the operation response of password.
Can find out that by above-described embodiment above-described embodiment has been realized following beneficial effect:
Compared with prior art, prior art for example web browser has the function of remembeing password and preserving password usually, but this function can not stop other people use to password when using current account, is to be equivalent to reveal personal information in fact.Then can effectively avoid this problem by above-described embodiment, personal information be played safeguard protection use.And the position that obtains behind each input password can be at random, also can ensure information safety to a certain extent.
In another embodiment, also provide a kind of software, this software be used for to be carried out the technical scheme that above-described embodiment and preferred implementation are described.
In another embodiment, also provide a kind of storage medium, stored above-mentioned software in this storage medium, this storage medium includes but not limited to: CD, floppy disk, hard disk, scratch pad memory etc.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with general calculation element, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation elements form, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the memory storage and be carried out by calculation element, and in some cases, can carry out step shown or that describe with the order that is different from herein, perhaps they are made into respectively each integrated circuit modules, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
Be the preferred embodiments of the present invention only below, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (13)

1. a unlock method is characterized in that, comprising:
The required movement that detection is carried out terminal;
When detecting described required movement, obtain the pre-stored release information of described terminal, wherein, described required movement is corresponding with described release information;
By described release information release is carried out in the appointment application of described terminal.
2. method according to claim 1 is characterized in that, detects the required movement that terminal is carried out, and comprising:
The appointment sliding trace that detection is made at the touch-screen of described terminal.
3. method according to claim 2 is characterized in that, detects the appointment sliding trace of making at described touch-screen, comprising:
The described appointment sliding trace that detection is made as starting point take the assigned address of touch-screen.
4. method according to claim 3 is characterized in that, by described release information the appointment of described terminal is used and carries out also comprising before the release:
Show described assigned address.
5. method according to claim 4 is characterized in that, the zone that shows described assigned address is at random.
6. method according to claim 1 is characterized in that, detects the required movement that terminal is carried out, and comprising:
The button operation that detection is carried out described terminal.
7. method according to claim 6 is characterized in that, described button operation is push-button combination operated.
8. according to claim 1 to 7 each described methods, it is characterized in that, by described release information the appointment of described terminal used and carry out release, comprise one of following:
Described release information is shown to the terminal user, described appointment is used according to described release information by the terminal user and carry out release;
Automatically release is carried out in described appointment application according to described release information.
9. according to claim 1 to 7 each described methods, it is characterized in that described release information is used corresponding to a plurality of described appointments, and/or described required movement is corresponding to a plurality of described release information.
10. according to claim 1 to 7 each described methods, it is characterized in that, obtain before the pre-stored release information of described terminal, also comprise:
When first release is carried out in described appointment application, store described release information.
11. a tripper is characterized in that, comprising:
Detection module is for detection of the required movement that terminal is carried out;
Acquisition module is used for obtaining the pre-stored release information of described terminal when detecting described required movement, and wherein, described required movement is corresponding with described release information;
Separate lock module, be used for by described release information release being carried out in the appointment application of described terminal.
12. device according to claim 11 is characterized in that, described detection module comprises:
The first detecting unit is used for detecting the appointment sliding trace of making at described touch-screen when described terminal comprises touch-screen.
13. device according to claim 11 is characterized in that, described detection module also comprises:
The second detecting unit is for detection of the button operation that described terminal is carried out.
CN201210519577.4A 2012-12-06 2012-12-06 Unlocking method and device Active CN103034441B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210519577.4A CN103034441B (en) 2012-12-06 2012-12-06 Unlocking method and device
PCT/CN2013/080322 WO2013174348A2 (en) 2012-12-06 2013-07-29 Unlocking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210519577.4A CN103034441B (en) 2012-12-06 2012-12-06 Unlocking method and device

Publications (2)

Publication Number Publication Date
CN103034441A true CN103034441A (en) 2013-04-10
CN103034441B CN103034441B (en) 2019-02-01

Family

ID=48021378

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210519577.4A Active CN103034441B (en) 2012-12-06 2012-12-06 Unlocking method and device

Country Status (2)

Country Link
CN (1) CN103034441B (en)
WO (1) WO2013174348A2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013174348A2 (en) * 2012-12-06 2013-11-28 中兴通讯股份有限公司 Unlocking method and device
CN105763714A (en) * 2016-04-05 2016-07-13 北京京东尚科信息技术有限公司 Method and device for locking/unlocking mobile phone screen
WO2016192237A1 (en) * 2015-05-29 2016-12-08 中兴通讯股份有限公司 Wireless local area network connecting method, mobile terminal and wireless access point
CN106714163A (en) * 2016-12-05 2017-05-24 同济大学 Gesture behavior authentication model constructing method and system based on posture change

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050044398A1 (en) * 2003-08-20 2005-02-24 Keith Ballinger Custom security tokens
CN101217375A (en) * 2008-01-16 2008-07-09 陈勇 A saving and acquisition method and device of accounts and passwords
CN101383704A (en) * 2008-04-23 2009-03-11 鲁东大学 Cipher module based on finger print recognition technology
CN101634925A (en) * 2008-07-22 2010-01-27 联想移动通信科技有限公司 Method for unlocking keypad through gestures
CN101916166A (en) * 2010-08-19 2010-12-15 中兴通讯股份有限公司 Method for starting application program and mobile terminal
CN102043587A (en) * 2010-12-23 2011-05-04 东莞宇龙通信科技有限公司 Touch screen unlocking method and mobile terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102646047B (en) * 2012-04-20 2016-03-30 华为终端有限公司 A kind ofly start the method for application program and there is the terminal device of touch display screen
CN102681785A (en) * 2012-05-13 2012-09-19 曾晖 Unlocking method and mobile equipment
CN103034441B (en) * 2012-12-06 2019-02-01 中兴通讯股份有限公司 Unlocking method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050044398A1 (en) * 2003-08-20 2005-02-24 Keith Ballinger Custom security tokens
CN101217375A (en) * 2008-01-16 2008-07-09 陈勇 A saving and acquisition method and device of accounts and passwords
CN101383704A (en) * 2008-04-23 2009-03-11 鲁东大学 Cipher module based on finger print recognition technology
CN101634925A (en) * 2008-07-22 2010-01-27 联想移动通信科技有限公司 Method for unlocking keypad through gestures
CN101916166A (en) * 2010-08-19 2010-12-15 中兴通讯股份有限公司 Method for starting application program and mobile terminal
CN102043587A (en) * 2010-12-23 2011-05-04 东莞宇龙通信科技有限公司 Touch screen unlocking method and mobile terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013174348A2 (en) * 2012-12-06 2013-11-28 中兴通讯股份有限公司 Unlocking method and device
WO2013174348A3 (en) * 2012-12-06 2014-01-16 中兴通讯股份有限公司 Unlocking method and device
WO2016192237A1 (en) * 2015-05-29 2016-12-08 中兴通讯股份有限公司 Wireless local area network connecting method, mobile terminal and wireless access point
CN105763714A (en) * 2016-04-05 2016-07-13 北京京东尚科信息技术有限公司 Method and device for locking/unlocking mobile phone screen
CN106714163A (en) * 2016-12-05 2017-05-24 同济大学 Gesture behavior authentication model constructing method and system based on posture change

Also Published As

Publication number Publication date
WO2013174348A3 (en) 2014-01-16
WO2013174348A2 (en) 2013-11-28
CN103034441B (en) 2019-02-01

Similar Documents

Publication Publication Date Title
US10798090B2 (en) User authentication method, system for implementing the same, and information communication terminal used in the same
EP2506183B1 (en) Systems and methods for gesture lock obfuscation
US10574647B2 (en) User authentication method and system for implementing same
US8347103B2 (en) System and method for authenticating a user using a graphical password
CN104049897B (en) Touch panel device unlock method and device
CN106372470B (en) A kind of method and mobile terminal for reminding input password
US20130159927A1 (en) Electronic device with touch screen and screen unlocking method thereof
CN104573479B (en) A kind of use control method and device of user equipment
CN103634107A (en) Authentication method, password setting method and authentication system for electronic device
US20110283353A1 (en) Method and a device for generating a secret value
CN104813631A (en) Pluggable authentication mechanism for mobile device applications
CN103034798A (en) Random password generation method and device
CN102857615A (en) Unlocking method for touch screen mobile phone based on dynamic password
CN103309479A (en) Touch screen operating system and method
WO2017024973A1 (en) Information recommendation method and device, terminal apparatus, and server
CN103034441A (en) Method and device for unlocking
CN106211070B (en) A kind of anti-theft protection method and mobile terminal of mobile terminal
CN106709382A (en) Keyboard display method and device
CN105450405A (en) Password setting and authentication method and system
CN107632870A (en) The startup method and terminal of a kind of application
US9652619B2 (en) Method of inputting confidential data on a terminal
CN102957688A (en) Password input and verification method and device
WO2017024972A1 (en) Method and device for displaying a locked interface and terminal device for same
US20120291123A1 (en) Method and electronic device for inputting passwords
JP5471706B2 (en) Password input system, input method, and input program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant