CN103678962B - The method, apparatus and terminal of managing personal information - Google Patents

The method, apparatus and terminal of managing personal information Download PDF

Info

Publication number
CN103678962B
CN103678962B CN201210315347.6A CN201210315347A CN103678962B CN 103678962 B CN103678962 B CN 103678962B CN 201210315347 A CN201210315347 A CN 201210315347A CN 103678962 B CN103678962 B CN 103678962B
Authority
CN
China
Prior art keywords
personal information
user
password
content
concealed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210315347.6A
Other languages
Chinese (zh)
Other versions
CN103678962A (en
Inventor
张军柯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201210315347.6A priority Critical patent/CN103678962B/en
Publication of CN103678962A publication Critical patent/CN103678962A/en
Application granted granted Critical
Publication of CN103678962B publication Critical patent/CN103678962B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of method, apparatus of managing personal information and terminal, belong to areas of information technology.Methods described includes:The personal information of user's input is obtained, and the content to be concealed in the personal information is determined according to the field length of the personal information;The content to be concealed of determination is hidden, and whole personal information are encrypted according to the password that user pre-sets, the personal information after being encrypted.Described device includes:Acquisition module, determining module, hidden module and encrypting module.The present invention is by determining the content to be concealed in personal information according to the field length of personal information; and after the content to be concealed of determination is hidden; whole personal information are encrypted again; so as in the case that password is decrypted; personal information is still in hidden state; and then individual privacy can be effectively protected, improve the reliability of managing personal information.

Description

The method, apparatus and terminal of managing personal information
Technical field
The present invention relates to areas of information technology, the method, apparatus and terminal of more particularly to a kind of managing personal information.
Background technology
In today of rapid development of information technology, the species of personal information is more and more, for example, bank card information, website Information, notes information etc., in order to ensure individual privacy, the problem of how managing personal information is a key.
Prior art generally sets a password, further according to user by user in advance when being managed to personal information The personal information of user is encrypted the password of setting, and afterwards by inputting the password pre-set, i.e., user only needs It can be achieved to check personal information.
During the present invention is realized, inventor has found that prior art at least has problems with:
Because prior art is in managing personal information, only realized by a password of user's setting to personal information Encryption and decryption processing, however, the password once set is decrypted, then personal information will all be shown, cause privacy Protection is not perfect enough, and reliability is not high.
The content of the invention
In order to solve problem of the prior art, the embodiments of the invention provide a kind of method, apparatus of managing personal information And terminal.The technical scheme is as follows:
On the one hand, there is provided a kind of method of managing personal information, methods described include:
The personal information of user's input is obtained, and is determined according to the field length of the personal information in the personal information Content to be concealed;
The content to be concealed of determination is hidden, and whole personal information carried out according to the password that user pre-sets Encryption, the personal information after being encrypted.
Wherein, the field length according to the personal information determines the content to be concealed in the personal information, tool Body includes:
If the field length N of the personal information<3, then the field in the personal information is all shown;
If field length N=3 of the personal information, preceding 2 bit field in the personal information is defined as to be concealed Content;
If the field length N of the personal information>3, if N%3=0, it is determined that N*1/3 positions are extremely in the personal information N-1 bit fields are content to be concealed;If N%3=1, it is determined that in the personal information(N-1)* 1/3 to N-1 positions word Section is content to be concealed;If N%3=2, it is determined that in the personal information(N+1)* 1/3 is to be concealed to N-1 bit fields Content;
Wherein, the N is the field length of the personal information, and the % is the computing that rems.
Further, it is described encrypted after personal information after, in addition to:
The password of user's input is received, and verifies that the password that the password of user's input is pre-set with the user is It is no consistent;
If the password of user's input is consistent with the password that the user pre-sets, the individual after encryption is believed Breath is decrypted, the personal information after being decrypted, and hiding content to be concealed is included in the personal information after the decryption.
Further, the password of checking user input is pre-set with the user password it is whether consistent it Afterwards, in addition to:
If the password of user's input and the password that the user pre-sets are inconsistent, prompt user again defeated Enter password.
Further, it is described decrypted after personal information after, in addition to:
Entirely aobvious cryptoguard problem and the answer of user's input are received, and verifies the entirely aobvious password of user's input Whether the entirely aobvious cryptoguard problem and answer that protection problem and answer are pre-set with the user are consistent;
If the entirely aobvious password that the complete aobvious cryptoguard problem of user's input and answer are pre-set with the user Protection problem and answer are consistent, then are shown the hiding content to be concealed.
Further, the entirely aobvious cryptoguard problem of checking user's input and answer are set in advance with the user After whether the entirely aobvious cryptoguard problem put and answer are consistent, in addition to:
If the entirely aobvious password that the complete aobvious cryptoguard problem of user's input and answer are pre-set with the user Protection problem and answer are inconsistent, then prompt user to re-enter aobvious cryptoguard problem entirely.
Further, the personal information comprises at least one kind in bank card information, site information and notes information;
Wherein, the bank card information includes Bank Name, card number, Hu Zhuming, payment cipher, Help by Phone password, net Silver-colored modification logging, service calls, remarks and User Defined option;
The site information includes web site name, account, modification logging, secondary modification logging, payment cipher, customer service electricity Words, remarks and User Defined option;
Notes information includes title, content and User Defined option.
On the other hand, a kind of device of managing personal information is additionally provided, described device includes:
Acquisition module, for obtaining the personal information of user's input;
Determining module, the field length of the personal information for being got according to the acquisition module determine described Content to be concealed in people's information;
Hidden module, the content to be concealed for the determining module to be determined are hidden;
Encrypting module, for whole personal information to be encrypted according to the password that user pre-sets, added Personal information after close.
Wherein, the determining module, if the field length N specifically for the personal information<3, then by the individual Field in information is all shown;
If field length N=3 of the personal information, preceding 2 bit field in the personal information is defined as to be concealed Content;
If the field length N of the personal information>3, if N%3=0, it is determined that N*1/3 positions are extremely in the personal information N-1 bit fields are content to be concealed;If N%3=1, it is determined that in the personal information(N-1)* 1/3 to N-1 positions word Section is content to be concealed;If N%3=2, it is determined that in the personal information(N+1)* 1/3 is to be concealed to N-1 bit fields Content;
Wherein, the N is the field length of the personal information, and the % is the computing that rems.
Further, described device, in addition to:
First receiving module, for receiving the password of user's input;
First authentication module, the password of the user's input received for verifying first receiving module and the user Whether the password pre-set is consistent;
Deciphering module, if verifying that the password of user's input and the user are advance for first authentication module The password of setting is consistent, then the personal information after encryption is decrypted, the personal information after being decrypted, after the decryption Hiding content to be concealed is included in personal information.
Further, described device, in addition to:
First reminding module, if verifying the password of user's input and the user for first authentication module The password pre-set is inconsistent, then prompts user to re-enter password.
Further, described device, in addition to:
Second receiving module, for receiving entirely aobvious cryptoguard problem and the answer of user's input;
Second authentication module, the entirely aobvious password of the user input received for verifying second receiving module are protected Whether the entirely aobvious cryptoguard problem and answer that shield problem and answer are pre-set with the user are consistent;
Display module, if for second authentication module verify user input entirely aobvious cryptoguard problem and The entirely aobvious cryptoguard problem and answer that answer and the user pre-set are consistent, then enter the hiding content to be concealed Row display.
Further, described device, in addition to:
Second reminding module, if the entirely aobvious cryptoguard for verifying user's input for second authentication module is asked The entirely aobvious cryptoguard problem and answer that topic and answer are pre-set with the user are inconsistent, then prompt user to re-enter entirely Aobvious cryptoguard problem.
Further, the personal information that the acquisition module is got comprises at least bank card information, site information and pen Remember one kind in information;
Wherein, the bank card information includes Bank Name, card number, Hu Zhuming, payment cipher, Help by Phone password, net Silver-colored modification logging, service calls, remarks and User Defined option;
The site information includes web site name, account, modification logging, secondary modification logging, payment cipher, customer service electricity Words, remarks and User Defined option;
Notes information includes title, content and User Defined option.
Another further aspect, additionally provides a kind of terminal, and the terminal includes the device of above-mentioned managing personal information.
The beneficial effect that technical scheme provided in an embodiment of the present invention is brought is:
By determining the content to be concealed in personal information according to the field length of personal information, and by determination treat it is hidden After Tibetan content is hidden, then whole personal information are encrypted, so that in the case that password is decrypted, it is individual People's information can effectively protect individual privacy still in hidden state, improve the reliability of managing personal information.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, make required in being described below to embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings Accompanying drawing.
Fig. 1 is a kind of method flow diagram for managing personal information that the embodiment of the present invention one provides;
Fig. 2 is a kind of method flow diagram for managing personal information that the embodiment of the present invention two provides;
Fig. 3 is that a kind of password that the embodiment of the present invention two provides sets interface schematic diagram;
Fig. 4 is that a kind of entirely aobvious cryptoguard problem that the embodiment of the present invention two provides and answer set interface schematic diagram;
Fig. 5 is that a kind of personal information that the embodiment of the present invention two provides sets interface schematic diagram;
Fig. 6 is a kind of information input interface schematic diagram that the embodiment of the present invention two provides;
Fig. 7 is a kind of display interface schematic diagram for personal information that the embodiment of the present invention two provides;
Fig. 8 is the display interface schematic diagram for another personal information that the embodiment of the present invention two provides;
Fig. 9 is the interface schematic diagram that a kind of modification information that the embodiment of the present invention two provides is set;
Figure 10 is the apparatus structure schematic diagram for the first managing personal information that the embodiment of the present invention three provides;
Figure 11 is the apparatus structure schematic diagram for second of managing personal information that the embodiment of the present invention three provides;
Figure 12 is the apparatus structure schematic diagram for the third managing personal information that the embodiment of the present invention three provides;
Figure 13 is the apparatus structure schematic diagram for the 4th kind of managing personal information that the embodiment of the present invention three provides;
Figure 14 is the apparatus structure schematic diagram for the 5th kind of managing personal information that the embodiment of the present invention three provides.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to embodiment party of the present invention Formula is described in further detail.
Embodiment one
A kind of method of managing personal information is present embodiments provided, referring to Fig. 1, the method flow tool that the present embodiment provides Body is as follows:
101:The personal information of user's input is obtained, and determines to treat in personal information according to the field length of personal information Hide content;
Wherein, the content to be concealed in personal information is determined according to the field length of personal information, is included but is not limited to:
If the field length N of personal information<3, then the field in personal information is all shown;
If field length N=3 of personal information, preceding 2 bit field in personal information is defined as content to be concealed;
If the field length N of personal information>3, if N%3=0, it is determined that N*1/3 positions to N-1 positions in personal information Field is content to be concealed;If N%3=1, it is determined that in personal information(N-1)* 1/3 is to be concealed interior to N-1 bit fields Hold;If N%3=2, it is determined that in personal information(N+1)* 1/3 to N-1 bit fields be content to be concealed;
Wherein, N is the field length of personal information, and % is the computing that rems.
102:The content to be concealed of determination is hidden, and according to the password that user pre-sets to whole personal information It is encrypted, the personal information after being encrypted.
Further, after the personal information after being encrypted, in addition to:
The password of user's input is received, and verifies whether the password of user's input and password that user pre-sets are consistent;
If the password of user's input is consistent with the password that user pre-sets, the personal information after encryption is solved It is close, the personal information after being decrypted, hiding content to be concealed is included in the personal information after decryption.
Alternatively, after verifying whether password that password and the user of user's input pre-set is consistent, in addition to:
If the password of user's input and the password that user pre-sets are inconsistent, user is prompted to re-enter password.
Further, after the personal information after being decrypted, in addition to:
Entirely aobvious cryptoguard problem and the answer of user's input are received, and verifies the entirely aobvious cryptoguard problem of user's input And the entirely aobvious cryptoguard problem that pre-sets of answer and user and answer it is whether consistent;
If the entirely aobvious cryptoguard problem that the complete aobvious cryptoguard problem of user's input and answer are pre-set with user And answer is consistent, then hiding content to be concealed is shown.
Alternatively, the complete aobvious cryptoguard problem and answer for verifying user's input are protected with the entirely aobvious password that user pre-sets After whether shield problem and answer are consistent, in addition to:
If the entirely aobvious cryptoguard problem that the complete aobvious cryptoguard problem of user's input and answer are pre-set with user And answer is inconsistent, then user is prompted to re-enter aobvious cryptoguard problem entirely.
Wherein, personal information comprises at least one kind in bank card information, site information and notes information;
Wherein, bank card information is stepped on including Bank Name, card number, Hu Zhuming, payment cipher, Help by Phone password, Net silver Land password, service calls, remarks and User Defined option;
Site information includes web site name, account, modification logging, secondary modification logging, payment cipher, service calls, standby Note and User Defined option;
Notes information includes title, content and User Defined option.
The method that the present embodiment provides, by being determined according to the field length of personal information in be concealed in personal information Hold, and be encrypted after the content to be concealed of determination is hidden, then to whole personal information, so as to even in close In the case that code is decrypted, personal information can effectively protect individual privacy still in hidden state, and it is personal to improve management The reliability of information.
In order to clearly illustrate the method for above-described embodiment offer, with reference to the above, it is with following examples two Example, is illustrated to the method for managing personal information, sees below embodiment two:
Embodiment two
A kind of method of managing personal information is present embodiments provided, this method is by hiding content and to all personal letters Cease the mode being encrypted to be managed the personal information of user, and then effectively protect individual privacy.With reference to above-described embodiment One content, for convenience of description, the present embodiment exemplified by the method for managing personal information is realized by mobile phone terminal to be said Bright, referring to Fig. 2, the method flow that the present embodiment provides is specific as follows:
201:Obtain the personal information of password, complete aobvious cryptoguard problem, answer and user's input that user pre-sets;
For the step, when obtaining the password that user pre-sets, password setting can be provided a user by mobile phone terminal Interface, set by user in the password and the password of setting is inputted on interface, so as to using the password of user's input as getting The password that user pre-sets.Such as, it is possible to provide password as shown in Figure 3 sets interface, in order that user confirms the close of input Code, can be by Fig. 3(A)Shown interface provides a user the option for inputting password twice, if the password that user inputs twice differs Cause, then Fig. 3 occur(B)Shown interface, prompt user to input twice inconsistent, re-enter user, it is determined that user twice After the password of input is consistent, the password that user inputs is preserved, and pre-set as the user got close Code.When it is implemented, password can be combination, problem or other any types of any character, the present embodiment is not to password Type, length and content etc. are defined.After the password that user pre-sets is got, by stored in case after Continuous to use, the storage of password can be stored in client server with arbitrary form, and the present embodiment is not made equally to have to this Body limits.In addition to interface is set and realized by the way of setting password using the password shown in Fig. 3, other setting circles can also be used Face and the mode for obtaining the password that user pre-sets, the present embodiment are not carried out to the specific setting interface of password and acquisition modes Limit.
When obtaining entirely aobvious cryptoguard problem and the answer that user pre-sets, because this shows cryptoguard problem entirely and answers Whether case shows hiding content for subsequent authentication, thus can equally provide a user and set interface, passes through setting by user The entirely aobvious cryptoguard problem and corresponding answer that interface input is pre-set.For example, as shown in Figure 4 set can be provided a user Interface is put, aobvious cryptoguard problem and corresponding answer entirely are set by user.In Fig. 4, user can pass through Fig. 4(A)Shown interface Selection shows answer corresponding to cryptoguard problem and input entirely, and after inputting answer, interface can be such as Fig. 4(B)It is shown, the Fig. 4(B)Institute Show all entirely aobvious cryptoguard problems of interface display, by each complete aobvious cryptoguard problem of user's selection and the correspondence of input The entirely aobvious cryptoguard problem that is pre-set as the user got of answer and answer.When it is implemented, aobvious password is protected entirely Answer corresponding to shield problem can be combination, problem or other any types of any character, and the present embodiment is not to the class of answer Type, length and content etc. are defined.After the entirely aobvious cryptoguard problem and answer that user pre-sets is got, pass through by It is stored in case follow-up use, and the storage of complete aobvious cryptoguard problem and answer can be stored in client with arbitrary form Or server end, the present embodiment are equally not especially limited to this.Except using the entirely aobvious cryptoguard problem shown in Fig. 4 and answering Case sets interface to realize outside complete aobvious cryptoguard problem and the mode that answer is set, and can also use other setting interfaces and obtain Take complete aobvious cryptoguard problem that family pre-sets and the mode of answer, the present embodiment does not show cryptoguard problem and answered to complete The specific setting interface of case and acquisition modes are defined.
When obtaining the personal information that user pre-enters, the personal information that the present embodiment provides includes but is not limited to bank card At least one of information, site information and notes information, it can equally provide and interface is set, by user by setting interface to set Personal information to be managed.As shown in figure 5, user can pass through Fig. 5(A)Shown interface inputs bank card information, bank card letter Breath includes but is not limited to Bank Name, card number, Hu Zhuming, payment cipher, Help by Phone password, Net silver modification logging, customer service electricity Words, remarks and User Defined option;User can pass through Fig. 5(B)Shown interface inputs site information, the site information include but It is not limited to web site name, account, modification logging, secondary modification logging, payment cipher, service calls, remarks and User Defined Option;User passes through Fig. 5(C)Shown interface inputs notes information, and the notes information includes but is not limited to title, content and user Custom option.When it is implemented, the setting except realizing personal information using the setting interface of the personal information shown in Fig. 5 Outside, can also be by the way of other setting interfaces and acquisition personal information, the present embodiment not specific setting to personal information Interface and acquisition modes are defined.
202:The content to be concealed in personal information is determined according to the field length of personal information;
Specifically, why determine the content to be concealed in personal information, be in order to during managing personal information, By hiding the content to be concealed in personal information, whole personal information are encrypted again afterwards, so as to realize to personal hidden Private double shielding, realizes that in the case that password is cracked, personal information is still within hidden state, reaches effective guarantor The purpose that shield personal information is not leaked.The present embodiment is not defined to hiding which partial content in personal information, can be with The medium content of personal information is hidden, perhaps tail content, hiding field length in the head of personal information can also be hidden and depended on The encryption algorithm used when coding, the present embodiment are not defined to hiding content and length.Only with according to personal information Field length determine the content to be concealed in personal information exemplified by.Determined according to field length in be concealed in personal information Rong Shi, Chinese and English and punctuation mark are not differentiated between, i.e. a Chinese field length is 1, the word of an English or punctuation mark Segment length is also 1.Bank card information in the personal information got for above-mentioned steps 201, card number therein, householder It is to be concealed right that the information such as name, payment cipher, Help by Phone password, Net silver modification logging and User Defined option can be used as As;Site information in the personal information got for above-mentioned steps 201, account therein, modification logging, it is secondary log in it is close The information such as code, payment cipher and User Defined option can be used as object to be concealed;The individual got for above-mentioned steps 201 Notes information in information, content therein and User Defined option can be used as object to be concealed.Content to be concealed can be to treat Content in hidden object, when it is implemented, the content to be concealed in personal information is determined according to the field length of personal information, Including but not limited to following three kinds of situations:
Situation one:If the field length N of personal information<3, then the field in personal information is all shown;
Situation two:If field length N=3 of personal information, preceding 2 bit field in personal information is defined as to be concealed Content;
Situation three:If the field length N of personal information>3, if N%3=0, it is determined that N*1/3 positions are extremely in personal information N-1 bit fields are content to be concealed;If N%3=1, it is determined that in personal information(N-1)* 1/3 is to N-1 bit fields Content to be concealed;If N%3=2, it is determined that in personal information(N+1)* 1/3 to N-1 bit fields be content to be concealed;
Wherein, N is the field length of personal information, and % is the computing that rems.
In order to make it easy to understand, it is illustrated with following instantiation:
Example one:For the bank card information in personal information, card number therein, payment cipher, Help by Phone password, net Whole of the field length less than 3 is shown in the information such as silver-colored modification logging, custom option, hides preceding two equal to 3 Position, the determination mode followed described in the above situation three more than 3;Whole displays of entitled 1 of householder, entitled 2 of householder Hide first, the determination side followed described in the above situation three of the hiding front two of entitled 3 of householder, householder's name more than 3 Formula.
For example, so that bank's card number is " 6222000000000000000 " as an example, because its field length N is 19, meet Situation three, and because 19%3 remainder is 1, the then accordingly content in three, it may be determined that the(N-1)* 1/3 to N- 1 bit field is content to be concealed, and(19-1)* 1/3 is the 6th, N-1 positions are the 18th, i.e., by above-mentioned 19 bank cards The 6th to the 18th in number is defined as content to be concealed, and it is " 62220*************0 " afterwards that it, which is hidden,.
Example two:For the site information in personal information, account therein, login password, secondary login password, payment The whole displays of password, custom option less than 3, the hiding front two equal to 3, the above situation three are followed more than 3 Described determination mode.
For example, so that modification logging is " zhangjunke12345678 " as an example, because its field length N is 18, meet Situation three, and due to 18%3=0, the then accordingly content in three, it may be determined that N*1/3 positions to N-1 bit fields is treat Content is hidden, and 18*1/3 positions are the 6th, 18-1 positions are the 17th, i.e., by the 6th in above-mentioned 18 modification loggings extremely 17th is defined as content to be concealed, and it is " zhang************8 " afterwards that it, which is hidden,.
Example three:For the notes information in personal information, content therein is shown all, greatly when being less than or equal to 3 In the determination mode that 3 then follow described in the above situation three.
For example, using the content text in notes information as " 2 months No. 9 can travel!" exemplified by, due to its field length For 11, meet situation three, and due to 11%3=2, then the accordingly content in three, it may be determined that(N+1)* 1/3 to N-1 bit fields are content to be concealed, and the(11+1)* 1/3 is the 4th, 11-1 positions are the 10th, i.e., by above-mentioned 11 The 4th to the 10th in appearance is defined as content to be concealed, as " 2 months 9******* after it is hidden!”.
203:The content to be concealed of determination is hidden, and according to the password that user pre-sets to whole personal information It is encrypted, the personal information after being encrypted;
It is hidden by being carried out after the content to be concealed during above-mentioned steps 202 determine personal information for the step Hide, realize the not all display of personal information.And because step 201 has got the password that user pre-sets before, thus After the content to be concealed of determination is hidden, whole personal information are encrypted further according to the password that user pre-sets Processing, you can make personal information obtain the effect of double layer encryption.On being believed according to the password that user pre-sets all personal The mode that is encrypted is ceased, the present embodiment is not defined to specific cipher mode, can ensure not input in user correct close In the case of code, reach the purpose for not showing personal information.
So far, by the process of above-mentioned steps 201 to step 203, the storage management operations of personal information are realized, with When the personal information of management is checked at family, it can be achieved by the steps of, see below step.
204:Receive the password of user's input, and verify password that password and the user of user's input pre-set whether one Cause, if it is, performing step 205, otherwise, perform step 208;
Specifically, when receiving the password of user's input, inputting interface can be provided a user by mobile phone terminal, and receive use The password that family is inputted by the inputting interface.By taking the interface for password input shown in Fig. 6 as an example, user is received in Fig. 6(A)Shown in After interface input password, verify whether the password of user's input and password that user pre-sets are consistent, if unanimously, performed Step 205, it is inconsistent, then perform step 208.
205:Personal information after encryption is decrypted, the personal information after being decrypted, the personal letter after the decryption Hiding content to be concealed is included in breath;
For the step, pre-set due to having verified that the password of user's input in above-mentioned steps 204 with user close Code is consistent, then triggers the step and perform the step of personal information after encryption is decrypted, specific manner of decryption the present embodiment It is not especially limited, due to concealing the content to be concealed of determination before encryption, therefore, the personal information after encryption is solved It is close, after the personal information after being decrypted, still it will can be wrapped comprising hiding content to be concealed in the personal information after the decryption Personal information after decryption containing hiding content to be concealed is directly displayed to user.
Further, in the personal information after display is decrypted, it is contemplated that interface size is limited, and displayable content is limited Etc. factor, for the different personal information after decryption, can be shown respectively by separate interface, and because every kind of personal information can be with There is a plurality of record, thus after the personal information after by decryption is decrypted, can only show the summary of the personal information after decryption Information.With the display interface of the bank card information after decryption such as Fig. 7(A)Shown, the display interface of the site information after decryption is such as Fig. 7(B)It is shown, display interface such as Fig. 7 of the notes information after decryption(C)Exemplified by shown, two are shown on each interface The summary info of corresponding personal information, user can realize bank card information, site information by the option below each interface And the display switching of notes information, if the user desired that check the personal information specified, can be grasped by the selection such as clicking or double-clicking Make the detail information that triggering shows this personal information.As shown in figure 8, if user is in Fig. 7(A)Shown interface have selected first Bar bank card information, then triggering show Fig. 8(A)Shown bank card information details interface;If user is in Fig. 7(B)Shown boundary Face have selected first site information, then triggering shows Fig. 8(B)Shown site information details interface;If user is in Fig. 7 (C)Shown interface have selected first notes information, then triggering shows Fig. 8(C)Shown notes information details interface.
Further, in the personal information after display is decrypted, except independently showing every kind of personal information with different interfaces Summary info, user can realize that the display switching of different personal information is outer by the option below each interface, can also be every Setting options are provided under individual interface, by the setting options, the reconfigurable password of user, entirely aobvious cryptoguard problem and answer Etc. information.
For example, under the interface shown in Fig. 7, if user have selected setting options, may occur in which such as Fig. 9(A)Shown boundary Face, in Fig. 9(A)On shown interface, Modify password or entirely aobvious cryptoguard problem and answer may be selected in user.If user selects Modify password, then triggering show Fig. 9(B)Shown interface, Old Password is inputted in user, and Old Password is correct and then input is new Password, and by selecting to determine the successful modification that option realizes password.If Old Password input is incorrect, what the present embodiment provided Method may also provide such as Fig. 6(B)The wrong prompting of shown Password Input.If user is in Fig. 9(A)Shown interface selection modification Aobvious cryptoguard problem and answer entirely, then triggering show Fig. 9(C)Shown interface, after user's selection entirely aobvious cryptoguard problem, Answer corresponding to input, the complete aobvious cryptoguard problem of realization and answer are reset.
In addition, the summary info of the personal information either shown in Fig. 7, or the details letter of the personal information shown in Fig. 8 Ceasing, the information to be concealed in every kind of personal information is in hidden state, if the user desired that check whole personal information, i.e., it is aobvious Show whole personal information, then user can carry out the complete of triggering following step by selecting the display shown in Fig. 8 to hide the option of content Aobvious operation.
206:Entirely aobvious cryptoguard problem and the answer of user's input are received, and verifies the entirely aobvious cryptoguard of user's input Whether the entirely aobvious cryptoguard problem and answer that problem and answer are pre-set with user are consistent, if it is, step 207 is performed, Otherwise, step 209 is performed;
For the step, after the personal information after the display decryption of above-mentioned steps 205, due in the personal information after decryption Comprising hiding content to be concealed, if the user desired that checking complete personal information, what can be set before by input shows close entirely Code protection problem and answer show to trigger the whole of personal information.When it is implemented, when user selects the display shown in Fig. 8 hidden After the option for hiding content, it is possible to provide complete aobvious cryptoguard problem and the inputting interface of answer, so as in the complete of checking user's input After aobvious cryptoguard problem and answer are consistent with entirely aobvious cryptoguard problem that user pre-sets and answer, triggering personal information Complete aobvious operation.
For example, after user selects the display shown in Fig. 8 to hide the option of content, Fig. 6 may occur in which(C)Shown input circle Face, by user in Fig. 6(C)Shown interface selection shows cryptoguard problem entirely, answer corresponding to input afterwards.Receiving user After the entirely aobvious cryptoguard problem of input and answer, verify user's input entirely aobvious cryptoguard problem and answer and user it is advance Whether the entirely aobvious cryptoguard problem set and answer are consistent, if unanimously, performing step 207, otherwise perform step 209.
207:Hiding content to be concealed is shown that flow terminates;
Specifically, when above-mentioned steps 206 verify that the entirely aobvious cryptoguard problem of user's input and answer are set in advance with user When the entirely aobvious cryptoguard problem put and consistent answer, hiding content to be concealed is shown, personal letter is shown to realize The full content of breath.Because the display operation of the step is to perform verification operation in above-mentioned steps 206, and held after being verified It is capable, hereby it is ensured that showing in the case where user allows the full content of personal information.
208:Prompting user re-enters password, return to step 204;
For the step, verify that the password of user's input and the password that user pre-sets are inconsistent in above-mentioned steps 204 Afterwards, can provide a user such as Fig. 6(B)Shown prompting interface, to prompt user cipher input error, user is set to re-execute input Operation, such as return to Fig. 6(A)Shown interface, after re-entering password by user, return to step 204 re-executes verification operation, and When the result is consistent, step 205 is performed, otherwise still re-executes the prompting operation of the step.
209:Prompting user re-enters aobvious cryptoguard problem and answer entirely, return to step 206.
For the step, verify that the complete aobvious cryptoguard problem that user inputs and answer and user are pre- in above-mentioned steps 206 When the entirely aobvious cryptoguard problem first set and inconsistent answer, triggering performs step prompting user and re-enters aobvious password entirely Protection problem and the operation of answer, and inputted in user in consistent with the entirely aobvious cryptoguard problem pre-set and answer Rong Hou, return to step 206 re-executes verification operation, and when the result is consistent, performs step 207, otherwise still again Perform the prompting operation of the step.
The method that the present embodiment provides, by being determined according to the field length of personal information in be concealed in personal information Hold, and be encrypted after the content to be concealed of determination is hidden, then to whole personal information, so as to even in close In the case that code is decrypted, personal information can effectively protect individual privacy still in hidden state, and it is personal to improve management The reliability of information.
Embodiment three
A kind of device of managing personal information is present embodiments provided, the device is used to perform above-described embodiment one or implemented The method for the managing personal information that example two provides.Referring to Figure 10, the device includes:
Acquisition module 1001, for obtaining the personal information of user's input;
Determining module 1002, the field length of the personal information for being got according to acquisition module 1001 determine personal letter Content to be concealed in breath;
Hidden module 1003, the content to be concealed for determining module 1002 to be determined are hidden;
Encrypting module 1004, for whole personal information to be encrypted according to the password that user pre-sets, obtain Personal information after to encryption.
Wherein it is determined that module 1002, if the field length N specifically for personal information<3, then by personal information Field is all shown;
If field length N=3 of personal information, preceding 2 bit field in personal information is defined as content to be concealed;
If the field length N of personal information>3, if N%3=0, it is determined that N*1/3 positions to N-1 positions in personal information Field is content to be concealed;If N%3=1, it is determined that in personal information(N-1)* 1/3 is to be concealed interior to N-1 bit fields Hold;If N%3=2, it is determined that in personal information(N+1)* 1/3 to N-1 bit fields be content to be concealed;
Wherein, N is the field length of personal information, and % is the computing that rems.
Further, referring to Figure 11, the device, in addition to:
First receiving module 1005, for receiving the password of user's input;
First authentication module 1006, the password of the user's input received for verifying the first receiving module 1005 and user Whether the password pre-set is consistent;
Deciphering module 1007, if the password for the checking user's input of the first authentication module 1006 is pre-set with user Password it is consistent, then the personal information after encryption is decrypted, the personal information after being decrypted, the personal information after decryption In include hiding content to be concealed.
Referring to Figure 12, the device, in addition to:
First reminding module 1008, if advance for the password of the first authentication module 1006 checking user's input and user The password of setting is inconsistent, then prompts user to re-enter password.
Referring to Figure 13, the device, in addition to:
Second receiving module 1009, for receiving entirely aobvious cryptoguard problem and the answer of user's input;
Second authentication module 1010, the entirely aobvious password of the user's input received for verifying the second receiving module 1009 are protected Whether the entirely aobvious cryptoguard problem and answer that shield problem and answer are pre-set with user are consistent;
Display module 1011, if for the checking user's input of the second authentication module 1010 entirely aobvious cryptoguard problem and The entirely aobvious cryptoguard problem and answer that answer and user pre-set are consistent, then are shown hiding content to be concealed.
Referring to Figure 14, the device, in addition to:
Second reminding module 1012, if the entirely aobvious cryptoguard for the checking user's input of the second authentication module 1010 is asked The entirely aobvious cryptoguard problem and answer that topic and answer are pre-set with user are inconsistent, then prompt user to re-enter and show close entirely Code protection problem.
Further, the personal information that acquisition module 1001 is got comprises at least bank card information, site information and pen Remember one kind in information;
Wherein, bank card information is stepped on including Bank Name, card number, Hu Zhuming, payment cipher, Help by Phone password, Net silver Land password, service calls, remarks and User Defined option;
Site information includes web site name, account, modification logging, secondary modification logging, payment cipher, service calls, standby Note and User Defined option;
Notes information includes title, content and User Defined option.
The device that the present embodiment provides, by being determined according to the field length of personal information in be concealed in personal information Hold, and be encrypted after the content to be concealed of determination is hidden, then to whole personal information, so as to even in close In the case that code is decrypted, personal information can effectively protect individual privacy still in hidden state, and it is personal to improve management The reliability of information.
Example IV
A kind of terminal is present embodiments provided, the terminal includes the device of managing personal information;
Wherein, the device for the managing personal information that for example above-mentioned embodiment three of the device of managing personal information provides.
The terminal can be mobile phone terminal, computer, tablet personal computer etc., and the present embodiment is not to the specific product form of terminal It is defined.
The terminal that the present embodiment provides, by being determined according to the field length of personal information in be concealed in personal information Hold, and be encrypted after the content to be concealed of determination is hidden, then to whole personal information, so as to even in close In the case that code is decrypted, personal information can effectively protect individual privacy still in hidden state, and it is personal to improve management The reliability of information.
It should be noted that:Above-described embodiment provide managing personal information device in managing personal information, only with The division progress of above-mentioned each functional module, can be as needed and by above-mentioned function distribution by not for example, in practical application Same functional module is completed, i.e., the internal structure of device is divided into different functional modules, to complete whole described above Or partial function.In addition, the method for the device for the managing personal information that above-described embodiment provides, terminal and managing personal information Embodiment belongs to same design, and its specific implementation process refers to embodiment of the method, repeats no more here.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that hardware can be passed through by realizing all or part of step of above-described embodiment To complete, by program the hardware of correlation can also be instructed to complete, described program can be stored in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only storage, disk or CD etc..
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all the present invention spirit and Within principle, any modification, equivalent substitution and improvements made etc., it should be included in the scope of the protection.

Claims (15)

  1. A kind of 1. method of managing personal information, it is characterised in that methods described includes:
    The personal information of user's input is obtained, and determines to treat in the personal information according to the field length of the personal information Content is hidden, the field length of the content to be concealed depends on the encryption algorithm used during coding, and the content to be concealed is extremely Perhaps tail content in medium content for the personal information or head less;
    The content to be concealed of determination is hidden, and whole personal information are encrypted according to the password that user pre-sets Processing, the personal information after being encrypted.
  2. 2. according to the method for claim 1, it is characterised in that the field length according to the personal information determines institute The content to be concealed in personal information is stated, is specifically included:
    If the field length N of the personal information<3, then the field in the personal information is all shown;
    If the field length N=3 of the personal information, preceding 2 bit field in the personal information is defined as in be concealed Hold;
    If the field length N of the personal information>3, if N%3=0, it is determined that N*1/3 positions are in the personal information N-1 bit fields are content to be concealed;If N%3=1, it is determined that (N-1) * 1/3 is to N-1 positions word in the personal information Section is content to be concealed;If N%3=2, it is determined that (N+1) * 1/3 is hidden to treat to N-1 bit fields in the personal information Hide content;
    Wherein, the N is the field length of the personal information, and the % is the computing that rems.
  3. 3. according to the method for claim 1, it is characterised in that it is described encrypted after personal information after, in addition to:
    Receive the password of user's input, and verify password that the password of user input pre-sets with the user whether one Cause;
    If the password of user's input is consistent with the password that the user pre-sets, the personal information after encryption is entered Row is decrypted, the personal information after being decrypted, and hiding content to be concealed is included in the personal information after the decryption.
  4. 4. according to the method for claim 3, it is characterised in that the password of checking user's input and the user After whether the password pre-set is consistent, in addition to:
    If the password of user's input and the password that the user pre-sets are inconsistent, user is prompted to re-enter close Code.
  5. 5. according to the method for claim 3, it is characterised in that it is described decrypted after personal information after, in addition to:
    Entirely aobvious cryptoguard problem and the answer of user's input are received, and verifies the entirely aobvious cryptoguard of user's input Whether the entirely aobvious cryptoguard problem and answer that problem and answer are pre-set with the user are consistent;
    If the entirely aobvious cryptoguard that the complete aobvious cryptoguard problem of user's input and answer are pre-set with the user Problem and answer are consistent, then are shown the hiding content to be concealed.
  6. 6. according to the method for claim 5, it is characterised in that the entirely aobvious cryptoguard of checking user's input is asked After whether entirely aobvious cryptoguard problem and answer that topic and answer and the user pre-set are consistent, in addition to:
    If the entirely aobvious cryptoguard that the complete aobvious cryptoguard problem of user's input and answer are pre-set with the user Problem and answer are inconsistent, then prompt user to re-enter aobvious cryptoguard problem and answer entirely.
  7. 7. the method according to any claim in claim 1 to 6, it is characterised in that the personal information is at least wrapped Include one kind in bank card information, site information and notes information;
    Wherein, the bank card information is stepped on including Bank Name, card number, Hu Zhuming, payment cipher, Help by Phone password, Net silver Land password, service calls, remarks and User Defined option;
    The site information includes web site name, account, modification logging, secondary modification logging, payment cipher, service calls, standby Note and User Defined option;
    Notes information includes title, content and User Defined option.
  8. 8. a kind of device of managing personal information, it is characterised in that described device includes:
    Acquisition module, for obtaining the personal information of user's input;
    Determining module, the field length of the personal information for being got according to the acquisition module determine the personal letter Content to be concealed in breath, the field length of the content to be concealed depend on the encryption algorithm used during coding, it is described treat it is hidden Hide content and be at least in the medium content or head of the personal information perhaps tail content;
    Hidden module, the content to be concealed for the determining module to be determined are hidden;
    Encrypting module, for whole personal information to be encrypted according to the password that user pre-sets, after obtaining encryption Personal information.
  9. 9. device according to claim 8, it is characterised in that the determining module, if specifically for the personal letter The field length N of breath<3, then the field in the personal information is all shown;
    If the field length N=3 of the personal information, preceding 2 bit field in the personal information is defined as in be concealed Hold;
    If the field length N of the personal information>3, if N%3=0, it is determined that N*1/3 positions are in the personal information N-1 bit fields are content to be concealed;If N%3=1, it is determined that (N-1) * 1/3 is to N-1 positions word in the personal information Section is content to be concealed;If N%3=2, it is determined that (N+1) * 1/3 is hidden to treat to N-1 bit fields in the personal information Hide content;
    Wherein, the N is the field length of the personal information, and the % is the computing that rems.
  10. 10. device according to claim 8, it is characterised in that described device also includes:
    First receiving module, for receiving the password of user's input;
    First authentication module, the password of the user's input received for verifying first receiving module and the user are advance Whether the password of setting is consistent;
    Deciphering module, if the password for verifying user's input for first authentication module is pre-set with the user Password it is consistent, then the personal information after encryption is decrypted, the personal information after being decrypted, the individual after the decryption Hiding content to be concealed is included in information.
  11. 11. device according to claim 10, it is characterised in that described device, in addition to:
    First reminding module, if verifying that the password of user's input and the user are advance for first authentication module The password of setting is inconsistent, then prompts user to re-enter password.
  12. 12. device according to claim 10, it is characterised in that described device, in addition to:
    Second receiving module, for receiving entirely aobvious cryptoguard problem and the answer of user's input;
    Second authentication module, the entirely aobvious cryptoguard of the user input received for verifying second receiving module are asked Whether the entirely aobvious cryptoguard problem and answer that topic and answer are pre-set with the user are consistent;
    Display module, if verifying entirely aobvious cryptoguard problem and the answer of user's input for second authentication module It is consistent with entirely aobvious cryptoguard problem that the user pre-sets and answer, then the hiding content to be concealed is shown Show.
  13. 13. device according to claim 12, it is characterised in that described device, in addition to:
    Second reminding module, if for second authentication module verify user input entirely aobvious cryptoguard problem and The entirely aobvious cryptoguard problem and answer that answer is pre-set with the user are inconsistent, then prompt user to re-enter and show close entirely Code protection problem.
  14. 14. the device according to any claim in claim 8 to 13, it is characterised in that the acquisition module obtains To personal information comprise at least bank card information, site information and notes information in one kind;
    Wherein, the bank card information is stepped on including Bank Name, card number, Hu Zhuming, payment cipher, Help by Phone password, Net silver Land password, service calls, remarks and User Defined option;
    The site information includes web site name, account, modification logging, secondary modification logging, payment cipher, service calls, standby Note and User Defined option;
    Notes information includes title, content and User Defined option.
  15. 15. a kind of terminal, it is characterised in that the terminal is included in the claim 8 to 14 described in any claim The device of managing personal information.
CN201210315347.6A 2012-08-30 2012-08-30 The method, apparatus and terminal of managing personal information Active CN103678962B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210315347.6A CN103678962B (en) 2012-08-30 2012-08-30 The method, apparatus and terminal of managing personal information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210315347.6A CN103678962B (en) 2012-08-30 2012-08-30 The method, apparatus and terminal of managing personal information

Publications (2)

Publication Number Publication Date
CN103678962A CN103678962A (en) 2014-03-26
CN103678962B true CN103678962B (en) 2018-04-03

Family

ID=50316490

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210315347.6A Active CN103678962B (en) 2012-08-30 2012-08-30 The method, apparatus and terminal of managing personal information

Country Status (1)

Country Link
CN (1) CN103678962B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156667B (en) * 2014-07-22 2016-06-08 腾讯科技(深圳)有限公司 The management process of operation object and device
CN110033302B (en) * 2014-10-28 2023-08-04 创新先进技术有限公司 Malicious account identification method and device
CN106295390A (en) * 2015-06-08 2017-01-04 阿里巴巴集团控股有限公司 A kind of method and device of information processing
CN106022173B (en) * 2016-05-18 2019-07-02 北京京东尚科信息技术有限公司 Sensitive data display methods and device
CN106372518A (en) * 2016-08-31 2017-02-01 维沃移动通信有限公司 Information protection method and mobile terminal
CN110472390B (en) * 2019-08-15 2021-09-17 江苏建筑职业技术学院 Method for protecting computer system safety
CN110619072A (en) * 2019-08-29 2019-12-27 凡普数字技术有限公司 Bank account information acquisition method and device and storage medium
CN113158240A (en) * 2021-04-02 2021-07-23 上海嵩恒网络科技股份有限公司 Method and device for optimizing file decryption process, terminal and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1612627A (en) * 2003-10-30 2005-05-04 英华达(南京)科技有限公司 Group data hiding system and method
CN1708160A (en) * 2005-05-27 2005-12-14 上海贝豪通讯电子有限公司 Mobile communication terminal capable of carrying out encrypting to user information and method thereof
CN1980429A (en) * 2005-11-30 2007-06-13 中兴通讯股份有限公司 Method for information secrete-keeping in mobile terminal
CN101026822A (en) * 2006-02-24 2007-08-29 江苏高通科技实业有限公司 Method for protecting mobile phone private data
CN101345963A (en) * 2008-08-15 2009-01-14 宇龙计算机通信科技(深圳)有限公司 Secrecy method, system and mobile terminal for private data
CN101754209A (en) * 2010-01-20 2010-06-23 中兴通讯股份有限公司 Method for protecting contents of mobile phone

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003132160A (en) * 2001-10-23 2003-05-09 Nec Corp Personal information management system and device, and personal information management program

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1612627A (en) * 2003-10-30 2005-05-04 英华达(南京)科技有限公司 Group data hiding system and method
CN1708160A (en) * 2005-05-27 2005-12-14 上海贝豪通讯电子有限公司 Mobile communication terminal capable of carrying out encrypting to user information and method thereof
CN1980429A (en) * 2005-11-30 2007-06-13 中兴通讯股份有限公司 Method for information secrete-keeping in mobile terminal
CN101026822A (en) * 2006-02-24 2007-08-29 江苏高通科技实业有限公司 Method for protecting mobile phone private data
CN101345963A (en) * 2008-08-15 2009-01-14 宇龙计算机通信科技(深圳)有限公司 Secrecy method, system and mobile terminal for private data
CN101754209A (en) * 2010-01-20 2010-06-23 中兴通讯股份有限公司 Method for protecting contents of mobile phone

Also Published As

Publication number Publication date
CN103678962A (en) 2014-03-26

Similar Documents

Publication Publication Date Title
CN103678962B (en) The method, apparatus and terminal of managing personal information
US8117458B2 (en) Methods and systems for graphical image authentication
US20190260747A1 (en) Securing a transaction performed from a non-secure terminal
US20090077653A1 (en) Graphical Image Authentication And Security System
CN106534570A (en) Privacy protection method and device
US20070277224A1 (en) Methods and Systems for Graphical Image Authentication
US20160127134A1 (en) User authentication system and method
US8312288B2 (en) Secure PIN character retrieval and setting using PIN offset masking
EP3176779B1 (en) Systems and methods for sensitive audio zone rearrangement
CN1523809A (en) Password variable identification verification technique
CN103714301A (en) Password input method and device
CN106709382A (en) Keyboard display method and device
CN105898054A (en) Verification-based message display method and communication terminal
Anwar et al. A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication.
CN103795849B (en) The device and method of operation are performed for private contact in portable terminal
CN101655768A (en) Anti-peep password input method
CN102880305A (en) Keyboard input encryption method and mobile terminal thereof
CN107181873A (en) Method, device and terminal that short message session is shown
CN104966017B (en) A kind of Password Input protects system and method
CN106851613A (en) Service request method, the verification method of business handling number and its terminal
Ali et al. Developing and evaluating a gestural and tactile mobile interface to support user authentication
KR20200082723A (en) Vulnerability countermeasure virtual keyboard providing device and method and computer readable medium storing program of the same
Alsuhibany A camouflage text-based password approach for mobile devices against shoulder-surfing attack
CN107944303A (en) A kind of smart mobile phone cipher-code input method and device
US20140304789A1 (en) Convenient one-time password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant