CN103678964A - Mobile terminal and password input method and system - Google Patents

Mobile terminal and password input method and system Download PDF

Info

Publication number
CN103678964A
CN103678964A CN201210338098.2A CN201210338098A CN103678964A CN 103678964 A CN103678964 A CN 103678964A CN 201210338098 A CN201210338098 A CN 201210338098A CN 103678964 A CN103678964 A CN 103678964A
Authority
CN
China
Prior art keywords
password
unit
website
security
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210338098.2A
Other languages
Chinese (zh)
Inventor
胡波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201210338098.2A priority Critical patent/CN103678964A/en
Publication of CN103678964A publication Critical patent/CN103678964A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration

Abstract

The invention discloses a mobile terminal and a password input method and system. The mobile terminal comprises a connection module and a password management module. The connection module is used for being connected with a computer. The password management module comprises an authentication unit, a password generation unit, a password pairing unit, a password output unit and a password control unit. The authentication unit is used for logging in a password management interface. The password generation unit is used for correspondingly generating safe passwords according to seed passwords and a preset encryption algorithm. The password pairing unit is used for carrying out pairing on the safe passwords and login websites. The password output unit is used for outputting the safe passwords. The password control unit is connected to the authentication unit, the password generation unit, the password pairing unit and the password output unit, and is used for controlling the authentication unit, the password generation unit, the password pairing unit and the password output unit to work in cooperation. When a user accesses a password input interface of one of the login website on the computer and needs to input the corresponding password, the password output unit is started so that the password output unit can output the safe password corresponding to the login website and the safe password can be transmitted to the computer through the connection module.

Description

Mobile terminal, cipher-code input method and system
Technical field
The present invention relates to mobile terminal input data to computing machine, particularly mobile terminal, cipher-code input method, system.
Background technology
Be accompanied by the development of computer technology, make internet obtain unprecedented development, people are in order to login the various websites based on internet, have to be registered as the member of a lot of websites, and when registration, people need to input a password, in order to improve security, some websites also require user to input various combination pins, for example: the combination of arabic numeral and English alphabet, and somebody has registered a lot of website members, correspondingly can produce a lot of passwords, to bring certain trouble like this, specifically, because password is too many, after time grown, people can often forget Password, sometimes also password is misused to other website, causing cannot login system.So somebody is for solving the problem forgetting Password, often in the process of a lot of website registrations, use same password, sometimes also use very simple password, for example: the house number of the birthdate of oneself or family, this brings great potential safety hazard, once the password of oneself is leaked, by lawless person, grasped, may suffer heavy economic losses, a lot of people, just because of the net purchase password of oneself, the loss of bank cipher, cause the money in account illegally to be usurped, and suffer heavy losses.In brief, because user registers too much website, correspondingly, can produce a plurality of passwords, when a plurality of passwords all arrange difference, can cause like this user easily to forget Password or obscure password, when a plurality of passwords are set to when identical, can bring potential safety hazard like this.
Summary of the invention
In view of this, be necessary that for user, registering the Password Management problem of bringing a plurality of websites proposes a kind of mobile terminal, cipher-code input method and system.
An aspect of of the present present invention has proposed a kind of mobile terminal, comprises link block and Password Management module, and described link block is in order to connect computing machine, and described Password Management module comprises:
Authentication ' unit, in order to login Password Management interface;
Password generation unit, in order to generate security password according to kind of subcipher and default cryptographic algorithm correspondence;
Password pairing unit, in order to described security password with log in website and match;
Password output unit, in order to export described security password; And
Cryptographic control unit, is connected in described authentication ' unit, described password generation unit, password pairing unit and password output unit, in order to control the co-ordination of described authentication ' unit, described password generation unit, password pairing unit and password output unit;
Wherein, when logging in the interface for password input of website described in user enters in described computing machine and need to input password, start described password output unit, so that log in the corresponding security password of website and transfer to computing machine by described link block described in the output of described password output unit, thereby make user log in website described in logining in described computing machine.
In an embodiment, described Password Management module also comprises self-defined password generation unit therein, in order to generate described security password according to described kind of subcipher and external encryption algorithm.
In an embodiment, by input authentication password, login Password Management interface therein.
In an embodiment, by fingerprint recognition, login Password Management interface therein.
Therein in an embodiment, after starting described password output unit, need input universal code, when the universal code of input is correct, logs in the corresponding security password of website and transfer to computing machine by described link block described in described password output unit output.
Another aspect of the present invention has proposed a kind of cipher-code input method, for inputting password to computing machine by mobile terminal, comprising:
Connect described mobile terminal and described computing machine;
When entering in described computing machine, user logs in the interface for password input of website and need to input password time, user logins the Password Management interface of described mobile terminal;
Enter password output interface; And
Described in click, log in the corresponding icon of website so that described in log in the corresponding security password of website and export and transfer to computing machine, thereby make user log in website described in logining in described computing machine.
Therein in an embodiment, log in after the corresponding icon of website described in click, also need to input universal code, when described universal code is correct so that described in log in the corresponding security password of website and export and transfer to computing machine.
In an embodiment, the Password Management interface that user logins described mobile terminal comprises therein:
Setting up password management software;
Input authentication password; And
When the authentication password of inputting is correct, enter described Password Management interface.
In an embodiment, the Password Management interface that user logins described mobile terminal comprises therein:
Setting up password management software;
Checking fingerprint; And
When fingerprint authentication is correct, enter described Password Management interface.
In an embodiment, described security password is by kind of subcipher and the corresponding generation of default cryptographic algorithm therein.
In an embodiment, described security password generates step and comprises therein:
Input described kind of subcipher;
From described default cryptographic algorithm, select cryptographic algorithm; And
Generate described security password.
In an embodiment, described security password is by kind of subcipher and the corresponding generation of external encryption algorithm therein.
In an embodiment, described security password generates step and comprises therein:
Input described kind of subcipher;
Select described external encryption algorithm; And
Generate described security password.
Therein in an embodiment, described security password with described in log in website and match to form one-to-one relationship.
Therein in an embodiment, described security password with described in log in the process that website matches and comprise:
Select described security password;
Described in selection, log in website; And
Match.
Another aspect of the present invention has proposed a kind of password input system, comprising:
Computing machine; And
Mobile terminal, comprises link block and Password Management module, and described link block is in order to connect computing machine, and described Password Management module comprises:
Authentication ' unit, in order to login Password Management interface;
Password generation unit, in order to generate security password according to kind of subcipher and default cryptographic algorithm correspondence;
Password pairing unit, in order to described security password with log in website and match;
Password output unit, in order to export described security password; And
Cryptographic control unit, is connected in described authentication ' unit, described password generation unit, password pairing unit and password output unit, in order to control the co-ordination of described authentication ' unit, described password generation unit, password pairing unit and password output unit;
Wherein, when logging in the interface for password input of website described in user enters in described computing machine and need to input password, start described password output unit, so that log in the corresponding security password of website and transfer to computing machine by described link block described in the output of described password output unit, thereby make user log in website described in logining in described computing machine.
In an embodiment, described Password Management module also comprises self-defined password generation unit therein, in order to generate described security password according to described kind of subcipher and external encryption algorithm.
As from the foregoing, mobile terminal proposed by the invention, cipher-code input method and system, the Password Management software by mobile terminal carries out Password Management and output password to computing machine.Because user only need input, login password and enter behind Password Management interface, security password can be exported in computing machine, thereby realize, in computing machine, login the various websites that log in, make like this user not need to remember a plurality of passwords, to user, brought facility.Meanwhile, because protection and the security password of the private ownership of mobile phone, set authentication password is to obtain by encryption, this will improve security.
In addition, when will output safety password during to computing machine, be also provided with and need to input universal code, this have further improved security.
Accompanying drawing explanation
Fig. 1 has illustrated the block diagram of the mobile terminal of an embodiment of the present invention;
Fig. 2 has illustrated the process flow diagram of the cipher-code input method of another embodiment of the present invention;
Fig. 3 A has illustrated the process flow diagram of logining Password Management interface of an embodiment;
Fig. 3 B has illustrated the schematic diagram of the authentication interface of logining Password Management of an embodiment;
Fig. 3 C has illustrated the schematic diagram at the main interface of Password Management of an embodiment;
Fig. 4 A has illustrated the process flow diagram of the security password generation of an embodiment;
Fig. 4 B has illustrated the schematic diagram at the security password generation interface of an embodiment;
Fig. 5 A has illustrated the process flow diagram of the security password generation of another embodiment;
Fig. 5 B has illustrated the schematic diagram at the security password generation interface of another embodiment.
Fig. 6 A has illustrated the security password and the process flow diagram that logs in website pairing of an embodiment;
Fig. 6 B has illustrated the security password and the schematic diagram that logs in the interface of website pairing of an embodiment;
Fig. 7 A has illustrated the process flow diagram of the security password output of an embodiment; And
Fig. 7 B has illustrated the schematic diagram at interface of the security password output of an embodiment.
Embodiment
In order to make relevant technical staff in the field understand better technical scheme of the present invention, accompanying drawing below in conjunction with embodiment of the present invention, technical scheme in embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiments.
About there is " logging in website " herein, general reference user registers need to input various application software and the various website of password while logging in, as various application software such as qq, msn, Fetions, and, as various websites such as Sina's microblogging, 163 mailboxes, Alipay, Web banks.
In addition, about " computing machine " that occurred, make a general reference various computing machines herein, such as, desk-top computer, notebook, mainframe computer etc.
With reference to Fig. 1, Fig. 1 has illustrated the block diagram of the mobile terminal of an embodiment of the present invention.
As shown in Figure 1, mobile terminal 100 comprises link block 110 and Password Management module 120.
Link block 110, in order to connect computing machine (not illustrating), mobile terminal 100 can be connected with computing machine by wired connection mode or wireless connections mode, for wired connection mode, such as being electrically connected to computing machine by USB interface, now, mobile terminal 100 can be used as the keyboard of computing machine.
Password Management module 120 comprises authentication ' unit 121, password generation unit 122, password pairing unit 123, password output unit 124 and cryptographic control unit 125.
Authentication ' unit 121, in order to login Password Management interface.In one embodiment, logining Password Management interface needs input authentication password, when authentication password is inputted when correct, and the Password Management interface of being allowed for access.In another embodiment, can enter Password Management interface by fingerprint recognition, when fingerprint recognition is correct, can enter Password Management interface.
Password generation unit 122, in order to generate security password according to kind of subcipher and default cryptographic algorithm correspondence, wherein plant subcipher variable, default cryptographic algorithm can be a cryptographic algorithm, also can be a plurality of cryptographic algorithm, when cryptographic algorithm is a plurality of cryptographic algorithm, can in a plurality of cryptographic algorithm, select corresponding cryptographic algorithm in conjunction with kind of a subcipher, now can generate security password.
Password pairing unit 123, in order to security password with log in website and match, particularly, the security password generating according to password generation unit 122, selects the corresponding website that logs in, and forms one-to-one relationship.For example, by kind of subcipher, be combined with first cryptographic algorithm and generate the first security password P1, by kind of subcipher, be combined with second cryptographic algorithm and generate the second security password P2, as need the first security password P1 is corresponding with qq Instant Messenger (IM) software, can match to the first security password P1 and qq Instant Messenger (IM) software, equally, as need the second security password P2Yu Sina microblogging is corresponding, the second security password P2Yu Sina microblogging can be matched, here, it should be noted that, the first security password P1 also can adopt identical cryptographic algorithm to generate in conjunction with kind of subcipher with the second security password P2, , now the first security password P1 and the second security password P2 are identical password.
Password output unit 124, in order to output safety password.
Cryptographic control unit 125, is connected in authentication ' unit 121, password generation unit 122, password pairing unit 123 and password output unit 124.Cryptographic control unit 125, can, in order to control the co-ordination of authentication ' unit 121, password generation unit 122, password pairing unit 123 and password output unit 124, can dispatch unit.
In the present embodiment, when entering in computing machine, user logs in the interface for password input of website and need to input password time, setting up password output unit 124, so that 124 outputs of password output unit log in the corresponding security password of website and transfer to computing machine by link block 110, thereby being logined in computing machine, user logs in website.For instance, when user is in computing machine, open Sina's microblogging (logging in website) webpage, enter the interface of logining of Sina's microblogging, while entering the interface for password input of Sina's microblogging, and in the time of need to inputting password, as while clicking Password Input frame, setting up password output unit 124,124 outputs of password output unit log in password, and transfer to computing machine by link block 110, thereby reach, security password is inputed in the password box in interface for password input, and then user is logined in computing machine log in website.
In the present embodiment, also can be after setting up password output unit 124, need a universal code of input, this universal code can be the conventional password of user Yi Jiqi, after input universal code is correct, just make 124 outputs of password output unit log in the corresponding security password of website and transfer to computing machine by link block 110.
In the present embodiment, Password Management module 120 can also comprise self-defined password generation unit 126, in order to generate security password according to kind of subcipher and external encryption algorithm, particularly, self-defined password generation unit 126, is by introducing outside cryptographic algorithm, rather than default cryptographic algorithm, come, in conjunction with planting subcipher, to generate the required security password of user.
In the present embodiment, Password Management module 120 can also comprise help unit 127, when user exists query to the operation of Password Management module 120, can seek help from and help unit 127, helps unit 127 can provide certain query solution.
In the present embodiment, kind subcipher is variable, no matter at password generation unit 122 or at self-defined password generation unit 126, can change kind of a subcipher, thereby can change security password.
With reference to Fig. 2, Fig. 2 has illustrated the process flow diagram of the cipher-code input method of another embodiment of the present invention.
In present embodiment, cipher-code input method, for inputting password to computing machine by mobile terminal, specifically can be with reference to following.
First, in step S210, connect mobile terminal and computing machine, as mobile terminal being connected with computing machine by USB interface.
Then, in step S220, when user enters the interface for password input that logs in website in computing machine, user logins the Password Management interface of mobile terminal.For the Password Management interface of logining mobile terminal, can be that the authentication password of inputting by checking is logined, when the authentication password of inputting is correct, the Password Management interface of being allowed for access, certainly, can also adopt alternate manner to login, such as, adopt fingerprint recognition, when the fingerprint of verifying is correct, enter Password Management interface.
Afterwards, in step S230, enter password output interface.
Then, in step S240, click and log in the corresponding icon of website, so that log in the corresponding security password of website, export and transfer to computing machine, thereby user is logined in computing machine, log in website.
For logining Password Management interface, in conjunction with Fig. 3 A, Fig. 3 B, Fig. 3 C, be described in detail, Fig. 3 A has illustrated the process flow diagram of logining Password Management interface of an embodiment; Fig. 3 B has illustrated the schematic diagram of the authentication interface of logining Password Management of an embodiment; Fig. 3 C has illustrated the schematic diagram at the main interface of Password Management of an embodiment.
The present embodiment is narrated adopting authentication password to login Password Management interface, specific as follows.
First, in step S310, setting up password management software.
Then, in step S320, enter authentication interface, as shown in Figure 3A, in authentication interface, there is a password box, and there is " determining ", " abandoning ", " removing " button.
Afterwards, in step S330, click password box.
Then,, in step S340, eject soft keyboard, soft keyboard region as shown in Figure 3A.
Then, in step S350, use soft keyboard input authentication password.This authentication password, can arrange the password that user can remember and safety coefficient is higher, like this, can prevent that other people from entering.
Afterwards, in step S360, judge whether authentication password has been inputted, if inputted, enter step S370, otherwise return to step S350, continue input.
In step S370, click " confirmation " button, that is, authentication password has been inputted and can have been pressed " confirmation " button.What need supplement is, logining in interface as shown in Figure 3 B also has " abandoning " and " removing " button, in the process of input authentication password or after input, user determines while not needing to login Password Management interface, can select " abandoning " button, release and login interface, and when user finds that the authentication password of inputting is wrong, can click " removing " button, then re-enter authentication password.But what need emphasize is, " abandon ", " removing " button is not essential, this two button can be set yet, such as " abandoning " button can login interface and replaces by directly cutting out, and " removing " button can replace by directly delete password in password box.
Then,, in step S380, whether the authentication password of judgement input is correct, if correct, enter step S390, otherwise returns to step S350, by soft keyboard, re-enters.
At step S390, enter the main interface of Password Management, as shown in Figure 3 B, the main interface of Password Management has a plurality of icons, as password generates icon, password pairing icon, password output icon, self-defined password generation icon and help icon.
For security password, in one embodiment, can be in advance by kind of subcipher and the corresponding generation of default cryptographic algorithm.Below in conjunction with Fig. 4 A, Fig. 4 B, be described in detail, Fig. 4 A has illustrated the process flow diagram of the security password generation of an embodiment, and Fig. 4 B has illustrated the schematic diagram at the security password generation interface of an embodiment.
First, in step S410, input kind of subcipher.Certainly, before step S410, need setting up password systematic function unit, such as, click as the password generation icon in Fig. 3 C, now, the password ejecting is as shown in Figure 4 B generated to interface, password generates in interface, has password box, cryptographic algorithm drop-down menu, " generation " button, " abandoning " button, " removing " button and " preservation " button of seed Password Input frame, generation new password.It should be noted that, various frame tables and button, not unique its saying of restriction, such as " generation " button also can be referred to as " generation " button, " abandon " button and also can be referred to as " cancellation " button, same, " removing " button also can be other saying with " preservation " button, in a word, the saying of the various frame tables of not unique restriction and button.
For kind of a subcipher, it might not keep constant, can change arbitrarily, conventionally can select user to hold catchy password.
Then, in step S420, select cryptographic algorithm, can from default cryptographic algorithm, select.As shown in Figure 4 B, default cryptographic algorithm has cryptographic algorithm 1, cryptographic algorithm 2, cryptographic algorithm 3, cryptographic algorithm 4, cryptographic algorithm 5 and cryptographic algorithm 6, but does not limit, and default cryptographic algorithm can, more than these 6 kinds of cryptographic algorithm, also can be less than this 6 kinds of algorithms.
Afterwards, in step S430, judge whether to click " removing " button, if click " removing " button, will dispose kind of subcipher and selected cryptographic algorithm, re-enter kind of subcipher and select cryptographic algorithm,, turn back to step S410, if do not click " removing " button, enter step S440.
Then, in step S440, judge whether to click " abandoning " button, if click " abandoning " button, directly exit password and generate interface, if do not click " abandoning " button, enter step S450.
In step S450, judge whether to click " generation " button, if click " generation " button, enter step S460, otherwise do not operate.
In step S460, generate security password, as shown in Figure 4 B, in the frame that generates new password, produce new password, i.e. security password.
Then, enter step S470, " save button, if click " preservation " button, enters step S480, otherwise returns to step S410 to judge whether click.
In step S480, preserve security password, security password can be kept in the storer of mobile terminal.
Also it should be noted that, password generates in interface as shown in Figure 4 B, button " is abandoned ", " removing " and " preservation " is not essential, such as " abandoning " button can login interface and replaces by directly cutting out, " removing " button can replace by directly delete password in password box, and, when clicking the new password generating after " generation " button, automatically preserve, and not necessarily need operation " preservation " button, just the new password generating can be preserved, that is, " preservation " button is not essential yet.And when having, button " is not abandoned ", during " removing " and " preservation " button, correspondingly, can, in the process flow diagram shown in Fig. 4 A, save step S430, S440 and S470 yet.
For furthermore open-birth becomes the process of security password, in conjunction with concrete example, narrate again below.
Example 1:
Input " 123456 " this kind of subcipher in password as shown in Figure 4 B generates the password box of the input kind subcipher in interface, and selected cryptographic algorithm, wherein, cryptographic algorithm 1 represents is " the 1st with the 2nd exchange, the 3rd cryptographic algorithm with the 4th exchange, the 5th the 6th exchange ", click so after " generation " button, to generate new password, security password 213265.
Example 2:
Equally, input " 123456 " this kind of subcipher in password as shown in Figure 4 B generates the password box of the input kind subcipher in interface, and selected cryptographic algorithm 2, wherein, cryptographic algorithm 2 represents is " use the mode of other data value cumulative sum to calculate this password; if the result being added has surpassed 10, can using result divided by 10 remainders that obtain the password as this ".According to cryptographic algorithm 2, specifically calculate the every concrete numerical value in generated new password below, while calculating the numerical value of the 1st, by " 2+3+4+5+6=20/10 ", remainder is 0, the numerical value that draws so the 1st is exactly " 0 ", while calculating the password of the 2nd, by " 1+3+4+5+6=19/10 ", remainder is 9, the numerical value of the 2nd is exactly " 9 " so, while calculating the numerical value of the 3rd, by " 1+2+4+5+6=18/10 ", remainder is 8, the numerical value that draws so the 3rd is exactly " 8 ", the rest may be inferred, can draw 6 new passwords of generation, be that security password is 098765.
Certainly, example 1 above, the kind subcipher in example 2, elect comparatively simple " 123456 " as, but in practice, user can select more complicated kind subcipher.
For security password, in another embodiment, can be by kind of subcipher and the corresponding generation of external encryption algorithm.Below in conjunction with Fig. 5 A, Fig. 5 B, be described in detail, Fig. 5 A has illustrated the process flow diagram of the security password generation of another embodiment, and Fig. 5 B has illustrated the schematic diagram at the security password generation interface of another embodiment.
First, in step S510, input kind of subcipher.Certainly, before step S510, need to start self-defined password systematic function unit, such as, click as the self-defined password generation icon in Fig. 3 C, now, the self-defined password ejecting is as shown in Figure 5 B generated to interface, self-defined password generates in interface, has the password box of seed Password Input frame, generation new password, frame, " generation " button, " abandoning " button, " removing " button, the Browse button and " preservation " button of selection external encryption algorithm.It should be noted that, various frame tables and button, not unique its saying of restriction, such as " generation " button also can be referred to as " generation " button, " abandon " button and also can be referred to as " cancellation " button, same, " removing " button also can be other saying with " preservation " button, in a word, the saying of the various frame tables of not unique restriction and button.
Then, in step S520, select cryptographic algorithm, can from external encryption algorithm program, select, particularly, can be by clicking the Browse button, browse external encryption algorithm program, this outside encipheror can be to be kept in the local storage of mobile terminal, can be to be also kept in the external memory storage being connected with mobile terminal, in browsing external encryption algorithm program, can select required external encryption algorithm program.
Afterwards, in step S530, judge whether to click " removing " button, if click " removing " button, will dispose kind of subcipher and selected cryptographic algorithm, re-enter kind of subcipher and select cryptographic algorithm,, turn back to step S510, if do not click " removing " button, enter step S540.
Then, in step S540, judge whether to click " abandoning " button, if click " abandoning " button, directly exit password and generate interface, if do not click " abandoning " button, enter step S550.
In step S550, judge whether to click " generation " button, if click " generation " button, enter step S560, otherwise do not operate.
In step S560, generate security password, as shown in Figure 5 B, in the frame that generates new password, produce new password, i.e. security password.
Then, enter step S570, " save button, if click " preservation " button, enters step S580, otherwise returns to step S510 to judge whether click.
In step S580, preserve security password, security password can be kept in the storer of mobile terminal.
Also it should be noted that, password generates in interface as shown in Figure 5 B, button " is abandoned ", " removing " and " preservation " is not essential, such as " abandoning " button can login interface and replaces by directly cutting out, " removing " button can replace by directly delete password in password box, and, when clicking the new password generating after " generation " button, automatically preserve, and not necessarily need operation " preservation " button, just the new password generating can be preserved, that is, " preservation " button is not essential yet.
For security password, match with logging in website, can be elaborated with reference to Fig. 6 A, Fig. 6 B.Fig. 6 A has illustrated the security password and the process flow diagram that logs in website pairing of an embodiment, and Fig. 6 B has illustrated the security password and the schematic diagram that logs in the interface of website pairing of an embodiment.
First, in step S610, select a security password.Certainly, before step S610, need setting up password matching function unit, such as, click as the password pairing icon in Fig. 3 C, now, by the password pairing interface of ejecting as shown in Figure 6B, in password pairing interface, there is security password drop-down menu, log in website drop-down menu, " determining " button, " abandoning " button, " removing " button.It should be noted that various frame tables and button, not unique its saying of restriction, such as " abandoning " button also can be referred to as " cancellation " button, same, " removing " button also can be other saying with " determining " button, in a word, the saying of the various frame tables of not unique restriction and button.In one embodiment, can select security password 1, this security password is 214365.
Then, in step S620, select one and log in website, can select from default logging in website.As shown in Figure 6B, default log in website and log in website 1, log in website 2, log in website 3, log in website 4, log in website 5 and log in website 6, but do not limit, the default website that logs in can be more than these 6.In one embodiment, can select to log in website 1, this logs in website 1 for Sina's microblogging.It should be noted that, logging in website can upgrade according to user's request in password matching function unit, can add the new website that logs in, and will have demonstration in logging in website drop-down menu after interpolation in pairing interface as shown in Figure 6B.
Afterwards, in step S630, judge whether to click " removing " button, if click " removing " button, will dispose selected security password and selected adding to log in website, reselect security password and selection logs in website,, turn back to step S610, if do not click " removing " button, enter step S640.
Then, in step S640, judge whether to click " abandoning " button, if click " abandoning " button, directly exit password and generate interface, if do not click " abandoning " button, enter step S650.
Then, enter step S650, judge whether to click " determining " button, if click " confirmation " button, enter step S660, otherwise return to step S610.
In step S660, match, selected security password and the selected website that logs in are matched, to form one-to-one relationship, such as, to security password 1 with log in website 1 and match, and when security password 1 be 214365, while logging in website 1 for Sina's microblogging, can think that, when logging in Sina's microblogging, the password of input is, can enter Sina's microblogging at 214365 o'clock.In addition selected security password and the selected pairing result that logs in website are preserved, as being kept in mobile terminal memory.
Also it should be noted that, as shown in Figure 6B in password pairing interface, button " is abandoned ", " removing " is not essential, and such as " abandoning " button can login interface and replaces by directly cutting out, " removing " button can replace by directly delete password in password box.And when having, button " is not abandoned ", when " removing ", correspondingly, can in the process flow diagram shown in Fig. 6 A, save step S630, S640, directly from step S620 to step S650 yet.
For security password output, can be elaborated with reference to Fig. 7 A, Fig. 7 B.Fig. 7 A has illustrated the process flow diagram of the security password output of an embodiment, and Fig. 7 B has illustrated the schematic diagram at interface of the security password output of an embodiment.
First, in step S710, enter password output interface, such as, click as the password output icon in Fig. 3 C, now, by the password output interface ejecting as shown in Figure 7 B, in password output interface, there are a plurality of icons, as icon 11, icon 12 ... icon 1n, wherein n is natural number, each icon represents that logs in a website, as icon 11 represents website 11, icon 12, represents website 12.
Then, in step S720, click the icon that logs in website, click and log in the corresponding icon of website.Such as, the website that will log in is Sina's microblogging, can click the icon that Sina's microblogging is corresponding, similarly, if the website that will log in is qq Instant Messenger (IM) software, can click the corresponding icon of qq Instant Messenger (IM) software.
Afterwards, in step S730, input universal code, the universal code here can be the conventional password that user can easily remember.
Then,, in step S740, whether the universal code of judgement input is correct, if correctly, enters step S750, otherwise re-enters universal code, returns to step S750.
In step S750, export corresponding security password and transfer to computing machine, according to the selected website that logs in, by its corresponding security password output, and transfer in computing machine, particularly, security password can be input in the password box in the interface for password input that logs in website in computing machine, thereby can make user successfully login, log in website.Give an example it, when logging in website and be Sina's microblogging, and its corresponding security password is 214365, when needs are logined Sina's microblogging from computing machine, when input password, can in the password output interface in mobile terminal, click Sina's microblogging icon, its corresponding security password 214365 is input to Sina's microblogging and login in the password box at interface, thereby realize, log in Sina's microblogging.
It should be noted that, for step S730, step S740, be not essential, also can not there are these two steps, and directly after completing steps S720, enter step S750, when clicking, log in after the icon of website, export corresponding security password and transfer to computing machine.But, added step S730, S740 that security can be provided.
From above, user only need remember to login password (when adopting fingerprint recognition, can not remember to login password), can reach and login the various websites that log in.In order further to improve security, user only need remember a universal code again.Reduced like this
In another embodiment, a kind of password input system, comprises computing machine and mobile terminal.Wherein, mobile terminal comprises link block and Password Management module, and link block is in order to connect computing machine.
Password Management module comprises authentication ' unit, password generation unit, password pairing unit, password output unit and cryptographic control unit.Authentication ' unit, in order to login Password Management interface; Password generation unit, in order to generate security password according to kind of subcipher and default cryptographic algorithm correspondence; Password pairing unit, in order to security password with log in website and match; Password output unit, in order to output safety password; And cryptographic control unit, be connected in authentication ' unit, password generation unit, password pairing unit and password output unit, in order to control the co-ordination of authentication ' unit, password generation unit, password pairing unit and password output unit.
Wherein, when entering in computing machine, user logs in the interface for password input of website and need to input password time, setting up password output unit, so that the output of password output unit logs in the corresponding security password of website and transfers to computing machine by link block, thereby being logined in computing machine, user logs in website.
In embodiment of the present invention, Password Management module also comprises self-defined password generation unit, in order to generate described security password according to described kind of subcipher and external encryption algorithm.
In embodiment of the present invention, Password Management module can also comprise help unit, when user exists query to the operation of Password Management module, can seek help from help unit, helps unit can provide certain query solution.
As from the foregoing, mobile terminal proposed by the invention, cipher-code input method and system, the Password Management software by mobile terminal carries out Password Management and output password to computing machine.Because user only need input, login password and enter behind Password Management interface, security password can be exported in computing machine, thereby realize, in computing machine, login the various websites that log in, make like this user not need to remember a plurality of passwords, to user, brought facility.Meanwhile, because protection and the security password of the private ownership of mobile phone, set authentication password is to obtain by encryption, this will improve security.
In addition, when will output safety password during to computing machine, be also provided with and need to input universal code, this have further improved security.
The above embodiment has only expressed several embodiment of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.

Claims (15)

1. a mobile terminal, is characterized in that, comprises link block and Password Management module, and described link block is in order to connect computing machine, and described Password Management module comprises:
Authentication ' unit, in order to login Password Management interface;
Password generation unit, in order to generate security password according to kind of subcipher and default cryptographic algorithm correspondence;
Password pairing unit, in order to described security password with log in website and match;
Password output unit, in order to export described security password; And
Cryptographic control unit, is connected in described authentication ' unit, described password generation unit, password pairing unit and password output unit, in order to control the co-ordination of described authentication ' unit, described password generation unit, password pairing unit and password output unit;
Wherein, when logging in the interface for password input of website described in user enters in described computing machine and need to input password, start described password output unit, so that log in the corresponding security password of website and transfer to computing machine by described link block described in the output of described password output unit, thereby make user log in website described in logining in described computing machine.
2. mobile terminal according to claim 1, is characterized in that, described Password Management module also comprises:
Self-defined password generation unit, in order to generate described security password according to described kind of subcipher and external encryption algorithm.
3. mobile terminal according to claim 1, is characterized in that, by input authentication password, logins Password Management interface.
4. mobile terminal according to claim 1, is characterized in that, by fingerprint recognition, logins Password Management interface.
5. mobile terminal according to claim 1, it is characterized in that, after starting described password output unit, need input universal code, when the universal code of input is when correct, log in the corresponding security password of website and transfer to computing machine by described link block described in described password output unit output.
6. a cipher-code input method, for inputting password to computing machine by mobile terminal, is characterized in that, comprising:
Connect described mobile terminal and described computing machine;
When entering in described computing machine, user logs in the interface for password input of website and need to input password time, user logins the Password Management interface of described mobile terminal;
Enter password output interface; And
Described in click, log in the corresponding icon of website so that described in log in the corresponding security password of website and export and transfer to computing machine, thereby make user log in website described in logining in described computing machine.
7. cipher-code input method according to claim 6, is characterized in that:
Described in click, log in after the corresponding icon of website, also need to input universal code, when described universal code is correct so that described in log in the corresponding security password of website and export and transfer to computing machine.
8. cipher-code input method according to claim 6, is characterized in that, the Password Management interface that user logins described mobile terminal comprises:
Setting up password management software;
Input authentication password; And
When the authentication password of inputting is correct, enter described Password Management interface.
9. cipher-code input method according to claim 6, is characterized in that, described security password is by kind of subcipher and the corresponding generation of default cryptographic algorithm.
10. cipher-code input method according to claim 9, is characterized in that, described security password generates step and comprises:
Input described kind of subcipher;
From described default cryptographic algorithm, select cryptographic algorithm; And
Generate described security password.
11. cipher-code input methods according to claim 6, is characterized in that, described security password is by kind of subcipher and the corresponding generation of external encryption algorithm.
12. cipher-code input methods according to claim 11, is characterized in that, described security password generates step and comprises:
Input described kind of subcipher;
Select described external encryption algorithm; And
Generate described security password.
13. cipher-code input methods according to claim 6, is characterized in that, described security password with described in log in website and match to form one-to-one relationship.
14. cipher-code input methods according to claim 13, is characterized in that, described security password with described in log in the process that website matches and comprise:
Select described security password;
Described in selection, log in website; And
Match.
15. 1 kinds of password input systems, is characterized in that, comprising:
Computing machine; And
Mobile terminal, comprises link block and Password Management module, and described link block is in order to connect computing machine, and described Password Management module comprises:
Authentication ' unit, in order to login Password Management interface;
Password generation unit, in order to generate security password according to kind of subcipher and default cryptographic algorithm correspondence;
Password pairing unit, in order to described security password with log in website and match;
Password output unit, in order to export described security password; And
Cryptographic control unit, is connected in described authentication ' unit, described password generation unit, password pairing unit and password output unit, in order to control the co-ordination of described authentication ' unit, described password generation unit, password pairing unit and password output unit;
Wherein, when logging in the interface for password input of website described in user enters in described computing machine and need to input password, start described password output unit, so that log in the corresponding security password of website and transfer to computing machine by described link block described in the output of described password output unit, thereby make user log in website described in logining in described computing machine.
CN201210338098.2A 2012-09-13 2012-09-13 Mobile terminal and password input method and system Pending CN103678964A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210338098.2A CN103678964A (en) 2012-09-13 2012-09-13 Mobile terminal and password input method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210338098.2A CN103678964A (en) 2012-09-13 2012-09-13 Mobile terminal and password input method and system

Publications (1)

Publication Number Publication Date
CN103678964A true CN103678964A (en) 2014-03-26

Family

ID=50316492

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210338098.2A Pending CN103678964A (en) 2012-09-13 2012-09-13 Mobile terminal and password input method and system

Country Status (1)

Country Link
CN (1) CN103678964A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182680A (en) * 2014-08-27 2014-12-03 上海斐讯数据通信技术有限公司 User name password management and user name password input method and system
CN104182677A (en) * 2014-07-14 2014-12-03 联想(北京)有限公司 Information processing method and electronic equipment
CN105117636A (en) * 2015-08-10 2015-12-02 苏州海博智能系统有限公司 Intelligent card type password recorder
CN105323094A (en) * 2014-07-29 2016-02-10 中国电信股份有限公司 Safety management method based on equipment identification and system thereof
CN105553952A (en) * 2015-12-09 2016-05-04 惠州Tcl移动通信有限公司 Input password processing method and input password processing system based on mobile terminal
CN105701392A (en) * 2015-12-31 2016-06-22 联想(北京)有限公司 Information processing method and electronic equipment
WO2020095120A1 (en) * 2019-04-03 2020-05-14 苏云 Password generation method which simultaneously satisfies security and usability

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1949241A (en) * 2006-11-02 2007-04-18 北京飞天诚信科技有限公司 Method and system of software identify identification
CN101340439A (en) * 2008-08-11 2009-01-07 中兴通讯股份有限公司 Identity authenticating method, system and mobile terminal
CN101815091A (en) * 2010-03-12 2010-08-25 薛明 Cipher providing equipment, cipher authentication system and cipher authentication method
WO2011025185A2 (en) * 2009-08-22 2011-03-03 주식회사 엠더블유스토리 Security usb storage medium generation and decryption method, and medium having the record of a program for generation of security usb storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1949241A (en) * 2006-11-02 2007-04-18 北京飞天诚信科技有限公司 Method and system of software identify identification
CN101340439A (en) * 2008-08-11 2009-01-07 中兴通讯股份有限公司 Identity authenticating method, system and mobile terminal
WO2011025185A2 (en) * 2009-08-22 2011-03-03 주식회사 엠더블유스토리 Security usb storage medium generation and decryption method, and medium having the record of a program for generation of security usb storage medium
CN101815091A (en) * 2010-03-12 2010-08-25 薛明 Cipher providing equipment, cipher authentication system and cipher authentication method

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182677A (en) * 2014-07-14 2014-12-03 联想(北京)有限公司 Information processing method and electronic equipment
CN105323094A (en) * 2014-07-29 2016-02-10 中国电信股份有限公司 Safety management method based on equipment identification and system thereof
CN105323094B (en) * 2014-07-29 2018-10-30 中国电信股份有限公司 Method for managing security based on device identification and system
CN104182680A (en) * 2014-08-27 2014-12-03 上海斐讯数据通信技术有限公司 User name password management and user name password input method and system
CN104182680B (en) * 2014-08-27 2018-01-16 上海斐讯数据通信技术有限公司 A kind of user name Password Management, input method and system
CN105117636A (en) * 2015-08-10 2015-12-02 苏州海博智能系统有限公司 Intelligent card type password recorder
CN105553952A (en) * 2015-12-09 2016-05-04 惠州Tcl移动通信有限公司 Input password processing method and input password processing system based on mobile terminal
CN105701392A (en) * 2015-12-31 2016-06-22 联想(北京)有限公司 Information processing method and electronic equipment
WO2020095120A1 (en) * 2019-04-03 2020-05-14 苏云 Password generation method which simultaneously satisfies security and usability

Similar Documents

Publication Publication Date Title
CN103678964A (en) Mobile terminal and password input method and system
US10686602B2 (en) Portable device interface methods and systems
US10079826B2 (en) Methods and systems for data entry
CN103065178B (en) A kind of Quick Response Code sharing apparatus, access means and sharing method
US8930708B2 (en) Web-based security authentication
TWI449397B (en) Near field communication electronic device, login system using the same and method thereof
US20160127134A1 (en) User authentication system and method
CN104025505A (en) Method, Device, And System For Managing User Authentication
TWI525467B (en) Method and computer system for dynamically providing multi-dimensions based password/challenge authentication
CN103607284A (en) Identity authentication method and equipment and server
CN106850228A (en) A kind of foundation of portable intelligent password management system and operating method
US20190124066A1 (en) User selected key authentication
CN102984260A (en) Internet account number and password information management method and system
CN107294999A (en) Information Authentication processing method, device, system, client and server
CN101789864A (en) On-line bank background identity identification method, device and system
TWI668586B (en) Data communication method and system, client and server
US20120198530A1 (en) Real time password generation apparatus and method
US20110154483A1 (en) Electronic device with password protection function and method thereof
CN103684796A (en) SMI (subscriber identity module) card and personal identity authentication method
CN110351672A (en) Information-pushing method, device and electronic equipment
KR101436238B1 (en) Automated human interface device operation procedure
CN102646107A (en) Digital key with functions of security and webpage guidance
WO2015070593A1 (en) Method, device and system for on-line payment information transmission
CN103207972B (en) Device and method for recovering and analyzing login password of computer operation system
KR20120107610A (en) The apparatus for verifying user in portable appliance and the method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140326

RJ01 Rejection of invention patent application after publication