CN103714301B - Cipher-code input method and device - Google Patents

Cipher-code input method and device Download PDF

Info

Publication number
CN103714301B
CN103714301B CN201210379995.8A CN201210379995A CN103714301B CN 103714301 B CN103714301 B CN 103714301B CN 201210379995 A CN201210379995 A CN 201210379995A CN 103714301 B CN103714301 B CN 103714301B
Authority
CN
China
Prior art keywords
password
input
button
character
event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210379995.8A
Other languages
Chinese (zh)
Other versions
CN103714301A (en
Inventor
邹华林
王佼
高晓洁
李万强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201210379995.8A priority Critical patent/CN103714301B/en
Publication of CN103714301A publication Critical patent/CN103714301A/en
Application granted granted Critical
Publication of CN103714301B publication Critical patent/CN103714301B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Input From Keyboards Or The Like (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

A kind of cipher-code input method, comprises the following steps:Receive the character of input;Symbol corresponding with the character is shown in Password Input frame;Obtain the first trigger event that button is checked to password;The symbol in the Password Input frame is shown as by corresponding character according to first trigger event.Using the cipher-code input method, can reduce the error rate and can of Password Input reduces password leakage risk.In addition, additionally provide a kind of cipher input.

Description

Cipher-code input method and device
Technical field
The present invention relates to field of computer technology, more particularly to a kind of cipher-code input method and device.
Background technology
Traditional cipher-code input method is in order to reduce the risk that password is compromised, defeated generally during Password Input The password entered can be shown as specific symbol in Password Input frame(Substitute symbol), such as round dot is shown as, a round dot is Represent a character of input.However, this mode can't see the character of input due to user, the mistake of Password Input can be increased Rate, so as to cause to improve the probability for re-entering password.In traditional cipher-code input method, Password Input mistake may also be arranged on Cheng Zhong, shows in plain text in Password Input frame, that is, inputs a character and the character is shown in Password Input frame.However, this Kind mode can cause the password that user inputs easily to be seen by other people again, bring the risk of password leakage, so as to cause safety hidden Suffer from.
The content of the invention
Based on this, it is necessary to high or the problem of password easily leaks for the error rate of above-mentioned Password Input, there is provided a kind of The error rate and can of Password Input, which can be reduced, reduces the cipher-code input method and device of password leakage risk.
A kind of cipher-code input method, comprises the following steps:
Receive the character of input;
Symbol corresponding with the character is shown in Password Input frame;
Obtain the first trigger event that button is checked to password;
The symbol in the Password Input frame is shown as by corresponding character according to first trigger event.
A kind of cipher input, including:
Character receiving module, for receiving the character of input;
Password display module, for showing symbol corresponding with the character in Password Input frame;
First trigger module, the first trigger event of button is checked to password for obtaining;
The password display module, which is additionally operable to get in first trigger module, checks that the first of button touches to password After hair event, the symbol in the Password Input frame is shown as corresponding character.
Above-mentioned cipher-code input method and device, the character of input is received, then display and character pair in Password Input frame It the symbol answered, can prevent password from being seen by other people during Password Input, reduce the risk of password leakage;Meanwhile obtaining Get after the first trigger event of button is checked to password, then the symbol in Password Input frame is shown as corresponding character, energy Enough realize during Password Input, can go to check whether the character of input is correct at any time, so as to reduce Password Input Error rate.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of cipher-code input method in one embodiment;
Fig. 2 is the schematic flow sheet of cipher-code input method in another embodiment;
Fig. 3 is one of schematic diagram of Password Input operation interface;
Fig. 4 is the two of the schematic diagram of Password Input operation interface;
Fig. 5 is the three of the schematic diagram of Password Input operation interface;
Fig. 6 is the structural representation of cipher input in one embodiment;
Fig. 7 is the structural representation of cipher input in another embodiment;
Fig. 8 is the structural representation of cipher input in another embodiment.
Embodiment
As shown in figure 1, in one embodiment, a kind of cipher-code input method, comprise the following steps:
Step S102, receive the character of input.
Specifically, can by physical keyboard or the dummy keyboard based on touch-screen input character, often input a character, then Receive the character of input.
Step S104, symbol corresponding with character is shown in Password Input frame.
For each character received, then symbol corresponding with the character, each symbol are shown in Password Input frame Represent a character of input.For example, symbol can be round dot etc..Due to one character of every input, show in Password Input frame What is shown is symbol corresponding with the character, and non-character is in itself, therefore can prevent that password from being seen by other people, reduces password and lets out The risk of leakage.
In one embodiment, step S104 detailed process is:Show the character of input in Password Input frame, and After preset time, the character of input is shown as corresponding symbol.
Preferably, preset time may be configured as being less than or equal to 0.5S.In the present embodiment, a character is received, then close The character preset time is shown in code input frame, i.e., the character is shown as corresponding symbol again after quickly showing the character received Number.So, before symbol corresponding to the character of input is shown as, character is quickly shown, user can be helped to check input Character it is whether correct, so as to further reduce the error rate of Password Input.
Step S106, obtain the first trigger event that button is checked to password.
In one embodiment, it can show that password checks button after step s 102.Specifically, input can received First character after show that password checks button.Preferably, it can show that the password is checked in Password Input frame region Button, password check that the content that button is used in trigger password input frame show switches between character and symbol.
Step S108, the symbol in Password Input frame is shown as by corresponding character according to first trigger event.
In the present embodiment, the character of an input is received, then is cached the character.Password is checked when getting After first trigger event of button, then character is taken out from caching, and each symbol in Password Input frame is shown as pair The character answered, the password that will be inputted are shown as in plain text.
Due to that after display password checks button, can check that button triggers to password at any time, by the password of input It is shown as in plain text, being easy to user to check whether the password of input is correct at any time, so as to reduce the error rate of Password Input.
In one embodiment, after step S108, the second trigger event that button is checked to password can be also obtained, will Character in Password Input frame is shown as corresponding symbol.
Specifically, in one embodiment, the first trigger event is that the first click event of button is checked to password, second Trigger event is that the second click event of button is checked to password.In the present embodiment, after one click password checks button, it can incite somebody to action Symbol in Password Input frame is shown as corresponding character, and the password that will be inputted is shown as in plain text, being easy to check the close of input Whether code is correct.Again tap on after password checks button, the character in Password Input frame can be shown as corresponding symbol again, from And can prevent from bringing the risk of password leakage due to password exposure for a long time, improve security.
In another embodiment, the first trigger event is that password checks that the cursor of button region or touch point move into Event, the second trigger event are to check that the cursor of button region or touch point remove event to password.In the present embodiment, when Cursor or touch point are moved to password and check button region, then the symbol in Password Input frame are shown as into corresponding word Symbol, button region is checked when cursor or touch point remove password, then the character in Password Input frame is shown as to corresponding again Symbol.
Button is checked due to password need not be clicked on, as long as cursor or touch point are checked where button into and out password Region can switch between character and symbol, it is possible to increase operating efficiency realizes quickly cutting between character and symbol Change, can check whether the password of input is correct at any time, can also prevent password exposure, therefore Password Input can be reduced for a long time Error rate and can reduce the risk divulged a secret.
In one embodiment, as shown in Fig. 2 a kind of cipher-code input method, comprises the following steps:
Step S202, initialized cryptographic input frame.
The initialized cryptographic input frame in the application interface of Password Input, to receive the character of input.
Step S204, judge whether include password default in Password Input frame, if so, into step S206, otherwise enter Step S208.
Password default is the password of last input, remembers password if being provided with during last input password Option, then during this input password, the password once inputted can be shown in Password Input frame, it is preferred that in Password Input Password default is shown as corresponding symbol in frame, to prevent password leakage.
Step S206, hiding password check button.
In the present embodiment, in the region of Password Input frame password can be set to check button, it is silent when being included in Password Input frame When recognizing password, then set password to check that the display properties of button is invisible, that is, hide the password and check button.So, can be with Prevent trigger password from checking button and the symbol currently shown in Password Input frame is switched into corresponding character, so as to cause to write from memory Recognize the leakage of password.
Step S208, judges whether password default is all deleted, if so, then entering step S210, does not otherwise process.
Step S210, receive the character of input.
After password default is all deleted, show that user needs to re-enter password, then receive the character of input.
Step S212, display password checks button, and symbol corresponding with character is shown in Password Input frame.
Specifically, after the first character of input is received, then set password check the display properties of button be it is visible, Password is checked that button is shown, button is checked to can trigger password at any time, the symbol in Password Input frame is shown For corresponding character.Further, trigger password checks button again, then the character in Password Input frame is shown as into corresponding Symbol.By that analogy, detailed process at this as described above, then repeat no more.
In one embodiment, after Password Input operation interface is back to, if including password default in Password Input frame, Then hide password and check button.
The principle of the cipher-code input method in above-described embodiment is illustrated with specific example below.As shown in figure 3, In login interface, initialized cryptographic input frame 100, password default 110 is shown in Password Input frame 100, then password is looked into See that button 120 is invisible.As shown in figure 4, password default 110 is all deleted, password is re-entered, password checks button 120 It can be seen that and input character be shown as in Password Input frame 100 corresponding to symbol 130.As shown in figure 5, looked into when clicking on password Button 120 is seen, or, cursor or touch point are moved into password and check the region of button 120, then in Password Input frame 100 Symbol 130 is shown as corresponding character 140.Further, button 120 is checked when again tapping on password, or, cursor or touch Point removes password and checks the region of button 120, then the character 140 in Password Input frame 100 is shown as corresponding symbol 130 again (Referring to Fig. 4).
As shown in fig. 6, in one embodiment, a kind of cipher input, including character receiving module 10, password are shown The trigger module 30 of module 20 and first, wherein:
Character receiving module 10 is used for the character for receiving input.
Specifically, can by physical keyboard or the dummy keyboard based on touch-screen input character, often input a character, then Character receiving module 10 receives the character of input.
Password display module 20 is used to show symbol corresponding with character in Password Input frame.
The each character received for character receiving module 10, password display module 20 are then shown in Password Input frame Symbol corresponding with the character, each symbol represent a character of input.
In one embodiment, password display module 20 is additionally operable to show the character of input in Password Input frame, and After preset time, the character of input is shown as corresponding symbol.Preferably, preset time may be configured as being less than or equal to 0.5S. In the present embodiment, character receiving module 10 receives a character, and then display should in Password Input frame for password display module 20 Character preset time, i.e., the character is shown as corresponding symbol again after quickly showing the character received.
First trigger module 30 is used to obtain the first trigger event for checking password on button.
In one embodiment, as shown in fig. 7, cipher input, which may also include password, checks button display module 40, Show that password checks button after character for receiving input in character receiving module 10.Specifically, password checks that button shows Show the display properties that module 40 can set password to check button after character receiving module 10 receives the first character of input To be visible, that is, show that password checks button.Preferably, it can show that the password checks button in Password Input frame region, Password checks that the content that button is used in trigger password input frame show switches between character and symbol.
In the present embodiment, password display module 20 is additionally operable to get in the first trigger module 30 checks button to password After first trigger event, the symbol in Password Input frame is shown as corresponding character.
Specifically, character receiving module 10 often receives the character of an input, then the character is cached.When first Trigger module 30 is got the first trigger event of button is checked to password after, password display module 20 then takes out word from caching Symbol, and each symbol in Password Input frame is shown as corresponding character, the password that will be inputted is shown as in plain text.
In one embodiment, as shown in fig. 7, cipher input may also include the second trigger module 50, for obtaining The second trigger event of button is checked to password.In the present embodiment, password display module 20 is additionally operable in the second trigger module 50 Get after the second trigger event of button is checked to password, the character in Password Input frame is shown as corresponding symbol.
Specifically, in one embodiment, the first trigger event is that the first click event of button is checked to password, second Trigger event is that the second click event of button is checked to password.
In another embodiment, the first trigger event is that password checks that the cursor of button region or touch point move into Event, the second trigger event are to check that the cursor of button region or touch point remove event to password.
In one embodiment, cipher input can also only include above-mentioned character receiving module 10, password display module 20th, the first trigger module 30 and password check button display module 40.
In one embodiment, as shown in figure 8, cipher input may also include initialization module 60 and password check by Button hidden module 70, wherein:
Initialization module 60 is used for initialized cryptographic input frame.
Password checks that button hidden module 70 is used for judging whether include password default in Password Input frame, if so, then hidden Hide password and check button.
Password default is the password of last input, remembers password if being provided with during last input password Option, then during this input password, password display module 20 can show the password once inputted in Password Input frame, preferably , password default is shown as corresponding symbol in Password Input frame, to prevent password leakage.
Further, when including password default in Password Input frame, it is close that password checks that button hidden module 70 is then set Code checks that the display properties of button is invisible, that is, hides the password and check button.
In the present embodiment, character receiving module 10 judges whether password default is all deleted, if so, then receiving the word of input Symbol, is not otherwise processed.
In one embodiment, cipher input can also only include above-mentioned character receiving module 10, password display module 20th, the first trigger module 30, initialization module 60 and password check button hidden module 70.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with The hardware of correlation is instructed to complete by computer program, described program can be stored in a computer read/write memory medium In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only memory(Read-Only Memory, ROM)Or random access memory(Random Access Memory, RAM)Deng.
Embodiment described above only expresses the several embodiments of the present invention, and its description is more specific and detailed, but simultaneously Therefore the limitation to the scope of the claims of the present invention can not be interpreted as.It should be pointed out that for one of ordinary skill in the art For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the guarantor of the present invention Protect scope.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.

Claims (8)

1. a kind of cipher-code input method, comprises the following steps:
The character of input is received, button is checked in display;
The character of the input is shown in Password Input frame, and after preset time, the character of the input is shown as pair The symbol answered;
Obtain the first trigger event that button is checked to password;
The symbol in the Password Input frame is shown as by corresponding character according to first trigger event;
After Password Input operation interface is back to, if including password default in Password Input frame, hides password and check button.
2. cipher-code input method according to claim 1, it is characterised in that the symbol in the frame by Password Input After the step of being shown as corresponding character, in addition to:
Obtain the second trigger event that button is checked to the password;
The character in the Password Input frame is shown as corresponding symbol.
3. cipher-code input method according to claim 2, it is characterised in that first trigger event is to the password The first click event of button is checked, second trigger event is that the second click event of button is checked to the password;Or
First trigger event be the password check button region cursor or touch point move into event, described second Trigger event is to check that the cursor of button region or touch point remove event to the password.
4. cipher-code input method according to claim 1, it is characterised in that it is described receive input character the step of it Before, in addition to:
Initialized cryptographic input frame;
Judge whether include password default in the Password Input frame, if so, then
Hide the password and check button.
A kind of 5. cipher input, it is characterised in that including:
Character receiving module, for receiving the character of input;
Password checks button display module, for after the character receiving module receives the character of input, display to be described close Code checks button;
Password display module, will be described defeated for showing the character of the input in Password Input frame, and after preset time The character entered is shown as corresponding symbol;
First trigger module, the first trigger event of button is checked to password for obtaining;
The password display module, which is additionally operable to get in first trigger module, checks that the first of button triggers thing to password After part, the symbol in the Password Input frame is shown as corresponding character;
Password checks button hidden module, for after Password Input operation interface is back to, being write from memory if being included in Password Input frame Recognize password, then hide password and check button.
6. cipher input according to claim 5, it is characterised in that described device also includes:
Second trigger module, the second trigger event of button is checked to the password for obtaining;
The password display module, which is additionally operable to get in second trigger module, checks that the second of button touches to the password After hair event, the character in the Password Input frame is shown as corresponding symbol.
7. cipher input according to claim 6, it is characterised in that first trigger event is to the password The first click event of button is checked, second trigger event is that the second click event of button is checked to the password;Or
First trigger event be the password check button region cursor or touch point move into event, described second Trigger event is to check that the cursor of button region or touch point remove event to the password.
8. cipher input according to claim 5, it is characterised in that described device also includes:
Initialization module, for initialized cryptographic input frame;
The password checks that button hidden module is additionally operable to judge whether include password default in the Password Input frame, if so, Then hide the password and check button.
CN201210379995.8A 2012-10-09 2012-10-09 Cipher-code input method and device Active CN103714301B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210379995.8A CN103714301B (en) 2012-10-09 2012-10-09 Cipher-code input method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210379995.8A CN103714301B (en) 2012-10-09 2012-10-09 Cipher-code input method and device

Publications (2)

Publication Number Publication Date
CN103714301A CN103714301A (en) 2014-04-09
CN103714301B true CN103714301B (en) 2017-11-21

Family

ID=50407261

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210379995.8A Active CN103714301B (en) 2012-10-09 2012-10-09 Cipher-code input method and device

Country Status (1)

Country Link
CN (1) CN103714301B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105205386A (en) * 2014-06-25 2015-12-30 腾讯科技(深圳)有限公司 Password protecting method and device for mobile terminal application program
CN104077520B (en) * 2014-07-08 2017-12-29 深圳市金立通信设备有限公司 A kind of display methods of Password Input
CN104091128B (en) * 2014-07-08 2017-09-26 深圳市金立通信设备有限公司 A kind of terminal
WO2016004871A1 (en) * 2014-07-08 2016-01-14 深圳市金立通信设备有限公司 Password input display method and terminal
CN105468960B (en) * 2014-09-11 2019-12-06 阿里巴巴集团控股有限公司 method and device for displaying password plaintext, mobile equipment and computer
CN105653054B (en) * 2015-05-28 2018-11-06 宇龙计算机通信科技(深圳)有限公司 A kind of cipher processing method and device
CN106293439A (en) * 2015-06-04 2017-01-04 阿里巴巴集团控股有限公司 Interface alternation method and device
CN105577633B (en) * 2015-06-27 2019-10-11 宇龙计算机通信科技(深圳)有限公司 A kind of verification method and terminal
CN106873947A (en) * 2015-12-11 2017-06-20 阿里巴巴集团控股有限公司 The control method and device of application program breaker in middle class control
CN108646928B (en) * 2018-03-29 2020-06-30 维沃移动通信有限公司 Character input method and terminal equipment
CN111191264A (en) * 2019-12-31 2020-05-22 苏宁金融科技(南京)有限公司 Echoing method, echoing device, computer equipment and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6747676B2 (en) * 2000-12-13 2004-06-08 International Business Machines Corporation User interface for displaying protected information
US20060056626A1 (en) * 2004-09-16 2006-03-16 International Business Machines Corporation Method and system for selectively masking the display of data field values
US9588595B2 (en) * 2011-09-12 2017-03-07 Microsoft Technology Licensing, Llc Password reveal selector

Also Published As

Publication number Publication date
CN103714301A (en) 2014-04-09

Similar Documents

Publication Publication Date Title
CN103714301B (en) Cipher-code input method and device
Katsini et al. Security and usability in knowledge-based user authentication: A review
US9208304B2 (en) Method for web service user authentication
CN104813631A (en) Pluggable authentication mechanism for mobile device applications
KR102217273B1 (en) Multi-phase password input method and electronic device thereof
CN103973892B (en) A kind of method of the mobile terminal switching on and shutting down based on voice and recognition of face and device
US8117652B1 (en) Password input using mouse clicking
EP2973182B1 (en) Methods and apparatus for securing user input in a mobile device
CN101986670A (en) Method for protecting password input security at mobile phone by using password keyboard
CN105354458B (en) Password Input verification method and system
CN102945336B (en) A kind of cipher-code input method of intelligent communication terminal
Yeung et al. Graphical password: Shoulder-surfing resistant using falsification
CN108073802B (en) Password input protection system and method
WO2015032255A1 (en) Intelligent key device, mobile terminal and dynamic password output method and system
CN101383833B (en) Apparatus and method for enhancing PIN code input security of intelligent cipher key apparatus
KR101435487B1 (en) User device, method of using hidden page of the same and computer-readable recording medium
Mandalapu et al. An NFC featured three level authentication system for tenable transaction and abridgment of ATM card blocking intricacies
CN106570386B (en) Touch screen unlocking method and system
KR101526500B1 (en) Suspected malignant website detecting method and system using information entropy
Moses et al. Touch interface and keylogging malware
KR101015633B1 (en) A method and a computer readable media for secure data input
CN107944303A (en) A kind of smart mobile phone cipher-code input method and device
JP2008005371A (en) Japanese language password converter and method therefor
Taheritajar et al. A Survey on Acoustic Side Channel Attacks on Keyboards
US10433173B2 (en) Touch movement activation for gaining access beyond a restricted access gateway

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant