CN103714301B - Cipher-code input method and device - Google Patents
Cipher-code input method and device Download PDFInfo
- Publication number
- CN103714301B CN103714301B CN201210379995.8A CN201210379995A CN103714301B CN 103714301 B CN103714301 B CN 103714301B CN 201210379995 A CN201210379995 A CN 201210379995A CN 103714301 B CN103714301 B CN 103714301B
- Authority
- CN
- China
- Prior art keywords
- password
- input
- button
- character
- event
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Input From Keyboards Or The Like (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
A kind of cipher-code input method, comprises the following steps:Receive the character of input;Symbol corresponding with the character is shown in Password Input frame;Obtain the first trigger event that button is checked to password;The symbol in the Password Input frame is shown as by corresponding character according to first trigger event.Using the cipher-code input method, can reduce the error rate and can of Password Input reduces password leakage risk.In addition, additionally provide a kind of cipher input.
Description
Technical field
The present invention relates to field of computer technology, more particularly to a kind of cipher-code input method and device.
Background technology
Traditional cipher-code input method is in order to reduce the risk that password is compromised, defeated generally during Password Input
The password entered can be shown as specific symbol in Password Input frame(Substitute symbol), such as round dot is shown as, a round dot is
Represent a character of input.However, this mode can't see the character of input due to user, the mistake of Password Input can be increased
Rate, so as to cause to improve the probability for re-entering password.In traditional cipher-code input method, Password Input mistake may also be arranged on
Cheng Zhong, shows in plain text in Password Input frame, that is, inputs a character and the character is shown in Password Input frame.However, this
Kind mode can cause the password that user inputs easily to be seen by other people again, bring the risk of password leakage, so as to cause safety hidden
Suffer from.
The content of the invention
Based on this, it is necessary to high or the problem of password easily leaks for the error rate of above-mentioned Password Input, there is provided a kind of
The error rate and can of Password Input, which can be reduced, reduces the cipher-code input method and device of password leakage risk.
A kind of cipher-code input method, comprises the following steps:
Receive the character of input;
Symbol corresponding with the character is shown in Password Input frame;
Obtain the first trigger event that button is checked to password;
The symbol in the Password Input frame is shown as by corresponding character according to first trigger event.
A kind of cipher input, including:
Character receiving module, for receiving the character of input;
Password display module, for showing symbol corresponding with the character in Password Input frame;
First trigger module, the first trigger event of button is checked to password for obtaining;
The password display module, which is additionally operable to get in first trigger module, checks that the first of button touches to password
After hair event, the symbol in the Password Input frame is shown as corresponding character.
Above-mentioned cipher-code input method and device, the character of input is received, then display and character pair in Password Input frame
It the symbol answered, can prevent password from being seen by other people during Password Input, reduce the risk of password leakage;Meanwhile obtaining
Get after the first trigger event of button is checked to password, then the symbol in Password Input frame is shown as corresponding character, energy
Enough realize during Password Input, can go to check whether the character of input is correct at any time, so as to reduce Password Input
Error rate.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of cipher-code input method in one embodiment;
Fig. 2 is the schematic flow sheet of cipher-code input method in another embodiment;
Fig. 3 is one of schematic diagram of Password Input operation interface;
Fig. 4 is the two of the schematic diagram of Password Input operation interface;
Fig. 5 is the three of the schematic diagram of Password Input operation interface;
Fig. 6 is the structural representation of cipher input in one embodiment;
Fig. 7 is the structural representation of cipher input in another embodiment;
Fig. 8 is the structural representation of cipher input in another embodiment.
Embodiment
As shown in figure 1, in one embodiment, a kind of cipher-code input method, comprise the following steps:
Step S102, receive the character of input.
Specifically, can by physical keyboard or the dummy keyboard based on touch-screen input character, often input a character, then
Receive the character of input.
Step S104, symbol corresponding with character is shown in Password Input frame.
For each character received, then symbol corresponding with the character, each symbol are shown in Password Input frame
Represent a character of input.For example, symbol can be round dot etc..Due to one character of every input, show in Password Input frame
What is shown is symbol corresponding with the character, and non-character is in itself, therefore can prevent that password from being seen by other people, reduces password and lets out
The risk of leakage.
In one embodiment, step S104 detailed process is:Show the character of input in Password Input frame, and
After preset time, the character of input is shown as corresponding symbol.
Preferably, preset time may be configured as being less than or equal to 0.5S.In the present embodiment, a character is received, then close
The character preset time is shown in code input frame, i.e., the character is shown as corresponding symbol again after quickly showing the character received
Number.So, before symbol corresponding to the character of input is shown as, character is quickly shown, user can be helped to check input
Character it is whether correct, so as to further reduce the error rate of Password Input.
Step S106, obtain the first trigger event that button is checked to password.
In one embodiment, it can show that password checks button after step s 102.Specifically, input can received
First character after show that password checks button.Preferably, it can show that the password is checked in Password Input frame region
Button, password check that the content that button is used in trigger password input frame show switches between character and symbol.
Step S108, the symbol in Password Input frame is shown as by corresponding character according to first trigger event.
In the present embodiment, the character of an input is received, then is cached the character.Password is checked when getting
After first trigger event of button, then character is taken out from caching, and each symbol in Password Input frame is shown as pair
The character answered, the password that will be inputted are shown as in plain text.
Due to that after display password checks button, can check that button triggers to password at any time, by the password of input
It is shown as in plain text, being easy to user to check whether the password of input is correct at any time, so as to reduce the error rate of Password Input.
In one embodiment, after step S108, the second trigger event that button is checked to password can be also obtained, will
Character in Password Input frame is shown as corresponding symbol.
Specifically, in one embodiment, the first trigger event is that the first click event of button is checked to password, second
Trigger event is that the second click event of button is checked to password.In the present embodiment, after one click password checks button, it can incite somebody to action
Symbol in Password Input frame is shown as corresponding character, and the password that will be inputted is shown as in plain text, being easy to check the close of input
Whether code is correct.Again tap on after password checks button, the character in Password Input frame can be shown as corresponding symbol again, from
And can prevent from bringing the risk of password leakage due to password exposure for a long time, improve security.
In another embodiment, the first trigger event is that password checks that the cursor of button region or touch point move into
Event, the second trigger event are to check that the cursor of button region or touch point remove event to password.In the present embodiment, when
Cursor or touch point are moved to password and check button region, then the symbol in Password Input frame are shown as into corresponding word
Symbol, button region is checked when cursor or touch point remove password, then the character in Password Input frame is shown as to corresponding again
Symbol.
Button is checked due to password need not be clicked on, as long as cursor or touch point are checked where button into and out password
Region can switch between character and symbol, it is possible to increase operating efficiency realizes quickly cutting between character and symbol
Change, can check whether the password of input is correct at any time, can also prevent password exposure, therefore Password Input can be reduced for a long time
Error rate and can reduce the risk divulged a secret.
In one embodiment, as shown in Fig. 2 a kind of cipher-code input method, comprises the following steps:
Step S202, initialized cryptographic input frame.
The initialized cryptographic input frame in the application interface of Password Input, to receive the character of input.
Step S204, judge whether include password default in Password Input frame, if so, into step S206, otherwise enter
Step S208.
Password default is the password of last input, remembers password if being provided with during last input password
Option, then during this input password, the password once inputted can be shown in Password Input frame, it is preferred that in Password Input
Password default is shown as corresponding symbol in frame, to prevent password leakage.
Step S206, hiding password check button.
In the present embodiment, in the region of Password Input frame password can be set to check button, it is silent when being included in Password Input frame
When recognizing password, then set password to check that the display properties of button is invisible, that is, hide the password and check button.So, can be with
Prevent trigger password from checking button and the symbol currently shown in Password Input frame is switched into corresponding character, so as to cause to write from memory
Recognize the leakage of password.
Step S208, judges whether password default is all deleted, if so, then entering step S210, does not otherwise process.
Step S210, receive the character of input.
After password default is all deleted, show that user needs to re-enter password, then receive the character of input.
Step S212, display password checks button, and symbol corresponding with character is shown in Password Input frame.
Specifically, after the first character of input is received, then set password check the display properties of button be it is visible,
Password is checked that button is shown, button is checked to can trigger password at any time, the symbol in Password Input frame is shown
For corresponding character.Further, trigger password checks button again, then the character in Password Input frame is shown as into corresponding
Symbol.By that analogy, detailed process at this as described above, then repeat no more.
In one embodiment, after Password Input operation interface is back to, if including password default in Password Input frame,
Then hide password and check button.
The principle of the cipher-code input method in above-described embodiment is illustrated with specific example below.As shown in figure 3,
In login interface, initialized cryptographic input frame 100, password default 110 is shown in Password Input frame 100, then password is looked into
See that button 120 is invisible.As shown in figure 4, password default 110 is all deleted, password is re-entered, password checks button 120
It can be seen that and input character be shown as in Password Input frame 100 corresponding to symbol 130.As shown in figure 5, looked into when clicking on password
Button 120 is seen, or, cursor or touch point are moved into password and check the region of button 120, then in Password Input frame 100
Symbol 130 is shown as corresponding character 140.Further, button 120 is checked when again tapping on password, or, cursor or touch
Point removes password and checks the region of button 120, then the character 140 in Password Input frame 100 is shown as corresponding symbol 130 again
(Referring to Fig. 4).
As shown in fig. 6, in one embodiment, a kind of cipher input, including character receiving module 10, password are shown
The trigger module 30 of module 20 and first, wherein:
Character receiving module 10 is used for the character for receiving input.
Specifically, can by physical keyboard or the dummy keyboard based on touch-screen input character, often input a character, then
Character receiving module 10 receives the character of input.
Password display module 20 is used to show symbol corresponding with character in Password Input frame.
The each character received for character receiving module 10, password display module 20 are then shown in Password Input frame
Symbol corresponding with the character, each symbol represent a character of input.
In one embodiment, password display module 20 is additionally operable to show the character of input in Password Input frame, and
After preset time, the character of input is shown as corresponding symbol.Preferably, preset time may be configured as being less than or equal to 0.5S.
In the present embodiment, character receiving module 10 receives a character, and then display should in Password Input frame for password display module 20
Character preset time, i.e., the character is shown as corresponding symbol again after quickly showing the character received.
First trigger module 30 is used to obtain the first trigger event for checking password on button.
In one embodiment, as shown in fig. 7, cipher input, which may also include password, checks button display module 40,
Show that password checks button after character for receiving input in character receiving module 10.Specifically, password checks that button shows
Show the display properties that module 40 can set password to check button after character receiving module 10 receives the first character of input
To be visible, that is, show that password checks button.Preferably, it can show that the password checks button in Password Input frame region,
Password checks that the content that button is used in trigger password input frame show switches between character and symbol.
In the present embodiment, password display module 20 is additionally operable to get in the first trigger module 30 checks button to password
After first trigger event, the symbol in Password Input frame is shown as corresponding character.
Specifically, character receiving module 10 often receives the character of an input, then the character is cached.When first
Trigger module 30 is got the first trigger event of button is checked to password after, password display module 20 then takes out word from caching
Symbol, and each symbol in Password Input frame is shown as corresponding character, the password that will be inputted is shown as in plain text.
In one embodiment, as shown in fig. 7, cipher input may also include the second trigger module 50, for obtaining
The second trigger event of button is checked to password.In the present embodiment, password display module 20 is additionally operable in the second trigger module 50
Get after the second trigger event of button is checked to password, the character in Password Input frame is shown as corresponding symbol.
Specifically, in one embodiment, the first trigger event is that the first click event of button is checked to password, second
Trigger event is that the second click event of button is checked to password.
In another embodiment, the first trigger event is that password checks that the cursor of button region or touch point move into
Event, the second trigger event are to check that the cursor of button region or touch point remove event to password.
In one embodiment, cipher input can also only include above-mentioned character receiving module 10, password display module
20th, the first trigger module 30 and password check button display module 40.
In one embodiment, as shown in figure 8, cipher input may also include initialization module 60 and password check by
Button hidden module 70, wherein:
Initialization module 60 is used for initialized cryptographic input frame.
Password checks that button hidden module 70 is used for judging whether include password default in Password Input frame, if so, then hidden
Hide password and check button.
Password default is the password of last input, remembers password if being provided with during last input password
Option, then during this input password, password display module 20 can show the password once inputted in Password Input frame, preferably
, password default is shown as corresponding symbol in Password Input frame, to prevent password leakage.
Further, when including password default in Password Input frame, it is close that password checks that button hidden module 70 is then set
Code checks that the display properties of button is invisible, that is, hides the password and check button.
In the present embodiment, character receiving module 10 judges whether password default is all deleted, if so, then receiving the word of input
Symbol, is not otherwise processed.
In one embodiment, cipher input can also only include above-mentioned character receiving module 10, password display module
20th, the first trigger module 30, initialization module 60 and password check button hidden module 70.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with
The hardware of correlation is instructed to complete by computer program, described program can be stored in a computer read/write memory medium
In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic
Dish, CD, read-only memory(Read-Only Memory, ROM)Or random access memory(Random Access
Memory, RAM)Deng.
Embodiment described above only expresses the several embodiments of the present invention, and its description is more specific and detailed, but simultaneously
Therefore the limitation to the scope of the claims of the present invention can not be interpreted as.It should be pointed out that for one of ordinary skill in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the guarantor of the present invention
Protect scope.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.
Claims (8)
1. a kind of cipher-code input method, comprises the following steps:
The character of input is received, button is checked in display;
The character of the input is shown in Password Input frame, and after preset time, the character of the input is shown as pair
The symbol answered;
Obtain the first trigger event that button is checked to password;
The symbol in the Password Input frame is shown as by corresponding character according to first trigger event;
After Password Input operation interface is back to, if including password default in Password Input frame, hides password and check button.
2. cipher-code input method according to claim 1, it is characterised in that the symbol in the frame by Password Input
After the step of being shown as corresponding character, in addition to:
Obtain the second trigger event that button is checked to the password;
The character in the Password Input frame is shown as corresponding symbol.
3. cipher-code input method according to claim 2, it is characterised in that first trigger event is to the password
The first click event of button is checked, second trigger event is that the second click event of button is checked to the password;Or
First trigger event be the password check button region cursor or touch point move into event, described second
Trigger event is to check that the cursor of button region or touch point remove event to the password.
4. cipher-code input method according to claim 1, it is characterised in that it is described receive input character the step of it
Before, in addition to:
Initialized cryptographic input frame;
Judge whether include password default in the Password Input frame, if so, then
Hide the password and check button.
A kind of 5. cipher input, it is characterised in that including:
Character receiving module, for receiving the character of input;
Password checks button display module, for after the character receiving module receives the character of input, display to be described close
Code checks button;
Password display module, will be described defeated for showing the character of the input in Password Input frame, and after preset time
The character entered is shown as corresponding symbol;
First trigger module, the first trigger event of button is checked to password for obtaining;
The password display module, which is additionally operable to get in first trigger module, checks that the first of button triggers thing to password
After part, the symbol in the Password Input frame is shown as corresponding character;
Password checks button hidden module, for after Password Input operation interface is back to, being write from memory if being included in Password Input frame
Recognize password, then hide password and check button.
6. cipher input according to claim 5, it is characterised in that described device also includes:
Second trigger module, the second trigger event of button is checked to the password for obtaining;
The password display module, which is additionally operable to get in second trigger module, checks that the second of button touches to the password
After hair event, the character in the Password Input frame is shown as corresponding symbol.
7. cipher input according to claim 6, it is characterised in that first trigger event is to the password
The first click event of button is checked, second trigger event is that the second click event of button is checked to the password;Or
First trigger event be the password check button region cursor or touch point move into event, described second
Trigger event is to check that the cursor of button region or touch point remove event to the password.
8. cipher input according to claim 5, it is characterised in that described device also includes:
Initialization module, for initialized cryptographic input frame;
The password checks that button hidden module is additionally operable to judge whether include password default in the Password Input frame, if so,
Then hide the password and check button.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210379995.8A CN103714301B (en) | 2012-10-09 | 2012-10-09 | Cipher-code input method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210379995.8A CN103714301B (en) | 2012-10-09 | 2012-10-09 | Cipher-code input method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103714301A CN103714301A (en) | 2014-04-09 |
CN103714301B true CN103714301B (en) | 2017-11-21 |
Family
ID=50407261
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210379995.8A Active CN103714301B (en) | 2012-10-09 | 2012-10-09 | Cipher-code input method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103714301B (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105205386A (en) * | 2014-06-25 | 2015-12-30 | 腾讯科技(深圳)有限公司 | Password protecting method and device for mobile terminal application program |
CN104077520B (en) * | 2014-07-08 | 2017-12-29 | 深圳市金立通信设备有限公司 | A kind of display methods of Password Input |
CN104091128B (en) * | 2014-07-08 | 2017-09-26 | 深圳市金立通信设备有限公司 | A kind of terminal |
WO2016004871A1 (en) * | 2014-07-08 | 2016-01-14 | 深圳市金立通信设备有限公司 | Password input display method and terminal |
CN105468960B (en) * | 2014-09-11 | 2019-12-06 | 阿里巴巴集团控股有限公司 | method and device for displaying password plaintext, mobile equipment and computer |
CN105653054B (en) * | 2015-05-28 | 2018-11-06 | 宇龙计算机通信科技(深圳)有限公司 | A kind of cipher processing method and device |
CN106293439A (en) * | 2015-06-04 | 2017-01-04 | 阿里巴巴集团控股有限公司 | Interface alternation method and device |
CN105577633B (en) * | 2015-06-27 | 2019-10-11 | 宇龙计算机通信科技(深圳)有限公司 | A kind of verification method and terminal |
CN106873947A (en) * | 2015-12-11 | 2017-06-20 | 阿里巴巴集团控股有限公司 | The control method and device of application program breaker in middle class control |
CN108646928B (en) * | 2018-03-29 | 2020-06-30 | 维沃移动通信有限公司 | Character input method and terminal equipment |
CN111191264A (en) * | 2019-12-31 | 2020-05-22 | 苏宁金融科技(南京)有限公司 | Echoing method, echoing device, computer equipment and storage medium |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6747676B2 (en) * | 2000-12-13 | 2004-06-08 | International Business Machines Corporation | User interface for displaying protected information |
US20060056626A1 (en) * | 2004-09-16 | 2006-03-16 | International Business Machines Corporation | Method and system for selectively masking the display of data field values |
US9588595B2 (en) * | 2011-09-12 | 2017-03-07 | Microsoft Technology Licensing, Llc | Password reveal selector |
-
2012
- 2012-10-09 CN CN201210379995.8A patent/CN103714301B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN103714301A (en) | 2014-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103714301B (en) | Cipher-code input method and device | |
Katsini et al. | Security and usability in knowledge-based user authentication: A review | |
US9208304B2 (en) | Method for web service user authentication | |
CN104813631A (en) | Pluggable authentication mechanism for mobile device applications | |
KR102217273B1 (en) | Multi-phase password input method and electronic device thereof | |
CN103973892B (en) | A kind of method of the mobile terminal switching on and shutting down based on voice and recognition of face and device | |
US8117652B1 (en) | Password input using mouse clicking | |
EP2973182B1 (en) | Methods and apparatus for securing user input in a mobile device | |
CN101986670A (en) | Method for protecting password input security at mobile phone by using password keyboard | |
CN105354458B (en) | Password Input verification method and system | |
CN102945336B (en) | A kind of cipher-code input method of intelligent communication terminal | |
Yeung et al. | Graphical password: Shoulder-surfing resistant using falsification | |
CN108073802B (en) | Password input protection system and method | |
WO2015032255A1 (en) | Intelligent key device, mobile terminal and dynamic password output method and system | |
CN101383833B (en) | Apparatus and method for enhancing PIN code input security of intelligent cipher key apparatus | |
KR101435487B1 (en) | User device, method of using hidden page of the same and computer-readable recording medium | |
Mandalapu et al. | An NFC featured three level authentication system for tenable transaction and abridgment of ATM card blocking intricacies | |
CN106570386B (en) | Touch screen unlocking method and system | |
KR101526500B1 (en) | Suspected malignant website detecting method and system using information entropy | |
Moses et al. | Touch interface and keylogging malware | |
KR101015633B1 (en) | A method and a computer readable media for secure data input | |
CN107944303A (en) | A kind of smart mobile phone cipher-code input method and device | |
JP2008005371A (en) | Japanese language password converter and method therefor | |
Taheritajar et al. | A Survey on Acoustic Side Channel Attacks on Keyboards | |
US10433173B2 (en) | Touch movement activation for gaining access beyond a restricted access gateway |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |