CN103870744B - A kind of method and electronic equipment for verifying password - Google Patents

A kind of method and electronic equipment for verifying password Download PDF

Info

Publication number
CN103870744B
CN103870744B CN201210541372.6A CN201210541372A CN103870744B CN 103870744 B CN103870744 B CN 103870744B CN 201210541372 A CN201210541372 A CN 201210541372A CN 103870744 B CN103870744 B CN 103870744B
Authority
CN
China
Prior art keywords
password
verified
son
pressure value
input operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210541372.6A
Other languages
Chinese (zh)
Other versions
CN103870744A (en
Inventor
魏鸿伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201210541372.6A priority Critical patent/CN103870744B/en
Publication of CN103870744A publication Critical patent/CN103870744A/en
Application granted granted Critical
Publication of CN103870744B publication Critical patent/CN103870744B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Input From Keyboards Or The Like (AREA)
  • Telephone Function (AREA)

Abstract

A kind of method and electronic equipment for verifying password, the described method includes:The Password Input for detecting whether to input the first password to be verified by the input equipment of the electronic equipment operates;When detecting the Password Input operation, respond the Password Input operation, obtain the described first password to be verified, wherein, first password to be verified includes the first son password to be verified that the input equipment responds the Password Input operation and obtains, and attribute relevant second son to be verified password with Password Input operation of the Password Input operation when operating the input equipment;Described second son password to be verified is matched with the second substandard password, obtains the first matching result.

Description

A kind of method and electronic equipment for verifying password
Technical field
The application belongs to field of human-computer interaction, and in particular to a kind of method and electronic equipment for verifying password.
Background technology
Password is commonly used in authentication, after verification password success, could perform corresponding operation, close by setting Code achievees the purpose that protection is not desired to by privacy that others sees or prevents unwarranted operation, for example, being set for important file Password is put, is that the login system of computer sets password, or password etc. is set for mobile phone screen.
In general, the password of user setting can be to include numeral, letter, the character string of symbol, or special Pattern.
Present inventor at least exists in the prior art during the embodiment of the present application technical solution is realized Following technical problem:
In the prior art, due to setting cryptogram form single, and when input password, can be seen by people the position of password with Pattern, there are the technical problem that password is easily cracked;
And then since password is easily cracked, there are the low technical problem of cipher safety.
The content of the invention
The embodiment of the present invention provides a kind of method and electronic equipment for verifying password, existing in the prior art for solving The technical problem that password is easily cracked, realizes password and is not easy to be seen, improve the technique effect of cipher safety.
A kind of method for verifying password, applied in electronic equipment, the described method includes:
The Password Input for detecting whether to input the first password to be verified by the input equipment of the electronic equipment operates;
When detecting the Password Input operation, the Password Input operation is responded, it is to be verified close to obtain described first Code, wherein, first password to be verified includes the first son that the input equipment responds the Password Input operation and obtains Password to be verified, and attribute with Password Input operation of the Password Input operation when operating the input equipment Relevant second son password to be verified;
Described second son password to be verified is matched with the second substandard password, obtains the first matching result.
Further, described second son password to be verified is matched with the second substandard password described, acquisition the After one matching result, the method further includes:
Described first son password to be verified is matched with the first substandard password, obtains the second matching result;
Wherein, when first and second described matching result shows successful match, the described first password to be verified is shown Pass through verification;When first matching result and/or second matching result show to match unsuccessful, show described first Password to be verified could not pass through verification.
Further, first son password to be verified is specially character string to be verified or pattern to be verified, and described second Son password to be verified is specially pressure value to be verified, fingerprint to be verified or pressing duration to be verified.
Further, when the described first password to be verified is specially the character string to be verified and second son is to be verified When password is specially the pressure value to be verified, the response Password Input operation, obtains first password to be verified, Specifically include:
The touch control operation is responded, obtains at least one positional information of the touch control operation on the touch control unit, And at least one position of corresponding at least one positional information the touch control operation at least one pressure to be verified Value;
Based at least one positional information, at least one position of corresponding at least one positional information is determined At least one character, and then obtain the character string to be verified for including at least one character;
Based at least one pressure value to be verified and the character string to be verified, it is to be verified close to obtain described first Code.
Further, described first son password to be verified is matched with the first substandard password described, acquisition the After two matching results, the method further includes:
When first matching result shows that second son password to be verified and the second substandard password match fail, Generate and export a prompt message, to prompt second son password to be verified to carry out weight as bad password and/or prompting user New input.
A kind of electronic equipment, including:
Detection unit, the first password to be verified is inputted for detecting whether having by the input equipment of the electronic equipment Password Input operates;
Obtaining unit, for when detecting the Password Input operation, responding the Password Input and operating, described in acquisition First password to be verified, wherein, first password to be verified include the input equipment respond Password Input operation and The the first son password to be verified obtained, and Password Input operation are defeated with the password when operating the input equipment Enter relevant second son of the attribute password to be verified of operation;
First matching unit, for the described second son password to be verified to be matched with the second substandard password, obtains First matching result.
Further, the electronic equipment further includes:
Second matching unit, for the described first son password to be verified to be matched with the first substandard password, obtains Second matching result;
Wherein, when first and second described matching result shows successful match, the described first password to be verified is shown Pass through verification;When first matching result and/or second matching result show to match unsuccessful, show described first Password to be verified could not pass through verification.
Further, first son password to be verified is specially character string to be verified or pattern to be verified, and described second Son password to be verified is specially pressure value to be verified, fingerprint to be verified or pressing duration to be verified.
Further, when the described first password to be verified is specially the character string to be verified and second son is to be verified When password is specially the pressure value to be verified, the obtaining unit specifically includes:
First obtains subelement, for responding the touch control operation, obtains the touch control operation on the touch control unit At least one positional information, and the touch control operation at least one position of corresponding at least one positional information At least one pressure value to be verified;
Second obtains subelement, for based at least one positional information, determining corresponding at least one position At least one character of at least one position of information, and then obtain the character string to be verified for including at least one character;
3rd obtains subelement, for based at least one pressure value to be verified and the character string to be verified, obtaining Obtain first password to be verified.
Further, the electronic equipment further includes:
Prompt unit, for showing that second son password to be verified and the second substandard are close in first matching result Code is generated and exports a prompt message when it fails to match, to prompt second son password to be verified as bad password and/or carry Show that user is re-entered.
The one or more technical solutions provided in the embodiment of the present application, have at least the following technical effects or advantages:
It is to be verified by the input equipment input first of the electronic equipment by detecting whether in the embodiment of the present invention The Password Input operation of password;When detecting Password Input operation, the Password Input operation is responded, obtains described the One password to be verified, wherein, first password to be verified includes the input equipment and responds the Password Input operation and obtain The first son password to be verified, and Password Input operation when operating the input equipment with the Password Input Relevant second son of the attribute password to be verified of operation;By the described second son password to be verified and the progress of the second substandard password Match somebody with somebody, obtain the first matching result, solve in the prior art when inputting password, position and the pattern of password can be seen by people, The technical problem that existing password is easily cracked, realizes lifting password and cracks difficulty, and be not easy when inputting password by People sees the technique effect of password;
And then since password is not easy to be cracked, solves the low technical problem of cipher safety in the prior art, realize Improve the technique effect of cipher safety.
Brief description of the drawings
Fig. 1 is the flow chart that cryptographic methods are verified in one embodiment of the invention;
Fig. 2 is the flow chart of step 102 in one embodiment of the invention;
Fig. 3 is the schematic diagram of pattern to be verified in one embodiment of the invention;
Fig. 4 is the structure chart of electronic equipment in one embodiment of the invention.
Embodiment
The embodiment of the present invention provides a kind of method and electronic equipment for verifying password, existing in the prior art for solving The technical problem that password is easily cracked, realizes password and is not easy to be seen, improve the technique effect of cipher safety.
Technical solution in the embodiment of the present invention is to solve the above problems, general thought is as follows:
By detecting whether that the input equipment by the electronic equipment inputs the Password Input of the first password to be verified Operation;When detecting the Password Input operation, the Password Input operation is responded, obtains first password to be verified, Wherein, it is to be tested to include the first son that the input equipment responds the Password Input operation and obtains for the described first password to be verified Card password, and Password Input operation are related to the attribute of Password Input operation when operating the input equipment The second son password to be verified;Described second son password to be verified is matched with the second substandard password, obtains first With as a result, solve in the prior art when inputting password, position and the pattern of password can be seen by people, there are the easy quilt of password The technical problem cracked.
In order to better understand the above technical scheme, in conjunction with appended figures and specific embodiments to upper Technical solution is stated to be described in detail.
One embodiment of the application provides a kind of method for verifying password, and applied in electronic equipment, the electronic equipment can Think the electronic equipments such as mobile phone, tablet computer, laptop, wherein, the electronic equipment has an input equipment.
Referring to Fig. 1, the method for the verification password specifically includes:
Step 101:Detect whether the password of input equipment the first password to be verified of input by the electronic equipment Input operation.
Wherein, the input equipment is specially the soft keyboard or mechanical keyboard shown on touch control unit.
In specific implementation process, detect whether that the Password Input operation is to pass through electronics there are Password Input operation The input equipment of equipment inputs the operation of the first password to be verified.Wherein, the input equipment inputs number for user to computer According to the equipment with information, for example, when electronic equipment is mobile phone, input equipment can be the dummy keyboard on handset touch panel, Can also be the physical keyboard of mobile phone, when electronic equipment is laptop, input equipment can be mechanical keyboard.
After detecting whether to obtain Password Input operation, the embodiment of the present application performs step 102:It is described close detecting During code input operation, the Password Input operation is responded, obtains first password to be verified, wherein, described first is to be verified Password includes the first son password to be verified that the input equipment responds the Password Input operation and obtains, and the password Attribute relevant second son to be verified password with Password Input operation of the input operation when operating the input equipment.
In a step 102, first son password to be verified can be character string to be verified, or figure to be verified Case, specifically, numeral, letter or symbol can be combined, so that the character string to be verified is obtained, wherein, institute It can be any digit to state character string, for example, df25% or 256091.In addition, the pattern to be verified can be User Defined Special graph or preset, for example, " mouth " shape pattern or " ∵ " shape preset.In addition, second son password to be verified can be with For pressure value to be verified, can also fingerprint to be verified, can also be the pressing duration to be verified, specifically, can be according to pressure The big wisp pressure value of power is divided into some grades, for example, high-strength press force value III, middle intensity pressure value II, low-intensity pressure value I, the pressure value to be verified is obtained by the pressure size that input equipment inputs according to user, in addition, according to user to input Equipment pressing obtains the pressing duration to be verified, for example, pressing is for 2 seconds or pressing is for 3 seconds.
In implementation process, by taking input equipment is touch control unit as an example, specifically, when the described first son password to be verified Specially described character string to be verified and when second son password to be verified is specially the pressure value to be verified, such as Fig. 2 institutes Show, step 102 includes:
Step 201:The touch control operation is responded, obtains at least one position of the touch control operation on the touch control unit The touch-control behaviour's is at least one to be verified at confidence breath, and at least one position of corresponding at least one positional information Pressure value.
After step 201 is performed, step 202 is performed:Based at least one positional information, determine described in correspondence extremely At least one character of at least one position of a few positional information, and then acquisition includes the to be tested of at least one character Demonstrate,prove character string;
After performing step 202, step 203 is performed:Based at least one pressure value to be verified and described to be tested Character string is demonstrate,proved, obtains first password to be verified.
Process, which is described in detail, will be realized to step 201,202 and 203 by specific example below:
By responding the touch control operation of user, at least one position letter of the touch control operation on touch control unit is obtained Breath, and at least one positional information is based on, determine at least one character of the corresponding positional information, for example, by using The position of " x ", obtains first position information in family touching dummy keyboard, and is based on the first position information, obtains character " x ", can obtain multiple characters input by user in the same way, and then obtain what is be made of multiple characters input by user Character string to be verified, for example, " xyz ".In addition, while response touch control operation obtains the character string to be verified, acquisition pair Answer and at least one treated by what touch control operation applied touch control unit at least one position of at least one positional information Verify pressure value, for example, the pressure value to be verified at character " x " place is II, the pressure value to be verified at character " y " place is III, character The pressure value to be verified at " z " place is I.Finally, based on the pressure value to be verified and the character string to be verified, obtain first and treat Verify password.
In implementation process, when the described first son password to be verified for the character string to be verified and second son it is to be tested When card password is the pressing duration to be verified, step 102 is specially:
Using the method same with step 201, by responding the touch control operation of user, character string to be verified is obtained, for example, " xyz ", and while the character string to be verified is obtained, obtain the pressing duration to be verified of corresponding each character, example Such as, 2 seconds pressing duration to be verified of character " x ", 1 second pressing duration to be verified of character " y ", character " z's " treats Verification 3 seconds duration of pressing, finally, based on the pressing duration and character string to be verified to be verified, obtain the One password to be verified.
In implementation process, when the described first son password to be verified for the character string to be verified and second son it is to be tested When card password is fingerprint to be verified, step 102 is specially:
Using the method same with step 201, by responding the touch control operation of user, character string to be verified is obtained, for example, " xyz ", and while the character string to be verified is obtained, obtain the fingerprint to be verified of corresponding each character, corresponding each word The fingerprint of symbol may be the same or different, for example, the fingerprint of character " x " corresponds to right hand forefinger, the fingerprint of character " y " corresponds to Right hand middle finger, the fingerprint of character " z " correspond to right hand middle finger, finally, based on the fingerprint to be verified and the character string to be verified, Obtain the first password to be verified.
In addition, in implementation process, first son password to be verified can also use pattern to be verified, below with first Son password to be verified is pattern to be verified, and the second son password to be verified is described in detail step 102 for pressure value to be verified:
By responding the touch control operation of user, at least one position letter of the touch control operation on touch control unit is obtained Breath, and at least one positional information is based on, determine at least one location point of corresponding at least one positional information, and Based at least one location point, obtain pattern to be verified, for example, the pattern to be verified shown in Fig. 3, wherein, it is illustrated that treat Verification pattern includes three location points.In addition, while response touch control operation obtains the pattern to be verified, corresponding institute is obtained State at least one position of at least one positional information touch control unit is applied by touch control operation it is at least one to be verified Pressure value, for example, the pressure value to be verified of first position point is II, the pressure value to be verified of second place point is III, the 3rd The pressure value to be verified put a little is I.Finally, based on the pressure value to be verified and the pattern to be verified, it is to be tested to obtain first Demonstrate,prove password.
Wherein, the second son password to be verified can also be fingerprint to be verified or pressing duration to be verified, due to ought the When one son password to be verified be pattern to be verified, the preparation method of second son password to be verified and when first sub to be verified close The method that the second son password to be verified is obtained when code is character string to be verified is identical, and details are not described herein.
In addition, in the embodiment of the present application, when input equipment is mechanical keyboard, first son password to be verified can be with For character string to be verified, second son password to be verified can be pressure value to be verified or pressing duration to be verified.
It is specially below mechanical keyboard with the input equipment, process, which is described in detail, is realized to the application:
It is character string to be verified in the described first son password to be verified, second son password to be verified is pressure to be verified During value, the character string to be verified inputted by mechanical keyboard is obtained, for example, user can be with typing character string by the keyboard " xyz ", wherein, " x " key corresponds to character string " x ", and " y " key corresponds to character string " y ", and " z " key corresponds to character string " z ", is obtaining institute While stating character string, mechanical keyboard can obtain the pressure to be verified of each character in the corresponding character string by sensing device Force value, for example, the corresponding pressure value II to be verified of character " x ", the corresponding pressure value III to be verified of character " y ", character " z " correspondence are to be tested Pressure value I is demonstrate,proved, finally, based on the pressure value to be verified and the character string to be verified, obtains the first password to be verified.
In addition, when the second son password to be verified is the pressing duration to be verified, character string " xyz " to be verified is being obtained While, the pressing duration to be verified for corresponding to each character in the character string can be obtained by sensing device, finally, Based on the pressing duration to be verified and the character string to be verified, the first password to be verified is obtained.
After first password to be verified is obtained, step 103 is performed:By the described second son password to be verified and second Substandard password is matched, and obtains the first matching result.
In specific implementation process, for example, when the second son password to be verified is pressure value to be verified, user can be utilized defeated The size of pressure value intensity to be verified and the order of input entered is matched, for example, user inputs pressure to be verified for the first time Force value is II, and it is III to input pressure value to be verified for the second time, and it is I to input pressure value to be verified for the third time, then will input first time Pressure value to be verified II matched with first reference pressure value being correspondingly arranged, will second input pressure to be verified Value III is matched with second reference pressure value being correspondingly arranged, and will input pressure value I to be verified for the third time with being correspondingly arranged The 3rd reference pressure value matched.
After execution of step 103, step 104 is performed:Described first son password to be verified and the first substandard is close Code is matched, and obtains the second matching result.
In specific implementation process, when the first password to be verified is character string to be verified, the second password to be verified is to be tested When demonstrate,proving pressure value, by least one reference pressure value progress of at least one pressure value to be verified and user setting of acquisition Match somebody with somebody, pressure value matching result is obtained as the first matching result, by the mark of the character string to be verified and user setting of acquisition Quasi- character string is matched, and obtains string matching result as the second matching result.Wherein, in character string to be verified and standard When character string is consistent, show successful match, conversely, then show to match it is unsuccessful, in pressure value to be verified and reference pressure value one During cause, show successful match, conversely, it is then unsuccessful, and, when first and second described matching result shows successful match, Show that the described first password to be verified passes through verification;Show in first matching result and/or second matching result With it is unsuccessful when, show that the described first password to be verified could not pass through verification.
After step 104, the method further includes:
When first matching result shows that second son password to be verified and the second substandard password match fail, Generate and export a prompt message, to prompt second son password to be verified to carry out weight as bad password and/or prompting user New input.
In addition, in implementation process, any two kinds of forms of the second son password to be verified can also be combined, example Such as, when user carries out Password Input operation, while pressure value to be verified input by user and fingerprint to be verified are obtained, and will Pressure value to be verified is matched with reference pressure value, and fingerprint to be verified is matched with standard fingerprint, only twice During with all succeeding, just show that password passes through verification.
Based on same design, one embodiment of the application provides a kind of electronic equipment, and there is the electronic equipment input to set Standby, referring to Fig. 4, the electronic equipment specifically includes:
Detection unit 401, for detecting whether having to be verified close by the input equipment input first of the electronic equipment The Password Input operation of code.
Wherein, the input equipment is specially the soft keyboard or mechanical keyboard shown on touch control unit.
In specific implementation process, detect whether that the Password Input operation is to pass through electronics there are Password Input operation The input equipment of equipment inputs the operation of the first password to be verified.Wherein, the input equipment inputs number for user to computer According to the equipment with information, for example, when electronic equipment is mobile phone, input equipment can be the dummy keyboard on handset touch panel, Can also be the physical keyboard of mobile phone, when electronic equipment is laptop, input equipment can be mechanical keyboard, also may be used Think Trackpad.
In the embodiment of the present application, the electronic equipment further includes:
Obtaining unit 402, for when detecting the Password Input operation, responding the Password Input operation, obtaining First password to be verified, wherein, first password to be verified includes the input equipment and responds the Password Input behaviour The the first son password to be verified made and obtained, and Password Input operation when operating the input equipment with it is described close Relevant second son of the attribute password to be verified of code input operation.
Wherein, first son password to be verified can be character string to be verified, or pattern to be verified, specifically , numeral, letter or symbol can be combined, so as to obtain the character string to be verified, the character string can be with For any digit, for example, df25% or 256091.In addition, the pattern to be verified can be user-defined special graph or hidden The preset of Tibetan, for example, " mouth " shape pattern or " ∵ " shape preset.Second son password to be verified can be pressure to be verified Value, can also fingerprint to be verified, can also be the pressing duration to be verified, specifically, can be according to the big wisp pressure of pressure Force value is divided into some grades, for example, III grade of high-strength press force value, middle II grade of intensity pressure value, I grade of low-intensity pressure value, according to User obtains the pressure value to be verified by the pressure size that input equipment inputs, in addition, being pressed according to user to input equipment Pressure obtains the pressing duration to be verified, for example, pressing is for 2 seconds or pressing is for 3 seconds.
In implementation process, specifically, by taking input equipment is touch control unit as an example, when the described first son password to be verified Specially described character string to be verified and when second son password to be verified is specially the pressure value to be verified, the acquisition Unit 402 specifically includes:
First obtains subelement, for responding the touch control operation, obtains the touch control operation on the touch control unit At least one positional information, and the touch-control behaviour is extremely at least one position of corresponding at least one positional information A few pressure value to be verified;
Second obtains subelement, for based at least one positional information, determining corresponding at least one position At least one character of at least one position of information, and then obtain the character string to be verified for including at least one character;
3rd obtains subelement, for based at least one pressure value to be verified and the character string to be verified, obtaining Obtain first password to be verified.
Subelement, the second acquisition subelement and the 3rd acquisition subelement will be obtained to first by specific example below It is described in detail:
By responding the touch control operation of user, at least one position letter of the touch control operation on touch control unit is obtained Breath, and at least one positional information is based on, determine at least one character of the corresponding positional information, for example, by using The position of " x ", obtains first position information in family touching dummy keyboard, and is based on the first position information, obtains character " x ", can obtain multiple characters input by user in the same way, and then obtain what is be made of multiple characters input by user Character string to be verified, for example, " xyz ".In addition, while response touch control operation obtains the character string to be verified, acquisition pair Answer and at least one treated by what touch control operation applied touch control unit at least one position of at least one positional information Verify pressure value, for example, the pressure value to be verified at character " x " place is II, the pressure value to be verified at character " y " place is III, character The pressure value to be verified at " z " place is I.Finally, based on the pressure value to be verified and the character string to be verified, obtain first and treat Verify password.
In implementation process, when the described first son password to be verified for the character string to be verified and second son it is to be tested When card password is the pressing duration to be verified, the obtaining unit 402 is specifically used for:
Using same method, by responding the touch control operation of user, character string to be verified is obtained, for example, " xyz ", and While the character string to be verified is obtained, the pressing duration to be verified of corresponding each character is obtained, for example, character 2 seconds pressing duration to be verified of " x ", 1 second pressing duration to be verified of character " y ", the pressing to be verified of character " z " 3 seconds duration, finally, based on the pressing duration to be verified and the character string to be verified, it is to be verified to obtain first Password.
In implementation process, when the described first son password to be verified for the character string to be verified and second son it is to be tested When card password is fingerprint to be verified, the obtaining unit 402 is specifically used for:
Using same method, by responding the touch control operation of user, character string to be verified is obtained, for example, " xyz ", and While the character string to be verified is obtained, the fingerprint to be verified of corresponding each character, the fingerprint of corresponding each character are obtained It may be the same or different, for example, the fingerprint of character " x " corresponds to right hand forefinger, the fingerprint of character " y " corresponds to right hand middle finger, The fingerprint of character " z " corresponds to right hand middle finger, finally, based on the fingerprint to be verified and the character string to be verified, obtains first Password to be verified.
In addition, in implementation process, first son password to be verified can also use pattern to be verified, below with first Son password to be verified is pattern to be verified, and the second son password to be verified carries out obtaining unit 402 in detail for pressure value to be verified Description:
By responding the touch control operation of user, at least one position letter of the touch control operation on touch control unit is obtained Breath, and at least one positional information is based on, determine at least one location point of corresponding at least one positional information, and Based at least one location point, obtain pattern to be verified, for example, the pattern to be verified shown in Fig. 3, wherein, it is illustrated that treat Verification pattern includes three location points.In addition, while response touch control operation obtains the pattern to be verified, corresponding institute is obtained State at least one position of at least one positional information touch control unit is applied by touch control operation it is at least one to be verified Pressure value, for example, the pressure value to be verified of first position point is II grade, the pressure value to be verified of second place point is III grade, the The pressure value to be verified of three location points is I grade.Finally, based on the pressure value to be verified and the pattern to be verified, the is obtained One password to be verified.
Wherein, when the first son password to be verified is pattern to be verified, the second son password to be verified can also be to be verified Fingerprint or compressing time to be verified, due to the preparation method of the described second son password to be verified and when the first son password to be verified is The method that the second son password to be verified is obtained during character string to be verified is identical, and details are not described herein.
In addition, in the embodiment of the present application, when input equipment is mechanical keyboard, first son password to be verified can be with For character string to be verified, second son password to be verified can be pressure value to be verified or pressing duration to be verified.
It is specially below mechanical keyboard with the input equipment, process, which is described in detail, is realized to the application:
It is character string to be verified in the described first son password to be verified, second son password to be verified is pressure to be verified During value, the character string to be verified inputted by mechanical keyboard is obtained, for example, user can be with typing character string by the keyboard " xyz ", wherein, " x " key corresponds to character string " x ", and " y " key corresponds to character string " y ", and " z " key corresponds to character string " z ", is obtaining institute While stating character string, mechanical keyboard can obtain the pressure to be verified of each character in the corresponding character string by sensing device Force value, for example, the corresponding pressure value II to be verified of character " x ", the corresponding pressure value III to be verified of character " y ", character " z " correspondence are to be tested Pressure value I is demonstrate,proved, finally, based on the pressure value to be verified and the character string to be verified, obtains the first password to be verified.
In addition, when the second son password to be verified is the pressing duration to be verified, character string " xyz " to be verified is being obtained While, the pressing duration to be verified for corresponding to each character in the character string can be obtained by sensing device, finally, Based on the pressing duration to be verified and the character string to be verified, the first password to be verified is obtained.
In the application implementation process, the electronic equipment further includes:
First matching unit 403, for the described second son password to be verified to be matched with the second substandard password, is obtained Obtain the first matching result.
In specific implementation process, for example, when the second son password to be verified is pressure value to be verified, user can be utilized defeated The size of pressure value intensity to be verified and the order of input entered is matched, for example, user inputs pressure to be verified for the first time Force value is II, and it is III to input pressure value to be verified for the second time, and it is I to input pressure value to be verified for the third time, then will input first time Pressure value to be verified II matched with first reference pressure value being correspondingly arranged, will second input pressure to be verified Value III is matched with second reference pressure value being correspondingly arranged, and will input pressure value I to be verified for the third time with being correspondingly arranged The 3rd reference pressure value matched.
Second matching unit, for the described first son password to be verified to be matched with the first substandard password, obtains Second matching result.
In specific implementation process, when the first password to be verified is character string to be verified, the second password to be verified is to be tested When demonstrate,proving pressure value, the first matching unit is specially pressure value matching unit, and the second matching unit 403 is specially string matching list Member.Wherein, when pressure value to be verified is consistent with reference pressure value, successful match is shown, conversely, it is then unsuccessful, to be verified When character string is consistent with standard characters, show successful match, conversely, then show to match it is unsuccessful, and, described first and When two matching results show successful match, show that the described first password to be verified passes through verification;In first matching result And/or second matching result shows that the described first password to be verified could not pass through verification when showing to match unsuccessful.
In the application implementation process, the electronic equipment further includes:
Prompt unit, for showing that second son password to be verified and the second substandard are close in first matching result Code is generated and exports a prompt message when it fails to match, to prompt second son password to be verified as bad password and/or carry Show that user is re-entered.
In addition, in implementation process, any two kinds of forms of the second son password to be verified can also be combined, example Such as, when user carries out Password Input operation, while pressure value to be verified input by user and fingerprint to be verified are obtained, and will Pressure value to be verified is matched with reference pressure value, and fingerprint to be verified is matched with standard fingerprint, only twice During with all succeeding, just show that password passes through verification.
Since the electronic equipment that the present embodiment is introduced is to implement in the embodiment of the present application used by information processing method Electronic equipment, so based on information processing method in the embodiment of the present application, those skilled in the art can understand the application The embodiment of electronic equipment and its various change form in embodiment, so no longer detailed for the electronic equipment herein It is thin to introduce.As long as those skilled in the art implement in the embodiment of the present application electronic equipment used by information processing method, Belong to the scope to be protected of the application.
The one or more technical solutions provided in the embodiment of the present application, have at least the following technical effects or advantages:
It is to be verified by the input equipment input first of the electronic equipment by detecting whether in the embodiment of the present invention The Password Input operation of password;When detecting Password Input operation, the Password Input operation is responded, obtains described the One password to be verified, wherein, first password to be verified includes the input equipment and responds the Password Input operation and obtain The first son password to be verified, and Password Input operation when operating the input equipment with the Password Input Relevant second son of the attribute password to be verified of operation;By the described second son password to be verified and the progress of the second substandard password Match somebody with somebody, obtain the first matching result, solve in the prior art when inputting password, position and the pattern of password can be seen by people, The technical problem that existing password is easily cracked, realizes lifting password and cracks difficulty, and be not easy when inputting password by People sees the technique effect of password;
And then since password is not easy to be cracked, solves the low technical problem of cipher safety in the prior art, realize Improve the technique effect of cipher safety.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art God and scope.In this way, if these modifications and changes of the present invention belongs to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these modification and variations.

Claims (6)

  1. A kind of 1. method for verifying password, applied in electronic equipment, it is characterised in that the described method includes:
    The Password Input for detecting whether to input the first password to be verified by the input equipment of the electronic equipment operates;
    When detecting the Password Input operation, the Password Input operation is responded, obtains first password to be verified, its In, it is to be verified that first password to be verified includes the first son that the input equipment responds the Password Input operation and obtains Password, and Password Input operation are relevant with the attribute of Password Input operation when operating the input equipment Second son password to be verified;
    Described second son password to be verified is matched with the second substandard password, obtains the first matching result;
    When first matching result shows that second son password to be verified and the second substandard password match fail, generation And a prompt message is exported, to prompt second son password to be verified again defeated as bad password and/or prompting user's progress Enter;
    Wherein, when the input equipment is mechanical keyboard, first son password to be verified is specially character string to be verified, described Second son password to be verified is specially pressure value to be verified or pressing duration to be verified.
  2. 2. the method as described in claim 1, it is characterised in that mark the described second son password to be verified and the second son described Quasi- password is matched, and after obtaining the first matching result, the method further includes:
    Described first son password to be verified is matched with the first substandard password, obtains the second matching result;
    Wherein, when first and second described matching result shows successful match, show that the described first password to be verified passes through Verification;When first matching result and/or second matching result show to match unsuccessful, show that described first is to be tested Card password could not pass through verification.
  3. 3. the method as described in claim 1, it is characterised in that when the described first password to be verified is specially the word to be verified When symbol is gone here and there and second son password to be verified is specially the pressure value to be verified, the response Password Input operation, The described first password to be verified is obtained, is specifically included:
    The Password Input operation is responded, obtains at least one position letter of the Password Input operation on the mechanical keyboard The Password Input operation is at least one to be tested at breath, and at least one position of corresponding at least one positional information Demonstrate,prove pressure value;
    Based at least one positional information, at least one position of corresponding at least one positional information is determined at least One character, and then obtain the character string to be verified for including at least one character;
    Based at least one pressure value to be verified and the character string to be verified, first password to be verified is obtained.
  4. 4. a kind of electronic equipment, it is characterised in that including:
    Detection unit, for detecting whether there is the password that the first password to be verified is inputted by the input equipment of the electronic equipment Input operation;
    Obtaining unit, for when detecting the Password Input operation, responding the Password Input operation, obtaining described first Password to be verified, wherein, first password to be verified includes the input equipment and responds the Password Input operation and obtain The first son password to be verified, and Password Input operation when operate the input equipment with Password Input behaviour Relevant second son of the attribute password to be verified of work;
    First matching unit, for the described second son password to be verified to be matched with the second substandard password, obtains first Matching result;
    Prompt unit, for showing second son password to be verified and the second substandard password in first matching result During with failure, generate and export a prompt message, to prompt second son password to be verified to be used as bad password and/or prompting Family is re-entered;
    Wherein, when the input equipment is mechanical keyboard, first son password to be verified is specially character string to be verified, institute It is specially pressure value to be verified or pressing duration to be verified to state the second son password to be verified.
  5. 5. electronic equipment as claimed in claim 4, it is characterised in that the electronic equipment further includes:
    Second matching unit, for the described first son password to be verified to be matched with the first substandard password, obtains second Matching result;
    Wherein, when first and second described matching result shows successful match, show that the described first password to be verified passes through Verification;When first matching result and/or second matching result show to match unsuccessful, show that described first is to be tested Card password could not pass through verification.
  6. 6. electronic equipment as claimed in claim 4, it is characterised in that when the described first password to be verified is specially described to be tested When to demonstrate,prove character string and second son password to be verified be specially the pressure value to be verified, the obtaining unit specifically includes:
    First obtains subelement, for responding the Password Input operation, obtains the Password Input operation in the mechanical keys The password is defeated at least one positional information on disk, and at least one position of corresponding at least one positional information Enter at least one pressure value to be verified of operation;
    Second obtains subelement, for based at least one positional information, determining corresponding at least one positional information At least one position at least one character, and then obtain and include the character string to be verified of at least one character;
    3rd obtains subelement, for based at least one pressure value to be verified and the character string to be verified, obtaining institute State the first password to be verified.
CN201210541372.6A 2012-12-13 2012-12-13 A kind of method and electronic equipment for verifying password Active CN103870744B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210541372.6A CN103870744B (en) 2012-12-13 2012-12-13 A kind of method and electronic equipment for verifying password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210541372.6A CN103870744B (en) 2012-12-13 2012-12-13 A kind of method and electronic equipment for verifying password

Publications (2)

Publication Number Publication Date
CN103870744A CN103870744A (en) 2014-06-18
CN103870744B true CN103870744B (en) 2018-04-27

Family

ID=50909268

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210541372.6A Active CN103870744B (en) 2012-12-13 2012-12-13 A kind of method and electronic equipment for verifying password

Country Status (1)

Country Link
CN (1) CN103870744B (en)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488437A (en) * 2014-09-19 2016-04-13 阿尔卡特朗讯公司 Password input device and method
CN104618498A (en) * 2015-02-13 2015-05-13 深圳市创梦天地科技有限公司 Data resource synchronizing method and server
CN104899494B (en) * 2015-05-29 2017-12-22 努比亚技术有限公司 Method of controlling operation thereof and mobile terminal based on multifunction push key
CN104915606A (en) * 2015-05-29 2015-09-16 努比亚技术有限公司 File encryption and decryption methods and devices
CN104951684A (en) * 2015-06-18 2015-09-30 广东欧珀移动通信有限公司 Fingerprint encryption and decryption method and terminal
CN105069360B (en) * 2015-08-27 2019-04-09 Oppo广东移动通信有限公司 A kind of file encryption, decryption method and terminal
CN105184126A (en) * 2015-08-27 2015-12-23 广东欧珀移动通信有限公司 Password setting method, authentication method and terminal
CN105160228A (en) * 2015-08-27 2015-12-16 广东欧珀移动通信有限公司 Mobile terminal unlocking method and mobile terminal
CN105302439A (en) * 2015-10-16 2016-02-03 宇龙计算机通信科技(深圳)有限公司 Shortcut operation method and terminal
CN105468952A (en) * 2015-11-17 2016-04-06 腾讯科技(深圳)有限公司 Authentication method and apparatus
US10657244B2 (en) 2015-10-26 2020-05-19 Tencent Technology (Shenzhen) Company Limited Identity authentication method and apparatus
CN105447353B (en) * 2015-11-03 2018-01-16 广东欧珀移动通信有限公司 Password Input verification method and system
CN105404460A (en) * 2015-11-27 2016-03-16 上海与德通讯技术有限公司 Key input detection method and module
CN105791531B (en) * 2015-12-24 2019-03-08 广东小天才科技有限公司 A kind of setting method and system of intelligent terminal difference startup password
CN105809022A (en) * 2016-03-07 2016-07-27 苏州佳世达电通有限公司 Password verification method and electronic apparatus
CN106096345A (en) * 2016-05-26 2016-11-09 中国银联股份有限公司 Method of password authentication based on keyboard and the device realizing the method
CN107239719B (en) * 2017-06-05 2021-04-02 中国农业银行股份有限公司 Characteristic data generating device, card reader, data processing system and method
CN109960914A (en) * 2017-12-26 2019-07-02 航天信息股份有限公司 A kind of verification method and equipment
CN108629174B (en) * 2018-05-08 2022-06-07 创新先进技术有限公司 Method and device for checking character strings
KR102176378B1 (en) * 2018-12-07 2020-11-10 현대오트론 주식회사 Method and apparatus for enhancing security of vehicle controller
CN111915782A (en) * 2020-02-27 2020-11-10 宁波大学 Intelligent door safety control method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1940803A (en) * 2005-09-30 2007-04-04 联想(北京)有限公司 Data encryption storage method
CN101556636A (en) * 2009-03-06 2009-10-14 上海凌锐信息技术有限公司 Biometric recognition device combining body capacitance with handwriting identification and realizing method thereof
CN102685106A (en) * 2012-03-27 2012-09-19 北京百纳威尔科技有限公司 Safety verification method and equipment
CN103714278A (en) * 2012-09-29 2014-04-09 北京三星通信技术研究有限公司 Password authentication method and password authentication device of terminal equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1940803A (en) * 2005-09-30 2007-04-04 联想(北京)有限公司 Data encryption storage method
CN101556636A (en) * 2009-03-06 2009-10-14 上海凌锐信息技术有限公司 Biometric recognition device combining body capacitance with handwriting identification and realizing method thereof
CN102685106A (en) * 2012-03-27 2012-09-19 北京百纳威尔科技有限公司 Safety verification method and equipment
CN103714278A (en) * 2012-09-29 2014-04-09 北京三星通信技术研究有限公司 Password authentication method and password authentication device of terminal equipment

Also Published As

Publication number Publication date
CN103870744A (en) 2014-06-18

Similar Documents

Publication Publication Date Title
CN103870744B (en) A kind of method and electronic equipment for verifying password
CN102982269A (en) Anti-peeping code authentication method and anti-peeping code authentication system based on biological metering characteristics
Yan et al. Designing leakage-resilient password entry on touchscreen mobile devices
EP3304395B1 (en) Encoding methods and systems
CN104134032B (en) The anti-peeping coding lock system and unlocking method that a kind of view-based access control model is obscured
US20050193208A1 (en) User authentication
CN109033771B (en) System and method for PIN entry on a mobile device
CN104063169B (en) Unlocking method based on touch screen
CN101813992A (en) Touch screen and password-inputting method thereof
CN104008326B (en) Device and method for management terminal safety
CN103996011A (en) Method and device for protecting codes to be input safely
JP4317359B2 (en) Authentication system
CN105354458B (en) Password Input verification method and system
CN106534479A (en) Cell phone password protection system based on implicit code identification and implicit conversion
CN105447353B (en) Password Input verification method and system
JP5645723B2 (en) Authentication server, authentication system, and server authentication method
WO2016201872A1 (en) Encryption method, decryption method and electronic device
CN106407847A (en) Unlocking method and apparatus
US20180349592A1 (en) Beat assisted temporal pressure password
CN113672886A (en) Prompting method and device
CN107423644B (en) Peep-proof touch feedback password input system and method
KR101319941B1 (en) User authentication system by using touch pattern
CN110837628B (en) Encryption and decryption method and device for terminal equipment, computer equipment and storage medium
CN201100887Y (en) Non-specific separated hand password-spy prevention input device
Seyed et al. CipherCard: Enhancing Security on Common Touchscreen Devices using Two-factor Authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant