CN104680049B - A kind of unlocking method - Google Patents
A kind of unlocking method Download PDFInfo
- Publication number
- CN104680049B CN104680049B CN201510112112.0A CN201510112112A CN104680049B CN 104680049 B CN104680049 B CN 104680049B CN 201510112112 A CN201510112112 A CN 201510112112A CN 104680049 B CN104680049 B CN 104680049B
- Authority
- CN
- China
- Prior art keywords
- password
- triggering
- attribute
- unlocking method
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 20
- 238000012216 screening Methods 0.000 claims 2
- 230000000007 visual effect Effects 0.000 claims 2
- 230000001960 triggered effect Effects 0.000 abstract description 7
- 230000003796 beauty Effects 0.000 abstract description 2
- 230000033001 locomotion Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 210000000988 bone and bone Anatomy 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000000052 comparative effect Effects 0.000 description 1
- 230000001351 cycling effect Effects 0.000 description 1
- 230000008921 facial expression Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
Landscapes
- Storage Device Security (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The present invention is a kind of unlocking method, its can peep-proof, improve password security, suitable icon and Background matching can be selected, make the more harmonious beauty of unlock interface.This method carries out Password Input by the triggering of icon.One or more, which are chosen, in the derivative attribute produced from the attribute of icon and change is used as cryptographic properties.When icon is triggered, the corresponding state of all properties and variable quantity will be transferred to password authentication unit when it is triggered.Password unit verifies that non-cryptographic properties can cover up cryptographic properties to the corresponding state of cryptographic properties and variable quantity.When triggering icon in the correct order, input password is all correct, unlocks successfully.
Description
Technical field
The present invention relates to technical field of electronic equipment, more particularly to the method for the unlock of screen and software.
Background technology
Present unlocking manner is mainly keyboard unlock, gesture unlock, and security is poor, is easily recorded by onlooker.
Lack independent cipher mode, stolen by hacker.
The unlocking method of present software is relatively simple, and interface is more stiff, and inadequate harmony is beautiful.
The content of the invention
The present invention is a kind of unlocking method, it can improve the security of password, peep-proof, unlock interface more harmony U.S.
See.From the attribute of icon(Such as:Appearance, shape, size, position, direction, action, expression, filter, brightness, light, the face of icon
Color, transparency, contrast, clarity)The derivative attribute produced with change(Such as:Statistic, comparative quantity)It is middle to choose one kind or more
Kind is used as cryptographic properties.When icon is triggered(Triggered comprising relevance, such as:Button triggers), all properties correspond to when it is triggered
State and variable quantity will be transferred to password authentication unit.Password unit to the corresponding state of cryptographic properties and variable quantity into
Row verification, non-cryptographic properties can cover up cryptographic properties.When triggering icon in the correct order, input password is all correct, unlock
Success.
Icon contains more attribute, therefore the transmission of a variety of properties secrets can be used to be encrypted.
The diversity of icon makes icon design more be matched with background, is the more harmonious beauty in interface.
Brief description of the drawings
A further understanding of the present invention in conjunction with the accompanying drawings, in the accompanying drawings:
Fig. 1 is according to embodiments of the present invention 1 user's " cryptographic properties " setting interface.
Fig. 2 is according to embodiments of the present invention 1 user cipher setting interface.
Fig. 3 is according to embodiments of the present invention 1 user cipher inputting interface.
Fig. 4 is according to embodiments of the present invention 2 user's " cryptographic properties " setting interface.
Fig. 5 is the interface after according to embodiments of the present invention 2 " cryptographic properties " selection.
Fig. 6 is according to embodiments of the present invention 2 and 3 password setting and log-in interface.
Embodiment
It is described with reference to the drawings that the present invention is further described with embodiment
Embodiment 1:
Example title:Racing car(Password contains more icon list attributes)
Setting in program:Trolley is that can trigger icon, and trolley has four kinds of variable attributes:Ranking(Produced based on change in location
Raw variable quantity), racing track, ranking lifting number(Based on ranking to proportion), appearance.
When trolley is triggered every time, the current state of its all properties and variable quantity will be transmitted to authentication unit, " touch
Hair number " increases once and is prompted at interface.The change to attributes of all icons carries out once random change.
It is required that:Two passwords that one cryptographic properties is " ranking " are set(Triggering is twice).
Setting up procedure:First, " cryptographic properties " selection is carried out into Fig. 1, selected " ranking ", clicked on " setting ".
2nd, into Fig. 2, a trolley is clicked on, the current state of its all attribute is all sent to authentication unit, verifies
Unit is only by its " ranking "(Suspense is " X ")Typing is first of password.
3rd, the variable attribute of all trolleies is all changed at random, then clicks on a trolley, its " ranking "(Suspense is
“Y”)Equally it is verified the second that unit typing is password.
4th, click on and complete, into Fig. 3.
5th,(Test password)Find first and click on the trolley that " ranking " is " X ", all change to attributes of this trolley are worked as
Preceding state is all transferred to authentication unit, and authentication unit is only verified " ranking " of trolley with first, the password set.
6th, after trolley is clicked, " triggering times " increase once, and all trolleies will random distribution again.
7th, find the trolley that " ranking " is " Y " to be clicked on, authentication unit carries out password second verification.
8th, when input password is with setting password to match completely, password is set successfully.
Unlock:Unlock content and test content is essentially identical, be all switched to mobile phone homepage after matching.Continue if mismatching
It is switched to the 6th step.When " triggering times " reach the upper limit, the password of input is removed, re-entered automatically.
When user has found input error, " replacement " can be clicked on, re-enters password.
Embodiment 2:
Example title:Chinese Wushu 1(The more attributes of password mark containing free hand drawing, suitable for smaller screen smart machine, such as:Intelligent watch,
Coded lock)
Setting in program:Wu Zhewei can trigger icon, and military person has five change to attributes:Quadruped locomotion, facial expression.
Military person's persistent movement, its five change to attributes are with motion change.When military person is triggered, five attributes works as
Preceding state will be transmitted to authentication unit.
It is required that:One two password being made of multiple cryptographic properties is set(Triggering is twice).
Setting up procedure:First, " cryptographic properties " and " replacement " command selection is carried out into Fig. 4, makes the setting such as Fig. 5, point
Hit " setting ".
2nd, automatically into Fig. 6, force person, its all change to attributes are clicked on(Four limbs posture and expression)Current state all
It is sent to authentication unit, authentication unit is by the posture of its left arm(Suspense is " under stretch ")Typing is first of password.
3rd, force person continues to move, then clicks on military person, its all change to attributes(Four limbs posture and expression)Current state
All it is sent to authentication unit, authentication unit is by the posture of its right arm(Suspense is " upper lift ")Typing is the second of password.
4th, click on and complete to enter Fig. 6.
5th,(Test password)The action of the left arm of military person is looked first at, as military person's left arm " under stretch ", clicks on force person, force
All states of person are all transferred to authentication unit, and authentication unit carries out the action of military person's left arm with first, the password set
Verification.
6th, after force person clicks on, once force person continues to move for " triggering times " increase,.
7th, continue to observe the action of military person, when military person's right arm " upper lift ", click on force person, all states of military person all by
Authentication unit is transferred to, authentication unit is verified the action of military person's right arm with the password second set.
8th, when input password is with setting password all to match, password is set successfully.
Unlock:Unlock content and test content is essentially identical, all unlock after matching.If mismatch continues cycling through the
Six steps, the 7th step, " triggering times " are added up always, password miscue just occur when beyond scope of statistics.
When user has found input error, can long-press " military person ", activate " replacement " function, password re-enters.
Embodiment 3:
Example title:Chinese Wushu 2(Password contains more sub-icons, guided bone change)
Setting in program:Wu Zhewei can trigger icon, and military person has four sub-icons.
Military person's action(The change of i.e. four sub- picture mark positions)Need what manual guidance was completed.When a guiding has acted
Into so the state of icon will be transmitted to authentication unit.
It is required that:Two passwords of one guided bone are set(Guide twice).
Setting up procedure:First, into Fig. 6, the position of military person's four limbs is random, and the left arm for pinning military person drags to and wants to set
The position put(Suspense is " under stretch "), unclamp, military person institute is stateful to be all sent to authentication unit, and authentication unit is by its left arm
Position typing is first of password.
2nd, right arm is pinned again drag to the position wanted to set up(Suspense is " upper lift "), unclamp, military person institute it is stateful all by
It is transmitted to authentication unit, second of the authentication unit by the position typing of its right arm for password.
3rd,(Test password)Fig. 6 is reentered, the left arm for pinning military person drags to lower position, completes the dynamic of " under stretch "
Make, all states of military person are all transferred to authentication unit, and authentication unit is by the position of military person's left arm and the password first that sets
Verified position.
6th, the right arm for pinning military person again drags to top position, completes the action of " upper lift ", all states of military person are all
Authentication unit is transferred to, authentication unit is verified the position of military person's right arm with the password second set.
7th, when input password is with setting password all to match, password is set successfully.
Unlock:Unlock content and test content is essentially identical, all unlock after matching.
Claims (7)
1. a kind of unlocking method, it is characterised in that the described method comprises the following steps:
When setting password, user needs to complete the setting of effective attribute screening rule;
User carries out Password Inputs by triggering more attribute graphs, every time triggering all generate one group be made of multiple attributes it is visual
Password;
System obtains the corresponding parameter of effective attribute according to effective attribute screening rule of setting and is made from visual password
For the valid password of this triggering;
User completes the input of whole password by repeatedly triggering;
In whole releasing process, the corresponding parameter of the multiple attributes of figure at least changes once at random.
2. a kind of unlocking method as claimed in claim 1, it is characterised in that the triggering, is to trigger to realize by relevance
's.
3. a kind of unlocking method as claimed in claim 1, it is characterised in that the triggering also specifically includes:User guides figure
Shape changes, so as to obtain oneself required parameter.
4. a kind of unlocking method as claimed in claim 1, it is characterised in that graphic attribute further includes:Spread out according to existing attribute
The new attribute born.
5. a kind of unlocking method as claimed in claim 1, it is characterised in that the change of graphic attribute parameter includes:Obtain new
Unlock interface, into changing when changing automatically after unlock interface, triggering.
6. a kind of unlocking method as claimed in claim 1, it is characterised in that system is counted simultaneously to having inputted password digit
Provide prompting.
7. a kind of unlocking method as claimed in claim 1, it is characterised in that user can terminate input in input process
And the input operation of early period is deleted, re-start Password Input.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510112112.0A CN104680049B (en) | 2015-04-03 | 2015-04-03 | A kind of unlocking method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510112112.0A CN104680049B (en) | 2015-04-03 | 2015-04-03 | A kind of unlocking method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104680049A CN104680049A (en) | 2015-06-03 |
CN104680049B true CN104680049B (en) | 2018-04-17 |
Family
ID=53315081
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510112112.0A Expired - Fee Related CN104680049B (en) | 2015-04-03 | 2015-04-03 | A kind of unlocking method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104680049B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107423589A (en) * | 2016-05-24 | 2017-12-01 | 阿里巴巴集团控股有限公司 | A kind of cipher-code input method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101499905A (en) * | 2008-02-02 | 2009-08-05 | 诚实科技股份有限公司 | Image password authentication system for mobile device and method therefor |
CN103413103A (en) * | 2013-08-30 | 2013-11-27 | 任建军 | System and method for inputting graphical passwords |
CN104134032A (en) * | 2014-07-30 | 2014-11-05 | 黄伟强 | Anti-peeping coded lock system based on visional confusion and anti-peeing unlocking method based on visional confusion |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8176332B2 (en) * | 2007-02-15 | 2012-05-08 | Christopher Nathan Drake | Computer security using visual authentication |
CN101877042A (en) * | 2009-04-30 | 2010-11-03 | 鸿富锦精密工业(深圳)有限公司 | Password protection method |
CN102566861A (en) * | 2010-12-17 | 2012-07-11 | 安徽康佳同创电器有限公司 | Electronic terminal, and touch unlocking method and touch unlocking setting method for electronic terminal |
CN102306260B (en) * | 2011-08-09 | 2013-10-23 | 北京哈工大计算机网络与信息安全技术研究中心 | Method and device for inputting password |
US8959619B2 (en) * | 2011-12-21 | 2015-02-17 | Fleet One, Llc. | Graphical image password authentication method |
CN103971045A (en) * | 2013-01-25 | 2014-08-06 | 苏州精易会信息技术有限公司 | Click type verification code implementation method |
-
2015
- 2015-04-03 CN CN201510112112.0A patent/CN104680049B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101499905A (en) * | 2008-02-02 | 2009-08-05 | 诚实科技股份有限公司 | Image password authentication system for mobile device and method therefor |
CN103413103A (en) * | 2013-08-30 | 2013-11-27 | 任建军 | System and method for inputting graphical passwords |
CN104134032A (en) * | 2014-07-30 | 2014-11-05 | 黄伟强 | Anti-peeping coded lock system based on visional confusion and anti-peeing unlocking method based on visional confusion |
Also Published As
Publication number | Publication date |
---|---|
CN104680049A (en) | 2015-06-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104156652B (en) | It is blurred the method and cryptographic check equipment of verification password | |
KR101142796B1 (en) | Password Input Method Based on touch screen | |
DE112015002332T5 (en) | Interactive textiles | |
CN103677644A (en) | Unlocking method and system for smart mobile terminal | |
CN103823572B (en) | Data entry device, data input device and electronic equipment | |
CN108664177A (en) | A kind of method and apparatus that application is opened based on fingerprint recognition | |
KR20090014803A (en) | Method and apparatus for using osk by input device | |
US20190018444A1 (en) | Wearable apparatus and method for controlling vr apparatus | |
CN103077342A (en) | Method for inputting graphic random passwords | |
TW201331788A (en) | Method of performing a switching operation through a gesture inputted to an electronic device | |
US9032508B2 (en) | Pattern password trajectory configuration system and method using the same | |
CN103389870B (en) | A kind of unlocking method and device of touch screen | |
CN106951159A (en) | A kind of terminal unlocking rapidly enters the method and terminal of application program | |
CN104966017B (en) | A kind of Password Input protects system and method | |
CN104680049B (en) | A kind of unlocking method | |
CN103246467A (en) | Terminal and terminal control method | |
CN102629159B (en) | Implementation method that remote controller analog mouse moves and device | |
JP2018527053A (en) | Game handle control method to support Android games | |
CN103067782B (en) | A kind of bimanual input interactive operation processing method and system based on intelligent television | |
CZ309308B6 (en) | A method of entering classified information into electronic digital devices | |
CN106022084B (en) | The method and device that a kind of pair of screen is unlocked | |
CN105138220B (en) | A kind of pattern unlocking method and device | |
CN105160221A (en) | Unlocking method and system of electronic equipment | |
CN105224212A (en) | A kind of terminal screen unlock method, device and terminal | |
CN106815500A (en) | Information processing method, information processor and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20180606 Address after: 266041 1, unit 40, yongqingyuan community, No. 22 Shengping East Road, Licang District, Qingdao, Shandong. Patentee after: Laixi green seedling science and technology studio Address before: 266606 No. 119, one village, Xia Ge Zhuang Town, Laixi, Qingdao, Shandong Patentee before: Yu Ruiqing |
|
TR01 | Transfer of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180417 Termination date: 20210403 |
|
CF01 | Termination of patent right due to non-payment of annual fee |