CN104680049B - A kind of unlocking method - Google Patents

A kind of unlocking method Download PDF

Info

Publication number
CN104680049B
CN104680049B CN201510112112.0A CN201510112112A CN104680049B CN 104680049 B CN104680049 B CN 104680049B CN 201510112112 A CN201510112112 A CN 201510112112A CN 104680049 B CN104680049 B CN 104680049B
Authority
CN
China
Prior art keywords
password
triggering
attribute
unlocking method
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510112112.0A
Other languages
Chinese (zh)
Other versions
CN104680049A (en
Inventor
于瑞清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Laixi Green Seedling Science And Technology Studio
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201510112112.0A priority Critical patent/CN104680049B/en
Publication of CN104680049A publication Critical patent/CN104680049A/en
Application granted granted Critical
Publication of CN104680049B publication Critical patent/CN104680049B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present invention is a kind of unlocking method, its can peep-proof, improve password security, suitable icon and Background matching can be selected, make the more harmonious beauty of unlock interface.This method carries out Password Input by the triggering of icon.One or more, which are chosen, in the derivative attribute produced from the attribute of icon and change is used as cryptographic properties.When icon is triggered, the corresponding state of all properties and variable quantity will be transferred to password authentication unit when it is triggered.Password unit verifies that non-cryptographic properties can cover up cryptographic properties to the corresponding state of cryptographic properties and variable quantity.When triggering icon in the correct order, input password is all correct, unlocks successfully.

Description

A kind of unlocking method
Technical field
The present invention relates to technical field of electronic equipment, more particularly to the method for the unlock of screen and software.
Background technology
Present unlocking manner is mainly keyboard unlock, gesture unlock, and security is poor, is easily recorded by onlooker.
Lack independent cipher mode, stolen by hacker.
The unlocking method of present software is relatively simple, and interface is more stiff, and inadequate harmony is beautiful.
The content of the invention
The present invention is a kind of unlocking method, it can improve the security of password, peep-proof, unlock interface more harmony U.S. See.From the attribute of icon(Such as:Appearance, shape, size, position, direction, action, expression, filter, brightness, light, the face of icon Color, transparency, contrast, clarity)The derivative attribute produced with change(Such as:Statistic, comparative quantity)It is middle to choose one kind or more Kind is used as cryptographic properties.When icon is triggered(Triggered comprising relevance, such as:Button triggers), all properties correspond to when it is triggered State and variable quantity will be transferred to password authentication unit.Password unit to the corresponding state of cryptographic properties and variable quantity into Row verification, non-cryptographic properties can cover up cryptographic properties.When triggering icon in the correct order, input password is all correct, unlock Success.
Icon contains more attribute, therefore the transmission of a variety of properties secrets can be used to be encrypted.
The diversity of icon makes icon design more be matched with background, is the more harmonious beauty in interface.
Brief description of the drawings
A further understanding of the present invention in conjunction with the accompanying drawings, in the accompanying drawings:
Fig. 1 is according to embodiments of the present invention 1 user's " cryptographic properties " setting interface.
Fig. 2 is according to embodiments of the present invention 1 user cipher setting interface.
Fig. 3 is according to embodiments of the present invention 1 user cipher inputting interface.
Fig. 4 is according to embodiments of the present invention 2 user's " cryptographic properties " setting interface.
Fig. 5 is the interface after according to embodiments of the present invention 2 " cryptographic properties " selection.
Fig. 6 is according to embodiments of the present invention 2 and 3 password setting and log-in interface.
Embodiment
It is described with reference to the drawings that the present invention is further described with embodiment
Embodiment 1:
Example title:Racing car(Password contains more icon list attributes)
Setting in program:Trolley is that can trigger icon, and trolley has four kinds of variable attributes:Ranking(Produced based on change in location Raw variable quantity), racing track, ranking lifting number(Based on ranking to proportion), appearance.
When trolley is triggered every time, the current state of its all properties and variable quantity will be transmitted to authentication unit, " touch Hair number " increases once and is prompted at interface.The change to attributes of all icons carries out once random change.
It is required that:Two passwords that one cryptographic properties is " ranking " are set(Triggering is twice).
Setting up procedure:First, " cryptographic properties " selection is carried out into Fig. 1, selected " ranking ", clicked on " setting ".
2nd, into Fig. 2, a trolley is clicked on, the current state of its all attribute is all sent to authentication unit, verifies Unit is only by its " ranking "(Suspense is " X ")Typing is first of password.
3rd, the variable attribute of all trolleies is all changed at random, then clicks on a trolley, its " ranking "(Suspense is “Y”)Equally it is verified the second that unit typing is password.
4th, click on and complete, into Fig. 3.
5th,(Test password)Find first and click on the trolley that " ranking " is " X ", all change to attributes of this trolley are worked as Preceding state is all transferred to authentication unit, and authentication unit is only verified " ranking " of trolley with first, the password set.
6th, after trolley is clicked, " triggering times " increase once, and all trolleies will random distribution again.
7th, find the trolley that " ranking " is " Y " to be clicked on, authentication unit carries out password second verification.
8th, when input password is with setting password to match completely, password is set successfully.
Unlock:Unlock content and test content is essentially identical, be all switched to mobile phone homepage after matching.Continue if mismatching It is switched to the 6th step.When " triggering times " reach the upper limit, the password of input is removed, re-entered automatically.
When user has found input error, " replacement " can be clicked on, re-enters password.
Embodiment 2:
Example title:Chinese Wushu 1(The more attributes of password mark containing free hand drawing, suitable for smaller screen smart machine, such as:Intelligent watch, Coded lock)
Setting in program:Wu Zhewei can trigger icon, and military person has five change to attributes:Quadruped locomotion, facial expression.
Military person's persistent movement, its five change to attributes are with motion change.When military person is triggered, five attributes works as Preceding state will be transmitted to authentication unit.
It is required that:One two password being made of multiple cryptographic properties is set(Triggering is twice).
Setting up procedure:First, " cryptographic properties " and " replacement " command selection is carried out into Fig. 4, makes the setting such as Fig. 5, point Hit " setting ".
2nd, automatically into Fig. 6, force person, its all change to attributes are clicked on(Four limbs posture and expression)Current state all It is sent to authentication unit, authentication unit is by the posture of its left arm(Suspense is " under stretch ")Typing is first of password.
3rd, force person continues to move, then clicks on military person, its all change to attributes(Four limbs posture and expression)Current state All it is sent to authentication unit, authentication unit is by the posture of its right arm(Suspense is " upper lift ")Typing is the second of password.
4th, click on and complete to enter Fig. 6.
5th,(Test password)The action of the left arm of military person is looked first at, as military person's left arm " under stretch ", clicks on force person, force All states of person are all transferred to authentication unit, and authentication unit carries out the action of military person's left arm with first, the password set Verification.
6th, after force person clicks on, once force person continues to move for " triggering times " increase,.
7th, continue to observe the action of military person, when military person's right arm " upper lift ", click on force person, all states of military person all by Authentication unit is transferred to, authentication unit is verified the action of military person's right arm with the password second set.
8th, when input password is with setting password all to match, password is set successfully.
Unlock:Unlock content and test content is essentially identical, all unlock after matching.If mismatch continues cycling through the Six steps, the 7th step, " triggering times " are added up always, password miscue just occur when beyond scope of statistics.
When user has found input error, can long-press " military person ", activate " replacement " function, password re-enters.
Embodiment 3:
Example title:Chinese Wushu 2(Password contains more sub-icons, guided bone change)
Setting in program:Wu Zhewei can trigger icon, and military person has four sub-icons.
Military person's action(The change of i.e. four sub- picture mark positions)Need what manual guidance was completed.When a guiding has acted Into so the state of icon will be transmitted to authentication unit.
It is required that:Two passwords of one guided bone are set(Guide twice).
Setting up procedure:First, into Fig. 6, the position of military person's four limbs is random, and the left arm for pinning military person drags to and wants to set The position put(Suspense is " under stretch "), unclamp, military person institute is stateful to be all sent to authentication unit, and authentication unit is by its left arm Position typing is first of password.
2nd, right arm is pinned again drag to the position wanted to set up(Suspense is " upper lift "), unclamp, military person institute it is stateful all by It is transmitted to authentication unit, second of the authentication unit by the position typing of its right arm for password.
3rd,(Test password)Fig. 6 is reentered, the left arm for pinning military person drags to lower position, completes the dynamic of " under stretch " Make, all states of military person are all transferred to authentication unit, and authentication unit is by the position of military person's left arm and the password first that sets Verified position.
6th, the right arm for pinning military person again drags to top position, completes the action of " upper lift ", all states of military person are all Authentication unit is transferred to, authentication unit is verified the position of military person's right arm with the password second set.
7th, when input password is with setting password all to match, password is set successfully.
Unlock:Unlock content and test content is essentially identical, all unlock after matching.

Claims (7)

1. a kind of unlocking method, it is characterised in that the described method comprises the following steps:
When setting password, user needs to complete the setting of effective attribute screening rule;
User carries out Password Inputs by triggering more attribute graphs, every time triggering all generate one group be made of multiple attributes it is visual Password;
System obtains the corresponding parameter of effective attribute according to effective attribute screening rule of setting and is made from visual password For the valid password of this triggering;
User completes the input of whole password by repeatedly triggering;
In whole releasing process, the corresponding parameter of the multiple attributes of figure at least changes once at random.
2. a kind of unlocking method as claimed in claim 1, it is characterised in that the triggering, is to trigger to realize by relevance 's.
3. a kind of unlocking method as claimed in claim 1, it is characterised in that the triggering also specifically includes:User guides figure Shape changes, so as to obtain oneself required parameter.
4. a kind of unlocking method as claimed in claim 1, it is characterised in that graphic attribute further includes:Spread out according to existing attribute The new attribute born.
5. a kind of unlocking method as claimed in claim 1, it is characterised in that the change of graphic attribute parameter includes:Obtain new Unlock interface, into changing when changing automatically after unlock interface, triggering.
6. a kind of unlocking method as claimed in claim 1, it is characterised in that system is counted simultaneously to having inputted password digit Provide prompting.
7. a kind of unlocking method as claimed in claim 1, it is characterised in that user can terminate input in input process And the input operation of early period is deleted, re-start Password Input.
CN201510112112.0A 2015-04-03 2015-04-03 A kind of unlocking method Expired - Fee Related CN104680049B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510112112.0A CN104680049B (en) 2015-04-03 2015-04-03 A kind of unlocking method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510112112.0A CN104680049B (en) 2015-04-03 2015-04-03 A kind of unlocking method

Publications (2)

Publication Number Publication Date
CN104680049A CN104680049A (en) 2015-06-03
CN104680049B true CN104680049B (en) 2018-04-17

Family

ID=53315081

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510112112.0A Expired - Fee Related CN104680049B (en) 2015-04-03 2015-04-03 A kind of unlocking method

Country Status (1)

Country Link
CN (1) CN104680049B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107423589A (en) * 2016-05-24 2017-12-01 阿里巴巴集团控股有限公司 A kind of cipher-code input method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499905A (en) * 2008-02-02 2009-08-05 诚实科技股份有限公司 Image password authentication system for mobile device and method therefor
CN103413103A (en) * 2013-08-30 2013-11-27 任建军 System and method for inputting graphical passwords
CN104134032A (en) * 2014-07-30 2014-11-05 黄伟强 Anti-peeping coded lock system based on visional confusion and anti-peeing unlocking method based on visional confusion

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8176332B2 (en) * 2007-02-15 2012-05-08 Christopher Nathan Drake Computer security using visual authentication
CN101877042A (en) * 2009-04-30 2010-11-03 鸿富锦精密工业(深圳)有限公司 Password protection method
CN102566861A (en) * 2010-12-17 2012-07-11 安徽康佳同创电器有限公司 Electronic terminal, and touch unlocking method and touch unlocking setting method for electronic terminal
CN102306260B (en) * 2011-08-09 2013-10-23 北京哈工大计算机网络与信息安全技术研究中心 Method and device for inputting password
US8959619B2 (en) * 2011-12-21 2015-02-17 Fleet One, Llc. Graphical image password authentication method
CN103971045A (en) * 2013-01-25 2014-08-06 苏州精易会信息技术有限公司 Click type verification code implementation method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499905A (en) * 2008-02-02 2009-08-05 诚实科技股份有限公司 Image password authentication system for mobile device and method therefor
CN103413103A (en) * 2013-08-30 2013-11-27 任建军 System and method for inputting graphical passwords
CN104134032A (en) * 2014-07-30 2014-11-05 黄伟强 Anti-peeping coded lock system based on visional confusion and anti-peeing unlocking method based on visional confusion

Also Published As

Publication number Publication date
CN104680049A (en) 2015-06-03

Similar Documents

Publication Publication Date Title
CN104156652B (en) It is blurred the method and cryptographic check equipment of verification password
KR101142796B1 (en) Password Input Method Based on touch screen
DE112015002332T5 (en) Interactive textiles
CN103677644A (en) Unlocking method and system for smart mobile terminal
CN103823572B (en) Data entry device, data input device and electronic equipment
CN108664177A (en) A kind of method and apparatus that application is opened based on fingerprint recognition
KR20090014803A (en) Method and apparatus for using osk by input device
US20190018444A1 (en) Wearable apparatus and method for controlling vr apparatus
CN103077342A (en) Method for inputting graphic random passwords
TW201331788A (en) Method of performing a switching operation through a gesture inputted to an electronic device
US9032508B2 (en) Pattern password trajectory configuration system and method using the same
CN103389870B (en) A kind of unlocking method and device of touch screen
CN106951159A (en) A kind of terminal unlocking rapidly enters the method and terminal of application program
CN104966017B (en) A kind of Password Input protects system and method
CN104680049B (en) A kind of unlocking method
CN103246467A (en) Terminal and terminal control method
CN102629159B (en) Implementation method that remote controller analog mouse moves and device
JP2018527053A (en) Game handle control method to support Android games
CN103067782B (en) A kind of bimanual input interactive operation processing method and system based on intelligent television
CZ309308B6 (en) A method of entering classified information into electronic digital devices
CN106022084B (en) The method and device that a kind of pair of screen is unlocked
CN105138220B (en) A kind of pattern unlocking method and device
CN105160221A (en) Unlocking method and system of electronic equipment
CN105224212A (en) A kind of terminal screen unlock method, device and terminal
CN106815500A (en) Information processing method, information processor and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20180606

Address after: 266041 1, unit 40, yongqingyuan community, No. 22 Shengping East Road, Licang District, Qingdao, Shandong.

Patentee after: Laixi green seedling science and technology studio

Address before: 266606 No. 119, one village, Xia Ge Zhuang Town, Laixi, Qingdao, Shandong

Patentee before: Yu Ruiqing

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180417

Termination date: 20210403

CF01 Termination of patent right due to non-payment of annual fee