CN104766004A - Information processing method and electronic equipment - Google Patents
Information processing method and electronic equipment Download PDFInfo
- Publication number
- CN104766004A CN104766004A CN201410851694.XA CN201410851694A CN104766004A CN 104766004 A CN104766004 A CN 104766004A CN 201410851694 A CN201410851694 A CN 201410851694A CN 104766004 A CN104766004 A CN 104766004A
- Authority
- CN
- China
- Prior art keywords
- identifier
- layout
- sequence
- identification
- candidate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 18
- 238000003672 processing method Methods 0.000 title claims abstract description 17
- 230000001960 triggered effect Effects 0.000 claims abstract description 50
- 238000000034 method Methods 0.000 claims abstract description 18
- 238000004458 analytical method Methods 0.000 claims description 3
- 238000001514 detection method Methods 0.000 claims description 3
- 230000001788 irregular Effects 0.000 description 16
- 238000010586 diagram Methods 0.000 description 7
- 230000002452 interceptive effect Effects 0.000 description 5
- 239000003550 marker Substances 0.000 description 4
- 230000000981 bystander Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000006266 hibernation Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 1
Landscapes
- Telephone Function (AREA)
Abstract
The invention discloses an information processing method and electronic equipment. The method comprises the steps: receiving a command; executing the command and showing a first identifier layout, wherein the first identifier layout is chosen from at least two different second identifier layouts, at least two different second identifier layouts are determined on the basis of the first identifier layout and a first identifier sequence is acquired on the basis of a third identifier layout; analyzing acquisition operation based on the first identifier layout; detecting whether a second identifier sequence matches with the first identifier sequence, and answering the operation based on a matched result, wherein the second identifier sequence is the sequence of identifiers which are sequentially triggered by the operating track of the operation in the first identifier layout. By adopting the invention, the locking can be supported and released in a safe and reliable manner; and potential risks to the data of the electronic equipment caused by the unlocking scheme of related techniques can be avoided.
Description
Technical Field
The present invention relates to information processing technologies, and in particular, to an information processing method and an electronic device.
Background
The track unlocking is a locking unlocking mode widely applied to the electronic equipment at present, a user draws a specific track in an interface presented by the electronic equipment to unlock the electronic equipment (including locking of the electronic equipment or locking of application), but when the track unlocking is used in public places, the probability that the track drawn by the user is peeped and identified is high, and hidden danger is brought to data safety of the electronic equipment.
Disclosure of Invention
The embodiment of the invention provides an information processing method and electronic equipment, which can support unlocking in a safe and reliable manner and avoid the problem that the unlocking scheme of the related technology brings potential safety hazard to the data of the electronic equipment.
The technical scheme of the embodiment of the invention is realized as follows:
the embodiment of the invention provides an information processing method, which comprises the following steps:
receiving an instruction;
executing the instruction and presenting a first identification layout; the first identifier layout is selected from at least two different second identifier layouts, the at least two different second identifier layouts are determined based on a first identifier sequence, the first identifier sequence is obtained based on a third identifier layout, and the third identifier layout is different from the at least two second identifier layouts;
analyzing the operation obtained based on the first identification layout;
detecting whether a second identification sequence is matched with the first identification sequence or not, and responding to the operation based on a matching result; the second identification sequence is a sequence of identifications triggered by the operation track of the operation in the first identification layout in sequence.
An embodiment of the present invention provides an electronic device, including:
a receiving unit for receiving an instruction;
the presentation unit is used for executing the instruction and presenting a first identification layout; the first identifier layout is selected from at least two different second identifier layouts, the at least two different second identifier layouts are determined based on a first identifier sequence, and the first identifier sequence is obtained based on a third identifier layout;
the analysis unit is used for analyzing the operation obtained based on the first identification layout;
the detection unit is used for detecting whether the second identification sequence is matched with the first identification sequence or not and responding to the operation based on the matching result; the second identification sequence is a sequence of identifications triggered by the operation track of the operation in the first identification layout in sequence.
According to the technical scheme provided by the embodiment of the invention, the user is supported to implement operation on the first identifier layout so as to draw the operation track corresponding to the preset first identifier sequence, so that unlocking is triggered, and it is similar to that the user unlocks the implementation track for bystanders, and actually the user draws the operation track corresponding to the first identifier sequence in operation; moreover, because the first identifier layout is selected from at least two different second identifier layouts, when the first identifier layouts presented by the electronic equipment are different, the operation tracks corresponding to the first identifier sequences (corresponding unlocking passwords) implemented by the user in the different first identifier layouts are different, so that the possibility that the operation tracks are identified by a bystander to trigger unlocking by using the operation tracks is eliminated, and the data security of the electronic equipment is ensured.
Drawings
FIG. 1 is a schematic illustration of a related art trajectory unlock;
FIG. 2 is a first schematic flow chart illustrating an implementation of an information processing method according to an embodiment of the present invention;
FIG. 3a is a schematic diagram of a second implementation flow of the information processing method according to the embodiment of the present invention;
FIGS. 3 b-3 f are schematic diagrams illustrating a third identifier layout according to an embodiment of the present invention;
FIGS. 3 g-3 l are schematic diagrams showing a first identifier layout in an embodiment of the invention;
FIG. 4a is a schematic diagram of a second implementation flow of the information processing method according to the embodiment of the present invention;
FIGS. 4b and 4c are schematic diagrams of candidate tag sequences according to embodiments of the present invention;
FIG. 4d is a schematic diagram of a second implementation flow of the information processing method according to the embodiment of the present invention;
FIG. 5 is a third schematic flow chart illustrating an implementation of the information processing method according to the embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device in an embodiment of the invention.
Detailed Description
The invention is described in further detail below with reference to the figures and specific examples.
The inventor finds that the electronic equipment is triggered to unlock by using a track recognition mode commonly used at present, for example, when the electronic equipment is triggered to light a screen or trigger to run content (or application) with access authority, the electronic equipment displays the identifier layout shown in fig. 1, so that a user draws a track in the identifier layout by connecting identifiers, and when the track drawn by the user is matched with a preset track, the lock is unlocked, but when the track is unlocked in a public place, the probability that the track drawn by the user is peeped by a bystander is high, and hidden danger is brought to the use safety of the electronic equipment;
the inventor also finds that if an information processing method is implemented, the method is applied to the electronic device, as shown in fig. 2, and in step 101, an instruction is received; in step 102, executing an instruction to present a first identification layout; the first identifier layout is selected from at least two different second identifier layouts, the second identifier layouts are determined based on a first identifier sequence (corresponding to a password preset by a user), the first identifier sequence is obtained based on a third identifier layout (namely the identifier layout when the user presets the password), and the third identifier layout is different from the second identifier layout; in step 103, resolving the operation obtained based on the first identification layout (the operation is the user-triggered unlocking operation implemented by the user based on the first identification layout); in step 104, detecting whether a second identification sequence (the second identification sequence is a sequence of identifications triggered by the operation track of the operation in sequence in the first identification layout) is matched with the first identification sequence, and responding to the operation based on the matching result;
it can be seen that, the user performs an operation on the first identifier layout to draw an operation track corresponding to the preset first identifier sequence, so as to trigger unlocking, and it seems to an observer that the user performs unlocking on the track, and actually the user performs an operation to draw an operation track corresponding to the first identifier sequence; moreover, because the first identifier layout is selected from at least two different second identifier layouts, when the first identifier layouts presented by the electronic equipment are different, the operation tracks corresponding to the first identifier sequences (corresponding unlocking passwords) implemented by the user in the different first identifier layouts are different, so that the possibility that the operation tracks are identified by a spectator to trigger unlocking by using the operation tracks is eliminated, and the data security of the electronic equipment is ensured.
Example one
The embodiment describes an information processing method, which can be applied to electronic devices such as smart phones and tablet computers; as shown in fig. 3a, the information processing method according to the present embodiment includes the steps of:
in step 201, the electronic device presents a third identification layout.
The third identification layout is used for a user to set a first identification sequence (namely an unlocking password set by the user), the identification in the third identification layout can adopt one or a combination of letters, numbers and other types of characters, and when the first identification sequence only adopts the numbers from 1 to 9, the third identification layout presented by the electronic equipment can adopt a nine-square form presenting the numbers from 1 to 9; when the first identification sequence adopts English letters, the first identification sequence can be in the form of a virtual keyboard presenting 26 English letters; that is to say, the type of the identifier presented in the first identifier layout depends on the type of the identifier in the first identifier sequence to be set by the user, and in practical applications, the third identifier layout including the corresponding type identifier may be presented according to the type of the identifier in the first identifier sequence preset by the user.
The marks in the third mark layout may be arranged in a regular array, that is, the marks in the third mark layout form straight lines in the longitudinal and transverse directions, or the marks in the third mark layout may be arranged in an irregular manner, that is, the marks in the third mark layout are arranged in a disorder manner.
Step 202, based on the third identifier layout, a first identifier sequence is obtained.
The electronic device may obtain the first identifier sequence in a form of supporting a point touch operation, that is, the electronic device prompts to sequentially trigger identifiers corresponding to the first identifier sequence (that is, a password to be set by a user) in the third identifier layout through the point touch operation;
the electronic device may further obtain the first identifier sequence in a form supporting a sliding operation, that is, the electronic device prompts to sequentially trigger identifiers corresponding to the first identifier sequence (that is, a password to be set by a user) in the third identifier layout in a form of performing a sliding operation in the third identifier layout.
The first identification sequence here can be used to authenticate access of the electronic device itself (e.g., when the electronic device is triggered to wake up from a hibernation state), to authenticate access of a specific application in the electronic device (e.g., an instant messaging application, an application presenting multimedia files local to the electronic device), or to authenticate access of specific content in the electronic device (e.g., multimedia content); that is, the operation track of the user performing the operation on the electronic device corresponds to the first identification sequence, and the electronic device can be triggered to unlock the lock of the electronic device, the specific application or the specific content.
In this embodiment, the same identifiers cannot continuously appear in the first identifier sequence, so as to avoid a situation that an operation trajectory corresponding to the first identifier sequence is drawn by an operation in the first identifier layout that cannot be presented by the electronic device subsequently, where the length of the first identifier sequence is smaller than the total number of types identified in the third identifier layout, for example, when the third identifier layout is a 9-squared figure 1, the length of the first identifier sequence may be smaller than the total number of types identified in the third identifier layout (9), or may be equal to the total number of types identified in the third identifier layout (9).
Step 203, receiving an instruction.
The instruction can trigger the electronic device to unlock itself (for example, when the electronic device is triggered to light up the display screen from a dormant state), unlock a specific application (for example, when an application with a high security level, such as bank client software, is triggered to run, authentication is required), or unlock specific content (for example, when multimedia content with access right is accessed, authentication is required);
the instructions herein may also be instructions to directly dismiss the electronic device from presenting the first identification layout; when the electronic equipment receives the instruction, the electronic equipment needs to detect and acquire the operation implemented by the user by displaying the first identifier, verify whether a second identifier sequence corresponding to the operation track implemented by the user is matched with the preset first identifier sequence, unlock the electronic equipment if the second identifier sequence is matched with the preset first identifier sequence, and explain the following steps.
Step 204, presenting a first identification layout.
The marks in the first mark layout may be arranged in a regular array, that is, the marks in the first mark layout form straight lines in the longitudinal and transverse arrangements, or the marks in the first mark layout may be arranged in an irregular arrangement, that is, the marks in the first mark layout are arranged in a disorder manner.
The first identifier layout is selected from at least two different second identifier layouts, the at least two different second identifier layouts are determined based on the first identifier sequence, and one of the at least two different second identifier layouts may be the same as the first identifier layout (that is, the identifier layout for setting the first identifier sequence may be the same as one of the at least two subsequently acquired second identifier sequences); of course, the at least two different second identification layouts may also be completely different from the first identification layout;
for example, when the third identifier layout in the conventional form shown in fig. 3e is adopted (that is, the third identifier layout supporting the point touch operation is used), the first identifier sequence is obtained, and when an instruction is subsequently received, one of the second identifier layouts in the regular arrangement shown in fig. 3i or fig. 3j may be selected as the first identifier layout to be presented; at the moment, the at least two second identifier layouts are different from the third identifier layout;
for another example, when the third identifier layout in the regular arrangement shown in fig. 3d is adopted (that is, the third identifier layout supporting the point-and-touch operation is used), the first identifier sequence is obtained, and when an instruction is subsequently received, one of the second identifier layouts in the regular arrangement shown in fig. 3d and fig. 3h can be selected as the first identifier layout to be presented, and at this time, one of the at least two second identifier layouts is the same as the third identifier layout;
for another example, when the third identifier layout in regular arrangement shown in fig. 3d is adopted (that is, the third identifier layout supporting the point-and-touch operation is used), the first identifier sequence is obtained, and when an instruction is subsequently received, one of the second identifier layouts in regular arrangement shown in fig. 3g or fig. 3h can be selected as the first identifier layout to be presented, and at this time, at least two of the second identifier layouts are different from the third identifier layout;
for another example, when the third identifier layout with irregular arrangement shown in fig. 3f is adopted (that is, the third identifier layout supporting the point-touch operation is used), the first identifier sequence is obtained, and when an instruction is subsequently received, one of the second identifier layouts with irregular arrangement shown in fig. 3k and fig. 3l may be selected as the first identifier layout to be presented, and at this time, at least two of the second identifier layouts are different from the third identifier layout;
of course, when the third identifier layout in the irregular arrangement shown in fig. 3f is adopted (that is, the third identifier layout supporting the point-and-touch operation is used), the first identifier sequence is obtained, and when an instruction is subsequently received, one of the second identifier layouts in the irregular arrangement shown in fig. 3g and fig. 3h may be selected as the first identifier layout to be presented, and at this time, at least two of the second identifier layouts are different from the third identifier layout.
It should be noted that the at least two different second identification sequences may be determined immediately according to the first identification sequence after the first identification sequence is obtained, or may be determined according to the first identification sequence set by the user only when an instruction is received that the first identification sequence needs to be presented;
for example, the electronic device is provided with a sequence 1 (corresponding to a first identification sequence of the electronic device) for unlocking the electronic device itself, the application 1 in the electronic device is provided with a sequence 2 (corresponding to the first identification sequence of the application 1) for unlocking, the application 2 in the electronic device is provided with a sequence 3 (corresponding to the first identification sequence of the application 2) for unlocking, and the sequences 1, 2 and 3 are different sequences;
the electronic equipment instantly determines at least two different second identifier layouts corresponding to the sequence 1 after acquiring the sequence 1, and only stores the sequence 2 after acquiring the sequence 2; when the electronic equipment receives an instruction to trigger unlocking of the electronic equipment (for example, the electronic equipment is triggered to light up the display screen from a dormant state), selecting one of at least two different predetermined second identifier layouts as a first identifier layout and presenting the first identifier layout on the display screen;
when the electronic device receives an instruction to trigger the electronic device to unlock the application 1 (for example, when the user triggers an icon of the application 1 to run the application 1), the corresponding at least two different second identifier layouts are determined according to the sequence 2, and one of the at least two different second identifier layouts is selected as the first identifier layout and is presented on the display screen.
In step 205, an operation performed on the first tag layout is detected.
The electronic equipment can detect whether the operation carried out by the user is received on the first identification layout at regular time after the first identification layout is presented on the display screen, and if the operation is detected, the subsequent steps are executed.
At step 206, the operation obtained based on the first identification layout is parsed.
Analyzing the operation point of the detected operation, and judging whether the operation point meets a preset condition, wherein the preset condition is as follows: the operating points of the operation form a continuous uninterrupted operating track; the trajectory between any two adjacent marks triggered by the operation trajectory in the first mark layout is a straight line segment; any two adjacent identifiers triggered by the operation track in the first identifier layout correspond to two adjacent identifiers in the first identifier sequence;
when the preset condition is met, obtaining an operation track of the operation based on the analyzed operation point and carrying out subsequent processing; otherwise, the operation performed on the first identification layout continues to be detected.
And step 207, analyzing the identifiers sequentially triggered by the operation tracks in the first identifier layout, and obtaining a second identifier sequence based on the identifiers sequentially triggered by the operation tracks.
Matching the operation track of the operation with the position in the first identifier layout, sequentially locating identifiers on the operation track after matching, and determining a second identifier sequence based on the sequentially matched identifiers, for example, when the operation track sequentially triggers identifiers 1, 2 and 3 in the first identifier sequence, determining that the corresponding second identifier sequences are 1, 2 and 3; when the operation track sequentially triggers the identifiers 1, 2, 3, 2 and 3 in the first identifier sequence, the corresponding second identifier sequence is determined to be 12323.
And step 208, unlocking when the second identification sequence is detected to be matched with the first identification sequence.
For example, when the received instruction is to trigger unlocking of the electronic device itself, a main interface (e.g., launcher interface) of the electronic device is presented; when the received instruction is to trigger unlocking of an application, such as the application 1, the application 1 is run and an interactive interface of the application 1 is presented.
The above steps will be described with reference to an actual usage scenario.
Scene 1: the method comprises the steps that a user triggers the electronic equipment in a dormant state, the electronic equipment obtains an unlocking password (corresponding to a second identification sequence) input by the user according to an operation track corresponding to an operation implemented by the user, and when the unlocking password is matched with a preset unlocking password (corresponding to a first identification sequence), the locking state of the electronic equipment is released and a launcher interface is displayed; the specific implementation steps are as follows:
1) the user sets the character type of the unlocking password and sets the unlocking password (corresponding to the first identification sequence) through the interactive interface shown in fig. 3 b.
Taking the selected number as an example, the electronic device may obtain an unlocking password of the electronic device set by the user through a nine-square grid (corresponding to the third identifier layout arranged regularly) as shown in fig. 3c, the user may set the unlocking password in the nine-square grid in a point-touch manner, the electronic device detects the operation of the user and analyzes an operation trajectory of the operation, and connects identifiers 1, 2, 3, and 4 sequentially triggered by the operation trajectory in the nine-square grid to obtain an unlocking password 1234 (corresponding to the first identifier sequence) input by the user; or, the user may set an unlocking password by performing an operation in a nine-grid (corresponding to a third identifier layout arranged regularly) as shown in fig. 3d, the electronic device detects that the operation points of the operation form a continuous operation track, the track between adjacent identifiers passed by the operation track in the third identifier layout is a straight line segment, and the operation track does not pass through a position corresponding to a different identifier in the first identifier sequence, which meets the preset condition, and connects identifiers 1, 2, 3, and 4 sequentially triggered by the analyzed operation track of the user performing the operation in the nine-grid to obtain the unlocking password 1234 (corresponding to the first identifier sequence);
taking the case that the user selects letters as the unlocking password, the electronic device may obtain the unlocking password (corresponding to the first identifier sequence) of the electronic device set by the user through a 26-letter virtual keyboard (corresponding to the third identifier layout in the conventional form) as shown in fig. 3e, the user may set the unlocking password in the virtual keyboard through a point-touch form, the electronic device recognizes the operation of the user, and the identifiers a, b, c, and d sequentially triggered by the user in the nine-square grid are connected to obtain the unlocking password abcd (corresponding to the first identifier sequence);
the first identification sequence 1234 is taken as an example for explanation.
Fig. 3b and fig. 3c both illustrate the third identifier layout as a regular arrangement manner, and the third identifier layout may also adopt the above irregular arrangement manner, one example is as described in fig. 3f, a user may implement an operation shown by a dotted line in the irregularly arranged nine-palace grid shown in fig. 3f to set an unlocking password, an operation point where the electronic device detects the operation forms a continuous operation track, a track between adjacent identifiers where the operation track passes in the third identifier layout is a straight line segment, and the operation track does not pass through a position corresponding to a different identifier in the first identifier sequence, which meets the above preset condition, and the analyzed identifiers 1, 2, 3, and 4 sequentially triggered by the operation track where the user implements the operation in the irregular nine-palace grid are connected to obtain the unlocking password 1234 (corresponding to the first identifier sequence).
2) When the electronic device is in a dormant state, the electronic device is triggered to light the display screen (for example, a user triggers a home key of the electronic device to trigger the electronic device to light the screen), the electronic device presents the first identifier layout and detects the operation of the user, and an unlocking password (corresponding to the second identifier sequence) corresponding to an operation track of the user for implementing the operation in the first identifier layout is obtained.
The electronic device determines at least two different second identifier layouts according to an unlocking password (corresponding to the first identifier sequence) of the electronic device preset by a user, where the at least two different second identifier layouts may also be predetermined, selects a third identifier layout from the at least two different second identifier layouts and presents the third identifier layout on a display screen, and when the first identifier sequence is set to 1234 through the third identifier layout shown in fig. 3c, 3d, or 3f, examples of the different second identifier layouts are shown in fig. 3g and 3h, or shown in fig. 3k and 3 l;
when the electronic device selects the second identifier layout shown in fig. 3g as the first identifier layout and presents the second identifier layout, the user performs the operation shown by the dotted line in fig. 3g, the electronic device detects that the operation points of the operation form a continuous track, the track between adjacent identifiers passed by the operation track in the first identifier layout is a straight line segment, and the operation track does not pass through the position corresponding to the different identifiers in the first identifier sequence, the preset condition is met, and the identifiers sequentially triggered by the analyzed operation track in the first identifier layout are connected to obtain the unlocking password (corresponding to the second identifier sequence) corresponding to the operation track operated by the user;
when the electronic device selects the second identifier layout shown in fig. 3h as the first identifier layout and presents the second identifier layout, the user may detect that the operating points of the operation form a continuous track through the operation shown by the dotted line in fig. 3h, the track between adjacent identifiers passed by the operating track in the first identifier layout is a straight line segment, and the operating track does not pass through the position corresponding to the different identifier in the first identifier sequence, so as to meet the preset condition, and connect the identifiers sequentially triggered by the analyzed operating track in the third identifier layout to obtain the unlocking password (corresponding to the second identifier sequence) input by the user through the operation;
for the spectator, it seems that the user is performing the trajectory unlocking operation of the related art (i.e., unlocking by using a specific trajectory), but the user draws an operation trajectory corresponding to a preset unlocking password (corresponding to the first identifier sequence) by an operation to trigger unlocking, and because the first identifier layout is selected from at least two different second identifier layouts, when the first identifier layouts presented by the electronic device are different, the operation trajectories performed by the user in the different first identifier layouts and corresponding to the preset unlocking password (corresponding to the first identifier sequence) are also different, so that the possibility that the operation trajectory is recognized by the spectator to trigger unlocking by using the operation trajectory is eliminated, and the data security of the electronic device is ensured.
3) And matching the unlocking password input by the user with the preset password, and responding to the operation based on the matching result.
When the unlock password (corresponding to the second identification sequence) input by the user matches the preset unlock password (corresponding to the first identification sequence), the electronic device is unlocked, and a home screen of the electronic device, such as a launcher interface, may be presented.
Scene 2: the method comprises the steps that a user triggers the electronic equipment to run an application 1, the electronic equipment obtains an unlocking password (corresponding to a second identification sequence) input by the user according to an operation track corresponding to an operation implemented by the user, and when the unlocking password is matched with a preset unlocking password (corresponding to a first identification sequence), the locking state of the application 1 is released and an interactive interface of the application 1 is displayed; the specific implementation steps are as follows:
1) the user sets the character type of the unlocking password and sets the unlocking password (corresponding to the first identification sequence) through the interactive interface shown in fig. 3 b.
Taking the selected number as an example, the electronic device may obtain an unlocking password (corresponding to the first identifier sequence) of the electronic device set by the user through a nine-square grid (corresponding to the third identifier layout) as shown in fig. 3c, the user may set the unlocking password in the nine-square grid through a point-touch manner, the electronic device detects the operation of the user and recognizes an operation trajectory of the operation, and identifiers 1, 2, 3, and 4 sequentially triggered by the operation trajectory in the nine-square grid are connected to obtain an unlocking password 1234 (corresponding to the first identifier sequence); or, the user may set an unlocking password by performing an operation in a nine-grid (a third identifier layout arranged in a corresponding rule) as shown in fig. 3d, the electronic device detects that the operation points of the operation form a continuous operation track, the track between adjacent identifiers passed by the operation track in the third identifier layout is a straight line segment, and the operation track does not pass through a position corresponding to a different identifier in the first identifier sequence, which meets the preset condition, and connects identifiers 1, 2, 3, and 4 sequentially triggered by the analyzed operation track performed by the user in the nine-grid to obtain the unlocking password 1234 (corresponding to the first identifier sequence);
taking the case that the user selects letters as the unlocking password, the electronic device may obtain the unlocking password (corresponding to the first identifier sequence) of the electronic device set by the user through a 26-letter virtual keyboard (corresponding to the third identifier layout) as shown in fig. 3e, the user may set the unlocking password in the virtual keyboard in a point-touch manner, the electronic device recognizes the operation of the user, and connects identifiers a, b, c, and d sequentially triggered by the user in the nine-square grid to obtain the unlocking password abcd (corresponding to the first identifier sequence);
the third identifier layout may also adopt the above irregular arrangement manner, one example is as shown in fig. 3f, a user may set an unlocking password by performing an operation in the irregularly arranged nine-palace lattice shown in fig. 3f, the electronic device detects that an operation point of the operation forms a continuous operation track, a track between adjacent identifiers that the operation track passes through in the third identifier layout is a straight line segment, and the operation track does not pass through a position corresponding to a different identifier in the first identifier sequence, which meets the above preset condition, and the identifiers 1, 2, 3, and 4 sequentially triggered by the operation track that the analyzed user performs the operation in the irregular nine-palace lattice are connected to obtain the unlocking password 1234 (corresponding to the first identifier sequence).
It should be noted that, in this embodiment, the unlocking passwords of different applications may be different, that is, different applications in the electronic device may have different unlocking passwords (corresponding to the first identification sequence).
2) The electronic device is triggered to run the application 1 (for example, a user triggers an icon of the application 1 in a launcher interface of the electronic device), the electronic device presents the first identifier layout and detects the operation of the user, and an unlocking password (corresponding to the second identifier sequence) corresponding to an operation track of the user implementing the operation in the first identifier layout is obtained.
The electronic device determines at least two different second identifier layouts according to an unlocking password (corresponding to the first identifier sequence) of the electronic device preset by a user, where the at least two different second identifier layouts may also be predetermined, selects a third identifier layout from the at least two different second identifier layouts and presents the third identifier layout on a display screen, and when the first identifier sequence is set to 1234 through the third identifier layout shown in fig. 3c, 3d, or 3f, examples of the different second identifier layouts are shown in fig. 3g and 3h, or shown in fig. 3k and 3 l;
setting a first identifier sequence as abcd, when the electronic device selects a second identifier layout shown in fig. 3i as the first identifier layout and presents the second identifier layout, the user performs an operation shown by a dotted line in fig. 3i, the electronic device detects that an operating point of the operation forms a continuous track, the track between adjacent identifiers passed by the operating track in the first identifier layout is a straight line segment, and the operating track does not pass through a position corresponding to a different identifier in the first identifier sequence, and meets the preset condition, and identifiers sequentially triggered by the analyzed operating track in the first identifier layout are connected to obtain an unlocking password abcd (corresponding to the second identifier sequence) corresponding to the operating track operated by the user;
when the electronic device selects the second identifier layout shown in fig. 3j as the first identifier layout and presents the second identifier layout, the user may perform an operation shown by a dotted line in fig. 3j, the electronic device detects that the operation points of the operation form a continuous track, the track between adjacent identifiers passed by the operation track in the first identifier layout is a straight line segment, and the operation track does not pass through a position corresponding to a different identifier in the first identifier sequence, the preset condition is met, and identifiers sequentially triggered by the analyzed operation track in the third identifier layout are connected to obtain an unlocking password abcd (corresponding to the second identifier sequence) input by the user through the operation;
fig. 3h and fig. 3i both illustrate the first identifier layout arranged regularly, the first identifier layout may also adopt a first identifier layout arranged irregularly as shown in fig. 3k and fig. 3l, and if the first identifier sequence is abcd, the user may perform an operation shown by a dotted line in fig. 3j, an operation point of the electronic device detection operation forms a continuous track, a track between adjacent identifiers that the operation track passes through in the first identifier layout is a straight line segment, and the operation track does not pass through a position corresponding to a different identifier in the first identifier sequence, which meets the preset condition, and the identifiers sequentially triggered by the analyzed operation track in the third identifier layout are connected to obtain an unlocking password abcd (corresponding to the second identifier sequence) input by the user through the operation.
3) And matching the unlocking password (corresponding to the second identification sequence) input by the user with the preset password (corresponding to the first identification sequence), and responding to the operation based on the matching result.
When the unlocking password (corresponding to the second identification sequence) input by the user is matched with the preset unlocking password (corresponding to the first identification sequence), the electronic equipment releases the locking of the application 1, and at the moment, the application 1 can be operated and the interactive interface of the application 1 can be displayed on the display screen
Scenario 2) is also applicable to the process in which the electronic device is triggered to release specific content (e.g., multimedia content in the electronic device), and is not described herein again.
When the scheme of this embodiment is adopted to trigger unlocking processing, it seems to the observer that the user is performing a trajectory unlocking operation (that is, unlocking by using a specific trajectory) of the related art, but the user draws an operation trajectory corresponding to a preset unlocking password (corresponding to the first identifier sequence) through an operation to trigger unlocking, and because the first identifier layout is selected from at least two different second identifier layouts, when the first identifier layouts presented by the electronic device are different, the operation trajectories performed by the user in the different first identifier layouts and corresponding to the unlocking password (corresponding to the first identifier sequence) are also different, so that a possibility that the operation trajectory is recognized by the observer to trigger unlocking by using the operation trajectory is eliminated, and data security of the electronic device is ensured.
Example two
In this embodiment, a process of acquiring the second identification sequence in the first embodiment is further described in detail, and in the first embodiment, as shown in fig. 3g and 3h, fig. 3i and 3j, and fig. 3k and 3l, the operations have the following features:
1) the operating points of the operation form a continuous uninterrupted operating track;
2) the trajectory between any two adjacent marks triggered by the operation trajectory in the first mark layout is a straight line segment;
3) any two adjacent identifiers triggered by the operation track in the first identifier layout correspond to two adjacent identifiers in the first identifier sequence; that is, the first marker sequence does not have a marker in the corresponding distribution trace in the second marker layout that is different from the markers in the first marker sequence.
According to the above-mentioned features of the operations carried out in the first identification layout, as shown in fig. 4a, at least two different second identification sequences can be determined by:
at step 301a, at least two candidate tag layouts are generated.
Step 302a, for the candidate tag layout x, assigning the position in the candidate tag layout x to the tags in the first tag sequence until all the tags in the first tag sequence are assigned to the position in the candidate tag layout x.
The value of x is more than or equal to 2 and less than or equal to N, and N is the number of candidate mark layouts.
Step 303a, determining whether a trajectory formed by the first identifier sequence at the position of the candidate identifier layout x passes through a position, which is not allocated to the first identifier sequence, in the candidate identifier layout x, and if not, determining that the candidate identifier layout x is the second identifier layout, that is, selecting the presented candidate identifier layout x as the first identifier layout for the user to perform the operation, so as to determine the corresponding second identifier sequence (corresponding to the unlock password input by the user on the candidate identifier layout x) according to the detected operation trajectory (the operation has the above characteristics).
For example, assuming that the first identifier sequence is 1234, for the candidate identifier layout shown in fig. 4b, the track obtained by connecting 1 and 2 in the first identifier sequence needs to pass through the position where the identifier 5 in the candidate identifier layout is located, and therefore it is determined that the candidate identifier layout cannot be used as the second identifier layout, that is, the user cannot input identifiers 1 and 2 in the preset unlocking password (corresponding to the first identifier sequence) by operating and connecting through the candidate identifier layout shown in fig. 4 b.
It should be noted that, when the identifiers in the first identifier sequence are all different identifiers (for example, the first identifier sequence is 1234, that is, there is no identifier recurrence in the first identifier sequence, the distribution trajectory formed by the positions of the first identifier sequence in the candidate identifier layout x also needs to satisfy the condition that the distribution trajectory corresponding to the positions of the first identifier sequence in the candidate identifier layout is not intersected with the identifiers triggered by the distribution trajectory, so as to avoid the situation that the operation trajectory of the operation input by the user repeatedly triggers the same identifier and cannot identify the identifier.
For example, assuming that the first identifier sequence is 15463, for the candidate identifier layout shown in fig. 4c, the identifier 6 in the first identifier sequence and the identifier 6 that the identifier 3 has passed before the track in the candidate identifier layout passes through the track, so that the candidate identifier layout cannot be used as the second identifier layout, that is, the user cannot input the preset unlock password (corresponding to the first identifier sequence) by the candidate identifier layout shown in fig. 4 b.
The steps shown in fig. 4a can also be implemented by the steps shown in fig. 4d, which are equivalent in implementation effect, and are used to determine at least two different second tag layouts among the candidate tag layouts; as shown in fig. 4d, at least two different second identification sequences may also be determined by:
step 301b, N candidate tag layouts are generated, where N is an integer greater than or equal to 2.
The subsequent steps 302b and 303b are the processing of the candidate identified layout j.
Step 302b, placing the identifier i in the first identifier sequence at the position i of the candidate identifier layout j, placing the identifier i +1 in the first identifier sequence at the position i +1 of the candidate identifier layout j, wherein the position i and the position i +1 are different positions in the candidate layout j, the value of i is greater than or equal to 1 and less than or equal to M, M is the number of identifiers in the first identifier sequence, and the value of j is greater than or equal to 1 and less than or equal to N.
Step 303b, judging whether a track formed by the identifier i and the identifier i +1 passes through a position k in the candidate identifier layout j, wherein the position k is different from the position i and the position i + 1; and if not, judging that the candidate mark layout j is the second mark layout.
Similarly, for the case shown in fig. 4c, when the identifiers in the first identifier sequence are all different identifiers (for example, the first identifier sequence is 1234, that is, there is no repeated identifier occurrence in the first identifier sequence), the track formed by the positions of the identifier i and the identifier i +1 in the candidate identifier layout j in the first identifier sequence further needs to satisfy the following condition: the track formed by the positions of the identifier i and the identifier i +1 in the candidate identifier layout j is not intersected with the identifier passed by the track, namely the identifier m (m is smaller than i), so that the situation that the same identifier cannot be identified due to repeated triggering of the operation track which cannot identify the operation input by the user is avoided.
Embodiment three processing after successful or failed matching of the first identification sequence with the second identification sequence
The embodiment describes an information processing method, which can be applied to electronic devices such as smart phones and tablet computers; as shown in fig. 5, the information processing method according to the present embodiment includes the steps of:
in step 401, the electronic device presents a third identification layout.
The third identification layout is used for a user to set a first identification sequence (namely an unlocking password set by the user), the identification in the third identification layout can adopt one or a combination of letters, numbers and other types of characters, and when the first identification sequence only adopts the numbers from 1 to 9, the third identification layout presented by the electronic equipment can adopt a nine-square form presenting the numbers from 1 to 9; when the first identification sequence adopts English letters, the first identification sequence can be in the form of a virtual keyboard presenting 26 English letters; that is to say, the type of the identifier presented in the first identifier layout depends on the type of the identifier in the first identifier sequence to be set by the user, and in practical applications, the third identifier layout including the corresponding type identifier may be presented according to the type of the identifier in the first identifier sequence preset by the user.
The marks in the third mark layout may be arranged in a regular array, that is, the marks in the third mark layout form straight lines in the longitudinal and transverse directions, or the marks in the third mark layout may be arranged in an irregular manner, that is, the marks in the third mark layout are arranged in a disorder manner.
Step 402, obtaining a first identification sequence based on the third identification layout.
The electronic device may obtain the first identifier sequence in a form of supporting a point touch operation, that is, the electronic device prompts to sequentially trigger identifiers corresponding to the first identifier sequence (that is, a password to be set by a user) in the third identifier layout through the point touch operation;
the electronic device may further obtain the first identifier sequence in a form supporting a sliding operation, that is, the electronic device prompts to sequentially trigger identifiers corresponding to the first identifier sequence (that is, a password to be set by a user) in the third identifier layout in a form of performing a sliding operation in the third identifier layout.
The first identification sequence here can be used to authenticate access of the electronic device itself (e.g., when the electronic device is triggered to wake up from a hibernation state), to authenticate access of a specific application in the electronic device (e.g., an instant messaging application, an application presenting multimedia files local to the electronic device), or to authenticate access of specific content in the electronic device (e.g., multimedia content); that is, the user can trigger the electronic device to unlock itself, a specific application or specific content by inputting the first identification sequence to the electronic device.
In this embodiment, the first identifier sequence may not continuously have the same identifier, so as to avoid a situation that an operation trajectory corresponding to the first identifier sequence is drawn by an operation in the first identifier layout that cannot be presented by the electronic device subsequently, where the length of the first identifier sequence is smaller than the total number of the identified categories in the third identifier layout, for example, when the third identifier layout is a 9-squared figure in number 1, the length of the first identifier sequence may be smaller than the total number of the identified categories in the third identifier layout (9), and may also be equal to the total number of the identified categories in the third identifier layout (9).
At step 403, an instruction is received.
The instruction can trigger the electronic device to unlock itself (for example, when the electronic device is triggered to light up the display screen from a dormant state), unlock a specific application (for example, when an application with a high security level, such as bank client software, is triggered to run, authentication is required), or unlock specific content (for example, when multimedia content with access right is accessed, authentication is required);
the instructions herein may also be instructions to directly dismiss the electronic device from presenting the first identification layout; when the electronic equipment receives the instruction, the electronic equipment needs to detect and acquire the operation implemented by the user by displaying the first identifier, verify whether a second identifier sequence corresponding to the operation track implemented by the user is matched with the preset first identifier sequence, unlock the electronic equipment if the second identifier sequence is matched with the preset first identifier sequence, and explain the following steps.
Step 404 presents a first identification layout.
The marks in the first mark layout may be arranged in a regular array, that is, the marks in the first mark layout form straight lines in the longitudinal and transverse arrangements, or the marks in the first mark layout may be arranged in an irregular arrangement, that is, the marks in the first mark layout are arranged in a disorder manner.
The first identifier layout is selected from at least two different second identifier layouts, the at least two different second identifier layouts are determined based on the first identifier sequence, and one of the at least two different second identifier layouts may be the same as the first identifier layout (that is, the identifier layout for setting the first identifier sequence may be the same as one of the at least two subsequently acquired second identifier sequences); of course, the at least two different second identification layouts may also be completely different from the first identification layout;
for example, when the third identifier layout in the conventional form shown in fig. 3e is adopted (that is, the third identifier layout supporting the point-and-touch operation is used), the first identifier sequence is obtained, and when an instruction is subsequently received, one of the second identifier layouts in the regular arrangement shown in fig. 3i or fig. 3j may be selected as the first identifier layout to be presented; at the moment, the at least two second identifier layouts are different from the third identifier layout;
for another example, when the third identifier layout in the regular arrangement shown in fig. 3d is adopted (that is, the third identifier layout supporting the point-and-touch operation is used), the first identifier sequence is obtained, and when an instruction is subsequently received, one of the second identifier layouts in the regular arrangement shown in fig. 3d and fig. 3g can be selected as the first identifier layout to be presented, and at this time, one of the at least two second identifier layouts is the same as the third identifier layout;
for another example, when the third identifier layout in regular arrangement shown in fig. 3d is adopted (that is, the third identifier layout supporting the point-and-touch operation is used), the first identifier sequence is obtained, and when an instruction is subsequently received, one of the second identifier layouts in regular arrangement shown in fig. 3g or fig. 3h can be selected as the first identifier layout to be presented, and at this time, at least two of the second identifier layouts are different from the third identifier layout;
for another example, when the third identifier layout with irregular arrangement shown in fig. 3f is adopted (that is, the third identifier layout supporting the point-touch operation is used), the first identifier sequence is obtained, and when an instruction is subsequently received, one of the second identifier layouts with irregular arrangement shown in fig. 3k and fig. 3l may be selected as the first identifier layout to be presented, and at this time, at least two of the second identifier layouts are different from the third identifier layout;
of course, when the third identifier layout in the irregular arrangement shown in fig. 3f is adopted (that is, the third identifier layout supporting the point-and-touch operation is used), the first identifier sequence is obtained, and when an instruction is subsequently received, one of the second identifier layouts in the irregular arrangement shown in fig. 3g and fig. 3h may be selected as the first identifier layout to be presented, and at this time, at least two of the second identifier layouts are different from the third identifier layout.
It should be noted that the at least two different second identification sequences may be determined immediately according to the first identification sequence after the first identification sequence is obtained, or may be determined according to the first identification sequence set by the user only when an instruction is received that the first identification sequence needs to be presented;
for example, the electronic device is provided with a sequence 1 (corresponding to a first identification sequence of the electronic device) for unlocking the electronic device itself, the application 1 in the electronic device is provided with a sequence 2 (corresponding to the first identification sequence of the application 1) for unlocking, the application 2 in the electronic device is provided with a sequence 3 (corresponding to the first identification sequence of the application 2) for unlocking, and the sequences 1, 2 and 3 are different sequences;
the electronic equipment immediately determines at least two different second identifier layouts corresponding to the sequence 1 after acquiring the sequence 1, and only stores the sequence 2 after acquiring the sequence 2; when the electronic equipment receives an instruction to trigger unlocking of the electronic equipment (for example, the electronic equipment is triggered to light up the display screen from a dormant state), selecting one of at least two different predetermined second identifier layouts as a first identifier layout and presenting the first identifier layout on the display screen;
when the electronic device receives an instruction to trigger the electronic device to unlock the application 1 (for example, when the user triggers an icon of the application 1 to run the application 1), the corresponding at least two different second identifier layouts are determined according to the sequence 2, and one of the at least two different second identifier layouts is selected as the first identifier layout and is presented on the display screen.
In step 405, an operation performed on a first logo layout is detected.
The electronic equipment can detect whether the operation carried out by the user is received on the first identification layout at regular time after the first identification layout is presented on the display screen, and if the operation is detected, the subsequent steps are executed.
At step 406, the operation obtained based on the first identified layout is parsed.
Analyzing the operation point of the detected operation, and judging whether the operation point meets a preset condition, wherein the preset condition is as follows: the operating points of the operation form a continuous uninterrupted operating track; the trajectory between any two adjacent marks triggered by the operation trajectory in the first mark layout is a straight line segment; any two adjacent identifiers triggered by the operation track in the first identifier layout correspond to two adjacent identifiers in the first identifier sequence;
when the preset condition is met, obtaining an operation track of the operation based on the analyzed operation point and carrying out subsequent processing; otherwise, the operation performed on the first identification layout continues to be detected.
Step 407, analyzing the identifiers sequentially triggered by the operation tracks in the first identifier layout, and obtaining a second identifier sequence based on the identifiers sequentially triggered by the operation tracks.
Matching the operation track of the operation with the position in the first identifier layout, sequentially locating identifiers on the operation track after matching, and determining a second identifier sequence based on the sequentially matched identifiers, for example, when the operation track sequentially triggers identifiers 1, 2 and 3 in the first identifier sequence, determining that the corresponding second identifier sequences are 1, 2 and 3; when the operation track sequentially triggers the identifiers 1, 2, 3, 2 and 3 in the first identifier sequence, the corresponding second identifier sequence is determined to be 12323.
Step 408, detecting whether the second identification sequence is matched with the first identification sequence, and if so, executing step 409; otherwise, step 411 is executed.
In step 409, the lock is released upon matching.
And step 410, when the same instruction is received again, selecting a second identification sequence different from the most recently selected second identification sequence from at least two different second identification sequences as the first identification sequence to be presented.
For example, if the instruction received in step 403 is used to trigger unlocking of application 1, step 404 to step 407 are correspondingly executed, and if the obtained second identifier sequence (corresponding to application 1) matches the first identifier sequence, in step 408, a second identifier layout different from the second identifier layout selected in step 404 is selected from at least two different second identifier sequences (determined according to the first identifier sequence corresponding to application 1, which may be predetermined, or determined when the instruction triggering unlocking of application 1 is received for the first time) to be presented as the first identifier layout, so that the operation trajectories corresponding to the operations performed by the user in the first identifier layout each time are different, and the possibility of the trajectories recognized by a spectator is eliminated.
Step 411, selecting the second identifier layout selected from the at least two different second identifier layouts most recently (i.e. in step 404) as the first identifier layout, and returning to step 404 to present the first identifier layout, that is, when the second identifier sequence corresponding to the operation track performed by the user is not matched with the preset first identifier sequence, the first identifier layout presented most recently is still presented to detect the operation performed again by the user, and the second identifier sequence is re-determined based on the operation track and is matched with the first identifier sequence, but the first identifier layout is presented in a non-transformation manner, so that the possibility that the first identifier sequence is broken by the first identifier layout presented based on the transformation manner is avoided, and the security of the electronic device is further enhanced.
When the number of times that the second identification sequence is not matched with the first identification sequence exceeds the threshold value, the electronic device can refuse to respond to the instruction within the preset time so as to ensure the data security of the electronic device.
Example four
For technical details that are not disclosed in the device embodiments, please refer to the description of the method embodiments; as shown in fig. 6, the electronic device according to the present embodiment includes:
a receiving unit 10 for receiving an instruction;
a presentation unit 20, configured to execute the instruction and present a first identification layout; the first identifier layout is selected from at least two different second identifier layouts, the at least two different second identifier layouts are determined based on a first identifier sequence, and the first identifier sequence is obtained based on a third identifier layout;
an analyzing unit 30 configured to analyze an operation obtained based on the first identifier layout;
a detecting unit 40, configured to detect whether the second identification sequence matches the first identification sequence, and respond to the operation based on a matching result; the second identification sequence is a sequence of identifications triggered by the operation track of the operation in the first identification layout in sequence.
As an embodiment, the electronic device further comprises:
a determining unit (not shown in the figures, coupled to the parsing unit 30) for determining the at least two different second identification layouts among the candidate identification layouts based on the first identification sequence; wherein,
the first identification sequence does not have identifications different from the identifications in the first identification sequence in the corresponding distribution track in the second identification layout.
As an embodiment, the determining unit comprises (not shown in the figures):
a first layout generation module for generating at least two candidate tag layouts;
a first assigning module (coupled to the first layout generating module) for assigning any two adjacent positions in the candidate tag layouts to tags in the first tag sequence for each of the candidate tag layouts until all tags in the first tag sequence are assigned to positions in the candidate tag layouts;
and the judging module (coupled with the first distributing module) is used for judging whether a distribution track formed by the first identification sequence at the position of the candidate identification layout comprises a position which is not distributed to the first identification sequence, and if the distribution track does not comprise the position which is not distributed to the first identification sequence, judging that the candidate identification layout is the second identification layout.
As an embodiment, the determining unit may include (not shown in the figure):
the second layout generation module is used for generating N candidate identifier layouts, wherein N is an integer greater than or equal to 2;
a second allocating module (coupled to the second layout generating module) configured to place an identifier i in the first identifier sequence at a position i of a candidate identifier layout j, place an identifier i +1 in the first identifier sequence at a position i +1 of the candidate identifier layout j, where the position i and the position i +1 are different positions in the candidate layout j, a value of i is greater than or equal to 1 and less than or equal to M, M is a number of identifiers in the first identifier sequence, and a value of j is greater than or equal to 1 and less than or equal to j and less than or equal to N;
a second determining module (coupled to the second allocating module) configured to determine whether a trajectory formed by the identifier i and the identifier i +1 passes through a position k in the candidate identifier layout j, where the position k is different from the position i and the position i + 1;
and if so, judging the candidate mark layout j as the second mark layout.
As an embodiment, the parsing unit 30 is further configured to parse an operation point of the operation, and determine whether the operation point meets a preset condition;
and when the preset condition is met, obtaining the operation track of the operation based on the analyzed operation point.
As an embodiment, the parsing unit 30 further comprises (not shown in the figure):
a determination module, configured to determine an operation trajectory of the operation based on an operation point of the operation;
and the matching module (coupled with the determining module) is used for matching the operation track with the position in the first identifier layout, obtaining identifiers sequentially positioned on the operation track through matching, and determining the second identifier sequence based on the identifiers sequentially obtained through matching.
As an embodiment, the detecting unit 40 is further configured to, when the first identifier sequence and the second identifier sequence do not match, re-acquire an operation using the first identifier layout, match a third identifier sequence triggered in the first identifier layout by an operation trajectory of the re-acquired operation with the first identifier sequence, and respond to the re-acquired operation based on a matching result.
In practical applications, the receiving unit 10, the analyzing unit 30, and the detecting unit 40 may be implemented by a Microprocessor (MCU), a logic programmable gate array (FPGA), or an Application Specific Integrated Circuit (ASIC) in an electronic device; the display unit 20 may be implemented by a display screen and a display driving module circuit of an electronic device.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.
Claims (14)
1. An information processing method, characterized in that the method comprises:
receiving an instruction;
executing the instruction and presenting a first identification layout; the first identifier layout is selected from at least two different second identifier layouts, the at least two different second identifier layouts are determined based on a first identifier sequence, and the first identifier sequence is obtained based on a third identifier layout;
analyzing the operation obtained based on the first identification layout;
detecting whether a second identification sequence is matched with the first identification sequence or not, and responding to the operation based on a matching result; the second identification sequence is a sequence of identifications triggered by the operation track of the operation in the first identification layout in sequence.
2. The method of claim 1, further comprising:
determining the at least two different second identification layouts among the candidate identification layouts based on the first identification sequence; wherein,
the first identification sequence does not have identifications different from the identifications in the first identification sequence in the corresponding distribution track in the second identification layout.
3. The method of claim 2, wherein determining the at least two different second identification layouts among the candidate identification layouts based on the first identification sequence comprises:
generating at least two candidate tag layouts;
for each of the candidate tag layouts, assigning positions in the candidate tag layout to tags in the first tag sequence until all tags in the first tag sequence are assigned to positions in the candidate tag layout;
and judging whether a distribution track formed by the first identifier sequence at the position of the candidate identifier layout passes through the position of the identifier which is not allocated to the first identifier sequence, if not, judging that the candidate identifier layout is the second identifier layout.
4. The method of claim 2, wherein determining the at least two different second identification layouts among the candidate identification layouts based on the first identification sequence comprises:
generating N candidate mark layouts, wherein N is an integer greater than or equal to 2;
placing an identifier i in the first identifier sequence at a position i of a candidate identifier layout j, and placing an identifier i +1 in the first identifier sequence at a position i +1 of the candidate identifier layout j, wherein the position i and the position i +1 are different positions in the candidate layout j, the value of i is greater than or equal to 1 and less than or equal to M, M is the number of identifiers in the first identifier sequence, and the value of j is greater than or equal to 1 and less than or equal to N;
judging whether a track formed by the identifier i and the identifier i +1 passes through a position k in the candidate identifier layout j, wherein the position k is different from the position i and the position i + 1;
and if not, judging that the candidate mark layout j is the second mark layout.
5. The method of claim 1, further comprising:
analyzing the operation point of the operation, and judging whether the operation point meets a preset condition or not;
and when the preset condition is met, obtaining the operation track of the operation based on the analyzed operation point.
6. The method of claim 5, further comprising:
determining an operation track of the operation based on the operation point of the operation;
matching the operation track with a position in the first identifier layout;
and obtaining identifiers sequentially positioned on the operation track through matching, and determining the second identifier sequence based on the identifiers sequentially obtained through matching.
7. The method of any of claims 1 to 6, wherein said responding to said operation based on a matching result comprises:
when the first identification sequence does not match the second identification sequence,
and re-acquiring the operation by using the first identification layout, matching a third identification sequence triggered in the first identification layout by using the operation track of the re-acquired operation with the first identification sequence, and responding to the re-acquired operation based on the matching result.
8. An electronic device, characterized in that the electronic device comprises:
a receiving unit for receiving an instruction;
the presentation unit is used for executing the instruction and presenting a first identification layout; the first identifier layout is selected from at least two different second identifier layouts, the at least two different second identifier layouts are determined based on a first identifier sequence, and the first identifier sequence is obtained based on a third identifier layout;
the analysis unit is used for analyzing the operation obtained based on the first identification layout;
the detection unit is used for detecting whether the second identification sequence is matched with the first identification sequence or not and responding to the operation based on the matching result; the second identification sequence is a sequence of identifications triggered by the operation track of the operation in the first identification layout in sequence.
9. The electronic device of claim 8, further comprising:
a determining unit configured to determine the at least two different second tag layouts among the candidate tag layouts based on the first tag sequence; wherein,
the first identification sequence does not have identifications different from the identifications in the first identification sequence in the corresponding distribution track in the second identification layout.
10. The electronic device according to claim 9, wherein the determination unit includes:
a first layout generation module for generating at least two candidate tag layouts;
a first allocation module, configured to allocate, for each candidate identifier layout, any two adjacent positions in the candidate identifier layout to identifiers in the first identifier sequence until all identifiers in the first identifier sequence are allocated to positions in the candidate identifier layout;
and the judging module is used for judging whether a distribution track formed by the first identifier sequence at the position of the candidate identifier layout comprises a position which is not distributed to the first identifier sequence, and if the distribution track does not comprise the position which is not distributed to the first identifier sequence, judging that the candidate identifier layout is the second identifier layout.
11. The electronic device according to claim 9, wherein the determination unit includes:
the second layout generation module is used for generating N candidate identifier layouts, wherein N is an integer greater than or equal to 2;
a second allocating module, configured to place an identifier i in the first identifier sequence at a position i of a candidate identifier layout j, and place an identifier i +1 in the first identifier sequence at a position i +1 of the candidate identifier layout j, where the position i and the position i +1 are different positions in the candidate layout j, a value of i is greater than or equal to 1 and less than or equal to M, M is the number of identifiers in the first identifier sequence, and a value of j is greater than or equal to 1 and less than or equal to j and less than or equal to N;
a second judging module, configured to judge whether a trajectory formed by the identifier i and the identifier i +1 passes through a position k in the candidate identifier layout j, where the position k is different from the position i and the position i + 1;
if yes, the candidate mark layout j is judged to be the second mark layout.
12. The electronic device of claim 8,
the analysis unit is further used for analyzing the operation point of the operation and judging whether the operation point meets a preset condition;
and when the preset condition is met, obtaining the operation track of the operation based on the analyzed operation point.
13. The electronic device of claim 12, wherein the parsing unit further comprises:
a determination module, configured to determine an operation trajectory of the operation based on an operation point of the operation;
and the matching module is used for matching the operation track with the position in the first identifier layout to obtain identifiers sequentially positioned on the operation track, and determining the second identifier sequence based on the identifiers sequentially matched.
14. The electronic device according to any one of claims 8 to 13, wherein the detecting unit is further configured to, when the first identification sequence does not match the second identification sequence, re-acquire an operation using the first identification layout, match a third identification sequence triggered in the first identification layout using an operation trajectory of the re-acquired operation with the first identification sequence, and respond to the re-acquired operation based on a matching result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410851694.XA CN104766004A (en) | 2014-12-31 | 2014-12-31 | Information processing method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410851694.XA CN104766004A (en) | 2014-12-31 | 2014-12-31 | Information processing method and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104766004A true CN104766004A (en) | 2015-07-08 |
Family
ID=53647826
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410851694.XA Pending CN104766004A (en) | 2014-12-31 | 2014-12-31 | Information processing method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104766004A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107480505A (en) * | 2017-07-11 | 2017-12-15 | 广州视源电子科技股份有限公司 | Equipment unlocking path generation method and device, unlocking method and device, and terminal |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104166516A (en) * | 2014-07-31 | 2014-11-26 | 宇龙计算机通信科技(深圳)有限公司 | Sliding unlocking method and device |
CN104166817A (en) * | 2014-08-19 | 2014-11-26 | 深圳市金立通信设备有限公司 | Touch screen unlocking method |
CN104200142A (en) * | 2014-08-19 | 2014-12-10 | 深圳市金立通信设备有限公司 | Terminal |
-
2014
- 2014-12-31 CN CN201410851694.XA patent/CN104766004A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104166516A (en) * | 2014-07-31 | 2014-11-26 | 宇龙计算机通信科技(深圳)有限公司 | Sliding unlocking method and device |
CN104166817A (en) * | 2014-08-19 | 2014-11-26 | 深圳市金立通信设备有限公司 | Touch screen unlocking method |
CN104200142A (en) * | 2014-08-19 | 2014-12-10 | 深圳市金立通信设备有限公司 | Terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107480505A (en) * | 2017-07-11 | 2017-12-15 | 广州视源电子科技股份有限公司 | Equipment unlocking path generation method and device, unlocking method and device, and terminal |
CN107480505B (en) * | 2017-07-11 | 2019-09-03 | 广州视源电子科技股份有限公司 | Equipment unlocking path generation method and device, unlocking method and device, and terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101860096B1 (en) | Password verifying device and method | |
CN103365581A (en) | User equipment touch unlocking method and device based on unlocking password | |
US10547624B2 (en) | Identity authentication method, apparatus, and system | |
US9384369B2 (en) | Information processing method and electronic device | |
US20140373178A1 (en) | Method, Apparatus and Server for User Verification | |
CN103795868A (en) | Mobile terminal screen unlocking method and device and mobile terminal | |
CN104049897A (en) | Touch screen device unlocking method and device | |
CN102316112A (en) | Password authentication method in network application and system | |
CN105678147B (en) | Touch operation method and device | |
CN109117616B (en) | Verification method and device, electronic equipment and computer readable storage medium | |
CN106203038B (en) | A kind of unlocking method and mobile terminal | |
CN103701600A (en) | Input validation method and device | |
WO2016206398A1 (en) | Method and apparatus for controlling electronic device, and method and apparatus for unlocking hand-held terminal | |
WO2021244531A1 (en) | Payment method and apparatus based on facial recognition | |
CN105094652A (en) | Touch screen unlocking method and device, electronic equipment, display and mobile terminal | |
CN105184133A (en) | Authentication method and apparatus, and corresponding mobile terminal | |
CN108765786B (en) | Two-dimensional code withdrawal safety verification method and system and computer storage medium | |
CN106407761B (en) | Unlocking method and unlocking device | |
CN106250730B (en) | A kind of smartwatch unlocking method and a device | |
CN111953647B (en) | Security verification method and device, electronic equipment and storage medium | |
CN107808082B (en) | Electronic device, data access verification method, and computer-readable storage medium | |
CN104766004A (en) | Information processing method and electronic equipment | |
CN105306209A (en) | Password setting method, login method and devices | |
JP5705177B2 (en) | INPUT INFORMATION AUTHENTICATION DEVICE, SERVER DEVICE, INPUT INFORMATION AUTHENTICATION SYSTEM, AND DEVICE PROGRAM | |
CN109697345A (en) | A kind of data destruction method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150708 |