CN105335674B - Password burglary-preventing method and device - Google Patents

Password burglary-preventing method and device Download PDF

Info

Publication number
CN105335674B
CN105335674B CN201410386637.9A CN201410386637A CN105335674B CN 105335674 B CN105335674 B CN 105335674B CN 201410386637 A CN201410386637 A CN 201410386637A CN 105335674 B CN105335674 B CN 105335674B
Authority
CN
China
Prior art keywords
password
user
input
application
control object
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410386637.9A
Other languages
Chinese (zh)
Other versions
CN105335674A (en
Inventor
艾忠元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201410386637.9A priority Critical patent/CN105335674B/en
Priority to CN201811630017.XA priority patent/CN109635601B/en
Publication of CN105335674A publication Critical patent/CN105335674A/en
Application granted granted Critical
Publication of CN105335674B publication Critical patent/CN105335674B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of password burglary-preventing method and devices, application of the password burglary-preventing method therein suitable for the Intelligent mobile equipment for showing interface for password input to user in the process of running, the method comprising the steps of: in the case where showing interface for password input to user in application operational process, intercept the password of user's input, by the password storage being truncated in predetermined variable, and storage is different from the dummy letter of the password in the password control object of application creation;In the case where the application needs to carry out subsequent operation using the password that user inputs, the password is obtained from the predetermined variable, and it is supplied to application, make the application that the password that the password obtained from the predetermined variable is inputted as user is executed subsequent operation.

Description

Password burglary-preventing method and device
Technical field
The present invention relates to information security technologies, fill more particularly to a kind of password burglary-preventing method and corresponding cipher anti theft It sets.
Background technique
Some in Intelligent mobile equipment apply and log in or durings payment etc. executing, it will usually it is required that user is referring to Password is inputted at fixed position or username and password is inputted at specified position.Operating system in Intelligent mobile equipment There is provided corresponding safety measure often to guarantee that the password of user's input will not maliciously be stolen;One specific example, base Almost all of application in the Intelligent mobile equipment of iOS is all based on the primary password control of iOS to obtain user password, and Execute the operations such as subsequent login or payment;One specific implementation process of the example are as follows: user inputs password by soft keyboard, The password is stored into password control, and does not show the password of user's input (as only shown identical digit in user interface Dot etc.), later, using the password of the acquisition user input from password control, and execute the behaviour such as subsequent login or payment Make.
Inventor has found that there is the password quilts of user's input in some Intelligent mobile equipments in realizing process of the present invention The phenomenon that malice is stolen has system permission using due to escaping from prison such as in the Intelligent mobile equipment based on the iOS to escape from prison, Making to apply may be implemented across application access, i.e., the data of the one accessible other application of application;(such as to some malicious applications IKeyMonitor etc.) can use across this feature of application access obtain other application user log in or pay waited The password that user is inputted in journey.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind State the password burglary-preventing method and device of problem.
According to one aspect of the present invention, a kind of password burglary-preventing method is provided, this method is suitable in the process of running The application in the Intelligent mobile equipment of interface for password input is shown to user, the method includes the steps: applying operational process In the case where the middle displaying interface for password input to user, the password of interception user's input, by the password storage being truncated in predetermined In variable, and storage is different from the dummy letter of the password in the password control object of application creation;It is needed in the application In the case where carrying out subsequent operation using the password that user inputs, the password is obtained from the predetermined variable, and be supplied to Using the password execution subsequent operation for inputting the application password obtained from the predetermined variable as user.
According to another aspect of the present invention, a kind of cipher anti-theft device is provided, which is suitable in the process of running The application in the Intelligent mobile equipment of interface for password input is shown to user, and described device includes: cryptographic handling module, is suitable for In the case where showing interface for password input to user in application operational process, the password of interception user's input, by what is be truncated to Storage is different from the false close of the password to password storage in predetermined variable, and in the password control object of application creation Code;Password obtains module, in the case where suitable for needing the password progress subsequent operation using user's input in the application, from institute It states and obtains the password in predetermined variable, and be supplied to the application, obtain the application will from the predetermined variable Password executes subsequent operation as the password that user inputs.
The password that password burglary-preventing method and device of the invention is inputted by interception user, and in the password of application creation Storage is different from the dummy letter of the password of user's input in control object, in this way, (being referred to as malice journey in malicious application Sequence) by across application access mode come from the password control object that some is applied obtain password when, from password control object In the password that gets be not user's input true password, but dummy letter disliked so as to avoid the password of user The phenomenon that meaning application is stolen;The present invention passes through the password storage that the user that will be intercepted inputs to be needed in specifying variable, and in application When the true password for wanting user to input the operation such as logs in or pay to execute, password is obtained from specifying variable, in this way, Corresponding operation is carried out using the true password that can use user's input, to have peace in the true password for guaranteeing user Make to apply under the premise of full property and can correctly execute corresponding operation;The final present invention improves the safety of userspersonal information Property, avoid the leakage as userspersonal information and unnecessary damage caused by property or the person to user etc. It loses.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field Technical staff will become clear.Figure of description only for the purpose of illustrating preferred embodiments, and is not considered as pair Limitation of the invention.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows according to embodiments of the present invention one password burglary-preventing method flow chart;
Fig. 2 shows according to embodiments of the present invention two password burglary-preventing method flow charts;
Fig. 3 shows according to embodiments of the present invention three password burglary-preventing method schematic diagram;
Fig. 4 shows according to embodiments of the present invention four cipher anti-theft device schematic diagram;
Fig. 5 shows according to embodiments of the present invention five cipher anti-theft device schematic diagram.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure It is fully disclosed to those skilled in the art.
Embodiment one, password burglary-preventing method.
The present embodiment changes the intelligent sliding where application by intercepting the application password that user inputs in the process of running Data transmission channel between keyboard (such as soft keyboard) input of dynamic equipment and password control object, by the true close of user's input Code is stored in predetermined variable, while storage dummy letter is (such as complete with the password digit of user's input in password control object Identical dummy letter), and durings subsequent login or payment etc., no longer make close using being obtained from password control object Code, but password is obtained from predetermined variable, in this way, the present embodiment in the case where ensure that using operating normally, makes malice The password that program (such as iKeyMonitor) is captured from the password control object of application build is dummy letter;To this reality Apply the safety that example effectively increases password.
It is described in detail below with reference to specific implementation step of the Fig. 1 to the method for the present embodiment.
S100, application operational process in user show interface for password input in the case where, interception user input it is close Code by the password storage being truncated in predetermined variable, and stores in the password control object of application creation different from above-mentioned The dummy letter of password.
Specifically, inputting password if necessary to user, then application will create password control pair using in the process of running As, and include the corresponding interface for password input of password control object in the user interface of its building.User can pass through key Disk is based on the interface for password input and inputs password;For example, user can be by way of soft keyboard and based on Password Input circle Face inputs its password.In the case where Intelligent mobile equipment is circumscribed with keyboard equipment, user can also be set by external keyboard It is standby and its password is inputted based on the interface for password input.
The present embodiment intercepts there are many passwords of user's input, for example, what can be supported using password control object is showed Some callback methods (being referred to as call back function) come intercept user input password.
In the case where application creates its password control object using existing mode, process of the user in input password In, password control object can receive the password of user's input, and store the password of user's input, meanwhile, password control object Can show that dot or star such as spend at the character or symbol of non-password in interface for password input, with hide user input it is true Password.
The present embodiment can expand password control object during application creates password control object accordingly Exhibition is such as inserted into corresponding program code in the corresponding position of password control object, defeated to receive user in password control object When the password entered, the password of user's input is intercepted by callback method that password control object is supported, and will be successfully truncated to Password storage in predetermined variable, meanwhile, to password control object provide dummy letter, make password control object store password Dummy letter for the password inputted different from user;Likewise, the password control object of the application creation of the present embodiment can be close Show that dot or star such as spend at the character or symbol of non-password in code input interface, with hide user input it is true close Code.
The dummy letter that the present embodiment is stored in password control object can be the digit of the password of digit and user's input Identical dummy letter;In addition, the dummy letter can be random number or predetermined character etc.;Here predetermined character can be display Dot or star in interface for password input are spent.
In the present embodiment, the specifying variable of the password of storage user input generally falls into memory variable, in this way, applying After end of run, memory variable can be automatically released, and so as to avoid applying after end of run, still be stayed in Intelligent mobile equipment There is the phenomenon that password of user's input, eliminates the security risk that the password of the retention may will be leaked.
S110, above-mentioned application need using user input password carry out subsequent operation in the case where, from predetermined variable Middle acquisition password, and it is supplied to the application, make to apply and holds the password that the password obtained from predetermined variable is inputted as user Row subsequent operation.
Specifically, needing the case where carrying out the operations such as subsequent login or payment using the password that user inputs in application Under, the present embodiment is to obtain password from predetermined variable to be supplied to application, rather than from the password control object that application creates It obtains password and is supplied to application;For example, user can click in user interface after user completes the input operation of password " login " or the buttons such as " determination " or " payment ", in the case, the present embodiment obtained from memory variable user input True password is supplied to application, rather than obtains dummy letter from password control and be supplied to application;In this way, using can will be from The password obtained in predetermined variable executes the operations such as corresponding login or payment as the password that user inputs.Specifically step on The specific implementation process of the operations such as record or payment is no longer described in detail herein.
Embodiment two, password burglary-preventing method.
The password that application in the present embodiment is inputted by intercepting user, and the keyboard for changing Intelligent mobile equipment is (such as soft Keyboard) input password control object between data transmission channel, by user input true password storage in predetermined variable In, while dummy letter (the identical dummy letter of password digit such as inputted with user) is stored in password control object, and Durings subsequent login or payment etc., using no longer obtaining password from password control object, but from predetermined variable Password is obtained, in this way, the present embodiment makes rogue program (such as iKeyMonitor in the case where ensure that using operating normally Deng) password that captures from the password control object of application build is dummy letter;To which the present embodiment effectively increases password Safety.
It is described in detail below with reference to specific implementation step of the Fig. 2 to the method for the present embodiment.
In Fig. 2, the application in S200, Intelligent mobile equipment shows to include Password Input frame to user in the process of running User interface.
Specifically, the Intelligent mobile equipment in the present embodiment can be the intelligence based on iOS (including based on the iOS to escape from prison) Mobile device, certainly, if other operating systems used in terms of password control with based on the same or similar processing of iOS Mode, then the Intelligent mobile equipment in the present embodiment may be the Intelligent mobile equipment using other operating systems.
Application in Intelligent mobile equipment inputs password in the process of running, if necessary to user, then application will create close Code control object, and include the corresponding Password Input frame of the password control object in the user interface of its building.User can be with The Password Input frame, which is based on, by keyboard inputs password;For example, user can be by way of soft keyboard and defeated based on the password Enter frame and inputs its password.In the case where Intelligent mobile equipment is circumscribed with keyboard equipment, user can also pass through external keyboard Equipment and its password is inputted based on the Password Input frame.
S210, the password inputted using interception user by user interface, by the password storage being truncated in predetermined variable In, and storage is different from the dummy letter of the password of its interception in the password control object of its creation.
Specifically, the present embodiment can be propped up using password control object there are many passwords of application interception user's input The existing callback method (being referred to as call back function) held intercept user input password.
In the case where application creates its password control object using existing mode, process of the user in input password In, password control object can receive the password of user's input, and store the password of user's input, meanwhile, password control object Can show that dot or star such as spend at the character or symbol of non-password in the password input box, with hide user input it is true Password.
The application of the present embodiment can carry out password control object corresponding during creating password control object Extension is such as inserted into corresponding program code in the corresponding position of password control object, to receive user in password control object When the password of input, the password of user's input is intercepted by callback method that password control object is supported, and will successfully be intercepted To password storage in predetermined variable, meanwhile, to password control object provide dummy letter, make password control object store it is close Code is the dummy letter of the password inputted different from user;Likewise, the password control object of the application creation of the present embodiment can be Show that dot or star such as spend at the character or symbol of non-password in Password Input frame, to hide the true close of user's input Code.
The dummy letter that the present embodiment is stored in password control object can be the digit of the password of digit and user's input Identical dummy letter;In addition, the dummy letter can be random number or predetermined character etc.;Here predetermined character can be display Dot or star in the password input box is spent.
In the present embodiment, the specifying variable of the password of storage user input generally falls into memory variable, in this way, applying After end of run, memory variable can be automatically released, and so as to avoid applying after end of run, still be stayed in Intelligent mobile equipment There is the phenomenon that password of user's input, eliminates the security risk that the password of the retention may will be leaked.
S220, in the case where application needs to carry out subsequent operation using the password that user inputs, using from predetermined variable Middle acquisition password.
Specifically, needing the case where carrying out the operations such as subsequent login or payment using the password that user inputs in application Under, password is obtained from predetermined variable using meeting, rather than obtains password from the password control object that it is created;For example, After user completes the input operation of password, user can click in user interface " login " either " determination " or " payment " Equal buttons, in the case, using the true password for obtaining user's input from memory variable, rather than from password control Obtain dummy letter.
S230, subsequent operation is executed using the password for inputting the password obtained from predetermined variable as user.
Specifically, executing and stepping on accordingly as the password that user inputs using the password for obtaining it from predetermined variable The operation such as record or payment.The specific implementation process of the operations such as specific login or payment is no longer described in detail herein.
Embodiment three, password burglary-preventing method.It is described in detail below with reference to method of the Fig. 3 to the present embodiment.
In Fig. 3, certain in step 1, the Intelligent mobile equipment based on the iOS to escape from prison is applied in execution building password control pair After equal operation, login window as shown in Figure 3 is shown to user, user inputs close by the soft keyboard in the login window Code.
Step 2, the application intercept the password that user is inputted by soft keyboard in such a way that password control object is supported; For example, include in the password control object of the application creation callback method in UITextFieldDelegate (such as ShoudChangeCharactersInRanges), which is the open interface of iOS, is not interfered with using the interface Audit and restocking of application etc..
Step 3, the true password storage inputted using the user intercepted are in memory variable.
Step 4 is sent to password control object using by dummy letter, and password control object stores the dummy letter, i.e. password Dummy letter is stored in password control object by the plug-in unit in control object.
The dummy letter that above-mentioned application is sent to password control object can be identical as the true password digit that user inputs Dot.Password control object can show dot in the Password Input frame of login window, in this way, the present embodiment can be kept It is consistent with iOS usage experience.
It should be strongly noted that above-mentioned steps 3 and step 4 usually executed parallel.
Step 5, user click " login " button in login interface after the completion of Password Input, at this point, using from memory The true password that user's input is obtained in variable executes subsequent register, and does not use and store in password control object Dummy letter execute subsequent register.
Step 6, malicious plugins (being referred to as rogue program or malicious application, such as iKeyMonitor) are across application When grabbing password from the password control object of this application, the password grabbed is not the true password of user's input, But dummy letter, such as the password that malicious plugins grab is four dots.
Example IV, cipher anti-theft device.It is described in detail below with reference to device of the Fig. 4 to the present embodiment.
Cipher anti-theft device shown in Fig. 4 is generally disposed in Intelligent mobile equipment, and the Intelligent mobile equipment can be with For the Intelligent mobile equipment based on iOS (including based on the iOS to escape from prison), certainly, if other operating systems are in password control side Face is used with based on the same or similar processing mode of iOS, then the Intelligent mobile equipment in the present embodiment may be to adopt With the Intelligent mobile equipment of other operating systems.
Cipher anti-theft device shown in Fig. 4 specifically includes that cryptographic handling module 400 and password obtain module 410.
Cryptographic handling module 400 is primarily adapted for the case where showing interface for password input to user in application operational process Under, the password of interception user's input, by the password storage being truncated in predetermined variable, and in the password control of above-mentioned application creation Storage is different from the dummy letter of above-mentioned password in part object.
Specifically, inputting password if necessary to user, then application will create password control pair using in the process of running As, and include the corresponding interface for password input of password control object in the user interface of its building.User can pass through key Disk is based on the interface for password input and inputs password;For example, user can be by way of soft keyboard and based on Password Input circle Face inputs its password.In the case where Intelligent mobile equipment is circumscribed with keyboard equipment, user can also be set by external keyboard It is standby and its password is inputted based on the interface for password input.
Cryptographic handling module 400 intercepts there are many passwords of user's input, for example, cryptographic handling module 400 can use The existing callback method (being referred to as call back function) that password control object is supported intercept user input password.
In the case where application creates its password control object using existing mode, process of the user in input password In, password control object can receive the password of user's input, and store the password of user's input, meanwhile, password control object Can show that dot or star such as spend at the character or symbol of non-password in interface for password input, with hide user input it is true Password.
The present embodiment can expand password control object during application creates password control object accordingly Exhibition is such as inserted into cryptographic handling module 400 in the corresponding position of password control object, defeated to receive user in password control object When the password entered, cryptographic handling module 400 intercepts the password that user inputs by the callback method that password control object is supported, And by the password storage being successfully truncated in predetermined variable, meanwhile, cryptographic handling module 400 provides false to password control object Password, the dummy letter for the password that the password for storing password control object is inputted different from user;Likewise, the present embodiment It can show that dot or star such as spend at the character or symbol of non-password in interface for password input using the password control object of creation Number, to hide the true password of user's input.
The dummy letter that cryptographic handling module 400 is stored in password control object can be the password of digit and user's input The identical dummy letter of digit;In addition, the dummy letter can be random number or predetermined character etc.;Here predetermined character can be with Dot or star to be shown in interface for password input are spent.
In the present embodiment, the specifying variable of the password of storage user input generally falls into memory variable, in this way, applying After end of run, memory variable can be automatically released, and so as to avoid applying after end of run, still be stayed in Intelligent mobile equipment There is the phenomenon that password of user's input, eliminates the security risk that the password of the retention may will be leaked.
Password obtains module 410 and is primarily adapted for needing the case where carrying out subsequent operation using the password that user inputs in application Under, password is obtained from above-mentioned predetermined variable, and be supplied to application, make using using the password obtained from predetermined variable as use The password of family input executes subsequent operation.
Specifically, needing the case where carrying out the operations such as subsequent login or payment using the password that user inputs in application Under, it is acquisition password and the password control for being supplied to application, rather than creating from application from predetermined variable that password, which obtains module 410, Password is obtained in part object and is supplied to application;For example, user can click after user completes the input operation of password " login " in user interface either buttons such as " determination " or " payment ", in the case, password obtains module 410 from memory The true password that user's input is obtained in variable is supplied to application, rather than acquisition dummy letter is supplied to and answers from password control With;In this way, using can be executed using the password obtained from predetermined variable as the password that user inputs it is corresponding log in or The operations such as person's payment.The specific implementation process of the operations such as specific login or payment is no longer described in detail herein.
Embodiment five, cipher anti-theft device.It is described in detail below with reference to device of the Fig. 5 to the present embodiment.
Cipher anti-theft device shown in Fig. 5 is generally disposed in Intelligent mobile equipment, and the Intelligent mobile equipment can be with For the Intelligent mobile equipment based on iOS (including based on the iOS to escape from prison), certainly, if other operating systems are in password control side Face is used with based on the same or similar processing mode of iOS, then the Intelligent mobile equipment in the present embodiment may be to adopt With the Intelligent mobile equipment of other operating systems.
Cipher anti-theft device shown in Fig. 5 specifically includes that showing interface module 500, cryptographic handling module 510, password Obtain module 520 and flow executing modules 530.
Showing interface module 500 is primarily adapted in the operational process of the application in Intelligent mobile equipment, shows to user It include the user interface of Password Input frame.
Specifically, inputting password if necessary to user, then interface in the operational process of the application in Intelligent mobile equipment Display module 500 will create password control object, and corresponding comprising the password control object in the user interface of its building Password Input frame.User can be based on the Password Input frame by keyboard and input password;For example, user can pass through soft keyboard Mode and its password is inputted based on the Password Input frame.In the case where Intelligent mobile equipment is circumscribed with keyboard equipment, Yong Huye Its password can be inputted by external keyboard equipment and based on the Password Input frame.
Cryptographic handling module 510 is primarily adapted for intercepting the password of user's input, and the password storage being truncated to is become in predetermined In amount, and storage is different from the dummy letter of the password in the password control object of application creation.
Specifically, cryptographic handling module 510 intercepts there are many passwords of user's input, as cryptographic handling module 510 can be with The existing callback method (being referred to as call back function) supported using password control object intercept user input it is close Code.
In the case where application creates its password control object using existing mode, process of the user in input password In, password control object can receive the password of user's input, and store the password of user's input, meanwhile, password control object Can show that dot or star such as spend at the character or symbol of non-password in the password input box, with hide user input it is true Password.
The showing interface module 500 of the present embodiment can be during creating password control object, to password control pair As being extended accordingly, it such as is inserted into cryptographic handling module 510 in the corresponding position of password control object, in password control pair As receive user input password when, cryptographic handling module 510 is intercepted by the callback method that password control object is supported The password of user's input, and by the password storage being successfully truncated in predetermined variable, meanwhile, cryptographic handling module 510 is to close Code control object provides dummy letter, the password for inputting the password stored in password control object different from user it is false close Code;Likewise, the password control object that showing interface module 500 creates can show that dot or star are spent in the password input box The character or symbol of non-password, to hide the true password of user's input.
The dummy letter that cryptographic handling module 510 is stored in password control object can be the password of digit and user's input The identical dummy letter of digit;In addition, the dummy letter can be random number or predetermined character etc.;Here predetermined character can be with To show that dot in the password input box or star are spent.
In the present embodiment, the specifying variable of the password of storage user input generally falls into memory variable, in this way, applying After end of run, memory variable can be automatically released, and so as to avoid applying after end of run, still be stayed in Intelligent mobile equipment There is the phenomenon that password of user's input, eliminates the security risk that the password of the retention may will be leaked.
Password obtains module 520 and is primarily adapted for needing the case where carrying out subsequent operation using the password that user inputs in application Under, password is obtained from predetermined variable.
Specifically, needing the case where carrying out the operations such as subsequent login or payment using the password that user inputs in application Under, password obtains module 520 and understands the password control that obtain password from predetermined variable, rather than create from showing interface module 500 Password is obtained in part object;For example, user can click in user interface after user completes the input operation of password " login " either buttons such as " determination " or " payment ", in the case, password obtain module 520 and obtain use from memory variable The true password of family input, rather than dummy letter is obtained from password control.
Flow executing modules 530 are primarily adapted for the password that the password that will be obtained from predetermined variable is inputted as user and execute Subsequent operation.
Specifically, the password that flow executing modules 530 obtain password acquisition module 520 from predetermined variable is as user The password of input and execute corresponding log in or the operations such as payment.The specific implementation of the operations such as specific login or payment Journey is no longer described in detail herein.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein. Various general-purpose systems can also be used together with teachings based herein.According to specific descriptions above, this kind of system institute is constructed It is required that structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use Various programming languages realize summary of the invention described herein, and the description done above to language-specific is to disclose Preferred forms of the invention.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice Microprocessor or digital signal processor (DSP) come realize some in cipher anti-theft device according to an embodiment of the present invention or The some or all functions of whole components.The present invention is also implemented as a part for executing method as described herein Or whole device or device program (for example, computer program and computer program product).Such realization present invention Program can store on a computer-readable medium, or can have the form of one or more signals.Such signal It can be downloaded from an internet website to obtain, be perhaps provided on the carrier signal or be provided in any other form.
It should be noted that above-described embodiment is that the present invention will be described, rather than limits the invention, and Those skilled in the art can be designed alternative embodiment without departing from the scope of the appended claims.In claim In, any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" is not excluded for depositing In elements or steps not listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple Such element.The present invention can be by means of including the hardware of several different elements and by means of properly programmed computer To realize.In the unit claims listing several devices, several in these devices can be by same hard Part item embodies.The use of word first, second and third etc. does not indicate any sequence, can be construed to these words Title.

Claims (12)

1. a kind of password burglary-preventing method, this method is suitable for showing the intelligent sliding of interface for password input to user in the process of running Application in dynamic equipment, the method includes the steps:
In the case where showing interface for password input to user in application operational process, the password of interception user's input will be intercepted To password storage in predetermined variable, and application creation password control object in storage be different from the password vacation it is close Code;
In the case where the application needs to carry out subsequent operation using the password that user inputs, obtained from the predetermined variable The password, and it is supplied to the application, input the application using the password obtained from the predetermined variable as user Password execute subsequent operation.
2. password burglary-preventing method as described in claim 1, wherein it is described interception user input password include:
The password that user is inputted by soft keyboard is intercepted by the callback method that the password control object of application creation is supported.
3. password burglary-preventing method as described in claim 1, wherein the predetermined variable belongs to memory variable.
4. password burglary-preventing method as described in claim 1, wherein the position of the digit of the dummy letter and the password of user's input Number is identical.
5. password burglary-preventing method as claimed in claim 1 or 2 or 3 or 4, wherein the Intelligent mobile equipment is based on iOS's Intelligent mobile equipment.
6. a kind of cipher anti-theft device, which is suitable for showing the intelligent sliding of interface for password input to user in the process of running Application in dynamic equipment, described device include:
Cryptographic handling module intercepts user in the case where being suitable for showing interface for password input to user in application operational process The password of input by the password storage being truncated in predetermined variable, and is deposited in the password control object of application creation Storage is different from the dummy letter of the password;
Password obtains module, in the case where suitable for needing the password progress subsequent operation using user's input in the application, from The password is obtained in the predetermined variable, and is supplied to the application, obtain the application will from the predetermined variable The password that inputs as user of password execute subsequent operation.
7. cipher anti-theft device as claimed in claim 6, wherein the cryptographic handling module is also particularly adapted to: by described The password that the callback method interception user supported using the password control object of creation is inputted by soft keyboard.
8. cipher anti-theft device as claimed in claim 6, wherein the predetermined variable belongs to memory variable.
9. cipher anti-theft device as claimed in claim 6, wherein the position of the digit of the dummy letter and the password of user's input Number is identical.
10. the cipher anti-theft device as described in claim 6 or 7 or 8 or 9, wherein the Intelligent mobile equipment is based on iOS Intelligent mobile equipment.
11. a kind of computer readable storage medium is stored thereon with the computer program of cipher anti theft, which is characterized in that the journey The method of any one of claim 1-5 is realized when sequence is executed by processor.
12. a kind of computer equipment including memory, processor and is stored on a memory and can be run on a processor close The antitheft computer program of code, which is characterized in that the processor realizes any one of claim 1-5's when executing described program Method.
CN201410386637.9A 2014-08-07 2014-08-07 Password burglary-preventing method and device Active CN105335674B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410386637.9A CN105335674B (en) 2014-08-07 2014-08-07 Password burglary-preventing method and device
CN201811630017.XA CN109635601B (en) 2014-08-07 2014-08-07 Password anti-theft method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410386637.9A CN105335674B (en) 2014-08-07 2014-08-07 Password burglary-preventing method and device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201811630017.XA Division CN109635601B (en) 2014-08-07 2014-08-07 Password anti-theft method and device

Publications (2)

Publication Number Publication Date
CN105335674A CN105335674A (en) 2016-02-17
CN105335674B true CN105335674B (en) 2019-02-12

Family

ID=55286192

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201811630017.XA Active CN109635601B (en) 2014-08-07 2014-08-07 Password anti-theft method and device
CN201410386637.9A Active CN105335674B (en) 2014-08-07 2014-08-07 Password burglary-preventing method and device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201811630017.XA Active CN109635601B (en) 2014-08-07 2014-08-07 Password anti-theft method and device

Country Status (1)

Country Link
CN (2) CN109635601B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109635601A (en) * 2014-08-07 2019-04-16 北京奇虎科技有限公司 Password burglary-preventing method and device

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653994A (en) * 2016-02-22 2016-06-08 浪潮通用软件有限公司 Method for preventing memory password from leakage
CN112261005B (en) * 2020-09-27 2022-12-06 中孚安全技术有限公司 Method and system for hiding Web secure login password

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1719370A (en) * 2004-07-09 2006-01-11 中国民生银行股份有限公司 Method of implementing cipher protection against computer keyboard information interfference
CN102447558A (en) * 2011-11-22 2012-05-09 王勇 Encryption method using random sequence on-demand and having misleading function
CN103150525A (en) * 2013-01-31 2013-06-12 深圳市金立通信设备有限公司 Password input method and password input terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1756152A (en) * 2004-04-05 2006-04-05 王松 Radix algorithm encryption method for dynamic password
US9245154B2 (en) * 2010-03-08 2016-01-26 Eva Andreasson System and method for securing input signals when using touch-screens and other input interfaces
CN102170350B (en) * 2011-04-11 2014-03-26 桂林电子科技大学 Multiple uncertainty encryption system with misleading function
CN102904725B (en) * 2012-10-22 2016-02-10 广东欧珀移动通信有限公司 A kind of cipher-code input method, device and mobile terminal
CN109635601B (en) * 2014-08-07 2022-01-11 北京奇虎科技有限公司 Password anti-theft method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1719370A (en) * 2004-07-09 2006-01-11 中国民生银行股份有限公司 Method of implementing cipher protection against computer keyboard information interfference
CN102447558A (en) * 2011-11-22 2012-05-09 王勇 Encryption method using random sequence on-demand and having misleading function
CN103150525A (en) * 2013-01-31 2013-06-12 深圳市金立通信设备有限公司 Password input method and password input terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109635601A (en) * 2014-08-07 2019-04-16 北京奇虎科技有限公司 Password burglary-preventing method and device

Also Published As

Publication number Publication date
CN109635601B (en) 2022-01-11
CN109635601A (en) 2019-04-16
CN105335674A (en) 2016-02-17

Similar Documents

Publication Publication Date Title
US11593055B2 (en) Selective screen sharing
Kantarcioglu et al. Securing big data in the age of AI
Memon et al. Colluding apps: Tomorrow's mobile malware threat
US9563773B2 (en) Systems and methods for securing BIOS variables
CN105335674B (en) Password burglary-preventing method and device
CN105809000A (en) Information processing method and electronic device
US20190197216A1 (en) Method, apparatus, and computer-readable medium for executing a logic on a computing device and protecting the logic against reverse engineering
CN104915594B (en) Application program operation method and device
WO2014145186A1 (en) Methods and apparatus for securing user input in a mobile device
US11379568B2 (en) Method and system for preventing unauthorized computer processing
CN110178135B (en) Altering application security to support instant access
US9942221B2 (en) Authentication for blocking shoulder surfing attacks
EP3756119B1 (en) Masked key hopping
US20230018027A1 (en) Virtual keyboard captcha
US10878129B2 (en) Classification of GUI items according to exposure to security sensitive operations
CN106792666A (en) The method and device of network sensitive information in protection wireless network connection
US10642979B1 (en) System and method for application tamper discovery
US11263328B2 (en) Encrypted log aggregation
EP2907064B1 (en) License information access based on developer profiles
Yee Reducing the attack surface for private data
US9642012B1 (en) Mobile device access control with two-layered display
US20180225468A1 (en) System and method for selecting a data entry mechanism during application creation
US10044846B2 (en) Method for executing dual operating systems of smart phone
US9852314B1 (en) Mobile device access control with two-layered display
CN115801271A (en) Method, equipment and storage medium for realizing dynamic password

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220712

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co., Ltd

TR01 Transfer of patent right