CN106161474A - A kind of password determines apparatus and method - Google Patents

A kind of password determines apparatus and method Download PDF

Info

Publication number
CN106161474A
CN106161474A CN201610807535.9A CN201610807535A CN106161474A CN 106161474 A CN106161474 A CN 106161474A CN 201610807535 A CN201610807535 A CN 201610807535A CN 106161474 A CN106161474 A CN 106161474A
Authority
CN
China
Prior art keywords
described
input
encrypted message
finger print
print information
Prior art date
Application number
CN201610807535.9A
Other languages
Chinese (zh)
Inventor
彭生全
Original Assignee
努比亚技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 努比亚技术有限公司 filed Critical 努比亚技术有限公司
Priority to CN201610807535.9A priority Critical patent/CN106161474A/en
Publication of CN106161474A publication Critical patent/CN106161474A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transaction
    • G06Q20/40145Biometric identity checks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0861Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using biometrical features, e.g. fingerprint, retina-scan

Abstract

The invention discloses a kind of password and determine device, this device includes: first detection module, the second detection module, authentication module and determining module.First detection module, under cryptosecurity input pattern, detects the fingerprint coverage condition in fingerprint recognition region;Second detection module is in the case of detecting that fingerprint recognition region keeps being covered by fingerprint, and detection is from the encrypted message of terminal back screen input;The encrypted message of input and the finger print information in fingerprint recognition region are verified by authentication module;Determining module, when encrypted message and finger print information are all proved to be successful, determines that Password Input is correct.The invention also discloses a kind of password and determine method.By embodiment of the present invention scheme, it is possible to increase the security of user cipher input and crypticity, improve Consumer's Experience sense.

Description

A kind of password determines apparatus and method

Technical field

The present invention relates to terminal applies field, particularly relate to a kind of password and determine apparatus and method.

Background technology

More and more universal with intelligent terminal, user uses the scene that terminal pays more and more in public Many, it is often necessary to input various password.Public arena is usually present the facility of camera monitor etc or other people compare Many, it is difficult to ensure that our password is not peeped, thus damage is caused to our property.Based on the problems referred to above, need badly related Technical staff develops a kind of novel cipher code protection method, improves security and the crypticity of user cipher input.

Content of the invention

Present invention is primarily targeted at a kind of password of proposition and determine apparatus and method, it is possible to increase user cipher input Security and crypticity, improve Consumer's Experience sense.

For achieving the above object, the invention provides a kind of password and determine device, this device includes:

First detection module, under cryptosecurity input pattern, detects the fingerprint coverage condition in fingerprint recognition region.

Second detection module, in the case of detecting that fingerprint recognition region keeps being covered by fingerprint, detection is from end The encrypted message of end back screen input.

Authentication module, for verifying to the encrypted message of input and the finger print information in fingerprint recognition region.

Determining module, for when encrypted message and finger print information are all proved to be successful, determines that Password Input is correct.

Alternatively, this device also includes:

Registering modules, for before entering cryptosecurity input pattern, inputs in detection registered fingerprint typing window Finger print information;And the finger print information being inputted is registered.

Alternatively, this device also includes: start module and prompting module.

First detection module, is additionally operable to before entering described cryptosecurity input pattern, detection fingerprint recognition region Finger print information.

Authentication module, is additionally operable to verify whether the finger print information detecting has been registered.

Start module, be additionally operable to when finger print information has been registered, the safe input pattern of setting up password.

Prompting module, is additionally operable to when finger print information is unregistered, sends the prompting message whether carrying out fingerprint register.

Alternatively, authentication module is additionally operable to:

Each code content in the encrypted message of terminal back screen input is identified and/or verifies.

To each code content identification and/or after being proved to be successful, finger print information is being verified, determining that current finger print is believed Breath is for opening the finger print information of cryptosecurity input pattern.

Alternatively, authentication module is further used for:

After determining that the input of current password information completes, the whole code content being inputted are arranged successively according to input sequence Row, and using the whole code content after arrangement as the encrypted message inputting.

By the encrypted message of input compared with the encrypted message prestoring.

When the encrypted message of input is consistent with the encrypted message prestoring, determine that the encrypted message of input is proved to be successful.

When the encrypted message of input is inconsistent with the encrypted message prestoring, determine the encrypted message authentication failed of input.

For achieving the above object, present invention also offers a kind of password and determine method, the method includes:

Under cryptosecurity input pattern, the fingerprint coverage condition in detection fingerprint recognition region.

In the case of detecting that fingerprint recognition region keeps being covered by fingerprint, detection is close from the input of terminal back screen Code information.

The encrypted message of input and the finger print information in fingerprint recognition region are verified.

When encrypted message and finger print information are all proved to be successful, determine that Password Input is correct.

Alternatively, the method also includes: before entering cryptosecurity input pattern, in detection registered fingerprint typing window The finger print information of input;And the finger print information being inputted is registered.

Alternatively, the method also includes:

Before entering cryptosecurity input pattern, the finger print information in detection fingerprint recognition region.

Whether the finger print information that checking detects has been registered.

When finger print information has been registered, the safe input pattern of setting up password.

When finger print information is unregistered, send the prompting message whether carrying out fingerprint register.

Alternatively, the encrypted message of input and the finger print information in fingerprint recognition region are carried out checking and include:

Each code content in the encrypted message of terminal back screen input is identified and/or verifies;

To each code content identification and/or after being proved to be successful, finger print information is being verified, determining that current finger print is believed Breath is for opening the finger print information of cryptosecurity input pattern.

Alternatively, carry out verifying to the encrypted message of input and the finger print information in fingerprint recognition region and also include:

After determining that the input of current password information completes, the whole code content being inputted are arranged successively according to input sequence Row, and using the whole code content after arrangement as the encrypted message inputting.

By the encrypted message of input compared with the encrypted message prestoring.

When the encrypted message of input is consistent with the encrypted message prestoring, determine that the encrypted message of input is proved to be successful.

When the encrypted message of input is inconsistent with the encrypted message prestoring, determine the encrypted message authentication failed of input.

The embodiment of the present invention proposes a kind of password and determines apparatus and method, in embodiment of the present invention scheme, and the first detection Module, under cryptosecurity input pattern, detects the fingerprint coverage condition in fingerprint recognition region;Second detection module is detecting In the case that fingerprint recognition region keeps being covered by fingerprint, detection is from the encrypted message of terminal back screen input;Authentication module The encrypted message of input and the finger print information in fingerprint recognition region are verified;Determining module works as encrypted message and finger print information When being all proved to be successful, determine that Password Input is correct.By embodiment of the present invention scheme, it is possible to increase the safety of user cipher input Property and crypticity, improve Consumer's Experience sense.

Brief description

Fig. 1 is the hardware architecture diagram realizing each one optional mobile terminal of embodiment of the present invention;

Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;

Fig. 3 is that the password of the embodiment of the present invention determines device composition frame chart;

Fig. 4 is the terminal structure schematic diagram of the embodiment of the present invention;

Fig. 5 is that the password of the embodiment of the present invention determines method flow diagram;

Fig. 6 is that the password of the embodiment of the present invention determines method schematic diagram.

The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, are described further referring to the drawings.

Detailed description of the invention

It should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.

Describe referring now to accompanying drawing and realize the present invention one optional mobile terminal of each embodiment.In follow-up description In, use the explanation only for the beneficially present invention for the suffix being used for representing such as " module ", " parts " or " unit " of element, Itself do not has specific meaning.Therefore, " module " and " parts " can mixedly use.

Mobile terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as moving Phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP The mobile terminal of (portable media player), guider etc. and such as numeral TV, desktop computer etc. consolidate Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, mobile except being used in particular for Outside the element of purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.

Fig. 1 is the hardware configuration signal of the mobile terminal realizing each embodiment of the present invention.

Mobile terminal 100 can include that wireless communication unit the 110th, A/V (audio/video) input block the 120th, user inputs The 130th, unit senses unit the 140th, output unit the 150th, memory the 160th, interface unit the 170th, controller 180 and power subsystem 190 Etc..Fig. 1 shows the mobile terminal with various assembly, it should be understood that be not required for implementing all groups illustrating Part.Can alternatively implement more or less of assembly.Will be discussed in more detail below the element of mobile terminal.

Wireless communication unit 110 generally includes one or more assembly, and it allows mobile terminal 100 and wireless communication system Or the radio communication between network.For example, wireless communication unit can include broadcast reception module the 111st, mobile communication module 112nd, at least one in wireless Internet module the 113rd, short range communication module 114 and positional information module 115.

Broadcast reception module 111 receives broadcast singal and/or broadcast via broadcast channel from external broadcasting management server Relevant information.Broadcast channel can include satellite channel and/or terrestrial channel.Broadcast management server can be to generate and send The broadcast singal generating before the server of broadcast singal and/or broadcast related information or reception and/or broadcast related information And send it to the server of terminal.Broadcast singal can include TV broadcast singal, radio signals, data broadcast Signal etc..And, broadcast singal may further include the broadcast singal combining with TV or radio signals.Broadcast phase Pass information also can provide via mobile communications network, and in this case, broadcast related information can be by mobile communication mould Block 112 receives.Broadcast singal can exist in a variety of manners, and for example, it can be with the electronics of DMB (DMB) Program guide (EPG), the form of electronic service guidebooks (ESG) etc. of digital video broadcast-handheld (DVB-H) and exist.Broadcast Receiver module 111 can be by using the broadcast of various types of broadcast system receipt signal.Especially, broadcast reception module 111 Can be by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), digital video wide Broadcast-hand-held (DVB-H), forward link media (MediaFLO@) Radio Data System, received terrestrial digital broadcasting integrated service Etc. (ISDB-T) digit broadcasting system receives digital broadcasting.Broadcast reception module 111 may be constructed such that and is adapted to provide for extensively Broadcast the various broadcast system of signal and above-mentioned digit broadcasting system.Via broadcast reception module 111 receive broadcast singal and/ Or broadcast related information can be stored in memory 160 (or other type of storage medium).

Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal And in server at least one and/or receive from it radio signal.Such radio signal can include that voice leads to Words signal, video calling signal or the various types of data sending according to text and/or Multimedia Message and/or receiving.

Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.This module can be internally or externally It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by this module can include WLAN (WLAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave access), HSDPA (high-speed downlink packet access) etc..

Short range communication module 114 is the module for supporting junction service.Some examples of short-range communication technology include indigo plant ToothTM, RF identification (RFID), Infrared Data Association (IrDA), ultra broadband (UWB), purple honeybeeTMEtc..

Positional information module 115 is the module of positional information for checking or obtaining mobile terminal.Positional information module Typical case be GPS (global positioning system).According to current technology, GPS module 115 calculates from three or more satellites Range information and correct time information and for the Information application triangulation calculating, thus according to longitude, latitude Highly accurately calculate three-dimensional current location information.Currently, the method use three for calculating position and temporal information is defended Star and the error being corrected the position calculating and temporal information by an other satellite of use.Additionally, GPS module 115 Velocity information can be calculated by Continuous plus current location information in real time.

A/V input block 120 is used for receiving audio or video signal.A/V input block 120 can include camera 121 He Microphone 1220, camera 121 is to the static map being obtained by image capture apparatus in Video Capture pattern or image capture mode The view data of piece or video is processed.Picture frame after process may be displayed on display unit 151.At camera 121 Picture frame after reason can be stored in memory 160 (or other storage mediums) or carry out via wireless communication unit 110 Send, two or more cameras 1210 can be provided according to the construction of mobile terminal.Microphone 122 can be at telephone relation mould Formula, logging mode, speech recognition mode etc. operational mode receives sound (voice data) via microphone, and can be by Such acoustic processing is voice data.Audio frequency (voice) data after process can be changed in the case of telephone calling model For can be sent to the form output of mobile communication base station via mobile communication module 112.Microphone 122 can implement all kinds The noise noise that eliminates (or suppression) algorithm to eliminate (or suppression) and produce during receiving and send audio signal or Person disturbs.

User input unit 130 can generate key input data to control each of mobile terminal according to the order that user inputs Plant operation.User input unit 130 allows user to input various types of information, and can include keyboard, metal dome, touch Plate (for example, detection due to touched and cause resistance, pressure, the sensitive component of change of electric capacity etc.), roller, rocking bar etc. Deng.Especially, when touch pad is superimposed upon on display unit 151 as a layer, touch-screen can be formed.

Sensing unit 140 detects the current state of mobile terminal 100, (for example, mobile terminal 100 open or close shape State), the position of mobile terminal 100, user is for the presence or absence of the contact (that is, touch input) of mobile terminal 100, mobile terminal Orientation, the acceleration or deceleration of mobile terminal 100 of 100 move and direction etc., and generate for controlling mobile terminal 100 The order of operation or signal.For example, when mobile terminal 100 is embodied as sliding-type mobile phone, sensing unit 140 can sense This sliding-type phone opens or cuts out.In addition, sensing unit 140 can detect power subsystem 190 whether provide electric power or Whether person's interface unit 170 couples with external device (ED).Sensing unit 140 can include that proximity transducer 1410 will combine below This is described by touch-screen.

Interface unit 170 is used as at least one external device (ED) and is connected connecing of can passing through with mobile terminal 100

Mouthful.For example, external device (ED) can include wired or wireless head-band earphone port, external power source (or battery charging Device) port, wired or wireless FPDP, memory card port, defeated for connecting the port of device with identification module, audio frequency Enter/export (I/O) port, video i/o port, ear port etc..Identification module can be that storage is for verifying that user uses The various information of mobile terminal 100 and subscriber identification module (UIM), client identification module (SIM), Universal Subscriber can be included Identification module (USIM) etc..In addition, the device (hereinafter referred to as " identifying device ") with identification module can take smart card Form, therefore, identify device can be connected with mobile terminal 100 via port or other attachment means.Interface unit 170 can And from the input (for example, data message, electric power etc.) of external device (ED) the input receiving is transferred to for reception One or more element in mobile terminal 100 or may be used for transmitting data between mobile terminal and external device (ED).

In addition, when mobile terminal 100 is connected with external base, interface unit 170 can serve as allowing electricity by it Power provides the path of mobile terminal 100 from base or can serve as allowing the various command signals from base input to pass through it It is transferred to the path of mobile terminal.May serve as identifying that mobile terminal is from various command signal or the electric power of base input The no signal being accurately fitted within base.Output unit 150 is configured to provide defeated with vision, audio frequency and/or tactile manner Go out signal (for example, audio signal, vision signal, alarm signal, vibration signal etc.).Output unit 150 can include display Unit the 151st, dio Output Modules the 152nd, alarm unit 153 etc..

Display unit 151 may be displayed on the information processing in mobile terminal 100.For example, when mobile terminal 100 is in electricity During words call mode, display unit 151 can show and call or other (for example, text messaging, multimedia files that communicate Download etc.) related user interface (UI) or graphic user interface (GUI).When mobile terminal 100 is in video calling pattern Or during image capture mode, display unit 151 can show the image of capture and/or the image of reception, illustrate video or figure UI or GUI of picture and correlation function etc..

Meanwhile, when display unit 151 and touch pad as a layer superposed on one another with formed touch-screen when, display unit 151 can serve as input unit and output device.Display unit 151 can include liquid crystal display (LCD), thin film transistor (TFT) In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least A kind of.Some in these displays may be constructed such that transparence with allow user from outside watch, this is properly termed as transparent Display, typical transparent display can for example, TOLED (transparent organic light emitting diode) display etc..According to specific The embodiment wanted, mobile terminal 100 can include two or more display units (or other display devices), for example, move Dynamic terminal can include outernal display unit (not shown) and inner display unit (not shown).Touch-screen can be used for detection and touches Input pressure and touch input position and touch input area.

Dio Output Modules 152 can mobile terminal be in call signal receive pattern, call mode, logging mode, When under the isotype such as speech recognition mode, broadcast reception mode, that wireless communication unit 110 is received or at memory 160 The voice data transducing audio signal of middle storage and be output as sound.And, dio Output Modules 152 can provide and move The related audio frequency output (for example, call signal receives sound, message sink sound etc.) of the specific function that terminal 100 performs. Dio Output Modules 152 can include loudspeaker, buzzer etc..

Alarm unit 153 can provide output to notify event to mobile terminal 100.Typical event is permissible Including calling reception, message sink, key signals input, touch input etc..In addition to audio or video output, alarm unit 153 can provide the generation exporting with notification event in a different manner.For example, alarm unit 153 can be with the form of vibration Output is provided, when receiving calling, message or some other entrance communication (incomingcommunication), alarm list Unit 153 can provide sense of touch output (that is, vibration) to notify to user.Exported by providing such sense of touch, even if When the mobile phone of user is in the pocket of user, user also can recognize that the generation of various event.Alarm unit 153 is also The output of the generation of notification event can be provided via display unit 151 or dio Output Modules 152.

Memory 160 can store the process being performed by controller 180 and the software program controlling operation etc., or can Temporarily to store oneself through exporting the data (for example, telephone directory, message, still image, video etc.) that or will export.And And, memory 160 can store with regard to when touch be applied to touch-screen when the vibration of various modes of output and audio signal Data.

Memory 160 can include the storage medium of at least one type, and described storage medium includes flash memory, hard disk, many Media card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access storage Device (SRAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..And, mobile terminal 100 can be connected execution memory with by network The network storage device cooperation of the storage function of 160.

Controller 180 generally controls the overall operation of mobile terminal.For example, controller 180 performs and voice call, data The related control of communication, video calling etc. and process.In addition, controller 180 can include for reproducing (or playback) many matchmakers The multi-media module 1810 of volume data, multi-media module 1810 can construct in controller 180, or it is so structured that with control Device 180 processed separates.Controller 180 can perform pattern recognition process, with the handwriting input that will perform on the touchscreen or figure Piece is drawn input and is identified as character or image.

Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit Suitable electric power needed for part and assembly.

Various embodiment described herein can be to use such as computer software, hardware or its any combination of calculating Machine computer-readable recording medium is implemented.Implementing for hardware, embodiment described herein can be by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can Program gate array (FPGA), processor, controller, microcontroller, microprocessor, be designed to perform function described herein At least one in electronic unit is implemented, and in some cases, such embodiment can be implemented in controller 180. Software is implemented, the embodiment of such as process or function can with allow to perform the single of at least one function or operation Software module is implemented.Software code can be come by the software application (or program) write with any suitable programming language Implementing, software code can be stored in memory 160 and be performed by controller 180.

So far, oneself is through describing mobile terminal according to its function.Below, for the sake of brevity, will describe such as folded form, Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc. is as showing Example.Therefore, the present invention can be applied to any kind of mobile terminal, and is not limited to slide type mobile terminal.

Mobile terminal 100 as shown in Figure 1 may be constructed such that utilize via frame or packet transmission data all if any Line and wireless communication system and satellite-based communication system operate.

Referring now to Fig. 2, the communication system being wherein operable to according to the mobile terminal of the present invention is described.

Such communication system can use different air interfaces and/or physical layer.For example, used by communication system Air interface includes such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and universal mobile communications system System (UMTS) (especially, Long Term Evolution (LTE)), global system for mobile communications (GSM) etc..As non-limiting example, under The description in face relates to cdma communication system, but such teaching is equally applicable to other type of system.

With reference to Fig. 2, cdma wireless communication system can include multiple mobile terminal the 100th, multiple base stations (BS) the 270th, base station Controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280 is configured to and Public Switched Telephony Network (PSTN) 290 formation interfaces.MSC280 is also structured to and the BSC275 formation interface that can be couple to base station 270 via back haul link. If any one in the interface that back haul link can be known according to Ganji constructs, described interface includes such as E1/T1, ATM, IP, PPP, frame relay, HDSL, ADSL or xDSL.It will be appreciated that system as shown in Figure 2 can include multiple BSC2750.

Each BS270 can service one or more subregion (or region), by multidirectional antenna or the sky pointing to specific direction Each subregion that line covers is radially away from BS270.Or, each subregion can be by for two or more of diversity reception Antenna covers.Each BS270 may be constructed such that support multiple frequency distribution, and the distribution of each frequency has specific frequency spectrum (for example, 1.25MHz, 5MHz etc.).

Intersecting that subregion and frequency are distributed can be referred to as CDMA Channel.BS270 also can be referred to as base station transceiver System (BTS) or other equivalent terms.In this case, term " base station " may be used for broadly representing single BSC275 and at least one BS270.Base station also can be referred to as " cellular station ".Or, each subregion of specific BS270 can be claimed For multiple cellular stations.

As shown in Figure 2, broadcast singal is sent to the mobile terminal operating in system by broadcsting transmitter (BT) 295 100.Broadcast reception module 111 as shown in Figure 1 is arranged on mobile terminal 100 and sentences the broadcast that reception is sent by BT295 Signal.In fig. 2 it is shown that several global positioning systems (GPS) satellite 300.Satellite 300 helps the multiple mobile terminal of positioning At least one in 100.

In fig. 2, depict multiple satellite 300, it is understood that be, it is possible to use any number of satellite obtain useful Positioning information.GPS module 115 as shown in Figure 1 is generally configured to coordinate with satellite 300 to obtain the positioning letter wanted Breath.Substitute GPS tracking technique or outside GPS tracking technique, it is possible to use other of position of mobile terminal can be followed the tracks of Technology.In addition, at least one gps satellite 300 can optionally or additionally process satellite dmb transmission.

As a typical operation of wireless communication system, BS270 receives the reverse link from various mobile terminals 100 Signal.Mobile terminal 100 generally participates in call, information receiving and transmitting and other type of communication.Each of certain base station 270 reception is anti- Processed in specific BS270 to link signal.The data obtaining are forwarded to the BSC275 being related to.BSC provides call The mobile management function of the coordination of resource distribution and the soft switching process including between BS270.The number that BSC275 also will receive According to being routed to MSC280, it provides for the extra route service with PSTN290 formation interface.Similarly, PSTN290 with MSC280 forms interface, and MSC and BSC275 forms interface, and BSC275 correspondingly controls BS270 with by forward link signals It is sent to mobile terminal 100.

Based on above-mentioned optional mobile terminal hardware configuration and communication system, each embodiment of the inventive method is proposed.

More and more universal with intelligent terminal, user uses the scene that terminal pays more and more in public Many, it is often necessary to input various password.Public arena is usually present the facility of camera monitor etc or other people compare Many, it is difficult to ensure that our password is not peeped, thus damage is caused to our property.Based on the problems referred to above, need badly related Technical staff develops a kind of novel Password Input guard method, improves security and the crypticity of user cipher input.

In order to solve the problems referred to above, as it is shown on figure 3, first embodiment of the invention proposes a kind of password determines device 1, should Device includes: first detection module the 01st, the second detection module the 02nd, authentication module 03 and confirmation module 04.

First detection module 01, under cryptosecurity input pattern, the fingerprint in detection fingerprint recognition region covers feelings Condition.

In embodiments of the present invention, it is known that password conventional in present terminal determines that method is all directly in the front end of terminal Password can be inputted by the form such as button, gesture after directly inputting password, or improvement on screen, but these passwords are defeated Enter mode be all intuitively, visual, with improving constantly of present monitoring technology and decryption technology, this intuitively, Visual password input mode cannot ensure the crypticity of user cipher input process, it is easy to is supervised by high-definition camera The modes such as control or deciphering gesture crack the password of user's input, cause information leakage for user, even property loss.For upper Stating situation, the embodiment of the present invention have employed the Password Input scheme of a kind of hidden, i.e. the back in terminal arranges Password Input Region, in the Password Input region at this back, completes Password Input by the finger input operation of the hidden of user, such as figure Shown in 4, region 11 is terminal back, and region 12 arranges Password Input region for terminal back.This scheme is close due to finger Code input action is blocked by terminal itself, it is ensured that the disguise of concrete input gesture or action, will not photographed by the external world Or see, it is ensured that the security of Password Input.

In addition, in this scenario, Password Input can also be combined with fingerprint recognition, by default fingerprint recognition dress Put the finger print information of the user identifying this terminal of current operation, to guarantee the secured user that active user is this terminal, such as Fig. 4 institute Showing, region 13 is the fingerprint recognition region preset in terminal.

In the embodiment of the present invention, this fingerprinting scheme can be tied in any way mutually with above-mentioned Password Input scheme Close, for example, first carry out fingerprint recognition, after fingerprint recognition is verified, then the password of input is verified;Or, advanced Row password authentification, password authentification by after carry out fingerprint authentication;Password authentification and fingerprint authentication can also be carried out simultaneously.

In embodiments of the present invention, give the embodiment scheme simultaneously verified password and fingerprint, i.e. exist During Password Input, need to keep finger to contact with fingerprint recognition region, to guarantee that the user being currently entered password does not has in real time There is replacing.During Password Input, once fingerprint identification device can't detect fingerprint, it is determined that is currently entered the user of password Having changed, and having determined that current password input is invalid, the program further ensure that the security of Password Input.

In embodiments of the present invention, complete such scheme especially by first detection module 01, input mould at cryptosecurity Under formula, first detection module 01 can detect the fingerprint coverage condition in fingerprint recognition region in real time, to guarantee the finger of user always Cover on fingerprint recognition region.Here, this fingerprint recognition region can be part or all of region on terminal screen, also Can be the special fingerprint recognition region preset on terminal predeterminated position, and this fingerprint recognition region can be in terminal Optional position, does not limits for its particular location.In embodiments of the present invention, user uses for convenience, this fingerprint recognition The position in region can be arranged on two, the left and right side of terminal, in order to user is when inputting password, and thumb fingerprint is permissible Covering easily on fingerprint recognition region, the position in this fingerprint recognition region can also be arranged on the top side of terminal, So that user is when inputting password, index fingerprint can cover easily on fingerprint recognition region.Need exist for explanation, Direction up and down for terminal determines and can define according in the following manner: by the front screen of terminal and user's face phase Right, when keeping terminal to place straight down, if at this moment in horizontal direction axis and the vertical direction axis of terminal screen Upper reference axis X-axis and the Y-axis done respectively, then the side in X-axis negative direction is the left side of terminal, the side in X-axis positive direction While be the right edge of terminal, the side in Y-axis positive direction is the upper side edge of terminal, and the side in Y-axis negative direction is terminal Lower side.In addition, in embodiments of the present invention, the quantity in this fingerprint recognition region can be one or more, for fingerprint Identify that the concrete number in region does not also limit.

It is further to note that in order to determine that method distinguishes with common password, the password of the embodiment of the present invention is defeated Entering scheme is to carry out under default cryptosecurity input pattern, therefore, before using embodiment of the present invention scheme, needs First start this cryptosecurity input pattern preset, if this cryptosecurity input pattern not actuated just carries out Password Input, can Operate as common Password Input pattern to be considered as current Password Input, do not use the Password Input of embodiment of the present invention scheme The password being currently entered is detected and verifies by scheme.In embodiments of the present invention, for this cryptosecurity input pattern Startup method can include multiple, for example, by the pressing operations of the startup button that detection is preset, the gesture behaviour that detection is preset Work, voice operating, or fingerprint recognition, face recognition, pattern identification etc. can also be carried out.Embodiment of the present invention scheme is for close The startup method of the safe input pattern of code is not particularly limited, and any startup method that can implement is all at the protection model of the present invention Within enclosing.

In embodiments of the present invention, user operation for convenience, using fingerprint recognition opening as cryptosecurity input pattern Dynamic condition illustrates, and is i.e. entered, by the above-mentioned fingerprint identification device preset, the fingerprint being placed on this fingerprint identification device Row identifies and checking, determines that when being verified this fingerprint is effective, the safe input pattern of setting up password.Concrete scheme can pass through Implementation below realizes:

Alternatively, this device also includes: start module 05 and prompting module 06.

First detection module 01, is additionally operable to, before entering described cryptosecurity input pattern, detect fingerprint recognition region Finger print information.

In embodiments of the present invention, when first detection module 01 has detected that finger is placed on fingerprint recognition region, meeting The finger print information of current finger is acquired and identifies.

Authentication module 03, is additionally operable to verify whether the finger print information detecting has been registered.

In embodiments of the present invention, the finger print information that authentication module 03 identifies for first detection module 01 is tested Card, to determine that whether this finger print information is registered in advance, finger print information only registered in advance just can be defined as effective fingerprint Information, specifically, by this finger print information compared with the one or more registering fingerprint information prestoring, when current finger print information During with any one the registered fingerprint system information match prestoring, determine that this finger print information is registered, when current finger print information When all not mating with any one the registered fingerprint system information prestoring, determining that this finger print information is unregistered, matching here refers to Both completely the same or similarities are more than or equal to the similarity threshold preset.

Start module 05, be additionally operable to when finger print information has been registered, the safe input pattern of setting up password.

In embodiments of the present invention, if authentication module 03 verifies the finger print information detecting and registered, then illustrate This finger print information is effective, and starting module 05 can be according to the safe input pattern of the result setting up password of this finger print information.Otherwise, If it is unregistered that authentication module 03 verifies the finger print information detecting, then illustrate that this finger print information is invalid, start module 05 meeting It is failure to actuate according to the result of this finger print information.

Prompting module 06, is additionally operable to when finger print information is unregistered, sends the prompting message whether carrying out fingerprint register.

In embodiments of the present invention, verify, at authentication module 03, the finger print information detecting unregistered, and determine that this refers to When line information is invalid, prompting module 06 can send the prompting message whether carrying out fingerprint register, and this prompting message can be with language Sound reminds or reminds the form of frame to occur, under the prompting of prompting module 06, user can optionally carry out registering or not noting Volume.For terminal owner, the Password Input under safe mode can be carried out after carrying out fingerprint register easily, for end For the non-owner of end or lawless person, this registration process can be process one layer of barrier of increase of input password, and such as Really lawless person attempts to enter Password Input pattern by registration, may leave the finger print information of lawless person.

In embodiments of the present invention, the registration of finger print information specifically can be realized by below scheme.

Alternatively, this device also includes: Registering modules 07.

Registering modules 07, for before entering cryptosecurity input pattern, inputs in detection registered fingerprint typing window Finger print information;And the finger print information being inputted is registered.

In embodiments of the present invention, can be registered by default registered fingerprint typing window, Registering modules 07 exists After receiving the registration confirmation that user replys, register interface or finger print information cog region can be entered on a terminal screen Territory is automatically into registration mode, and ejects registered fingerprint typing window;User can be gathered by this registered fingerprint typing window Finger print information and userspersonal information, the personal information of this finger print information and user is carried out one_to_one corresponding, and to this correspondence Relation preserves, and completes user fingerprints information registering.

Second detection module 02, for detect fingerprint recognition region keep covered by fingerprint in the case of, detection from The encrypted message of terminal back screen input.

In embodiments of the present invention, under cryptosecurity input pattern, first detection module 01 detects fingerprint recognition in real time The fingerprint coverage condition in region, and in the case of confirming that fingerprint recognition region keeps being covered by fingerprint, the second detection module 02 meeting Detection is from the encrypted message of terminal back screen input.

In embodiments of the present invention, in order to realize embodiment of the present invention scheme, user terminal need at terminal back, i.e. with Being provided with back screen or input window in the contrary one side of terminal front side screen, user can be by this back screen or input The encrypted message that window input is preset.This encrypted message can include any one in word, numeral, symbol, picture, lines Or it is multiple.This encrypted message is acquired and identifies by the second detection module, to determine encrypted message concrete being currently entered Content.

Authentication module 03, for verifying to the encrypted message of input and the finger print information in fingerprint recognition region.

In embodiments of the present invention, the encrypted message from the input of terminal back screen is detected by the second detection module 02 After, this encrypted message just can be demonstrated by authentication module 03.It should be noted that due to foregoing by the agency of Encrypted message and the multiple combinations of finger print information checking, be still verified as with finger print information with encrypted message at this simultaneously Example, illustrates the concrete proof scheme of the embodiment of the present invention.

Alternatively, authentication module 03 carries out checking include to the encrypted message of input and the finger print information in fingerprint recognition region

Each code content in the encrypted message of terminal back screen input is identified and/or verifies.

To each code content identification and/or after being proved to be successful, finger print information is being verified, determining that current finger print is believed Breath is for opening the finger print information of cryptosecurity input pattern.

In embodiments of the present invention, by each code content is identified respectively and/or can verify, and at each The scheme that the finger print information that interts in code content proof procedure is verified completes proof procedure, to guarantee that present terminal is being gathered around by terminal The person of having or safely and effectively user operation input password, further ensure the security of user profile.

This embodiment scheme specifically can be realized by following steps S101-S105:

S101, the first password content to the input of terminal back screen are identified.

In embodiment of the present invention scheme, owing to user cipher is usually string number, character or several words etc., user Each numeral to this string number, character or several word kind, character and word is needed to input respectively.Real in the present invention Executing in example, using the single numeral, character and the word that input every time as a code content, for example, a password is 12345, it therein 1st, the 2nd, the 3rd, the 4th, 5 is respectively one of this encrypted message code content, user is inputted by authentication module 03 Encrypted message when verifying, in order to strengthen the security of password, each code content of input can be identified and Checking,

S102, to first password content recognition success after finger print information is verified, determine that current finger print information is The no finger print information for opening cryptosecurity input pattern.

In embodiments of the present invention, in order to further ensure that the security of end message, the difficulty of password authentification is strengthened, can One-time authentication is carried out to the finger print information currently covering on fingerprint recognition region after often having verified a code content, Guaranteeing that user's finger covers on fingerprint recognition region always, and guarantee that the user being currently entered encrypted message does not become More.

S103, when current finger print information is on the finger print information of described cryptosecurity input pattern, default Second code content of detection terminal back screen input in one time, and the second code content is identified.

S104, to second code content identification success after again finger print information is verified, determine that current finger print is believed Whether breath is the finger print information opening cryptosecurity input pattern.

In embodiments of the present invention, be identified by first password content to input of step S101 and step S102 and After checking, continue the second password of input is identified and is verified by step S103 and step S104.

S105, when current finger print information is on the finger print information of cryptosecurity input pattern, when default first 3rd code content of interior detection terminal back screen input, and the 3rd code content is identified, and to current finger print Information is verified again, until being not detected by having code content to input in the screen of terminal back within the second default time When, determine that the input of current password information completes.

In embodiments of the present invention, when a password comprises more code content, can be by repeating step Each code content in encrypted message, to step S104, is verified, and is verified finger print information, directly by S101 successively To having verified the whole code content comprising in encrypted message.

In embodiments of the present invention, for a numeral, such as 12, a word, such as " good ", be required for multiple stroke or Need repeatedly to input and just can complete, therefore, how to confirm the problem that the code content inputting every time is also that we need to solve.? In the embodiment of the present invention, realized the judgement of the code content of input by the default very first time.For example, it is assumed that this first when Between be 0.1 second, input " 12 " when, if after having inputted " 1 ", within 0.1 second, the input of " 2 " detected, then confirm User's input is " 12 ", rather than " 1 " and " 2 ", in like manner, for the input of a word, if in the default very first time The input of new stroke inside detected, it is determined that current character does not input and finishes, continue to carry out the stroke of input detection and Identify, if being not detected by the input of new stroke within the default very first time, it is determined that current character has inputted and finished, And the word of this input is identified.It should be noted that this very first time can be fixed voluntarily according to different application scenarios Justice, in embodiments of the present invention, the concrete numerical value for the very first time does not limits.

In embodiments of the present invention, judged each code content of input by the default very first time after, the present invention Embodiment scheme can also pre-set for the second time, in order to judge whether encrypted message input completes, in order to be different from password The judgement of content, this second time is different from the very first time, and this second time is more than the very first time.It should be noted that This second time, the concrete numerical value for the second time did not limited equally equally according to different application scenarios self-definings System.

In addition, in embodiments of the present invention, by above-mentioned proof scheme, each code content is identified respectively and Checking, and after verifying user fingerprints information, in the case of checking all successfully, just can directly determine user's simultaneously Password is correct.In another embodiment scheme, only the code content of input can also be known during Password Input Do not verify, carry out unifying checking to password by below scheme after Password Input completes.

Alternatively, the encrypted message of input and the finger print information in fingerprint recognition region are carried out verifying and also wrap by authentication module 03 Include step S201-S204:

S201, after determining that the input of current password information completes, by whole code content of being inputted according to input sequence It is arranged in order, and using the whole code content after arrangement as the encrypted message inputting.

In embodiments of the present invention, when user is not detected by the Password Input operation of user within the second default time When, determine that the operation of current Password Input terminates, just can be by one or more code content of above identifying according to identification Sequentially, i.e. the input sequence of user sorts successively, determines final encrypted message.

S202, by the encrypted message of input compared with the encrypted message prestoring.

In embodiments of the present invention, the checking for overall encrypted message can be by close with prestore by this encrypted message The scheme that code information compares realizes, the encrypted message of storage when this encrypted message prestoring is user's initially set password.

S203, when input encrypted message consistent with the encrypted message prestoring when, determine input encrypted message verify into Work(.

In embodiments of the present invention, if the encrypted message of input is consistent with the encrypted message prestoring, the password i.e. inputting Information is identical with the encrypted message prestoring or similarity is more than or equal to the similarity threshold preset, it is determined that input close Code Information Authentication success.

S204, when input encrypted message inconsistent with the encrypted message prestoring when, determine input encrypted message checking Failure.

In embodiments of the present invention, if the encrypted message of input is inconsistent with the encrypted message prestoring, i.e. input is close Code information differs with the encrypted message prestoring or similarity is less than the similarity threshold preset, it is determined that the encrypted message of input Authentication failed.

Determining module 04, for when encrypted message and finger print information are all proved to be successful, determines that Password Input is correct.

In embodiments of the present invention, by a series of proof procedures to encrypted message and finger print information for the authentication module 03, According to the result, determining module 04 just can determine that whether the password being currently entered is correct.If encrypted message and fingerprint letter Breath is all proved to be successful, it is determined that Password Input is correct;If any one authentication failed in encrypted message and finger print information, then really Determine Password Input incorrect.

So far, by the agency of is over whole essential characteristics of embodiment of the present invention scheme, it should be noted that foregoing It is only one or more embodiments of the embodiment of the present invention, other embodiment can also be selected in other embodiments, Embodiment that is any identical with the embodiment of the present invention or that know each other, and any combination of the essential characteristic of the embodiment of the present invention, All within the protection domain of the embodiment of the present invention.

For achieving the above object, as shown in Figure 5, Figure 6, second embodiment of the invention additionally provides a kind of password determination side Method, the method comprising the steps of S301-S304:

S301, under cryptosecurity input pattern, detection fingerprint recognition region fingerprint coverage condition.

S302, detect fingerprint recognition region keep covered by fingerprint in the case of, detect defeated from terminal back screen The encrypted message entering.

S303, the finger print information to the encrypted message inputting and fingerprint recognition region are verified.

S304, when encrypted message and finger print information are all proved to be successful, determine that Password Input is correct.

Alternatively, the method also includes: before entering cryptosecurity input pattern, in detection registered fingerprint typing window The finger print information of input;And the finger print information being inputted is registered.

Alternatively, the method also includes:

Before entering cryptosecurity input pattern, the finger print information in detection fingerprint recognition region.

Whether the finger print information that checking detects has been registered.

When finger print information has been registered, the safe input pattern of setting up password.

When finger print information is unregistered, send the prompting message whether carrying out fingerprint register.

Alternatively, the step verified the encrypted message of input and the finger print information in fingerprint recognition region includes:

Each code content in the encrypted message of terminal back screen input is identified and/or verifies.

To each code content identification and/or after being proved to be successful, finger print information is being verified, determining that current finger print is believed Breath is for opening the finger print information of cryptosecurity input pattern.

Alternatively, the step verified the encrypted message of input and the finger print information in fingerprint recognition region also includes:

After determining that the input of current password information completes, the whole code content being inputted are arranged successively according to input sequence Row, and using the whole code content after arrangement as the encrypted message inputting.

By the encrypted message of input compared with the encrypted message prestoring.

When the encrypted message of input is consistent with the encrypted message prestoring, determine that the encrypted message of input is proved to be successful.

When the encrypted message of input is inconsistent with the encrypted message prestoring, determine the encrypted message authentication failed of input.

The embodiment of the present invention proposes a kind of password and determines apparatus and method, in embodiment of the present invention scheme, and the first detection Module, under cryptosecurity input pattern, detects the fingerprint coverage condition in fingerprint recognition region;Second detection module is detecting In the case that fingerprint recognition region keeps being covered by fingerprint, detection is from the encrypted message of terminal back screen input;Authentication module The encrypted message of input and the finger print information in fingerprint recognition region are verified;Determining module works as encrypted message and finger print information When being all proved to be successful, determine that Password Input is correct.By embodiment of the present invention scheme, it is possible to increase the safety of user cipher input Property and crypticity, improve Consumer's Experience sense.

It should be noted that herein, term " includes ", "comprising" or its any other variant are intended to non-row Comprising of his property, so that include that the process of a series of key element, method, article or device not only include those key elements, and And also include other key elements being not expressly set out, or also include intrinsic for this process, method, article or device Key element.In the case of there is no more restriction, the key element being limited by statement " including ... ", it is not excluded that including this The process of key element, method, article or device there is also other identical element.

The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.

Through the above description of the embodiments, those skilled in the art is it can be understood that arrive above-described embodiment side Method can add the mode of required general hardware platform by software and realize, naturally it is also possible to by hardware, but a lot of in the case of The former is more preferably embodiment.Based on such understanding, prior art is substantially done by technical scheme in other words The part going out contribution can embody with the form of software product, and this computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions with so that a station terminal equipment (can be mobile phone, computer, take Business device, air-conditioner, or the network equipment etc.) perform the method described in each embodiment of the present invention.

These are only the preferred embodiments of the present invention, not thereby limit the scope of the claims of the present invention, every utilize this Equivalent structure or equivalence flow process that bright specification and accompanying drawing content are made convert, or are directly or indirectly used in other related skills Art field, all in like manner includes in the scope of patent protection of the present invention.

Claims (10)

1. a password determines device, it is characterised in that described device includes:
First detection module, under cryptosecurity input pattern, detects the fingerprint coverage condition in fingerprint recognition region;
Second detection module, in the case of detecting that described fingerprint recognition region keeps being covered by fingerprint, detection is from end The encrypted message of end back screen input;
Authentication module, for verifying to the encrypted message of input and the finger print information in described fingerprint recognition region;
Determining module, for when described encrypted message and described finger print information are all proved to be successful, determines that Password Input is correct.
2. password as claimed in claim 1 determines device, it is characterised in that described device also includes:
Registering modules, for before entering described cryptosecurity input pattern, inputs in detection registered fingerprint typing window Finger print information;And the finger print information being inputted is registered.
3. password as claimed in claim 2 determines device, it is characterised in that described device also includes: start module and prompting Module;
Described first detection module, is additionally operable to, before entering described cryptosecurity input pattern, detect described fingerprint identification area The finger print information in territory;
Described authentication module, is additionally operable to verify whether the described finger print information detecting has been registered;
Described startup module, is additionally operable to, when described finger print information has been registered, start described cryptosecurity input pattern;
Described prompting module, is additionally operable to, when described finger print information is unregistered, send the prompting message whether carrying out fingerprint register.
4. password as claimed in claim 1 determines device, it is characterised in that described authentication module is additionally operable to:
Each code content in the encrypted message of described terminal back screen input is identified and/or verifies;
To each code content identification described and/or after being proved to be successful, described finger print information is being verified, determining and currently refer to Line information is for opening the finger print information of described cryptosecurity input pattern.
5. password as claimed in claim 4 determines device, it is characterised in that described authentication module is further used for:
After determining that the input of current password information completes, the whole code content being inputted are arranged in order according to input sequence, And using the whole code content after arrangement as the encrypted message inputting;
By the encrypted message of described input compared with the encrypted message prestoring;
When the encrypted message of described input is consistent with the encrypted message prestoring, determine that the encrypted message of described input is verified into Work(;
When the encrypted message of described input is inconsistent with the encrypted message prestoring, determine that the encrypted message checking of described input is lost Lose.
6. a password determines method, it is characterised in that described method includes:
Under cryptosecurity input pattern, the fingerprint coverage condition in detection fingerprint recognition region;
In the case of detecting that described fingerprint recognition region keeps being covered by fingerprint, detection is close from the input of terminal back screen Code information;
The encrypted message of input and the finger print information in described fingerprint recognition region are verified;
When described encrypted message and described finger print information are all proved to be successful, determine that Password Input is correct.
7. password as claimed in claim 6 determines method, it is characterised in that described method also includes: entering described password Before safe input pattern, the finger print information of input in detection registered fingerprint typing window;And the finger print information being inputted is entered Row registration.
8. password as claimed in claim 7 determines method, it is characterised in that described method also includes:
Before entering described cryptosecurity input pattern, detect the finger print information in described fingerprint recognition region;
Whether the described finger print information that checking detects has been registered;
When described finger print information has been registered, start described cryptosecurity input pattern;
When described finger print information is unregistered, send the prompting message whether carrying out fingerprint register.
9. password as claimed in claim 6 determines method, it is characterised in that the described encrypted message to input and described fingerprint Identify that the step that the finger print information in region is verified includes:
Each code content in the encrypted message of described terminal back screen input is identified and/or verifies;
To each code content identification described and/or after being proved to be successful, described finger print information is being verified, determining and currently refer to Line information is for opening the finger print information of described cryptosecurity input pattern.
10. password as claimed in claim 9 determines method, it is characterised in that the described encrypted message to input and described finger The step that the finger print information in line identification region is verified also includes:
After determining that the input of current password information completes, the whole code content being inputted are arranged in order according to input sequence, And using the whole code content after arrangement as the encrypted message inputting;
By the encrypted message of described input compared with the encrypted message prestoring;
When the encrypted message of described input is consistent with the encrypted message prestoring, determine that the encrypted message of described input is verified into Work(;
When the encrypted message of described input is inconsistent with the encrypted message prestoring, determine that the encrypted message checking of described input is lost Lose.
CN201610807535.9A 2016-09-05 2016-09-05 A kind of password determines apparatus and method CN106161474A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610807535.9A CN106161474A (en) 2016-09-05 2016-09-05 A kind of password determines apparatus and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610807535.9A CN106161474A (en) 2016-09-05 2016-09-05 A kind of password determines apparatus and method

Publications (1)

Publication Number Publication Date
CN106161474A true CN106161474A (en) 2016-11-23

Family

ID=57340743

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610807535.9A CN106161474A (en) 2016-09-05 2016-09-05 A kind of password determines apparatus and method

Country Status (1)

Country Link
CN (1) CN106161474A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106874846A (en) * 2017-01-03 2017-06-20 上海创功通讯技术有限公司 A kind of fingerprint identification method and identifying device based on terminal screen
CN109446794A (en) * 2018-10-15 2019-03-08 维沃移动通信有限公司 A kind of cipher-code input method and its mobile terminal

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100225607A1 (en) * 2009-03-06 2010-09-09 Lg Electronics Inc. Mobile terminal and method of controlling the mobile terminal
CN103092503A (en) * 2012-10-11 2013-05-08 百度在线网络技术(北京)有限公司 Unlocking and verification method for mobile terminal and unlocking and verification device
CN103678976A (en) * 2012-09-18 2014-03-26 阿里巴巴集团控股有限公司 Method for authenticating identity through handwriting input device and handwriting input device
CN103995667A (en) * 2014-05-14 2014-08-20 宇龙计算机通信科技(深圳)有限公司 Terminal and terminal screen unlocking method
CN104503631A (en) * 2015-01-21 2015-04-08 北京京东方茶谷电子有限公司 Password input keyboard, theft-proof unlocking method and ATM machine
CN105353952A (en) * 2015-09-30 2016-02-24 努比亚技术有限公司 Screen unlocking device and method for mobile terminal
CN105897429A (en) * 2016-06-06 2016-08-24 宇龙计算机通信科技(深圳)有限公司 Authentication method, authentication device and terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100225607A1 (en) * 2009-03-06 2010-09-09 Lg Electronics Inc. Mobile terminal and method of controlling the mobile terminal
CN103678976A (en) * 2012-09-18 2014-03-26 阿里巴巴集团控股有限公司 Method for authenticating identity through handwriting input device and handwriting input device
CN103092503A (en) * 2012-10-11 2013-05-08 百度在线网络技术(北京)有限公司 Unlocking and verification method for mobile terminal and unlocking and verification device
CN103995667A (en) * 2014-05-14 2014-08-20 宇龙计算机通信科技(深圳)有限公司 Terminal and terminal screen unlocking method
CN104503631A (en) * 2015-01-21 2015-04-08 北京京东方茶谷电子有限公司 Password input keyboard, theft-proof unlocking method and ATM machine
CN105353952A (en) * 2015-09-30 2016-02-24 努比亚技术有限公司 Screen unlocking device and method for mobile terminal
CN105897429A (en) * 2016-06-06 2016-08-24 宇龙计算机通信科技(深圳)有限公司 Authentication method, authentication device and terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106874846A (en) * 2017-01-03 2017-06-20 上海创功通讯技术有限公司 A kind of fingerprint identification method and identifying device based on terminal screen
CN109446794A (en) * 2018-10-15 2019-03-08 维沃移动通信有限公司 A kind of cipher-code input method and its mobile terminal

Similar Documents

Publication Publication Date Title
CN104899494B (en) Method of controlling operation thereof and mobile terminal based on multifunction push key
KR101788598B1 (en) Mobile terminal and information security setting method thereof
WO2016155422A1 (en) Unlocking method, and terminal device and computer storage medium
CN104765994A (en) User identity recognition method and device
US8645707B2 (en) Apparatus and method for unlocking a user equipment
KR20140075997A (en) Mobile terminal and method for controlling of the same
CN104731507B (en) The application changing method of mobile terminal and mobile terminal
CN105100476B (en) A kind of mobile terminal unlocking device and method
EP2750363B1 (en) Mobile terminal
CN104750420A (en) Screen capturing method and device
CN104808912B (en) Inputting interface method of adjustment and device
CN104951206A (en) Icon hiding method and device
CN105094533B (en) Enter the method and mobile terminal of singlehanded mode based on multifunction push key
CN104778395B (en) terminal control method and device
CN104731512B (en) The method, apparatus and terminal that picture is shared
WO2017020771A1 (en) Terminal control device and method
CN104808944B (en) Touch operation inducing method and device
CN104735255B (en) Multi-screen display method and system
CN105389527B (en) The Anti-peeping device and method of mobile terminal
CN104821068A (en) Mobile terminal real-time antitheft alarm method and apparatus
CN104731340B (en) Cursor position determines method and terminal device
CN105117123A (en) Device and method for displaying hidden object
CN105072248A (en) Control method of terminal device, and corresponding terminal device
WO2017020756A1 (en) Mobile terminal and information processing method
CN104793849A (en) Application icon display method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination