CN106453802A - Cipher verification method and device, and terminal - Google Patents

Cipher verification method and device, and terminal Download PDF

Info

Publication number
CN106453802A
CN106453802A CN201611088917.7A CN201611088917A CN106453802A CN 106453802 A CN106453802 A CN 106453802A CN 201611088917 A CN201611088917 A CN 201611088917A CN 106453802 A CN106453802 A CN 106453802A
Authority
CN
China
Prior art keywords
password
mapping
default information
user
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611088917.7A
Other languages
Chinese (zh)
Inventor
赵朋勃
张淑燕
杨高科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201611088917.7A priority Critical patent/CN106453802A/en
Publication of CN106453802A publication Critical patent/CN106453802A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a cipher verification method. The method comprises the steps of receiving first operation, wherein the first operation is used for triggering an input interface for displaying a cipher; obtaining preset prompt information of this time in response to the first operation and controlling the preset prompt information to be displayed in the input interface, wherein the preset prompt information is used for prompting a user to input a mapping rule of a mapping cipher; receiving second operation, wherein the second operation is used for inputting the mapping cipher; receiving the mapping cipher input by the user in the input interface based on the second operation; and verifying the mapping cipher according to the preset prompt information. The invention also discloses a cipher verification device and a terminal. Through adoption of the technical scheme of the method, the device and the terminal, an original cipher is enabled to correspond to the mapping cipher, in this way, even if the mapping cipher is seen and stolen, the preset prompt information is different each time, so the stolen mapping cipher cannot be used.

Description

A kind of method of password authentication and device, terminal
Technical field
The present invention relates to electronic technology, more particularly, to a kind of method of password authentication and device, terminal.
Background technology
With the fast development of mobile network, people can using install on mobile phone types of applications program (APP, Application, referred to as applies) carry out completing all kinds of things in daily life, for example see time, financial transaction, commodity purchase Buy, see a film, see video, keep a diary.As can be seen here, mobile phone has become as requisite electronic equipment in people's life, Obviously it has be unable to do without mobile phone in people's life.
In order to protect the information security of individual, password application on an electronic device also gets more and more, such as electronic equipment It is required for input password and could enter desktop after screen locking;The application program such as financial class or chat class is entering application or is executing certain It is also required to input password when one particular step just can continue executing with, such as, when user needs to carry out payment step, need defeated Enter password could complete further to pay.Type relatively conventional at present is numerical ciphers input and the password based on figure is defeated Enter, wherein the former is the digit (such as 4 or 6 are) of user setup password, then user input password, terminal unit is by user The password of input is mated with the password of user setup, and the match is successful then continues, and it fails to match does not then continue to;And it is based on figure The Password Input of shape is that user pre-sets figure, then user input figure, and terminal unit is by the figure of user input and use The figure of family setting is mated, and the match is successful then continues, and it fails to match does not then continue to.
From the above, it can be seen that in the various password of user input, the danger that password presence is stolen.For above-mentioned this Application scenarios, the shortcoming of existing solution is:1) storage of user sensitive information encrypted transmission, does not echo;2) user exists During input password, the operation of user by others it will be seen that during such as user input password, clicking on screen vestige and be stolen, and then Steal user cipher.As can be seen here, increasingly popularize with electronic equipment, the safety problem brought therewith is increasingly serious.
Content of the invention
In view of this, the embodiment of the present invention provides a kind of password for solving at least one problem present in prior art Verification method and device, terminal.
The technical scheme of the embodiment of the present invention is realized in:
In a first aspect, the embodiment of the present invention provides a kind of method of password authentication, methods described includes:
Receive the first operation, described first operates the inputting interface for triggering display password;
Respond described first operation, obtain this default information, and control described default information described Show in inputting interface, described default information is used for the mapping ruler pointing out user input to map password;
Receive the second operation, described second operates for input mapping password;
The mapping password being inputted in described inputting interface based on the described second operation receive user;
According to described default information, described mapping password is verified.
Second aspect, a kind of password authentication device of the embodiment of the present invention, described device includes the first receiving unit, obtains list Unit, the second receiving unit, determining unit and authentication unit, wherein:
Described first receiving unit, for receiving the first operation, described first operates the input for triggering display password Interface;
Described acquiring unit, for responding described first operation, obtains this default information, and controls described pre- If information shows in described inputting interface, described default information is used for the mapping pointing out user input to map password Rule;
Described second receiving unit, for receiving the second operation, described second operates for input mapping password;
Based on the described second operation, described determining unit, for determining that the mapping that user inputs in described inputting interface is close Code;
Described authentication unit, for verifying to described mapping password according to described default information.
The third aspect, the embodiment of the present invention provides a kind of terminal, and described terminal includes input equipment and processor, wherein institute State processor to be used for:
First operation is received by described input equipment, described first operates the inputting interface for triggering display password;
Respond described first operation, obtain this default information, and control described default information described Show in inputting interface, described default information is used for the mapping ruler pointing out user input to map password;
Second operation is received by described input equipment, described second operates for input mapping password;
The mapping password being inputted in described inputting interface based on the described second operation receive user;
According to described default information, described mapping password is verified.
The embodiment of the present invention provides a kind of method of password authentication and device, terminal, wherein, receives the first operation, and described the One operates the inputting interface for triggering display password;Respond described first operation, obtain this default information, and control Make described default information to show in described inputting interface, described default information is used for pointing out user input mapping close The mapping ruler of code;Receive the second operation, described second operates for input mapping password;Received based on the described second operation and use The mapping password that family inputs in described inputting interface;According to described default information, described mapping password is verified; So, map password by corresponding to into original password, accordingly even when mapping password is seen and steals, due to each default Information is different, so also cannot be using the mapping password stolen.
Brief description
Fig. 1-1 is the hardware architecture diagram of a mobile terminal realizing each embodiment of the present invention;
Fig. 1-2 realizes schematic flow sheet for embodiment of the present invention method of password authentication;
Fig. 2-1 to Fig. 2-3 is the schematic diagram of a scenario of the embodiment of the present invention;
Fig. 3 realizes schematic flow sheet for embodiment of the present invention method of password authentication;
Fig. 4 is the composition structural representation of embodiment of the present invention password authentication device.
Specific embodiment
It should be appreciated that specific embodiment described herein, only in order to explain technical scheme, is not used to Limit protection scope of the present invention.
Realize the mobile terminal of each embodiment of the present invention referring now to Description of Drawings.In follow-up description, use For represent element such as " module ", " part " or " unit " suffix only for being conducive to the explanation of the present invention, itself Not specific meaning.Therefore, " module " and " part " can mixedly use.
Mobile terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as moving Phone, smart phone, notebook computer, digit broadcasting receiver, personal digital assistant (PDA), panel computer (PAD), portable The fixation of the mobile terminal of formula multimedia player (PMP), guider etc. and such as digital TV, desk computer etc. Terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, except being used in particular for mobile mesh Element outside, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1-1 is that the hardware configuration of the mobile terminal 1 00 realizing each embodiment of the present invention is illustrated, and as Figure 1-1, moves Dynamic terminal 100 can include wireless communication unit 110, audio/video (A/V) input block 120, user input unit 130, sense Survey unit 140, output unit 150, memorizer 160, interface unit 170, controller 180 and power subsystem 190 etc..Fig. 1-1 Show the mobile terminal 1 00 with various assemblies, it should be understood that being not required for implementing all assemblies illustrating.Can Alternatively to implement more or less of assembly.Will be discussed in more detail below the element of mobile terminal 1 00.
Wireless communication unit 110 generally includes one or more assemblies, and it allows mobile terminal 1 00 and wireless communication system Or the radio communication between network.For example, wireless communication unit 110 can include broadcasting reception module 111, mobile communication mould At least one of block 112, wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast via broadcast channel from external broadcast management server Relevant information.Via broadcasting reception module 111, the broadcast singal receiving and/or broadcast related information can be stored in memorizer In 160 (or other types of storage mediums).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal And at least one of server and/or receive from it radio signal.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal 1 00.Wireless Internet module 113 can To be internally or externally couple to terminal.
Short range communication module 114 is the module for supporting junction service.Some examples of short-range communication technology include indigo plant ToothTM, RF identification (RFID), Infrared Data Association (IrDA), ultra broadband (UWB), purple honeybeeTMEtc..
Location information module 115 be for check or obtain mobile terminal 1 00 positional information module.Positional information mould The typical case of block 115 is global positioning system (GPS) module 115.
A/V input block 120 is used for receiving audio or video signal.A/V input block 120 can include camera 121 He Mike 122, camera 121 is to the static images being obtained by image capture apparatus in Video Capture pattern or image capture mode Or the view data of video is processed.Picture frame after process may be displayed on display unit 151.Process through camera 121 Picture frame afterwards can be stored in memorizer 160 (or other storage medium) or carry out sending out via wireless communication unit 110 Send, two or more cameras 121 can be provided according to the construction of mobile terminal 1 00.Mike 122 can be in telephone relation mould Sound (voice data) is received via mike in formula, logging mode, speech recognition mode etc. operational mode, and can be by Such acoustic processing is voice data.Audio frequency (voice) data after process can be changed in the case of telephone calling model For can be sent to the form output of mobile communication base station via mobile communication module 112.Mike 122 can implement all kinds Noise eliminate (or suppression) algorithm with eliminate (or suppression) receive and the noise that produces during sending audio signal or Person disturbs.
User input unit 130 can generate key input data to control mobile terminal 1 00 according to the order of user input Various operations.User input unit 130 allows the various types of information of user input.Especially, when touch pad is with the shape of layer When formula is superimposed upon on display unit 151, touch screen can be formed.
Sensing unit 140 detect mobile terminal 1 00 current state, (for example, mobile terminal 1 00 open or close shape State), the position of mobile terminal 1 00, user is for the presence or absence of the contact (that is, touch input) of mobile terminal 1 00, mobile terminal 100 orientation, the acceleration or deceleration movement of mobile terminal 1 00 and direction etc., and generate for controlling mobile terminal 1 00 The order of operation or signal.For example, when mobile terminal 1 00 is embodied as sliding-type mobile phone, sensing unit 140 can sense This sliding-type phone opens or cuts out.In addition, sensing unit 140 can detect power subsystem 190 whether provide electric power or Whether person's interface unit 170 is coupled with external device (ED).
Interface unit 170 is connected, with mobile terminal 1 00, the interface that can pass through as at least one external device (ED).For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port (typical case is general-purpose serial bus USB port), for connection, there is subscriber identification module The port of device, audio input/output (I/O) port, video i/o port, ear port etc..Subscriber identification module is permissible It is that storage uses the various information of mobile terminal 1 00 and can include client identification module (SIM), general for verifying user Client identification module (USIM) etc..
Interface unit 170 can be used for receive from external device (ED) input (for example, data message, electric power etc.) and The one or more elements that are transferred to the input receiving in mobile terminal 1 00 or can be used in mobile terminal 1 00 He Transmission data between external device (ED).
In addition, when mobile terminal 1 00 is connected with external base, interface unit 170 can serve as allowing by it by electricity Power provides the path of mobile terminal 1 00 from base or can serve as allowing the various command signals from base input to pass through it It is transferred to the path of mobile terminal 1 00.May serve as identifying and move eventually from the various command signals of base input or electric power Whether end 100 is accurately fitted within the signal on base.
Output unit 150 is configured to provide output signal (for example, audio frequency letter with vision, audio frequency and/or tactile manner Number, video signal, alarm signal, vibration signal etc.).Output unit 150 can include display unit 151, audio output mould Block 152, alarm unit 153 etc..
Display unit 151 may be displayed on the information processing in mobile terminal 1 00.For example, when mobile terminal 1 00 is in electricity During words call mode, display unit 151 can show (for example, text messaging, the multimedia file that communicate with call or other Download etc.) related user interface (UI) or graphic user interface (GUI).When mobile terminal 1 00 is in video calling pattern Or during image capture mode, display unit 151 can show the image of capture and/or the image of reception, illustrate video or figure UI or GUI of picture and correlation function etc..
Meanwhile, when display unit 151 and the touch pad touch screen with formation superposed on one another as a layer, display unit 151 can serve as input equipment and output device;Dio Output Modules 152 can include speaker, buzzer etc..Alarm list Unit 153 can provide output to notify event to mobile terminal 1 00.Typical event can include calling receive, Message sink, key signals input, touch input etc..
Memorizer 160 can store software program of the process being executed by controller 180 and control operation etc., or can Temporarily to store the data (for example, telephone directory, message, still image, video etc.) having exported or will having exported.And And, memorizer 160 can be to store the vibration of various modes with regard to exporting and audio signal when touching and being applied to touch screen Data.
Memorizer 160 can include the storage medium of at least one type, and, mobile terminal 1 00 can with by net Network connects the network storage device cooperation of the store function of execution memorizer 160.
Controller 180 generally controls the overall operation of mobile terminal 1 00.For example, controller 180 execution with voice call, The related control of data communication, video calling etc. and process.In addition, controller 180 can be included for reproducing or playing back many The multi-media module 181 of media data, multi-media module 181 can construct in controller 180, or it is so structured that and control Device 180 processed separates.Controller 180 can be with execution pattern identifying processing, by the handwriting input executing on the touchscreen or figure Piece is drawn input and is identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit Suitable electric power needed for part and assembly.
Various embodiment described herein can be with using such as computer software, hardware or its any combination of calculating Machine computer-readable recording medium is implementing.Hardware is implemented, embodiment described herein can be by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can Program gate array (FPGA), processor, controller, microcontroller, microprocessor, be designed to execute function described herein At least one in electronic unit implementing, in some cases, can be implemented in controller 180 by such embodiment. Software is implemented, the embodiment of such as process or function can with allow to execute the single of at least one function or operation Software module is implementing.Software code can be come by the software application (or program) write with any suitable programming language Implement, software code can be stored in memorizer 160 and be executed by controller 180.
So far, describe mobile terminal 1 00 according to its function.Below, for the sake of brevity, will describe and such as fold Sliding-type in various types of mobile terminal 1s 00 of type, board-type, oscillating-type, slide type mobile terminal 100 etc. is mobile eventually End 100 is as an example.Therefore, the present invention can be applied to any kind of mobile terminal 1 00, and is not limited to sliding-type movement Terminal 100.
The technical solution of the present invention is further elaborated with specific embodiment below in conjunction with the accompanying drawings.
In order to solve the technical problem in background technology, the embodiment of the present invention provides a kind of method of password authentication, is applied to Terminal, the function that the method is realized can be realized by the processor caller code in terminal, certain program code Can be saved in computer-readable storage medium it is seen then that this terminal at least includes processor and storage medium.
Fig. 1-2 realizes schematic flow sheet for embodiment of the present invention method of password authentication, as shown in Figure 1-2, the method bag Include:
Step S101, receives the first operation, and described first operates the inputting interface for triggering display password;
Here, described terminal can be various types of electricity with information processing capability during specific embodiment Sub- equipment, for example described electronic equipment can include mobile phone, panel computer, desktop computer, personal digital assistant, navigator, numeral Phone, visual telephone, television set etc..
Here, described first operation is realized by the input equipment of terminal, and the inputting interface in step S101 can be User's triggering and generation, such as when user carries out the operation such as Account Logon or payment, terminal will proceed to Password Input Interface, for another example, the mobile phone of user is in screen lock state (Fig. 2-1), and after the operation that user mobile phone is waken up, so mobile phone is carried out Interface for password input (Fig. 2-2), from the above, it can be seen that the first operation can be any triggering terminal enters the defeated of display password Enter interface.Certainly, in the other embodiment of the present invention, the modes such as phonetic entry can also be adopted to input first with user Operation, such as user says " payment " or the voice of " unlock or wake up screen ", then electronic equipment is received by the first behaviour Make.
Here, suppose that, user wants to log in an instant chat application, that is, user want to log in this instant chat should During server, first, user opens the application of this instant chat by modes such as click, double-clicks and (first operates, referring to figure 2-1).Now, terminal shows an Account Logon interface (i.e. inputting interface), and user can be corresponding in account login interface Input frame in input the password (referring to Fig. 2-2) of itself.
Step S102, described first operation of response, obtain this default information, and control described default prompting letter Breath shows in described inputting interface, and described default information is used for the mapping ruler pointing out user input to map password;
Here, during realizing, default information can be stored in advance in locally, can be by terminal according to certain One default information of Rule, then control described default information to be shown in inputting interface, wherein certain Rule for example can be in the way of using random acquisition.Certainly terminal can also be handed down to by server, can also by user according to A default information is selected in default list.Default information can be certain corresponding relation, such as original password It is 1234, then corresponding mapping password is ABCD, wherein 1 corresponds to A, and 2 correspond to B, and 3 correspond to C, and 4 correspond to D;For another example Original password is 1234, then corresponding mapping password is abcd, and 1 corresponds to a, and 2 correspond to b, and 3 correspond to c, and 4 correspond to d; For another example preset information and can adopt certain algorithm, for example, plus 1 (+1) or subtract 1 (- 1) or Jia 2 (+2) or subtract 2 (- 2), for example When original password is 1234, default information is Jia 1, then corresponding mapping password was 2345 (referring to Fig. 2-3).
Step S103, receives the second operation, and described second operates for input mapping password;
Step S104, the mapping password being inputted in described inputting interface based on the described second operation receive user;
Step S105, verifies to described mapping password according to described default information.
Here, according to described default information, described mapping password is verified, be verified result;If described The result shows, to described mapping password authentification success, to complete Password Input process;If described the result shows to institute State mapping password authentification failure, export information, described information is used for showing to described mapping password authentification failure.
In the embodiment of the present invention, realize password based on password mapping techniques and directly encrypt, comprise the steps:1) in mobile phone The touch screen of kernel maps to user input in driving;2) judge that the contact action of active user is intended to input mapping password When, the coordinate information of user input (can be provided many algorithms to allow user's combination selection according to user's algorithm set in advance He wants), the coordinate of user input is adjusted, then passes to input method.For example:The true password of user is 123456, user have selected password unified+1, then user inputs 234567 when inputting password, and kernel-driven can be passed Change 123456 corresponding touch coordinates into.
In the embodiment of the present invention, receive the first operation, described first operates the inputting interface for triggering display password;Ring Answer described first operation, obtain this default information, and control described default information in described inputting interface Display, described default information is used for the mapping ruler pointing out user input to map password;Receive second to operate, described second Operate for input mapping password;The mapping password being inputted in described inputting interface based on the described second operation receive user; According to described default information, described mapping password is verified;So, map password by corresponding to into original password, Accordingly even when mapping password is seen and steals, because each default information is different, so also cannot be using stealing Mapping password.
Fig. 3 realizes schematic flow sheet, as shown in figure 3, the method includes for embodiment of the present invention method of password authentication:
Step S201, receives the first operation, and described first operates the inputting interface for triggering display password;
Here, described first operation is realized by the input equipment of terminal, and such as user carries out Account Logon or props up When paying grade operation, terminal will proceed to interface for password input, and for another example, the mobile phone of user is in screen lock state, when user mobile phone quilt After the operation waking up, so mobile phone carries out interface for password input, from the above, it can be seen that the first operation can be that any triggering is whole End enters the inputting interface of display password.Certainly, in the other embodiment of the present invention, voice can also be adopted defeated with user The mode such as enter and input the first operation, such as user says " payment " or the voice of " unlock or wake up screen ", then electronics Equipment is received by the first operation.
Step S202, described first operation of response, obtain this default information, and control described default prompting letter Breath shows in described inputting interface, and described default information is used for the mapping ruler pointing out user input to map password;
Step S303, receives the second operation, and described second operates for input mapping password;
Step S204, the mapping password being inputted in described inputting interface based on the described second operation receive user;
Step S205, described second operation of response, obtain the identification information of user;
Step S206, the identification information according to described user obtains the original password of user;
Step S207, verifies to described mapping password according to described default information and described original password.
Here, described according to described default information and described original password, described mapping password is verified, bag Include:
Step S271, generates checking password according to described default information and described original password;
Step S272, judges whether described checking password is mated with described mapping password, obtains matching result;
Step S273, if described matching result shows described checking password and the described password match that maps it is determined that right Described mapping password is proved to be successful;If described matching result shows described checking password with described mapping password not Join it is determined that authentication failed is carried out to described mapping password.
Here, above-mentioned step S205 to step S207 actually provides one kind to realize above-mentioned steps S105 " described basis Described default information to described mapping password verify " specific implementation.
Two kinds of modes realizing step S102 are provided in the present embodiment:
Mode one:Described response described first operates, and obtains this default information, including:
Step S121A, response first operation, obtain the identification information of user;
Here, during realizing, the identification information of described user can adopt the accounts information of user or title, close Claim etc., the accounts information of user can adopt mailbox, cell-phone number, ID (identity number) card No. etc..
Step S122A, the identification information of described user is carried and is sent to server in prompting request message, described carry Show that request message is used for asking this default information;
Here, after server receives prompting request message, obtain this default information, then that this is default Information is carried in prompting response message, and then server will be prompted to response message and is sent to terminal.
Step S123A, the prompting response message that terminal the reception server sends, described prompting response message includes this Default information.
Here, terminal parses described prompting response message, obtains this default information.
Mode two:Described response described first operates, and obtains this default information, including:
Step S121B, described first operation of response, obtain prompting optionies from local;
Here, described prompting optionies include multiple default informations;
Step S122B, described prompting optionies are shown in described inputting interface;
Step S123B, obtains the 3rd operation, and the described 3rd operates for selecting the default of this to carry from prompting optionies Show information;
Step S124B, determines this default information described based on the described 3rd operation.
Based on aforesaid embodiment, the embodiment of the present invention provides a kind of password authentication device, each list included by this device Each module included by unit and each unit, can be realized by the processor in terminal, certainly also can be by specific Logic circuit is realized;During implementing, processor can be central processing unit (CPU), microprocessor (MPU), numeral letter Number processor (DSP) or field programmable gate array (FPGA) etc..
Fig. 4 is the composition structural representation of embodiment of the present invention password authentication device, as shown in figure 4, this device 400 includes First receiving unit 401, acquiring unit 402, the second receiving unit 403, determining unit 404 and authentication unit 405, wherein:
Described first receiving unit 401, for receiving the first operation, described first operates for triggering the defeated of display password Enter interface;
Described acquiring unit 402, for responding described first operation, obtains this default information, and controls institute State default information to show in described inputting interface, described default information is used for pointing out user input to map password Mapping ruler;
Described second receiving unit 403, for receiving the second operation, described second operates for input mapping password;
Described determining unit 404, for reflecting of being inputted in described inputting interface based on the described second operation determination user Penetrate password;
Described authentication unit 405, for verifying to described mapping password according to described default information.
In other embodiments of the invention, described authentication unit includes the first acquisition module, the second acquisition module and tests Card module, wherein:
Described first acquisition module, for obtaining the identification information of user;
Described second acquisition module, obtains the original password of user for the identification information according to described user;
Described authentication module, for carrying out to described mapping password according to described default information and described original password Checking.
In other embodiments of the invention, described authentication module includes generating submodule and judging submodule, wherein:
Described generation submodule, for generating checking password according to described default information and described original password;
Described judging submodule, for judging whether described checking password is mated with described mapping password, obtains coupling knot Really;If described matching result shows that described checking password maps password match it is determined that entering to described mapping password with described Row is proved to be successful;If described matching result shows described checking password and described mapping password mismatch it is determined that to described Mapping password carries out authentication failed.
In other embodiments of the invention, described acquiring unit includes the 3rd acquisition module, sending module and receives mould Block, wherein:
Described 3rd acquisition module, for response first operation, obtains the identification information of user;
Described sending module, is sent to service for carrying the identification information of described user in prompting request message Device, described prompting request message is used for asking this default information;
Described receiver module, the prompting response message sending for the reception server, described prompting response message includes This default information.
In other embodiments of the invention, described device also includes completing unit and output unit, wherein:
Described complete unit, if for described mapping password authentification success, complete Password Input process;
Described output unit, if for described mapping password authentification failure, exporting information, described information For showing to described mapping password authentification failure.
In other embodiments of the invention, described acquiring unit includes the 4th acquisition module, display module, the 5th acquisition Module and determining module, wherein:
Described 4th acquisition module, for responding described first operation, obtains this prompting optionies from local;
Described display module, for being shown in described inputting interface by described prompting optionies;
Described 5th acquisition module, for obtaining the 3rd operation, the described 3rd operates the default prompting for determining this Information;
Described determining module, for determining this default information described based on the described 3rd operation.
It need to be noted that be:The description of apparatus above embodiment, the description with said method embodiment is similar, There is the similar beneficial effect of same embodiment of the method.For the ins and outs not disclosed in apparatus of the present invention embodiment, refer to The description of the inventive method embodiment and understand.
It should be noted that in the embodiment of the present invention, if realize above-mentioned password in the form of software function module tested Card method, and as independent production marketing or use when it is also possible to be stored in a computer read/write memory medium.Base In such understanding, what the technical scheme of the embodiment of the present invention substantially contributed to prior art in other words partly can be with The form of software product embodies, and this computer software product is stored in a storage medium, including some instructions in order to Make a computer equipment (can be personal computer, server or network equipment etc.) each enforcement of the execution present invention The all or part of example methods described.And aforesaid storage medium includes:USB flash disk, portable hard drive, read only memory (ROM, Read Only Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.So, the embodiment of the present invention does not limit Combine in any specific hardware and software.
Correspondingly, the embodiment of the present invention reoffers a kind of computer-readable storage medium, stores in described computer-readable storage medium There are computer executable instructions, this computer executable instructions is used for executing method of password authentication in the embodiment of the present invention.
Based on aforesaid embodiment, the embodiment of the present invention reoffers a kind of terminal, and described terminal includes input equipment and place Reason device, wherein
Described processor is used for:First operation is received by described input equipment, described first operates for triggering display The inputting interface of password;Respond described first operation, obtain this default information, and control described default information Described inputting interface shows, described default information is used for the mapping ruler pointing out user input to map password;Pass through Described input equipment receives the second operation, and described second operates for input mapping password;Received based on the described second operation and use The mapping password that family inputs in described inputting interface;According to described default information, described mapping password is verified.
In other embodiments of the invention, described according to described default information to described mapping password test Card, including:Obtain the identification information of user;Identification information according to described user obtains the original password of user;According to described Default information and described original password are verified to described mapping password.
In other embodiments of the invention, described reflected to described according to described default information and described original password Penetrate password to be verified, including:Checking password is generated according to described default information and described original password;Test described in judgement Whether card password is mated with described mapping password, obtains matching result;If described matching result show described checking password with Described mapping password match is it is determined that be proved to be successful to described mapping password;If described matching result is tested described in showing Card password is mismatched with described mapping password it is determined that carrying out authentication failed to described mapping password.
In other embodiments of the invention, described response described first operates, and obtains this default information, bag Include:Response first operation, obtains the identification information of user;The identification information of described user is carried and sends out in prompting request message Give server, described prompting request message is used for asking this default information;The prompting that the reception server sends rings Answer message, described prompting response message includes this default information.
In other embodiments of the invention, described processor, is additionally operable to:Reflected to described according to described default information Penetrate password to be verified, be verified result;If described the result shows, to described mapping password authentification success, to complete close Code input process;If described the result shows, to described mapping password authentification failure, to export information, described prompting letter Cease and be used for showing to described mapping password authentification failure.
In other embodiments of the invention, described response described first operates, and obtains this default information, bag Include:Respond described first operation, obtain prompting optionies from local;Described prompting optionies are shown in described inputting interface; 3rd operation is obtained by described input equipment, the described 3rd operates the default information for determining this;Based on described 3rd operation determines this default information described.
It need to be noted that be:Above computing device or the description of storage medium embodiment, with said method embodiment Description be similar, there is the similar beneficial effect of same embodiment of the method.Real for computing device of the present invention or storage medium Apply the ins and outs not disclosed in example, refer to the description of the inventive method embodiment and understand.
It should be understood that " embodiment " or " embodiment " that description is mentioned in the whole text mean relevant with embodiment Special characteristic, structure or characteristic are included at least one embodiment of the present invention.Therefore, occur everywhere in entire disclosure " in one embodiment " or " in one embodiment " not necessarily refers to identical embodiment.Additionally, these specific feature, knots Structure or characteristic can combine in one or more embodiments in any suitable manner.It should be understood that the various enforcements in the present invention In example, the size of the sequence number of above-mentioned each process is not meant to the priority of execution sequence, and the execution sequence of each process should be with its work( Can determine with internal logic, and should not constitute any restriction to the implementation process of the embodiment of the present invention.The embodiments of the present invention Sequence number is for illustration only, does not represent the quality of embodiment.
It should be noted that herein, term " inclusion ", "comprising" or its any other variant are intended to non-row The comprising of his property, so that including a series of process of key elements, method, article or device not only include those key elements, and And also include other key elements of being not expressly set out, or also include intrinsic for this process, method, article or device institute Key element.In the absence of more restrictions, the key element being limited by sentence "including a ..." is it is not excluded that including being somebody's turn to do Also there is other identical element in the process of key element, method, article or device.
It should be understood that disclosed equipment and method in several embodiments provided herein, can be passed through it Its mode is realized.Apparatus embodiments described above are only schematically, for example, the division of described unit, it is only A kind of division of logic function, actual can have other dividing mode, such as when realizing:Multiple units or assembly can combine, or It is desirably integrated into another system, or some features can be ignored, or do not execute.In addition, shown or discussed each composition portion Coupling point each other or direct-coupling or communication connection can be the INDIRECT COUPLING of equipment or unit by some interfaces Or communication connection, can be electrical, machinery or other forms.
The above-mentioned unit illustrating as separating component can be or may not be physically separate, show as unit The part showing can be or may not be physical location;Both may be located at a place it is also possible to be distributed to multiple network lists In unit;The purpose to realize this embodiment scheme for the part or all of unit therein can be selected according to the actual needs.
In addition, can be fully integrated in a processing unit in each functional unit in various embodiments of the present invention, also may be used Be each unit individually as a unit it is also possible to two or more units are integrated in a unit;Above-mentioned Integrated unit both can be to be realized in the form of hardware, it would however also be possible to employ the form that hardware adds SFU software functional unit is realized.
One of ordinary skill in the art will appreciate that:The all or part of step realizing said method embodiment can be passed through Completing, aforesaid program can be stored in computer read/write memory medium the related hardware of programmed instruction, and this program exists During execution, execute the step including said method embodiment;And aforesaid storage medium includes:Movable storage device, read-only deposit Reservoir (Read Only Memory, ROM), magnetic disc or CD etc. are various can be with the medium of store program codes.
Or, if the above-mentioned integrated unit of the present invention is realized and as independent product using in the form of software function module It is also possible to be stored in a computer read/write memory medium when selling or using.Based on such understanding, the present invention is implemented What the technical scheme of example substantially contributed to prior art in other words partly can be embodied in the form of software product, This computer software product is stored in a storage medium, including some instructions with so that a computer equipment is (permissible Personal computer, server or network equipment etc.) execution each embodiment methods described of the present invention all or part. And aforesaid storage medium includes:Movable storage device, ROM, magnetic disc or CD etc. are various can be with Jie of store program codes Matter.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, and any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, all should contain Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by described scope of the claims.

Claims (10)

1. a kind of method of password authentication is it is characterised in that methods described includes:
Receive the first operation, described first operates the inputting interface for triggering display password;
Respond described first operation, obtain this default information, and control described default information in described input Show in interface, described default information is used for the mapping ruler pointing out user input to map password;
Receive the second operation, described second operates for input mapping password;
The mapping password being inputted in described inputting interface based on the described second operation receive user;
According to described default information, described mapping password is verified.
2. method according to claim 1 it is characterised in that described according to described default information to described mapping close Code is verified, including:
Obtain the identification information of user;
Identification information according to described user obtains the original password of user;
According to described default information and described original password, described mapping password is verified.
3. method according to claim 2 is it is characterised in that described according to described default information and described original close Code is verified to described mapping password, including:
Checking password is generated according to described default information and described original password;
Judge whether described checking password is mated with described mapping password, obtain matching result;
If described matching result shows that described checking password maps password match it is determined that entering to described mapping password with described Row is proved to be successful;If described matching result shows described checking password and described mapping password mismatch it is determined that to described Mapping password carries out authentication failed.
4. the method according to any one of claims 1 to 3, it is characterised in that described first operation of described response, obtains this Secondary default information, including:
Response first operation, obtains the identification information of user;
The identification information of described user is carried in prompting request message, is sent to server, described prompting request message is used for Ask this default information;
The prompting response message that the reception server sends, described prompting response message includes this default information.
5. the method according to claims 1 to 3 is it is characterised in that methods described also includes:
According to described default information, described mapping password is verified, be verified result;
If described the result shows, to described mapping password authentification success, to complete Password Input process;
If described the result shows, to described mapping password authentification failure, to export information, described information is used for Show to described mapping password authentification failure.
6. the method according to claims 1 to 3, it is characterised in that described first operation of described response, obtains the pre- of this If information, including:
Respond described first operation, obtain prompting optionies from local;
Described prompting optionies are shown in described inputting interface;
Obtain the 3rd operation, the described 3rd operates the default information for determining this;
This default information described is determined based on the described 3rd operation.
7. a kind of password authentication device is it is characterised in that described device includes the first receiving unit, acquiring unit, the second reception Unit, determining unit and authentication unit, wherein:
Described first receiving unit, for receiving the first operation, described first operates the inputting interface for triggering display password;
Described acquiring unit, for responding described first operation, obtains this default information, and controls described presetting to carry Show that information shows in described inputting interface, described default information is used for the mapping rule pointing out user input to map password Then;
Described second receiving unit, for receiving the second operation, described second operates for input mapping password;
Described determining unit, for determining, based on the described second operation, the mapping password that user inputs in described inputting interface;
Described authentication unit, for verifying to described mapping password according to described default information.
8. device according to claim 7 is it is characterised in that described authentication unit includes the first acquisition module, second obtains Delivery block and authentication module, wherein:
Described first acquisition module, for obtaining the identification information of user;
Described second acquisition module, obtains the original password of user for the identification information according to described user;
Described authentication module, for testing to described mapping password according to described default information and described original password Card.
9. device according to claim 8 is it is characterised in that described authentication module includes generating submodule and judges submodule Block, wherein:
Described generation submodule, for generating checking password according to described default information and described original password;
Described judging submodule, for judging whether described checking password is mated with described mapping password, obtains matching result;As Really described matching result shows that described checking password maps password match it is determined that verifying to described mapping password with described Success;If described matching result show described checking password with described mapping password mismatch it is determined that to described map close Code carries out authentication failed.
10. it is characterised in that described terminal includes input equipment and processor, wherein said processor is used for a kind of terminal:
First operation is received by described input equipment, described first operates the inputting interface for triggering display password;
Respond described first operation, obtain this default information, and control described default information in described input Show in interface, described default information is used for the mapping ruler pointing out user input to map password;
Second operation is received by described input equipment, described second operates for input mapping password;
The mapping password being inputted in described inputting interface based on the described second operation receive user;
According to described default information, described mapping password is verified.
CN201611088917.7A 2016-11-30 2016-11-30 Cipher verification method and device, and terminal Pending CN106453802A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611088917.7A CN106453802A (en) 2016-11-30 2016-11-30 Cipher verification method and device, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611088917.7A CN106453802A (en) 2016-11-30 2016-11-30 Cipher verification method and device, and terminal

Publications (1)

Publication Number Publication Date
CN106453802A true CN106453802A (en) 2017-02-22

Family

ID=58223425

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611088917.7A Pending CN106453802A (en) 2016-11-30 2016-11-30 Cipher verification method and device, and terminal

Country Status (1)

Country Link
CN (1) CN106453802A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107204974A (en) * 2017-04-14 2017-09-26 努比亚技术有限公司 The management method and mobile terminal of a kind of user cipher
CN107516025A (en) * 2017-07-04 2017-12-26 深圳天珑无线科技有限公司 Terminal and its method for generating cipher code, computer-readable recording medium
WO2018233718A1 (en) * 2017-06-23 2018-12-27 中兴通讯股份有限公司 Application program security management method and apparatus, and storage medium
CN110102527A (en) * 2019-04-24 2019-08-09 宁波永仕电机有限公司 A kind of axis class method for suppersonic cleaning and its system
CN112328986A (en) * 2020-11-26 2021-02-05 西安四叶草信息技术有限公司 User identity authentication method, device, server and storage medium
CN113066215A (en) * 2021-03-15 2021-07-02 长沙广缘物业管理有限公司 Two-dimensional code access control management method, system and storage medium
CN113158150A (en) * 2021-04-14 2021-07-23 捷德(中国)科技有限公司 Verification method, device and system
CN114531683A (en) * 2020-11-20 2022-05-24 中国联合网络通信集团有限公司 Router authentication method, router authentication device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236440A (en) * 2010-04-22 2011-11-09 联芯科技有限公司 Password input method and mobile terminal using same
KR20120081001A (en) * 2011-03-09 2012-07-18 홍문화 Apparatus for input code used in mobile application terminal and method for the same
CN103971048A (en) * 2014-04-30 2014-08-06 宇龙计算机通信科技(深圳)有限公司 Method and system for entering password
CN106127062A (en) * 2016-06-23 2016-11-16 北京小米移动软件有限公司 unlocking method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236440A (en) * 2010-04-22 2011-11-09 联芯科技有限公司 Password input method and mobile terminal using same
KR20120081001A (en) * 2011-03-09 2012-07-18 홍문화 Apparatus for input code used in mobile application terminal and method for the same
CN103971048A (en) * 2014-04-30 2014-08-06 宇龙计算机通信科技(深圳)有限公司 Method and system for entering password
CN106127062A (en) * 2016-06-23 2016-11-16 北京小米移动软件有限公司 unlocking method and device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107204974A (en) * 2017-04-14 2017-09-26 努比亚技术有限公司 The management method and mobile terminal of a kind of user cipher
WO2018233718A1 (en) * 2017-06-23 2018-12-27 中兴通讯股份有限公司 Application program security management method and apparatus, and storage medium
CN109117623A (en) * 2017-06-23 2019-01-01 中兴通讯股份有限公司 A kind of application method for managing security, device and storage medium
CN109117623B (en) * 2017-06-23 2024-01-05 中兴通讯股份有限公司 Application security management method, device and storage medium
CN107516025A (en) * 2017-07-04 2017-12-26 深圳天珑无线科技有限公司 Terminal and its method for generating cipher code, computer-readable recording medium
CN110102527A (en) * 2019-04-24 2019-08-09 宁波永仕电机有限公司 A kind of axis class method for suppersonic cleaning and its system
CN114531683A (en) * 2020-11-20 2022-05-24 中国联合网络通信集团有限公司 Router authentication method, router authentication device and storage medium
CN112328986A (en) * 2020-11-26 2021-02-05 西安四叶草信息技术有限公司 User identity authentication method, device, server and storage medium
CN113066215A (en) * 2021-03-15 2021-07-02 长沙广缘物业管理有限公司 Two-dimensional code access control management method, system and storage medium
CN113158150A (en) * 2021-04-14 2021-07-23 捷德(中国)科技有限公司 Verification method, device and system

Similar Documents

Publication Publication Date Title
CN106453802A (en) Cipher verification method and device, and terminal
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
KR102471289B1 (en) A method for quickly opening an application or application function, and a terminal
US11934505B2 (en) Information content viewing method and terminal
CN104915582B (en) unlocking method and device
US20140160316A1 (en) Mobile terminal and control method thereof
CN104216742B (en) Brush machine control method and device based on password
CN104283876A (en) Operation authorization method and device
CN105260673A (en) Short message reading method and apparatus
CN105844470A (en) Payment method and device
CN106156562B (en) A kind of private space protective device, mobile terminal and method
US20140040983A1 (en) Terminal authentication method and terminal
CN105323218A (en) Identity verifying method and device
US11562051B2 (en) Varying computing device behavior for different authenticators
CN105138874A (en) Screen unlocking control device and method
CN108551521A (en) A kind of log-on message reminding method and mobile terminal
CN107256367A (en) A kind of information processing method and device, terminal device and computer-readable recording medium
CN106022045A (en) Information processing device and method
CN106952090A (en) Payment verification device and method
CN106485119A (en) A kind of application message device for opening and method
CN103916471A (en) Information display method and device
CN106611112A (en) Application program safe processing method, device and equipment
CN106161474A (en) A kind of password determines apparatus and method
CN106211156A (en) WiFi network method of attachment, device, terminal unit and WiFi access point
CN106295363A (en) Startup calibration method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170222

RJ01 Rejection of invention patent application after publication