CN106453802A - Cipher verification method and device, and terminal - Google Patents
Cipher verification method and device, and terminal Download PDFInfo
- Publication number
- CN106453802A CN106453802A CN201611088917.7A CN201611088917A CN106453802A CN 106453802 A CN106453802 A CN 106453802A CN 201611088917 A CN201611088917 A CN 201611088917A CN 106453802 A CN106453802 A CN 106453802A
- Authority
- CN
- China
- Prior art keywords
- password
- mapping
- default information
- user
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a cipher verification method. The method comprises the steps of receiving first operation, wherein the first operation is used for triggering an input interface for displaying a cipher; obtaining preset prompt information of this time in response to the first operation and controlling the preset prompt information to be displayed in the input interface, wherein the preset prompt information is used for prompting a user to input a mapping rule of a mapping cipher; receiving second operation, wherein the second operation is used for inputting the mapping cipher; receiving the mapping cipher input by the user in the input interface based on the second operation; and verifying the mapping cipher according to the preset prompt information. The invention also discloses a cipher verification device and a terminal. Through adoption of the technical scheme of the method, the device and the terminal, an original cipher is enabled to correspond to the mapping cipher, in this way, even if the mapping cipher is seen and stolen, the preset prompt information is different each time, so the stolen mapping cipher cannot be used.
Description
Technical field
The present invention relates to electronic technology, more particularly, to a kind of method of password authentication and device, terminal.
Background technology
With the fast development of mobile network, people can using install on mobile phone types of applications program (APP,
Application, referred to as applies) carry out completing all kinds of things in daily life, for example see time, financial transaction, commodity purchase
Buy, see a film, see video, keep a diary.As can be seen here, mobile phone has become as requisite electronic equipment in people's life,
Obviously it has be unable to do without mobile phone in people's life.
In order to protect the information security of individual, password application on an electronic device also gets more and more, such as electronic equipment
It is required for input password and could enter desktop after screen locking;The application program such as financial class or chat class is entering application or is executing certain
It is also required to input password when one particular step just can continue executing with, such as, when user needs to carry out payment step, need defeated
Enter password could complete further to pay.Type relatively conventional at present is numerical ciphers input and the password based on figure is defeated
Enter, wherein the former is the digit (such as 4 or 6 are) of user setup password, then user input password, terminal unit is by user
The password of input is mated with the password of user setup, and the match is successful then continues, and it fails to match does not then continue to;And it is based on figure
The Password Input of shape is that user pre-sets figure, then user input figure, and terminal unit is by the figure of user input and use
The figure of family setting is mated, and the match is successful then continues, and it fails to match does not then continue to.
From the above, it can be seen that in the various password of user input, the danger that password presence is stolen.For above-mentioned this
Application scenarios, the shortcoming of existing solution is:1) storage of user sensitive information encrypted transmission, does not echo;2) user exists
During input password, the operation of user by others it will be seen that during such as user input password, clicking on screen vestige and be stolen, and then
Steal user cipher.As can be seen here, increasingly popularize with electronic equipment, the safety problem brought therewith is increasingly serious.
Content of the invention
In view of this, the embodiment of the present invention provides a kind of password for solving at least one problem present in prior art
Verification method and device, terminal.
The technical scheme of the embodiment of the present invention is realized in:
In a first aspect, the embodiment of the present invention provides a kind of method of password authentication, methods described includes:
Receive the first operation, described first operates the inputting interface for triggering display password;
Respond described first operation, obtain this default information, and control described default information described
Show in inputting interface, described default information is used for the mapping ruler pointing out user input to map password;
Receive the second operation, described second operates for input mapping password;
The mapping password being inputted in described inputting interface based on the described second operation receive user;
According to described default information, described mapping password is verified.
Second aspect, a kind of password authentication device of the embodiment of the present invention, described device includes the first receiving unit, obtains list
Unit, the second receiving unit, determining unit and authentication unit, wherein:
Described first receiving unit, for receiving the first operation, described first operates the input for triggering display password
Interface;
Described acquiring unit, for responding described first operation, obtains this default information, and controls described pre-
If information shows in described inputting interface, described default information is used for the mapping pointing out user input to map password
Rule;
Described second receiving unit, for receiving the second operation, described second operates for input mapping password;
Based on the described second operation, described determining unit, for determining that the mapping that user inputs in described inputting interface is close
Code;
Described authentication unit, for verifying to described mapping password according to described default information.
The third aspect, the embodiment of the present invention provides a kind of terminal, and described terminal includes input equipment and processor, wherein institute
State processor to be used for:
First operation is received by described input equipment, described first operates the inputting interface for triggering display password;
Respond described first operation, obtain this default information, and control described default information described
Show in inputting interface, described default information is used for the mapping ruler pointing out user input to map password;
Second operation is received by described input equipment, described second operates for input mapping password;
The mapping password being inputted in described inputting interface based on the described second operation receive user;
According to described default information, described mapping password is verified.
The embodiment of the present invention provides a kind of method of password authentication and device, terminal, wherein, receives the first operation, and described the
One operates the inputting interface for triggering display password;Respond described first operation, obtain this default information, and control
Make described default information to show in described inputting interface, described default information is used for pointing out user input mapping close
The mapping ruler of code;Receive the second operation, described second operates for input mapping password;Received based on the described second operation and use
The mapping password that family inputs in described inputting interface;According to described default information, described mapping password is verified;
So, map password by corresponding to into original password, accordingly even when mapping password is seen and steals, due to each default
Information is different, so also cannot be using the mapping password stolen.
Brief description
Fig. 1-1 is the hardware architecture diagram of a mobile terminal realizing each embodiment of the present invention;
Fig. 1-2 realizes schematic flow sheet for embodiment of the present invention method of password authentication;
Fig. 2-1 to Fig. 2-3 is the schematic diagram of a scenario of the embodiment of the present invention;
Fig. 3 realizes schematic flow sheet for embodiment of the present invention method of password authentication;
Fig. 4 is the composition structural representation of embodiment of the present invention password authentication device.
Specific embodiment
It should be appreciated that specific embodiment described herein, only in order to explain technical scheme, is not used to
Limit protection scope of the present invention.
Realize the mobile terminal of each embodiment of the present invention referring now to Description of Drawings.In follow-up description, use
For represent element such as " module ", " part " or " unit " suffix only for being conducive to the explanation of the present invention, itself
Not specific meaning.Therefore, " module " and " part " can mixedly use.
Mobile terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as moving
Phone, smart phone, notebook computer, digit broadcasting receiver, personal digital assistant (PDA), panel computer (PAD), portable
The fixation of the mobile terminal of formula multimedia player (PMP), guider etc. and such as digital TV, desk computer etc.
Terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, except being used in particular for mobile mesh
Element outside, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1-1 is that the hardware configuration of the mobile terminal 1 00 realizing each embodiment of the present invention is illustrated, and as Figure 1-1, moves
Dynamic terminal 100 can include wireless communication unit 110, audio/video (A/V) input block 120, user input unit 130, sense
Survey unit 140, output unit 150, memorizer 160, interface unit 170, controller 180 and power subsystem 190 etc..Fig. 1-1
Show the mobile terminal 1 00 with various assemblies, it should be understood that being not required for implementing all assemblies illustrating.Can
Alternatively to implement more or less of assembly.Will be discussed in more detail below the element of mobile terminal 1 00.
Wireless communication unit 110 generally includes one or more assemblies, and it allows mobile terminal 1 00 and wireless communication system
Or the radio communication between network.For example, wireless communication unit 110 can include broadcasting reception module 111, mobile communication mould
At least one of block 112, wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast via broadcast channel from external broadcast management server
Relevant information.Via broadcasting reception module 111, the broadcast singal receiving and/or broadcast related information can be stored in memorizer
In 160 (or other types of storage mediums).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal
And at least one of server and/or receive from it radio signal.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal 1 00.Wireless Internet module 113 can
To be internally or externally couple to terminal.
Short range communication module 114 is the module for supporting junction service.Some examples of short-range communication technology include indigo plant
ToothTM, RF identification (RFID), Infrared Data Association (IrDA), ultra broadband (UWB), purple honeybeeTMEtc..
Location information module 115 be for check or obtain mobile terminal 1 00 positional information module.Positional information mould
The typical case of block 115 is global positioning system (GPS) module 115.
A/V input block 120 is used for receiving audio or video signal.A/V input block 120 can include camera 121 He
Mike 122, camera 121 is to the static images being obtained by image capture apparatus in Video Capture pattern or image capture mode
Or the view data of video is processed.Picture frame after process may be displayed on display unit 151.Process through camera 121
Picture frame afterwards can be stored in memorizer 160 (or other storage medium) or carry out sending out via wireless communication unit 110
Send, two or more cameras 121 can be provided according to the construction of mobile terminal 1 00.Mike 122 can be in telephone relation mould
Sound (voice data) is received via mike in formula, logging mode, speech recognition mode etc. operational mode, and can be by
Such acoustic processing is voice data.Audio frequency (voice) data after process can be changed in the case of telephone calling model
For can be sent to the form output of mobile communication base station via mobile communication module 112.Mike 122 can implement all kinds
Noise eliminate (or suppression) algorithm with eliminate (or suppression) receive and the noise that produces during sending audio signal or
Person disturbs.
User input unit 130 can generate key input data to control mobile terminal 1 00 according to the order of user input
Various operations.User input unit 130 allows the various types of information of user input.Especially, when touch pad is with the shape of layer
When formula is superimposed upon on display unit 151, touch screen can be formed.
Sensing unit 140 detect mobile terminal 1 00 current state, (for example, mobile terminal 1 00 open or close shape
State), the position of mobile terminal 1 00, user is for the presence or absence of the contact (that is, touch input) of mobile terminal 1 00, mobile terminal
100 orientation, the acceleration or deceleration movement of mobile terminal 1 00 and direction etc., and generate for controlling mobile terminal 1 00
The order of operation or signal.For example, when mobile terminal 1 00 is embodied as sliding-type mobile phone, sensing unit 140 can sense
This sliding-type phone opens or cuts out.In addition, sensing unit 140 can detect power subsystem 190 whether provide electric power or
Whether person's interface unit 170 is coupled with external device (ED).
Interface unit 170 is connected, with mobile terminal 1 00, the interface that can pass through as at least one external device (ED).For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port (typical case is general-purpose serial bus USB port), for connection, there is subscriber identification module
The port of device, audio input/output (I/O) port, video i/o port, ear port etc..Subscriber identification module is permissible
It is that storage uses the various information of mobile terminal 1 00 and can include client identification module (SIM), general for verifying user
Client identification module (USIM) etc..
Interface unit 170 can be used for receive from external device (ED) input (for example, data message, electric power etc.) and
The one or more elements that are transferred to the input receiving in mobile terminal 1 00 or can be used in mobile terminal 1 00 He
Transmission data between external device (ED).
In addition, when mobile terminal 1 00 is connected with external base, interface unit 170 can serve as allowing by it by electricity
Power provides the path of mobile terminal 1 00 from base or can serve as allowing the various command signals from base input to pass through it
It is transferred to the path of mobile terminal 1 00.May serve as identifying and move eventually from the various command signals of base input or electric power
Whether end 100 is accurately fitted within the signal on base.
Output unit 150 is configured to provide output signal (for example, audio frequency letter with vision, audio frequency and/or tactile manner
Number, video signal, alarm signal, vibration signal etc.).Output unit 150 can include display unit 151, audio output mould
Block 152, alarm unit 153 etc..
Display unit 151 may be displayed on the information processing in mobile terminal 1 00.For example, when mobile terminal 1 00 is in electricity
During words call mode, display unit 151 can show (for example, text messaging, the multimedia file that communicate with call or other
Download etc.) related user interface (UI) or graphic user interface (GUI).When mobile terminal 1 00 is in video calling pattern
Or during image capture mode, display unit 151 can show the image of capture and/or the image of reception, illustrate video or figure
UI or GUI of picture and correlation function etc..
Meanwhile, when display unit 151 and the touch pad touch screen with formation superposed on one another as a layer, display unit
151 can serve as input equipment and output device;Dio Output Modules 152 can include speaker, buzzer etc..Alarm list
Unit 153 can provide output to notify event to mobile terminal 1 00.Typical event can include calling receive,
Message sink, key signals input, touch input etc..
Memorizer 160 can store software program of the process being executed by controller 180 and control operation etc., or can
Temporarily to store the data (for example, telephone directory, message, still image, video etc.) having exported or will having exported.And
And, memorizer 160 can be to store the vibration of various modes with regard to exporting and audio signal when touching and being applied to touch screen
Data.
Memorizer 160 can include the storage medium of at least one type, and, mobile terminal 1 00 can with by net
Network connects the network storage device cooperation of the store function of execution memorizer 160.
Controller 180 generally controls the overall operation of mobile terminal 1 00.For example, controller 180 execution with voice call,
The related control of data communication, video calling etc. and process.In addition, controller 180 can be included for reproducing or playing back many
The multi-media module 181 of media data, multi-media module 181 can construct in controller 180, or it is so structured that and control
Device 180 processed separates.Controller 180 can be with execution pattern identifying processing, by the handwriting input executing on the touchscreen or figure
Piece is drawn input and is identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit
Suitable electric power needed for part and assembly.
Various embodiment described herein can be with using such as computer software, hardware or its any combination of calculating
Machine computer-readable recording medium is implementing.Hardware is implemented, embodiment described herein can be by using application-specific IC
(ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can
Program gate array (FPGA), processor, controller, microcontroller, microprocessor, be designed to execute function described herein
At least one in electronic unit implementing, in some cases, can be implemented in controller 180 by such embodiment.
Software is implemented, the embodiment of such as process or function can with allow to execute the single of at least one function or operation
Software module is implementing.Software code can be come by the software application (or program) write with any suitable programming language
Implement, software code can be stored in memorizer 160 and be executed by controller 180.
So far, describe mobile terminal 1 00 according to its function.Below, for the sake of brevity, will describe and such as fold
Sliding-type in various types of mobile terminal 1s 00 of type, board-type, oscillating-type, slide type mobile terminal 100 etc. is mobile eventually
End 100 is as an example.Therefore, the present invention can be applied to any kind of mobile terminal 1 00, and is not limited to sliding-type movement
Terminal 100.
The technical solution of the present invention is further elaborated with specific embodiment below in conjunction with the accompanying drawings.
In order to solve the technical problem in background technology, the embodiment of the present invention provides a kind of method of password authentication, is applied to
Terminal, the function that the method is realized can be realized by the processor caller code in terminal, certain program code
Can be saved in computer-readable storage medium it is seen then that this terminal at least includes processor and storage medium.
Fig. 1-2 realizes schematic flow sheet for embodiment of the present invention method of password authentication, as shown in Figure 1-2, the method bag
Include:
Step S101, receives the first operation, and described first operates the inputting interface for triggering display password;
Here, described terminal can be various types of electricity with information processing capability during specific embodiment
Sub- equipment, for example described electronic equipment can include mobile phone, panel computer, desktop computer, personal digital assistant, navigator, numeral
Phone, visual telephone, television set etc..
Here, described first operation is realized by the input equipment of terminal, and the inputting interface in step S101 can be
User's triggering and generation, such as when user carries out the operation such as Account Logon or payment, terminal will proceed to Password Input
Interface, for another example, the mobile phone of user is in screen lock state (Fig. 2-1), and after the operation that user mobile phone is waken up, so mobile phone is carried out
Interface for password input (Fig. 2-2), from the above, it can be seen that the first operation can be any triggering terminal enters the defeated of display password
Enter interface.Certainly, in the other embodiment of the present invention, the modes such as phonetic entry can also be adopted to input first with user
Operation, such as user says " payment " or the voice of " unlock or wake up screen ", then electronic equipment is received by the first behaviour
Make.
Here, suppose that, user wants to log in an instant chat application, that is, user want to log in this instant chat should
During server, first, user opens the application of this instant chat by modes such as click, double-clicks and (first operates, referring to figure
2-1).Now, terminal shows an Account Logon interface (i.e. inputting interface), and user can be corresponding in account login interface
Input frame in input the password (referring to Fig. 2-2) of itself.
Step S102, described first operation of response, obtain this default information, and control described default prompting letter
Breath shows in described inputting interface, and described default information is used for the mapping ruler pointing out user input to map password;
Here, during realizing, default information can be stored in advance in locally, can be by terminal according to certain
One default information of Rule, then control described default information to be shown in inputting interface, wherein certain
Rule for example can be in the way of using random acquisition.Certainly terminal can also be handed down to by server, can also by user according to
A default information is selected in default list.Default information can be certain corresponding relation, such as original password
It is 1234, then corresponding mapping password is ABCD, wherein 1 corresponds to A, and 2 correspond to B, and 3 correspond to C, and 4 correspond to D;For another example
Original password is 1234, then corresponding mapping password is abcd, and 1 corresponds to a, and 2 correspond to b, and 3 correspond to c, and 4 correspond to d;
For another example preset information and can adopt certain algorithm, for example, plus 1 (+1) or subtract 1 (- 1) or Jia 2 (+2) or subtract 2 (- 2), for example
When original password is 1234, default information is Jia 1, then corresponding mapping password was 2345 (referring to Fig. 2-3).
Step S103, receives the second operation, and described second operates for input mapping password;
Step S104, the mapping password being inputted in described inputting interface based on the described second operation receive user;
Step S105, verifies to described mapping password according to described default information.
Here, according to described default information, described mapping password is verified, be verified result;If described
The result shows, to described mapping password authentification success, to complete Password Input process;If described the result shows to institute
State mapping password authentification failure, export information, described information is used for showing to described mapping password authentification failure.
In the embodiment of the present invention, realize password based on password mapping techniques and directly encrypt, comprise the steps:1) in mobile phone
The touch screen of kernel maps to user input in driving;2) judge that the contact action of active user is intended to input mapping password
When, the coordinate information of user input (can be provided many algorithms to allow user's combination selection according to user's algorithm set in advance
He wants), the coordinate of user input is adjusted, then passes to input method.For example:The true password of user is
123456, user have selected password unified+1, then user inputs 234567 when inputting password, and kernel-driven can be passed
Change 123456 corresponding touch coordinates into.
In the embodiment of the present invention, receive the first operation, described first operates the inputting interface for triggering display password;Ring
Answer described first operation, obtain this default information, and control described default information in described inputting interface
Display, described default information is used for the mapping ruler pointing out user input to map password;Receive second to operate, described second
Operate for input mapping password;The mapping password being inputted in described inputting interface based on the described second operation receive user;
According to described default information, described mapping password is verified;So, map password by corresponding to into original password,
Accordingly even when mapping password is seen and steals, because each default information is different, so also cannot be using stealing
Mapping password.
Fig. 3 realizes schematic flow sheet, as shown in figure 3, the method includes for embodiment of the present invention method of password authentication:
Step S201, receives the first operation, and described first operates the inputting interface for triggering display password;
Here, described first operation is realized by the input equipment of terminal, and such as user carries out Account Logon or props up
When paying grade operation, terminal will proceed to interface for password input, and for another example, the mobile phone of user is in screen lock state, when user mobile phone quilt
After the operation waking up, so mobile phone carries out interface for password input, from the above, it can be seen that the first operation can be that any triggering is whole
End enters the inputting interface of display password.Certainly, in the other embodiment of the present invention, voice can also be adopted defeated with user
The mode such as enter and input the first operation, such as user says " payment " or the voice of " unlock or wake up screen ", then electronics
Equipment is received by the first operation.
Step S202, described first operation of response, obtain this default information, and control described default prompting letter
Breath shows in described inputting interface, and described default information is used for the mapping ruler pointing out user input to map password;
Step S303, receives the second operation, and described second operates for input mapping password;
Step S204, the mapping password being inputted in described inputting interface based on the described second operation receive user;
Step S205, described second operation of response, obtain the identification information of user;
Step S206, the identification information according to described user obtains the original password of user;
Step S207, verifies to described mapping password according to described default information and described original password.
Here, described according to described default information and described original password, described mapping password is verified, bag
Include:
Step S271, generates checking password according to described default information and described original password;
Step S272, judges whether described checking password is mated with described mapping password, obtains matching result;
Step S273, if described matching result shows described checking password and the described password match that maps it is determined that right
Described mapping password is proved to be successful;If described matching result shows described checking password with described mapping password not
Join it is determined that authentication failed is carried out to described mapping password.
Here, above-mentioned step S205 to step S207 actually provides one kind to realize above-mentioned steps S105 " described basis
Described default information to described mapping password verify " specific implementation.
Two kinds of modes realizing step S102 are provided in the present embodiment:
Mode one:Described response described first operates, and obtains this default information, including:
Step S121A, response first operation, obtain the identification information of user;
Here, during realizing, the identification information of described user can adopt the accounts information of user or title, close
Claim etc., the accounts information of user can adopt mailbox, cell-phone number, ID (identity number) card No. etc..
Step S122A, the identification information of described user is carried and is sent to server in prompting request message, described carry
Show that request message is used for asking this default information;
Here, after server receives prompting request message, obtain this default information, then that this is default
Information is carried in prompting response message, and then server will be prompted to response message and is sent to terminal.
Step S123A, the prompting response message that terminal the reception server sends, described prompting response message includes this
Default information.
Here, terminal parses described prompting response message, obtains this default information.
Mode two:Described response described first operates, and obtains this default information, including:
Step S121B, described first operation of response, obtain prompting optionies from local;
Here, described prompting optionies include multiple default informations;
Step S122B, described prompting optionies are shown in described inputting interface;
Step S123B, obtains the 3rd operation, and the described 3rd operates for selecting the default of this to carry from prompting optionies
Show information;
Step S124B, determines this default information described based on the described 3rd operation.
Based on aforesaid embodiment, the embodiment of the present invention provides a kind of password authentication device, each list included by this device
Each module included by unit and each unit, can be realized by the processor in terminal, certainly also can be by specific
Logic circuit is realized;During implementing, processor can be central processing unit (CPU), microprocessor (MPU), numeral letter
Number processor (DSP) or field programmable gate array (FPGA) etc..
Fig. 4 is the composition structural representation of embodiment of the present invention password authentication device, as shown in figure 4, this device 400 includes
First receiving unit 401, acquiring unit 402, the second receiving unit 403, determining unit 404 and authentication unit 405, wherein:
Described first receiving unit 401, for receiving the first operation, described first operates for triggering the defeated of display password
Enter interface;
Described acquiring unit 402, for responding described first operation, obtains this default information, and controls institute
State default information to show in described inputting interface, described default information is used for pointing out user input to map password
Mapping ruler;
Described second receiving unit 403, for receiving the second operation, described second operates for input mapping password;
Described determining unit 404, for reflecting of being inputted in described inputting interface based on the described second operation determination user
Penetrate password;
Described authentication unit 405, for verifying to described mapping password according to described default information.
In other embodiments of the invention, described authentication unit includes the first acquisition module, the second acquisition module and tests
Card module, wherein:
Described first acquisition module, for obtaining the identification information of user;
Described second acquisition module, obtains the original password of user for the identification information according to described user;
Described authentication module, for carrying out to described mapping password according to described default information and described original password
Checking.
In other embodiments of the invention, described authentication module includes generating submodule and judging submodule, wherein:
Described generation submodule, for generating checking password according to described default information and described original password;
Described judging submodule, for judging whether described checking password is mated with described mapping password, obtains coupling knot
Really;If described matching result shows that described checking password maps password match it is determined that entering to described mapping password with described
Row is proved to be successful;If described matching result shows described checking password and described mapping password mismatch it is determined that to described
Mapping password carries out authentication failed.
In other embodiments of the invention, described acquiring unit includes the 3rd acquisition module, sending module and receives mould
Block, wherein:
Described 3rd acquisition module, for response first operation, obtains the identification information of user;
Described sending module, is sent to service for carrying the identification information of described user in prompting request message
Device, described prompting request message is used for asking this default information;
Described receiver module, the prompting response message sending for the reception server, described prompting response message includes
This default information.
In other embodiments of the invention, described device also includes completing unit and output unit, wherein:
Described complete unit, if for described mapping password authentification success, complete Password Input process;
Described output unit, if for described mapping password authentification failure, exporting information, described information
For showing to described mapping password authentification failure.
In other embodiments of the invention, described acquiring unit includes the 4th acquisition module, display module, the 5th acquisition
Module and determining module, wherein:
Described 4th acquisition module, for responding described first operation, obtains this prompting optionies from local;
Described display module, for being shown in described inputting interface by described prompting optionies;
Described 5th acquisition module, for obtaining the 3rd operation, the described 3rd operates the default prompting for determining this
Information;
Described determining module, for determining this default information described based on the described 3rd operation.
It need to be noted that be:The description of apparatus above embodiment, the description with said method embodiment is similar,
There is the similar beneficial effect of same embodiment of the method.For the ins and outs not disclosed in apparatus of the present invention embodiment, refer to
The description of the inventive method embodiment and understand.
It should be noted that in the embodiment of the present invention, if realize above-mentioned password in the form of software function module tested
Card method, and as independent production marketing or use when it is also possible to be stored in a computer read/write memory medium.Base
In such understanding, what the technical scheme of the embodiment of the present invention substantially contributed to prior art in other words partly can be with
The form of software product embodies, and this computer software product is stored in a storage medium, including some instructions in order to
Make a computer equipment (can be personal computer, server or network equipment etc.) each enforcement of the execution present invention
The all or part of example methods described.And aforesaid storage medium includes:USB flash disk, portable hard drive, read only memory (ROM, Read
Only Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.So, the embodiment of the present invention does not limit
Combine in any specific hardware and software.
Correspondingly, the embodiment of the present invention reoffers a kind of computer-readable storage medium, stores in described computer-readable storage medium
There are computer executable instructions, this computer executable instructions is used for executing method of password authentication in the embodiment of the present invention.
Based on aforesaid embodiment, the embodiment of the present invention reoffers a kind of terminal, and described terminal includes input equipment and place
Reason device, wherein
Described processor is used for:First operation is received by described input equipment, described first operates for triggering display
The inputting interface of password;Respond described first operation, obtain this default information, and control described default information
Described inputting interface shows, described default information is used for the mapping ruler pointing out user input to map password;Pass through
Described input equipment receives the second operation, and described second operates for input mapping password;Received based on the described second operation and use
The mapping password that family inputs in described inputting interface;According to described default information, described mapping password is verified.
In other embodiments of the invention, described according to described default information to described mapping password test
Card, including:Obtain the identification information of user;Identification information according to described user obtains the original password of user;According to described
Default information and described original password are verified to described mapping password.
In other embodiments of the invention, described reflected to described according to described default information and described original password
Penetrate password to be verified, including:Checking password is generated according to described default information and described original password;Test described in judgement
Whether card password is mated with described mapping password, obtains matching result;If described matching result show described checking password with
Described mapping password match is it is determined that be proved to be successful to described mapping password;If described matching result is tested described in showing
Card password is mismatched with described mapping password it is determined that carrying out authentication failed to described mapping password.
In other embodiments of the invention, described response described first operates, and obtains this default information, bag
Include:Response first operation, obtains the identification information of user;The identification information of described user is carried and sends out in prompting request message
Give server, described prompting request message is used for asking this default information;The prompting that the reception server sends rings
Answer message, described prompting response message includes this default information.
In other embodiments of the invention, described processor, is additionally operable to:Reflected to described according to described default information
Penetrate password to be verified, be verified result;If described the result shows, to described mapping password authentification success, to complete close
Code input process;If described the result shows, to described mapping password authentification failure, to export information, described prompting letter
Cease and be used for showing to described mapping password authentification failure.
In other embodiments of the invention, described response described first operates, and obtains this default information, bag
Include:Respond described first operation, obtain prompting optionies from local;Described prompting optionies are shown in described inputting interface;
3rd operation is obtained by described input equipment, the described 3rd operates the default information for determining this;Based on described
3rd operation determines this default information described.
It need to be noted that be:Above computing device or the description of storage medium embodiment, with said method embodiment
Description be similar, there is the similar beneficial effect of same embodiment of the method.Real for computing device of the present invention or storage medium
Apply the ins and outs not disclosed in example, refer to the description of the inventive method embodiment and understand.
It should be understood that " embodiment " or " embodiment " that description is mentioned in the whole text mean relevant with embodiment
Special characteristic, structure or characteristic are included at least one embodiment of the present invention.Therefore, occur everywhere in entire disclosure
" in one embodiment " or " in one embodiment " not necessarily refers to identical embodiment.Additionally, these specific feature, knots
Structure or characteristic can combine in one or more embodiments in any suitable manner.It should be understood that the various enforcements in the present invention
In example, the size of the sequence number of above-mentioned each process is not meant to the priority of execution sequence, and the execution sequence of each process should be with its work(
Can determine with internal logic, and should not constitute any restriction to the implementation process of the embodiment of the present invention.The embodiments of the present invention
Sequence number is for illustration only, does not represent the quality of embodiment.
It should be noted that herein, term " inclusion ", "comprising" or its any other variant are intended to non-row
The comprising of his property, so that including a series of process of key elements, method, article or device not only include those key elements, and
And also include other key elements of being not expressly set out, or also include intrinsic for this process, method, article or device institute
Key element.In the absence of more restrictions, the key element being limited by sentence "including a ..." is it is not excluded that including being somebody's turn to do
Also there is other identical element in the process of key element, method, article or device.
It should be understood that disclosed equipment and method in several embodiments provided herein, can be passed through it
Its mode is realized.Apparatus embodiments described above are only schematically, for example, the division of described unit, it is only
A kind of division of logic function, actual can have other dividing mode, such as when realizing:Multiple units or assembly can combine, or
It is desirably integrated into another system, or some features can be ignored, or do not execute.In addition, shown or discussed each composition portion
Coupling point each other or direct-coupling or communication connection can be the INDIRECT COUPLING of equipment or unit by some interfaces
Or communication connection, can be electrical, machinery or other forms.
The above-mentioned unit illustrating as separating component can be or may not be physically separate, show as unit
The part showing can be or may not be physical location;Both may be located at a place it is also possible to be distributed to multiple network lists
In unit;The purpose to realize this embodiment scheme for the part or all of unit therein can be selected according to the actual needs.
In addition, can be fully integrated in a processing unit in each functional unit in various embodiments of the present invention, also may be used
Be each unit individually as a unit it is also possible to two or more units are integrated in a unit;Above-mentioned
Integrated unit both can be to be realized in the form of hardware, it would however also be possible to employ the form that hardware adds SFU software functional unit is realized.
One of ordinary skill in the art will appreciate that:The all or part of step realizing said method embodiment can be passed through
Completing, aforesaid program can be stored in computer read/write memory medium the related hardware of programmed instruction, and this program exists
During execution, execute the step including said method embodiment;And aforesaid storage medium includes:Movable storage device, read-only deposit
Reservoir (Read Only Memory, ROM), magnetic disc or CD etc. are various can be with the medium of store program codes.
Or, if the above-mentioned integrated unit of the present invention is realized and as independent product using in the form of software function module
It is also possible to be stored in a computer read/write memory medium when selling or using.Based on such understanding, the present invention is implemented
What the technical scheme of example substantially contributed to prior art in other words partly can be embodied in the form of software product,
This computer software product is stored in a storage medium, including some instructions with so that a computer equipment is (permissible
Personal computer, server or network equipment etc.) execution each embodiment methods described of the present invention all or part.
And aforesaid storage medium includes:Movable storage device, ROM, magnetic disc or CD etc. are various can be with Jie of store program codes
Matter.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, and any
Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, all should contain
Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by described scope of the claims.
Claims (10)
1. a kind of method of password authentication is it is characterised in that methods described includes:
Receive the first operation, described first operates the inputting interface for triggering display password;
Respond described first operation, obtain this default information, and control described default information in described input
Show in interface, described default information is used for the mapping ruler pointing out user input to map password;
Receive the second operation, described second operates for input mapping password;
The mapping password being inputted in described inputting interface based on the described second operation receive user;
According to described default information, described mapping password is verified.
2. method according to claim 1 it is characterised in that described according to described default information to described mapping close
Code is verified, including:
Obtain the identification information of user;
Identification information according to described user obtains the original password of user;
According to described default information and described original password, described mapping password is verified.
3. method according to claim 2 is it is characterised in that described according to described default information and described original close
Code is verified to described mapping password, including:
Checking password is generated according to described default information and described original password;
Judge whether described checking password is mated with described mapping password, obtain matching result;
If described matching result shows that described checking password maps password match it is determined that entering to described mapping password with described
Row is proved to be successful;If described matching result shows described checking password and described mapping password mismatch it is determined that to described
Mapping password carries out authentication failed.
4. the method according to any one of claims 1 to 3, it is characterised in that described first operation of described response, obtains this
Secondary default information, including:
Response first operation, obtains the identification information of user;
The identification information of described user is carried in prompting request message, is sent to server, described prompting request message is used for
Ask this default information;
The prompting response message that the reception server sends, described prompting response message includes this default information.
5. the method according to claims 1 to 3 is it is characterised in that methods described also includes:
According to described default information, described mapping password is verified, be verified result;
If described the result shows, to described mapping password authentification success, to complete Password Input process;
If described the result shows, to described mapping password authentification failure, to export information, described information is used for
Show to described mapping password authentification failure.
6. the method according to claims 1 to 3, it is characterised in that described first operation of described response, obtains the pre- of this
If information, including:
Respond described first operation, obtain prompting optionies from local;
Described prompting optionies are shown in described inputting interface;
Obtain the 3rd operation, the described 3rd operates the default information for determining this;
This default information described is determined based on the described 3rd operation.
7. a kind of password authentication device is it is characterised in that described device includes the first receiving unit, acquiring unit, the second reception
Unit, determining unit and authentication unit, wherein:
Described first receiving unit, for receiving the first operation, described first operates the inputting interface for triggering display password;
Described acquiring unit, for responding described first operation, obtains this default information, and controls described presetting to carry
Show that information shows in described inputting interface, described default information is used for the mapping rule pointing out user input to map password
Then;
Described second receiving unit, for receiving the second operation, described second operates for input mapping password;
Described determining unit, for determining, based on the described second operation, the mapping password that user inputs in described inputting interface;
Described authentication unit, for verifying to described mapping password according to described default information.
8. device according to claim 7 is it is characterised in that described authentication unit includes the first acquisition module, second obtains
Delivery block and authentication module, wherein:
Described first acquisition module, for obtaining the identification information of user;
Described second acquisition module, obtains the original password of user for the identification information according to described user;
Described authentication module, for testing to described mapping password according to described default information and described original password
Card.
9. device according to claim 8 is it is characterised in that described authentication module includes generating submodule and judges submodule
Block, wherein:
Described generation submodule, for generating checking password according to described default information and described original password;
Described judging submodule, for judging whether described checking password is mated with described mapping password, obtains matching result;As
Really described matching result shows that described checking password maps password match it is determined that verifying to described mapping password with described
Success;If described matching result show described checking password with described mapping password mismatch it is determined that to described map close
Code carries out authentication failed.
10. it is characterised in that described terminal includes input equipment and processor, wherein said processor is used for a kind of terminal:
First operation is received by described input equipment, described first operates the inputting interface for triggering display password;
Respond described first operation, obtain this default information, and control described default information in described input
Show in interface, described default information is used for the mapping ruler pointing out user input to map password;
Second operation is received by described input equipment, described second operates for input mapping password;
The mapping password being inputted in described inputting interface based on the described second operation receive user;
According to described default information, described mapping password is verified.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611088917.7A CN106453802A (en) | 2016-11-30 | 2016-11-30 | Cipher verification method and device, and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611088917.7A CN106453802A (en) | 2016-11-30 | 2016-11-30 | Cipher verification method and device, and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106453802A true CN106453802A (en) | 2017-02-22 |
Family
ID=58223425
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611088917.7A Pending CN106453802A (en) | 2016-11-30 | 2016-11-30 | Cipher verification method and device, and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106453802A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107204974A (en) * | 2017-04-14 | 2017-09-26 | 努比亚技术有限公司 | The management method and mobile terminal of a kind of user cipher |
CN107516025A (en) * | 2017-07-04 | 2017-12-26 | 深圳天珑无线科技有限公司 | Terminal and its method for generating cipher code, computer-readable recording medium |
WO2018233718A1 (en) * | 2017-06-23 | 2018-12-27 | 中兴通讯股份有限公司 | Application program security management method and apparatus, and storage medium |
CN110102527A (en) * | 2019-04-24 | 2019-08-09 | 宁波永仕电机有限公司 | A kind of axis class method for suppersonic cleaning and its system |
CN112328986A (en) * | 2020-11-26 | 2021-02-05 | 西安四叶草信息技术有限公司 | User identity authentication method, device, server and storage medium |
CN113066215A (en) * | 2021-03-15 | 2021-07-02 | 长沙广缘物业管理有限公司 | Two-dimensional code access control management method, system and storage medium |
CN113158150A (en) * | 2021-04-14 | 2021-07-23 | 捷德(中国)科技有限公司 | Verification method, device and system |
CN114531683A (en) * | 2020-11-20 | 2022-05-24 | 中国联合网络通信集团有限公司 | Router authentication method, router authentication device and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236440A (en) * | 2010-04-22 | 2011-11-09 | 联芯科技有限公司 | Password input method and mobile terminal using same |
KR20120081001A (en) * | 2011-03-09 | 2012-07-18 | 홍문화 | Apparatus for input code used in mobile application terminal and method for the same |
CN103971048A (en) * | 2014-04-30 | 2014-08-06 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for entering password |
CN106127062A (en) * | 2016-06-23 | 2016-11-16 | 北京小米移动软件有限公司 | unlocking method and device |
-
2016
- 2016-11-30 CN CN201611088917.7A patent/CN106453802A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236440A (en) * | 2010-04-22 | 2011-11-09 | 联芯科技有限公司 | Password input method and mobile terminal using same |
KR20120081001A (en) * | 2011-03-09 | 2012-07-18 | 홍문화 | Apparatus for input code used in mobile application terminal and method for the same |
CN103971048A (en) * | 2014-04-30 | 2014-08-06 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for entering password |
CN106127062A (en) * | 2016-06-23 | 2016-11-16 | 北京小米移动软件有限公司 | unlocking method and device |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107204974A (en) * | 2017-04-14 | 2017-09-26 | 努比亚技术有限公司 | The management method and mobile terminal of a kind of user cipher |
WO2018233718A1 (en) * | 2017-06-23 | 2018-12-27 | 中兴通讯股份有限公司 | Application program security management method and apparatus, and storage medium |
CN109117623A (en) * | 2017-06-23 | 2019-01-01 | 中兴通讯股份有限公司 | A kind of application method for managing security, device and storage medium |
CN109117623B (en) * | 2017-06-23 | 2024-01-05 | 中兴通讯股份有限公司 | Application security management method, device and storage medium |
CN107516025A (en) * | 2017-07-04 | 2017-12-26 | 深圳天珑无线科技有限公司 | Terminal and its method for generating cipher code, computer-readable recording medium |
CN110102527A (en) * | 2019-04-24 | 2019-08-09 | 宁波永仕电机有限公司 | A kind of axis class method for suppersonic cleaning and its system |
CN114531683A (en) * | 2020-11-20 | 2022-05-24 | 中国联合网络通信集团有限公司 | Router authentication method, router authentication device and storage medium |
CN112328986A (en) * | 2020-11-26 | 2021-02-05 | 西安四叶草信息技术有限公司 | User identity authentication method, device, server and storage medium |
CN113066215A (en) * | 2021-03-15 | 2021-07-02 | 长沙广缘物业管理有限公司 | Two-dimensional code access control management method, system and storage medium |
CN113158150A (en) * | 2021-04-14 | 2021-07-23 | 捷德(中国)科技有限公司 | Verification method, device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106453802A (en) | Cipher verification method and device, and terminal | |
US11394555B2 (en) | Mobile terminal privacy protection method and protection apparatus, and mobile terminal | |
KR102471289B1 (en) | A method for quickly opening an application or application function, and a terminal | |
US11934505B2 (en) | Information content viewing method and terminal | |
CN104915582B (en) | unlocking method and device | |
US20140160316A1 (en) | Mobile terminal and control method thereof | |
CN104216742B (en) | Brush machine control method and device based on password | |
CN104283876A (en) | Operation authorization method and device | |
CN105260673A (en) | Short message reading method and apparatus | |
CN105844470A (en) | Payment method and device | |
CN106156562B (en) | A kind of private space protective device, mobile terminal and method | |
US20140040983A1 (en) | Terminal authentication method and terminal | |
CN105323218A (en) | Identity verifying method and device | |
US11562051B2 (en) | Varying computing device behavior for different authenticators | |
CN105138874A (en) | Screen unlocking control device and method | |
CN108551521A (en) | A kind of log-on message reminding method and mobile terminal | |
CN107256367A (en) | A kind of information processing method and device, terminal device and computer-readable recording medium | |
CN106022045A (en) | Information processing device and method | |
CN106952090A (en) | Payment verification device and method | |
CN106485119A (en) | A kind of application message device for opening and method | |
CN103916471A (en) | Information display method and device | |
CN106611112A (en) | Application program safe processing method, device and equipment | |
CN106161474A (en) | A kind of password determines apparatus and method | |
CN106211156A (en) | WiFi network method of attachment, device, terminal unit and WiFi access point | |
CN106295363A (en) | Startup calibration method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170222 |
|
RJ01 | Rejection of invention patent application after publication |