CN106469017A - A kind of terminal arranges the method and device of password and certification - Google Patents
A kind of terminal arranges the method and device of password and certification Download PDFInfo
- Publication number
- CN106469017A CN106469017A CN201510512521.XA CN201510512521A CN106469017A CN 106469017 A CN106469017 A CN 106469017A CN 201510512521 A CN201510512521 A CN 201510512521A CN 106469017 A CN106469017 A CN 106469017A
- Authority
- CN
- China
- Prior art keywords
- gesture
- operation information
- closed area
- information sequence
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 68
- 238000012163 sequencing technique Methods 0.000 claims abstract description 18
- 238000012544 monitoring process Methods 0.000 claims description 61
- 230000009471 action Effects 0.000 claims description 18
- 238000004321 preservation Methods 0.000 claims description 4
- 230000008569 process Effects 0.000 description 16
- 238000010586 diagram Methods 0.000 description 10
- 230000006399 behavior Effects 0.000 description 7
- 238000009499 grossing Methods 0.000 description 6
- 238000012795 verification Methods 0.000 description 6
- 238000012545 processing Methods 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 3
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 210000004247 hand Anatomy 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 230000010415 tropism Effects 0.000 description 1
Abstract
The embodiment of the present application provides a kind of terminal to arrange the method and device of password and certification, in order to solve in prior art the setting of password and authentication method is more single cracks it is easy to be modeled, the low problem of safety.The method terminal operates according to first gesture and determines each closed area position and shape, operated by second gesture again and determine operation information, according to the sequencing arrangement of operation information execution, obtain operation information sequence, finally operation information sequence is preserved as password.Said method terminal does not show the keyboard of fixed position and order, do not show the point of fixed position yet, but carried out each closed area of setting of personalization by user, and operated in each closed area, to arrange its password, therefore other people are difficult to simulate authentication operation by the trend observing user gesture operation with rule, and the probability that when reducing setting password and certification, password is revealed improves the safety of terminal use.
Description
Technical field
The application is related to areas of information technology, the method for more particularly, to a kind of terminal password setting and certification and dress
Put.
Background technology
Get more and more from mobile terminal and be related to the every field of people's life, its safety problem is particularly subject to people
Concern.Common practice is to arrange numeral or gesture password in the terminal, by corresponding operation solution
Some functions in lock mobile terminal.As:Mobile phone screen unlocks, application program (Application, APP)
Password unlocks.
In prior art, carry out password setting on mobile terminals and the mode of unblock is broadly divided into two
Kind.First, being in the numerical ciphers arranging one group of interface setting, when needing to use certification, input in order should
Group numeral can complete certification.Second, be setting interface use gesture complete one group suitable by multiple special points
Sequence connects the figure being formed, and when needing certification, marks this figure on each point of screen display in order
Complete certification.
, when showing above-mentioned numeral or at multiple, typically these are digital for the screen of this two methods mobile terminal
The position of button or point is fixing and regular, suitable with from left to right when such as display digit button
Sequence shows 1234567890 this ten digital keys, or with nine grids form display digit key board,
For another example, when showing at multiple, it is typically also that nine grids form shows.
Although the position of above-mentioned digital keys or multiple point and order meet the usual rule of people,
It is that, during realizing password setting and certification input, the gesture motion of user has certain tropism
And rule, this allow for other people see password setting or certification input process after, may arrive according to the observation
The trend of gesture motion and rule are simulating certification input process to crack.As can be seen here, prior art
There is a possibility that password is revealed in password setting and certification input process, lead to arrange in prior art close
The safety of code and certification is relatively low.
Content of the invention
The embodiment of the present application provides a kind of terminal to arrange the method and device of password and certification, existing in order to solve
The setting of password and authentication method is more single cracks it is easy to be modeled, the low problem of safety in technology.
The method that a kind of terminal that the embodiment of the present application provides arranges password, including:
Terminal detects the first gesture operation of user;
A closed area is determined according to first gesture operation;
Each second gesture operation that monitoring owning user executes in each closed area;
Each second gesture is operated corresponding operation information to press execution sequencing arrangement, obtains operation information sequence
Row;
Described operation information sequence is preserved as password.
A kind of method of terminal authentication that the embodiment of the present application provides, including:
Terminal obtains the standard operation information sequence preserving in advance as password;
Each second gesture operation that terminal monitoring user executes in each closed area;
Each second gesture is operated corresponding operation information to press execution sequencing arrangement, obtains operation to be certified
Information sequence;
Judge whether described operation information sequence to be certified is consistent with described standard operation information sequence;
If so, then certification is passed through;
Otherwise, certification is not passed through.
A kind of terminal that the embodiment of the present application provides arranges the device of password, including:
First monitoring modular, for the first gesture operation of terminal monitoring user;
Determining module, determines each closed area for operating according to described first gesture;
Second monitoring modular, for monitoring each second gesture behaviour that described user executes in each closed area
Make;
Order module, for each second gesture is operated corresponding operation information to press execution sequencing arrangement,
Obtain operation information sequence;
Preserving module, for preserving described operation information sequence as password.
A kind of device of terminal authentication that the embodiment of the present application provides, including:
Acquisition device, obtains, for terminal, the standard operation information sequence preserving in advance as password;
Second monitoring modular, for monitoring each second gesture operation that user executes in each closed area;
Order module, for each second gesture is operated corresponding operation information to press execution sequencing arrangement,
Obtain operation information sequence to be certified;
Judge module, for judging that described operation information sequence to be certified and described standard operation information sequence be
No consistent;
If so, then certification is passed through;
Otherwise, certification is not passed through.
The embodiment of the present application provides a kind of terminal to arrange the method and device of password and certification, the method terminal root
Operate according to first gesture and determine each closed area position and shape, then operation letter is determined by second gesture operation
Breath, according to the sequencing arrangement of operation information execution, obtains operation information sequence, finally by operation information
Sequence preserves as password.Said method terminal does not show the keyboard of fixed position and order, does not show yet
The point of fixed position, but carried out each closed area of setting of personalization by user, and in each closed area
Operated, to arrange its password, therefore other people are difficult to the trend by observing user gesture operation and rule
Simulate authentication operation, the probability that when reducing setting password and certification, password is revealed, improve terminal makes
Safety.
Brief description
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes of the application
Point, the schematic description and description of the application is used for explaining the application, does not constitute to the application not
Work as restriction.In the accompanying drawings:
The terminal password setting up procedure that Fig. 1 provides for the embodiment of the present application;
Fig. 2 arranges interface schematic diagram for the embodiment of the present application provides first;
The terminal that Fig. 3 provides for the embodiment of the present application determines the schematic diagram of each closed area;
Schematic diagram after the operation trace smoothing processing by Fig. 3 that Fig. 4 provides for the embodiment of the present application;
The terminal authentication procedure that Fig. 5 provides for the embodiment of the present application;
The authentication interface schematic diagram that Fig. 6 provides for the embodiment of the present application;
Fig. 7 arranges apparatus structure schematic diagram for the terminal password that the embodiment of the present application provides;
The terminal authentication apparatus structural representation that Fig. 8 provides for the embodiment of the present application.
Specific embodiment
Due in the prior art scheme, in setting password and verification process, terminal display fixed position and suitable
The keyboard of sequence or the point of fixed position, make other people be easy to the trend by observing user gesture operation and rule mould
Draw up authentication operation.Therefore, the probability revealed for password when reducing setting password and certification, improves
The safety that terminal uses, the embodiment of the present application carries out each closed area of setting of personalization by user, and
The method and device being operated in each closed area, makes other people pass through to observe the handss that also cannot grasp user
The trend of gesture operation and rule are it is impossible to simulate authentication operation, thus realizing reducing setting password and certification
When password reveal probability, improve terminal use safety.
Purpose, technical scheme and advantage for making the application are clearer, specifically real below in conjunction with the application
Apply example and corresponding accompanying drawing is clearly and completely described to technical scheme.Obviously, described
Embodiment is only some embodiments of the present application, rather than whole embodiments.Based on the enforcement in the application
Example, the every other enforcement that those of ordinary skill in the art are obtained under the premise of not making creative work
Example, broadly falls into the scope of the application protection.
Fig. 1 arranges cryptographic processes for the terminal that the embodiment of the present application provides, and specifically includes following steps:
S101:The first gesture operation of terminal monitoring user.
In the embodiment of the present application, terminal, when receiving password setting request, can show the first setting interface,
And monitor the first gesture operation of user's execution on this first setting interface.Wherein, terminal can by this first
As the initial interface of setting password, this first setting interface is the interface of no any image at setting interface,
So that user carries out next step operation, as shown in Figure 2.
Fig. 2 arranges interface schematic diagram, in fig. 2, the screen of terminal for the embodiment of the present application provides first
The interface of shown no any image is it is simply that initial interface during user setup password, that is, first sets
Put interface.
In addition, the first gesture operation described in the embodiment of the present application can operate for slip gesture, then step
In S101, terminal can detect the slip gesture operation of user's execution.
S102:Operated according to described first gesture and determine each closed area.
In the embodiment of the present application, when described first gesture operates and operates for slip gesture, terminal can root
The slip gesture operation of the user's execution monitoring according to step S101, determines that the operation of this slip gesture is corresponding
Operation trace, and carry out drawing according to this operation trace interface (namely initial interface) currently displaying to terminal
Point, obtain each closed area.
Specifically, the slip gesture that user executes can be operated corresponding operation trace to enclose with screen edge by terminal
Each the indivisible minimum closed area becoming is defined as each closed area, after determining each closed area,
In order to subsequently facilitate storage and use, also mark can be numbered to each closed area, as shown in Figure 3.
The terminal that Fig. 3 provides for the embodiment of the present application determines the schematic diagram of each closed area, in figure 3, eventually
End according to the operation trace of 4 slides and screen edge, can determine that altogether 5 closings and can not be again
The region of segmentation, numbering is respectively A~E.It should be noted that, although also may be used after numbering B and C in combination
Form a closed area, but the closed area after combination can be split by operation trace, therefore, B and C
The closed area combining can continue to be divided into closed area B and C.
Further, due to user slip gesture operation formed operation trace relatively rough it is more likely that
Can affect to divide the accuracy of closed area, therefore, in order to improve the accuracy of division, the embodiment of the present application
Middle terminal, also can be by each operation rail before initial interface being divided according to the operation trace of slide
Mark is smoothed.After to operation trace smoothing processing, terminal can be according to the operation rail after smoothing processing
Mark and terminal screen edge, divide initial interface, to obtain each closed area, as shown in Figure 4.
Schematic diagram after the operation trace smoothing processing by Fig. 3 that Fig. 4 provides for the embodiment of the present application, contrast
Fig. 3 and Fig. 4 is visible, and the operation trace after smoothing processing more conforms to divide the needs of closed area,
The accuracy of division can be effectively improved.Wherein, specific smoothing process is not in the protection domain of the application
Within.
S103:Monitor each second gesture operation that described user executes in each closed area.
In above-mentioned steps S102, its first gesture of user input operates, and makes terminal determine each enclosed area
Behind domain, can be by dividing to complete to instruct to make terminal preserve each closed area determined to terminal input, should
It can also be gesture operation that division completes instruction, such as shake operation etc..
Terminal receive this division complete instruction after, then can preserve each closed area determined, and monitor use
Each second gesture operation that family executes in each closed area.In addition, each second-hand in monitoring user's execution
During gesture operation, terminal can also show the border of each closed area, that is, display inclusion as shown in Figure 4
The second setting page on the border of each closed area, executes it in order to user according to the border of each closed area
Second gesture operates.
S104:Each second gesture is operated corresponding operation information to press execution sequencing arrangement, is operated
Information sequence.
In the embodiment of the present application, described second gesture operation can be clicking operation, slide etc..
Described second gesture operates corresponding operation information specifically to may include:The action type of second gesture operation
(e.g., clicking operation type, slide type etc.), and the closed area that second gesture operation is located
Position, shape.
Before hypothesis, terminal has carried out number-mark to each closed area determined, then second gesture behaviour
Make the numbering of closed area and the corresponding type of action type that corresponding operation information can be that operation is located
Mark, the operation information of each second gesture operation passes through the form record of " numbering+type identification ", will
Each operation information is arranged by operation sequencing, you can obtain operation information sequence.
For example, it is assumed that the type identification of clicking operation type is 1, the type identification of slide type is 2,
User's priority performs on the second setting interface as shown in Figure 4:Click on closed area A, click on closing
Region C, click closed area D, slip closed area A, click closed area B.Then terminal determines behaviour
The numbering of the closed area that work is located is ACDAB, and the action type of each second gesture operation is clicking operation
Type and slide type, are arranged as A1C1D1A2B1 in order, obtain operation information sequence.
S105:Described operation information sequence is preserved as password.
In above-mentioned steps S104, after the operation of its second gesture of user input, preservation instruction can be inputted, make
The operation information sequence determined by step S104 is preserved by terminal as password.
In the embodiment of the present application, this preservation instruction can also be gesture operation, be designated as the 3rd gesture operation,
3rd gesture operation can be for example shake operation etc..
During three gesture operation that terminal monitoring executes to user, then operation information sequence can directly can be made
It is saved in terminal local for password, or it is also possible to by this operation information sequence and the corresponding user of this user
Mark is sent to server, makes server protect this operation information sequence as the corresponding password of this ID
Deposit.Wherein, this ID can be specifically user name.
Operation information sequence as after password preservation, then can be transferred operation information when being authenticated by terminal
Information content included by sequence, can be specifically position and the shape of each closed area, each closed area
Numbering, second gesture action type, in order to be authenticated.
By cipher set-up method as shown in Figure 1, each closed area of setting of user's personalizable, and
Operated in each closed area, make other people pass through to observe also cannot grasp the trend of gesture operation of user with
Rule it is impossible to simulate authentication operation, thus realize reducing setting password and during certification password reveal can
Energy property, improves the safety of terminal use.
Based on the cipher set-up method described in Fig. 1, verification process such as Fig. 5 institute of corresponding the embodiment of the present application
Show.
The terminal authentication procedure that Fig. 5 provides for the embodiment of the present application, specifically includes following steps:
S501:Terminal obtains the standard operation information sequence preserving in advance as password.
In the embodiment of the present application, when user will be authenticated, can instruct to terminal input authentication, terminal is connecing
When receiving certification instruction, then can obtain the standard operation information sequence preserving in advance as password.
Specifically, terminal can first obtain ID (e.g., user name), and according to the ID obtaining,
From the local standard operation information sequence preserving, obtain this ID corresponding standard operation information sequence
Row, or it is also possible to the ID of acquisition is sent to server, and this use that the reception server returns
Family identifies corresponding standard operation information sequence.
After terminal gets standard operation information sequence, each enclosed area can be obtained from standard operation information sequence
The location and shape in domain, and show authentication interface.
For example, it is assumed that the standard operation information sequence that terminal obtains includes:A1C2B1D1E2 and number and be
The location and shape of each closed area of A~E, the wherein type identification of clicking operation type are 1, and slide behaviour
The type identification making type is 2, and the position of each closed area and shape are as shown in Figure 4.
S502:The second gesture operation that monitoring user executes in each closed area.
In the embodiment of the present application, after terminal determines the location and shape of each closed area, user can be monitored
The second gesture operation of execution in each closed area of authentication interface, described second gesture operates and can be
Clicking operation, slide etc..
Specifically, in order to improve the safety of certification, terminal monitoring user execute in authentication interface second
During gesture operation, do not show the border of each closed area, that is, not showing each enclosed area in authentication interface
The border in domain, as shown in Figure 6.
The authentication interface schematic diagram that Fig. 6 provides for the embodiment of the present application, in figure 6, dotted line is each enclosed area
The border in domain, but this dotted line does not show in authentication interface, and the numbering of each closed area does not also show
Out.
S503:Each second gesture is operated corresponding operation information to press execution sequencing arrangement, obtains waiting to recognize
Card operation information sequence.
In the embodiment of the present application, described second gesture operates corresponding operation information specifically to may include:The
The action type (e.g., clicking operation type, slide type etc.) of two gesture operations, and second-hand
The position of closed area at gesture operation place, shape.
Continue to use the example above, due to S501 according to obtain standard operation information sequence determine each
Closed area and numbering, so second gesture operates the enclosed area that corresponding operation information can be that operation is located
The numbering in domain and the corresponding type identification of action type, the operation information of each second gesture operation is passed through " to compile
Number+type identification " form record, by each operation information by operation sequencing arranged, you can
Obtain operation information sequence to be certified.
For example, it is assumed that the type identification of clicking operation type is 1, the type identification of slide type is 2,
User's priority performs in authentication interface as shown in Figure 4:Click on closed area A, click on closed area
C, click closed area D, slip closed area A, click closed area B.Then terminal determines operation institute
The numbering of closed area be ACDAB, the action type of each second gesture operation is clicking operation type
And slide type, it is arranged as A1C1D1A2B1 in order, obtain operation information sequence to be certified.
S504:Judge whether described operation information sequence to be certified is consistent with described standard operation information sequence,
If so, then execution step S505, otherwise execution step S506.
In the embodiment of the present application, described operation information sequence to be certified and described standard operation information are being judged
Before whether sequence is consistent, terminal also can determine whether whether operation information sequence to be certified meets certification premise bar
Part, if meeting, judges whether operation information sequence to be certified is consistent with standard operation information sequence, if not
Meet, then wouldn't carry out the judgement of step S204.
Specifically, believe if the operation information sequence to be certified monitoring character boundary shared by it is less than standard operation
The character boundary of breath sequence, then wouldn't carry out the judgement of step S204, continue waiting for user and carry out S503's
Second gesture operates, until meeting certification precondition, if its institute of operation information sequence to be certified monitoring
Account for the character boundary that character boundary is equal to standard operation information sequence, then judged.
It is assumed that being A1B1E1 by the operation information sequence to be certified that S503 terminal obtains, its character boundary
For 6 bytes, and the standard operation information sequence being obtained by S501 terminal is A1C2B1D1E2, its word
Accord with size for 10 bytes it is clear that its character of operation information sequence to be certified is less than standard operation information sequence,
It is not judged, continue waiting for inputting.
Continue to use the example above, if by the operation information sequence to be certified that S503 terminal obtains being
A1B1E1D2A2, its character boundary is 10 bytes, then operation information sequence to be certified meets criterion,
Whether terminal judges operation information to be certified sequence is consistent with standard operation information sequence, if so, then executes step
Rapid S505, if it is not, then execution step S506.
In addition, in the embodiment of the present application, operation information sequence to be certified and standard operation operation letter are being judged
Before whether breath sequence is consistent, terminal judges can also be made to be somebody's turn to do by completing to instruct to terminal input authentication
Whether operation information sequence to be certified is consistent with standard operation operation information sequence.This certification completes to instruct permissible
It is gesture operation, such as shake operation or the operation clicking on special button.
It is assumed that certification completes instruction for shake gesture operation, then terminal monitoring executes shake gesture behaviour to user
When making, will determine that whether the operation information sequence to be certified that S503 obtains is consistent with standard operation information sequence.
S505:Certification is passed through.
S506:Certification is not passed through.
Terminal determine operation information sequence to be certified consistent with standard operation information sequence when, to user authentication
Pass through, otherwise, certification is not passed through.If certification is not passed through, terminal can also be by operation information sequence to be certified
Row are removed, and point out user authentication mistake, return S502, wait user to operate further.
By authentication method as shown in Figure 5, in user authentication process, operated in each closed area,
And each closed area does not show border, other people are made to pass through to observe becoming of the gesture operation that also cannot grasp user
Gesture and rule are it is impossible to simulate authentication operation, thus realizing reducing the probability that during certification, password is revealed,
Improve the safety of terminal use.
In addition, in the setting cryptographic processes shown in Fig. 1, the described corresponding operation of second gesture operation is believed
Breath specifically may also include:Action type (e.g., clicking operation type, the slide class of second gesture operation
Type etc.), second gesture operation be located the location and shape of closed area, the operation time of second gesture operation
Number.
Continue to use the example above, before step S104 shown in Fig. 1, because terminal is to determining
Each closed area has carried out number-mark, so it can be operation institute that second gesture operates corresponding operation information
The numbering of closed area, the corresponding type identification of action type and the corresponding operation time of action type
Number, the operation information of each second gesture operation passes through the form record of " numbering+type identification+number of times ",
Each operation information is arranged by operation sequencing, you can obtain operation information sequence to be certified.
Specifically, when monitoring operation information, if continuously operating several times all in same closed area, tire out
Count the number of operations of each action type, continuously operation information several times will be combined into a total operation information,
It is " number of times+type identification the II+ of numbering+type identification I+ type identification I that this operation information should record form
The number of times of type identification II+etc. ".
For example, it is assumed that the type identification of clicking operation type is I, the type identification of slide type is II,
User's priority performs in authentication interface as shown in Figure 4:Click on closed area A, click on closed area
A, click on closed area D, slip closed area B, click on closed area B, slip closed area B,
Click on closed area A.Then terminal determines that the numbering of the closed area that operation is located is ADBA, each second-hand
The action type of gesture operation is clicking operation type and slide type, and in each closed area, execution is each
Second gesture number of operations be respectively 2,1,3,1, each operation information be arranged as in order AI2, DI1,
BI1II2, AI1, obtain operation information sequence AI2DI1BI1II2AI1.
Accordingly, in the verification process shown in Fig. 5, terminal is obtaining behaviour to be certified by step S503
When making information sequence, also according to the method described above operation information can be merged, then obtain operation information sequence.
Further, due to the merging of operation information, so in the verification process shown in Fig. 5, step S503
Middle terminal is not strict with the order of each continuous gesture operation in same closed area, increased setting password
And the convenience of verification process, improve property easy to use.Continue to use the example above, due in setting password
During, user sequentially performs click, slip, 3 operations clicked in the closed area of numbering B,
And merging the operation information obtaining is BI1II2, therefore, in verification process, user is in the envelope of this numbering B
When in closed region, the operation of execution second gesture is to input operation information sequence to be certified, as long as in this closed area
Middle execution clicks on for 2 times and 1 slide can get operation information BI1II2, the order of this 3 times operations
Be not required for arrange consistent during password.
Method and the authentication method of password are set for the terminal that the embodiment of the present application provides above, based on same
Thinking, the embodiment of the present application also provides the device that a kind of terminal arranges password and authentication device, such as Fig. 7,8
Shown.
Fig. 7 arranges the apparatus structure schematic diagram of password for the terminal that the embodiment of the present application provides, and specifically includes:
First monitoring modular 701, for the first gesture operation of terminal monitoring user;
Determining module 702, determines each closed area for operating according to described first gesture;
Second monitoring modular 703, for monitoring each second gesture that described user executes in each closed area
Operation;
Order module 704, for operating corresponding operation information to press execution sequencing row each second gesture
Row, obtain operation information sequence;
Preserving module 705, for preserving described operation information sequence as password.
Described first monitoring modular 701 is specifically for the first gesture of monitoring user operates, described first-hand
Gesture operation can be the slip gesture operation of user's execution.
Described determining module 702 is specifically for according to the slip gesture operation of described user execution, determining institute
State slip gesture and operate corresponding operation trace, according to the described operation trace boundary currently displaying to described terminal
Face is divided, and obtains each closed area.
Described determining module 702 is additionally operable to, on the boundary currently displaying to described terminal according to described operation trace
Face is divided, and before obtaining each closed area, described operation trace is smoothed.
Described second monitoring modular 703 is specifically for specifically for monitoring the click gesture of described user's execution
Operation.
Described device also includes:
Display module 706, for monitoring described user in each closed area in described second monitoring modular 703
During each second gesture operation of middle execution, show the border of each closed area.
Described second gesture operates corresponding operation information to include:The action type of described second gesture operation,
And the operation of described second gesture be located the position of closed area, shape.
Described preserving module 705 specifically for, monitor user execution three gesture operations when, will be described
Operation information sequence saves as password, or, when monitoring three gesture operation that user executes, will be described
Operation information sequence and the corresponding ID of described user are sent to server, make the described server will be described
Operation information sequence preserves as the corresponding password of described ID.
Specifically, password setting device as shown in Figure 7 may be located in terminal, specifically may be located at terminal
It is also possible to be located in the operating system of terminal in the application installed.
The terminal authentication apparatus structural representation that Fig. 8 provides for the embodiment of the present application, specifically includes:
Acquisition module 801, for obtaining the standard operation information sequence preserving in advance as password;
Monitoring modular 802, for monitoring each second gesture operation that user executes in each closed area;
Order module 803, for operating corresponding operation information to press execution sequencing row each second gesture
Row, obtain operation information sequence to be certified;
Authentication module 804, for judging described operation information sequence to be certified and described standard operation information sequence
Whether row are consistent, and if so, then certification is passed through, and otherwise, certification is not passed through.
Described acquisition module 801 is specifically for obtaining ID, from the local standard operation information preserving
In sequence, obtain described ID corresponding standard operation information sequence;Or, obtain ID,
Described ID is sent to server, the described ID corresponding standard behaviour that the reception server returns
Make information sequence.
Described acquisition module 801 is additionally operable to, in described monitoring modular 802 monitoring user in each closed area
Before each second gesture operation of execution, obtain the position of each closed area from described standard operation information sequence
Put, shape.
Described device also includes:
Display module 805, holds in each closed area for monitoring described user in described monitoring modular 802
During each second gesture operation of row, do not show the border of each closed area.
Described monitoring modular 802 specifically for, monitor described user execute in each closed area each second
Gesture operation.
Described second gesture operates corresponding operation information to include:The action type of described second gesture operation,
And the operation of described second gesture be located the position of closed area, shape.
Specifically, above-mentioned authentication device as shown in Figure 8 may be located in terminal, specifically may be located at terminal
It is also possible to be located in the operating system of terminal in the application installed.
The embodiment of the present application provides a kind of terminal to arrange the method and device of password and certification, the method terminal root
Operate according to first gesture and determine each closed area position and shape, then operation letter is determined by second gesture operation
Breath, according to the sequencing arrangement of operation information execution, obtains operation information sequence, finally by operation information
Sequence preserves as password.Said method terminal does not show the keyboard of fixed position and order, does not show yet
The point of fixed position, but carried out each closed area of setting of personalization by user, and in each closed area
Operated, to arrange its password, therefore other people are difficult to the trend by observing user gesture operation and rule
Simulate authentication operation, the probability that when reducing setting password and certification, password is revealed, improve terminal makes
Safety.
In a typical configuration, computing device includes one or more processors (CPU), input/defeated
Outgoing interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory
(RAM) and/or the form such as Nonvolatile memory, such as read only memory (ROM) or flash memory (flash RAM).
Internal memory is the example of computer-readable medium.
Computer-readable medium include permanent and non-permanent, removable and non-removable media can by appoint
What method or technique is realizing information Store.Information can be computer-readable instruction, data structure, program
Module or other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory
(PRAM), static RAM (SRAM), dynamic random access memory (DRAM), its
The random access memory (RAM) of his type, read only memory (ROM), electrically erasable are read-only
Memorizer (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read only memory
(CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassette tape, tape magnetic
Disk storage or other magnetic storage apparatus or any other non-transmission medium, can be used for storage can be calculated
The information that equipment accesses.Define according to herein, computer-readable medium does not include temporary computer-readable matchmaker
Body (transitory media), the such as data signal of modulation and carrier wave.
Also, it should be noted term " inclusion ", "comprising" or its any other variant are intended to non-row
The comprising, so that include a series of process of key elements, method, commodity or equipment not only including of his property
Those key elements, but also include other key elements of being not expressly set out, or also include for this process,
Method, commodity or the intrinsic key element of equipment.In the absence of more restrictions, " included by sentence
One ... " key element that limits is being it is not excluded that including the process of described key element, method, commodity or setting
Also there is other identical element in standby.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer journey
Sequence product.Therefore, the application can using complete hardware embodiment, complete software embodiment or combine software and
The form of the embodiment of hardware aspect.And, the application can adopt and wherein include calculating one or more
Machine usable program code computer-usable storage medium (including but not limited to disk memory, CD-ROM,
Optical memory etc.) the upper computer program implemented form.
The foregoing is only embodiments herein, be not limited to the application.For this area skill
For art personnel, the application can have various modifications and variations.All institutes within spirit herein and principle
Any modification, equivalent substitution and improvement made etc., within the scope of should be included in claims hereof.
Claims (28)
1. a kind of terminal arranges the method for password it is characterised in that including:
The first gesture operation of terminal monitoring user;
Operated according to described first gesture and determine each closed area;
Monitor each second gesture operation that described user executes in each closed area;
Each second gesture is operated corresponding operation information to press execution sequencing arrangement, obtains operation information sequence
Row;
Described operation information sequence is preserved as password.
2. the method for claim 1 it is characterised in that monitoring user first gesture operation,
Specifically include:
Monitor the slip gesture operation of described user's execution.
3. method as claimed in claim 2 determines it is characterised in that being operated according to described first gesture
Each closed area, specifically includes:
According to the slip gesture operation of described user execution, determine that described slip gesture operates corresponding operation rail
Mark;
Divided according to the interface that described operation trace is currently displaying to described terminal, obtain each enclosed area
Domain.
4. method as claimed in claim 3 is it is characterised in that according to described operation trace to described end
Currently displaying interface is held to be divided, before obtaining each closed area, methods described also includes:
Described operation trace is smoothed.
5. the method for claim 1 is it is characterised in that monitor described user in each closed area
Each second gesture operation of middle execution, specifically includes:
Monitor the click gesture operation of described user's execution.
6. the method for claim 1 is it is characterised in that methods described also includes:
When monitoring each second gesture operation that described user executes in each closed area, show each enclosed area
The border in domain.
7. the method for claim 1 is it is characterised in that described second gesture operates corresponding behaviour
Include as information:The action type of described second gesture operation, and the envelope that the operation of described second gesture is located
The position of closed region, shape.
8. the method for claim 1 is it is characterised in that using described operation information sequence as close
Code preserves, and specifically includes:
When monitoring three gesture operation that user executes, described operation information sequence is saved as password;Or
Person
When monitoring three gesture operation that user executes, will be corresponding with described user for described operation information sequence
ID be sent to server, make described server mark described operation information sequence as described user
Know corresponding password to preserve.
9. a kind of method of terminal authentication is it is characterised in that include:
Terminal obtains the standard operation information sequence preserving in advance as password;
Each second gesture operation that monitoring user executes in each closed area;
Each second gesture is operated corresponding operation information to press execution sequencing arrangement, obtains operation to be certified
Information sequence;
Judge whether described operation information sequence to be certified is consistent with described standard operation information sequence;
If so, then certification is passed through;
Otherwise, certification is not passed through.
10. method as claimed in claim 9 is it is characterised in that terminal obtains in advance as password preservation
Standard operation information sequence, concrete grammar includes:
Terminal obtains ID, from the local standard operation information sequence preserving, obtains described user's mark
Know corresponding standard operation information sequence;Or
Terminal obtains ID, and described ID is sent to server, the institute that the reception server returns
State ID corresponding standard operation information sequence.
11. methods as claimed in claim 9 are it is characterised in that monitoring user holds in each closed area
Before each second gesture operation of row, methods described also includes:
Position, the shape of each closed area is obtained from described standard operation information sequence.
12. methods as claimed in claim 9 are it is characterised in that work as monitoring user in each closed area
When executing each second gesture operation, do not show the border of each closed area.
13. methods as claimed in claim 9 are it is characterised in that monitoring user holds in each closed area
Each second gesture operation of row, specifically includes:
Monitor the click gesture operation of described user's execution.
14. methods as claimed in claim 9 are it is characterised in that described second gesture operates corresponding behaviour
Make information, specifically include:
The action type of described second gesture operation, and the closed area at described second gesture operation place
Position, shape.
A kind of 15. terminals arrange the device of password it is characterised in that including:
First monitoring modular, for the first gesture operation of terminal monitoring user;
Determining module, determines each closed area for operating according to described first gesture;
Second monitoring modular, for monitoring each second gesture behaviour that described user executes in each closed area
Make;
Order module, for each second gesture is operated corresponding operation information to press execution sequencing arrangement,
Obtain operation information sequence;
Preserving module, for preserving described operation information sequence as password.
16. devices as claimed in claim 15 are it is characterised in that described first monitoring modular is specifically used
In the slip gesture operation of monitoring described user execution.
17. devices as claimed in claim 15 it is characterised in that described determining module specifically for,
According to the slip gesture operation of described user execution, determine that described slip gesture operates corresponding operation trace,
Divided according to the interface that described operation trace is currently displaying to described terminal, obtain each closed area.
18. devices as claimed in claim 17 it is characterised in that described determining module is additionally operable to,
Divided according to the interface that described operation trace is currently displaying to described terminal, obtain each closed area it
Before, described operation trace is smoothed.
19. devices as claimed in claim 15, it is characterised in that described second monitoring modular, are specifically used
In the click gesture operation monitoring described user's execution.
20. devices as claimed in claim 15 are it is characterised in that described device also includes:
Display module, for execute in each closed area in user described in described second monitoring module monitors
During each second gesture operation, show the border of each closed area.
21. devices as claimed in claim 15 are it is characterised in that the operation of described second gesture is corresponding
Operation information includes:The action type of described second gesture operation, and described second gesture operation place
The position of closed area, shape.
22. devices as claimed in claim 15 it is characterised in that described preserving module specifically for,
When monitoring three gesture operation that user executes, described operation information sequence is saved as password, or,
When monitoring three gesture operation that user executes, by described operation information sequence and the corresponding use of described user
Family mark is sent to server, makes described server using described operation information sequence as described ID pair
The password answered preserves.
A kind of 23. devices of terminal authentication are it is characterised in that include:
Acquisition module, for obtaining the standard operation information sequence preserving in advance as password;
Monitoring modular, for monitoring each second gesture operation that user executes in each closed area;
Order module, for each second gesture is operated corresponding operation information to press execution sequencing arrangement,
Obtain operation information sequence to be certified;
Authentication module, for judging that described operation information sequence to be certified and described standard operation information sequence be
No consistent, if so, then certification is passed through, and otherwise, certification is not passed through.
24. devices as claimed in claim 23 it is characterised in that described acquisition module specifically for,
Obtain ID, from the local standard operation information sequence preserving, obtain described ID corresponding
Standard operation information sequence;Or, obtain ID, described ID be sent to server, connect
Receive the described ID corresponding standard operation information sequence that server returns.
25. devices as claimed in claim 24 it is characterised in that described acquisition module is additionally operable to,
Before each second gesture operation that described monitoring module monitors user executes in each closed area, from described mark
Position, the shape of each closed area is obtained in quasi- operation information sequence.
26. devices as claimed in claim 23 are it is characterised in that described device also includes:
Display module, for execute in each closed area in user described in described monitoring module monitors each
During two gesture operations, do not show the border of each closed area.
27. devices as claimed in claim 23 it is characterised in that described monitoring modular specifically for,
Monitor the click gesture operation of described user's execution.
28. devices as claimed in claim 23 are it is characterised in that the operation of described second gesture is corresponding
Operation information includes:The action type of described second gesture operation, and described second gesture operation place
The position of closed area, shape.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510512521.XA CN106469017A (en) | 2015-08-19 | 2015-08-19 | A kind of terminal arranges the method and device of password and certification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510512521.XA CN106469017A (en) | 2015-08-19 | 2015-08-19 | A kind of terminal arranges the method and device of password and certification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106469017A true CN106469017A (en) | 2017-03-01 |
Family
ID=58228723
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510512521.XA Pending CN106469017A (en) | 2015-08-19 | 2015-08-19 | A kind of terminal arranges the method and device of password and certification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106469017A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107357511A (en) * | 2017-06-05 | 2017-11-17 | 深圳天珑无线科技有限公司 | Password Input Area generation method, electric terminal and computer-readable recording medium |
CN108304711A (en) * | 2018-02-02 | 2018-07-20 | 惠州Tcl移动通信有限公司 | Touch unlocking method, storage device and the mobile terminal of mobile terminal |
CN113094695A (en) * | 2021-03-29 | 2021-07-09 | 盛林妹 | Authentication method, equipment for realizing authentication and intelligent lock |
CN113269853A (en) * | 2021-06-02 | 2021-08-17 | 福建天晴在线互动科技有限公司 | Method and system for dividing game interface area |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101499905A (en) * | 2008-02-02 | 2009-08-05 | 诚实科技股份有限公司 | Image password authentication system for mobile device and method therefor |
CN101706707A (en) * | 2009-12-18 | 2010-05-12 | 中兴通讯股份有限公司 | Method and device for unlocking screen of touch screen equipment |
US20110260829A1 (en) * | 2010-04-21 | 2011-10-27 | Research In Motion Limited | Method of providing security on a portable electronic device having a touch-sensitive display |
CN103530058A (en) * | 2013-10-30 | 2014-01-22 | 深圳市中兴移动通信有限公司 | Method for dividing screen freely and mobile terminal |
CN103941988A (en) * | 2013-01-20 | 2014-07-23 | 上海博路信息技术有限公司 | Method for gesture unlocking |
-
2015
- 2015-08-19 CN CN201510512521.XA patent/CN106469017A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101499905A (en) * | 2008-02-02 | 2009-08-05 | 诚实科技股份有限公司 | Image password authentication system for mobile device and method therefor |
CN101706707A (en) * | 2009-12-18 | 2010-05-12 | 中兴通讯股份有限公司 | Method and device for unlocking screen of touch screen equipment |
US20110260829A1 (en) * | 2010-04-21 | 2011-10-27 | Research In Motion Limited | Method of providing security on a portable electronic device having a touch-sensitive display |
CN103941988A (en) * | 2013-01-20 | 2014-07-23 | 上海博路信息技术有限公司 | Method for gesture unlocking |
CN103530058A (en) * | 2013-10-30 | 2014-01-22 | 深圳市中兴移动通信有限公司 | Method for dividing screen freely and mobile terminal |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107357511A (en) * | 2017-06-05 | 2017-11-17 | 深圳天珑无线科技有限公司 | Password Input Area generation method, electric terminal and computer-readable recording medium |
CN108304711A (en) * | 2018-02-02 | 2018-07-20 | 惠州Tcl移动通信有限公司 | Touch unlocking method, storage device and the mobile terminal of mobile terminal |
CN113094695A (en) * | 2021-03-29 | 2021-07-09 | 盛林妹 | Authentication method, equipment for realizing authentication and intelligent lock |
CN113094695B (en) * | 2021-03-29 | 2023-09-26 | 盛林妹 | Authentication method, equipment for realizing authentication and intelligent lock |
CN113269853A (en) * | 2021-06-02 | 2021-08-17 | 福建天晴在线互动科技有限公司 | Method and system for dividing game interface area |
CN113269853B (en) * | 2021-06-02 | 2023-09-22 | 福建天晴在线互动科技有限公司 | Game interface region division method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111585964B (en) | Login information input method, login information storage method and related device | |
US9514297B2 (en) | Systems and methods for gesture lock obfuscation | |
CN103841198B (en) | A kind of clean room cloud computing data processing method and system | |
CN107392040A (en) | A kind of method and device for checking of knowing together | |
CN108510290B (en) | Customer information amending method, device, computer equipment and storage medium in call | |
CN103164643B (en) | A kind of method and apparatus that anti-debug is carried out by hardware | |
CN106469017A (en) | A kind of terminal arranges the method and device of password and certification | |
CN107515890A (en) | A kind of method and terminal for identifying resident point | |
CN109960903A (en) | A kind of method, apparatus, electronic equipment and storage medium that application is reinforced | |
CN109033772A (en) | A kind of input method and device of verification information | |
CN110008744B (en) | Data desensitization method and related apparatus | |
CN107196901A (en) | A kind of identity registration and the method and device of certification | |
CN106470109A (en) | A kind of personal identification method and equipment | |
CN107690608A (en) | The certification inputted by RFID scannings to posture | |
CN108009435A (en) | Data desensitization method, device and storage medium | |
CN107609410A (en) | Android system data guard method, terminal device and storage medium based on HOOK | |
WO2020220212A1 (en) | Biological feature recognition method and electronic device | |
CN104486306B (en) | Identity authentication method is carried out based on finger hand vein recognition and cloud service | |
CN106851613A (en) | Service request method, the verification method of business handling number and its terminal | |
CN110188578A (en) | A kind of method and apparatus of automatic shield information | |
US11151238B1 (en) | Graphical event-based password system | |
CN102983969A (en) | Security login system and security login method for operating system | |
CN107808086A (en) | A kind of unlocking method of intelligent terminal, device and equipment | |
CN106407847A (en) | Unlocking method and apparatus | |
CN106878248A (en) | A kind of verification method and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1234852 Country of ref document: HK |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170301 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1234852 Country of ref document: HK |