CN106548064A - A kind of cipher set-up method and device - Google Patents
A kind of cipher set-up method and device Download PDFInfo
- Publication number
- CN106548064A CN106548064A CN201510593674.1A CN201510593674A CN106548064A CN 106548064 A CN106548064 A CN 106548064A CN 201510593674 A CN201510593674 A CN 201510593674A CN 106548064 A CN106548064 A CN 106548064A
- Authority
- CN
- China
- Prior art keywords
- password
- input
- frame
- sub
- timetable
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
The application provides a kind of cipher set-up method and device, and wherein method includes:Show Password Input frame and the timetable for password is input into the Password Input frame;The password that user is input into the Password Input frame by the timetable is obtained, the password includes:Password directional information and code characters information.The application improves the safety that the password of wireless encryption is arranged.
Description
Technical field
The application is related to network technology, more particularly to a kind of cipher set-up method and device.
Background technology
Than wide used in daily life, such as, log in mailbox needs to be input into password password,
Mobile-phone payment needs to be input into password etc., and many occasions are required for being input into password, to guarantee the peace of information transfer
Quan Xing.And the set-up mode and cryptogram form of password, typically by input through keyboard, during with wireless encryption
Cell phone password input as a example by, user can by cell phone keyboard input six bit digitals be used as password.But,
The password that this mode is arranged, is not only easily got a glimpse of (or even can guess password by being input into gesture) by people,
And the complexity of password is relatively low, is easily cracked so that the safety of information transfer is reduced.
The content of the invention
In view of this, the application provides a kind of cipher set-up method and device, to improve the close of wireless encryption
The safety that code is arranged.
Specifically, the application is achieved by the following technical solution:
A kind of first aspect, there is provided cipher set-up method, including:
Show Password Input frame and the timetable for password is input into the Password Input frame;
The password that user is input into the Password Input frame by the timetable is obtained, the password includes:
Password directional information and code characters information.
A kind of second aspect, there is provided password setting device, including:
Instrument display module, for show Password Input frame and for the Password Input frame be input into
The timetable of password;
Password acquisition module, for obtaining what user was input into the Password Input frame by the timetable
Password, the password include:Password directional information and code characters information.
Cipher set-up method and device that the application is provided, include password direction by using timetable input
The password of information and code characters information so that the password is more complicated, is difficult to crack, so as to improve
The safety that the password of wireless encryption is arranged.
Description of the drawings
Fig. 1 is a kind of flow chart of the cipher set-up method shown in one exemplary embodiment of the application;
Fig. 2 is a kind of interface for password input shown in one exemplary embodiment of the application;
Fig. 3 is the timetable operation chart shown in one exemplary embodiment of the application;
Fig. 4 is the Password Input mark schematic diagram shown in one exemplary embodiment of the application;
Fig. 5 is a kind of structure chart of the password setting device shown in one exemplary embodiment of the application;
Fig. 6 is the structure chart of another kind of password setting device shown in one exemplary embodiment of the application.
Specific embodiment
Here in detail exemplary embodiment will be illustrated, its example is illustrated in the accompanying drawings.Following
When description is related to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous
Key element.Embodiment described in following exemplary embodiment does not represent the institute consistent with the application
There is embodiment.Conversely, they are only and such as described in detail in appended claims, the application
The example of the consistent apparatus and method of a little aspects.
This application provides a kind of cipher set-up method that can be used for wireless encryption, for example, user makes
Password can be arranged by the method with during mobile-phone payment, or, the radio visitor service end of bank can also make
Password setting is carried out with the method.The cipher set-up method of the embodiment of the present application, in the input mode of password
And in terms of the set content of password it is all different with traditional password set-up mode, with provide it is a kind of more
Plus the password of complexity is arranged so that the safety of wireless encryption is higher.
The flow chart that Fig. 1 illustrates a kind of cipher set-up method of the application, may include steps of:
In a step 101, show Password Input frame and for password being input into the Password Input frame
Timetable.For example, when user is transferred accounts to certain contact person by payment client terminal on mobile phone, meeting
It is required to be input into password, the interface of the confession user input password for now showing can include similar Fig. 2 institutes
The part for showing.Password Input frame 21 and timetable 22 are shown in Fig. 2, wherein, timetable 22 can be with
Referred to as " input tool of password " to the input password of Password Input frame 21.
Wherein, Password Input frame 21 can include the sub- frame 23 of multiple inputs, and each is input in sub- frame 23
A cryptographic element 24 can be input into, the entirety of this multiple cryptographic element 24 just constitutes to be input into close
Code;And timetable 22 is then used to be input into the cryptographic element 24.
In a step 102, the password that user is input into the Password Input frame by the timetable is obtained,
The password includes:Password directional information and code characters information.
In the present embodiment, with the principle similar to clock and watch, which has pointer 25 to timetable 22, and
Pointer 25 can be rotated clockwise or counterclockwise under the stirring of user.For example, when on user mobile phone
When showing the input tool of password shown in Fig. 2, user can use the finger 26 of oneself, stir timetable
22 pointer 25, determines two factors, i.e. password directional information and code characters information by stirring pointer.
Exemplary, shown in Figure 3, pointer 25 clockwise, is toggled it to Fig. 3 by user
On shown position, the position that now pointer refers to is " 10 ", then it is determined that " password directional information "
It is " clockwise " that code characters information is " 10 ".Certainly, password directional information can be with predetermined
Mark such as, represents clockwise with " 00 " representing, represents the mode such as counterclockwise with " 11 ".
For example, for the Password Input frame shown in Fig. 2, including six sub- frames 23 of input, user can be with
The cryptographic element of each sub- frame of input is arranged one by one by timetable 22.Such as, generally when password is input into,
Can be the cryptographic element that each sub- frame of input is set one by one according to order from left to right, e.g., set
When putting first cryptographic element, user can set password directional information according to the example shown in Fig. 3
With code characters information;Then, the pointer of timetable is stirred then according to same mode, is arranged next
Individual cryptographic element, until the cryptographic element of the sub- frame of all inputs is all input into and completes.
Optionally, when cryptographic element is arranged one by one, for one of cryptographic element, when user is arranged
After the cryptographic element of the sub- frame of the input, the pointer of timetable can revert to starting point, in case passing through pointer
Next Password element is started setting up from the starting point.For example, by taking Fig. 3 as an example, when user stirs pointer
To after the position of diagram, pointer 25 can return to the dotted line 27 in Fig. 3 with automatic reduction to origin
Shown position.
Additionally, the mode of this pointer automatic reduction, it is also possible to for complete as user input cryptographic element
Complete instruction.Such as, mobile phone can detect that user stirs pointer using finger, and obtain pointer in real time
Rotation direction and the digit position of arrival, when detecting pointer and returning to origin, then it represents that this refers to
Needle movement is over, and that just obtains farthest digital as alphanumeric information in rotation direction.Or,
Even if pointer does not carry out automatic reduction, it is also possible to obtain the instruction that character input is finished by other means,
Such as, when user stirs pointer reaches the digit position for wanting to set, can stop 2 seconds, work as mobile phone
User is detected during stirring when position stops and reaches 2 seconds scheduled times, it is determined that this is just
It is the code characters information of user's setting.
In above-mentioned example, timetable 22 be with the application of similar to Clock and Watch describing, but it is concrete real
Shi Zhong, timetable 22 is used as an input tool for being used to input password, it is not limited to Fig. 2 and Fig. 3
Shown form, as long as which includes a dial plate type input area with word scale, for can
Code characters are input into the sub- frame of input of Password Input frame by the dial plate type input area.Additionally, when
Between the code characters information that can be input into of table 22, for example, it may be any one in 1-59, but have
Body is not limited thereto, or other digital scopes in implementing, and such as, can be appointing in 1-12
Meaning one etc., independently can set;Or, code characters can also be the English alphabets such as a, b, may be used also
Being the other kinds of character such as &, $, #.
Additionally, when user set up one be input into the cryptographic element of sub- frame after, in order to clearly point out to use
The cryptographic element of the family sub- frame has completed to arrange, and the mark for completing can be configured in sub- frame is input into.
For example, can be as shown in Figure 2, insert symbol " * " in sub- frame 23 is input into and be identified, when with
When family has been filled into " * " in seeing the sub- frame of input, then it is known that the cryptographic element of the sub- frame is configured
Terminate.Again for example, it is also possible to will be input into sub- frame filling is shown as predetermined color, by the predetermined color table
Show that the cryptographic element of the sub- frame of the input is provided with, than as shown in Figure 4, in the sub- frame of six inputs
The cryptographic element of first three sub- frame has been provided with, and often sets up a cryptographic element, just will be corresponding
It is input into sub- frame and is filled to Lycoperdon polymorphum Vitt.It is of course also possible to be filled with other colors.
When realizing, the displaying of the input tool of password of the embodiment of the present application can use Flash, html5
Deng language, and for the detection of encrypted message, can be realized with language such as Java, C++, C#.
The password arranged by the cipher set-up method of the present embodiment, due to it comprises password directional information
With code characters information, complex, it is not easy to crack, safety is higher;Also, user is stirring
When timetable arranges password, in order to prevent peeping for illegal molecule, it is only necessary to which cover in timetable one is little
Block region, illegal molecule are difficult to guess out code characters again, defeated relative to the utilization keyboard in traditional approach
Enter, safety is also further improved.
In order to realize above-mentioned cipher set-up method, the embodiment of the present application additionally provides a kind of password and arranges dress
Put, as shown in figure 5, the device can include:Instrument display module 51 and password acquisition module 52.
Instrument display module 51, for showing Password Input frame and for defeated to the Password Input frame
Enter the timetable of password;
Password acquisition module 52, is input into the Password Input frame by the timetable for obtaining user
Password, the password includes:Password directional information and code characters information.
Further, the password includes:Multiple cryptographic elements;The Password Input frame, including:It is many
The sub- frame of the individual input for accommodating each cryptographic element respectively.Password acquisition module 52, for by described
Timetable is input into cryptographic element one by one to each sub- frame of input respectively, and the cryptographic element includes:Password side
To information and code characters information.
Fig. 6 illustrates the structure of another kind of password setting device, on the basis of structure shown in Fig. 5, should
Device can also include:Color display module 53, for being input into the input in the password acquisition module
After the cryptographic element of sub- frame, the input sub- frame filling is shown as into predetermined color, the predetermined color
Represent that the cryptographic element input of the sub- frame of the input is completed.
Further, instrument display module 51, is additionally operable to be input into the input in the password acquisition module
After the cryptographic element of sub- frame, the pointer of the timetable reverts to starting point, in case by the pointer from
The starting point starts setting up Next Password element.
Further, the password directional information, including:Direction clockwise or counter-clockwise.
The password arranged by the password setting device of the present embodiment, due to it comprises password directional information
With code characters information, complex, it is not easy to crack, safety is higher;Also, user is stirring
When timetable arranges password, in order to prevent peeping for illegal molecule, it is only necessary to which cover in timetable one is little
Block region, illegal molecule are difficult to guess out code characters again, defeated relative to the utilization keyboard in traditional approach
Enter, safety is also further improved.
The preferred embodiment of the application is the foregoing is only, it is not to limit the application, all at this
Within the spirit and principle of application, any modification, equivalent substitution and improvements done etc. should be included in
Within the scope of the application protection.
Claims (10)
1. a kind of cipher set-up method, it is characterised in that include:
Show Password Input frame and the timetable for password is input into the Password Input frame;
The password that user is input into the Password Input frame by the timetable is obtained, the password includes:
Password directional information and code characters information.
2. method according to claim 1, it is characterised in that the password includes:Multiple passwords
Element;The Password Input frame, including:The sub- frame of multiple inputs for accommodating each cryptographic element respectively;
It is described to obtain the password that user is input into the Password Input frame by the timetable, including:
Cryptographic element, the cryptographic element are input into one by one to each sub- frame of input respectively by the timetable
Including:Password directional information and code characters information.
3. method according to claim 2, it is characterised in that also include:
After the cryptographic element of the sub- frame of the input is input into, the input sub- frame filling is shown as into predetermined
Color, the predetermined color represent that the cryptographic element input of the sub- frame of the input is completed.
4. method according to claim 2, it is characterised in that also include:
After the cryptographic element of the sub- frame of the input is input into, the pointer of the timetable reverts to starting point,
In case Next Password element is started setting up from the starting point by the pointer.
5. method according to claim 1, it is characterised in that the password directional information, including:
Direction clockwise or counter-clockwise.
6. a kind of password setting device, it is characterised in that include:
Instrument display module, for show Password Input frame and for the Password Input frame be input into
The timetable of password;
Password acquisition module, for obtaining what user was input into the Password Input frame by the timetable
Password, the password include:Password directional information and code characters information.
7. device according to claim 6, it is characterised in that the password includes:Multiple passwords
Element;The Password Input frame, including:The sub- frame of multiple inputs for accommodating each cryptographic element respectively;
The password acquisition module, for being input into each sub- frame of input one by one by the timetable respectively
Cryptographic element, the cryptographic element include:Password directional information and code characters information.
8. device according to claim 7, it is characterised in that also include:
Color display module, for the cryptographic element in the sub- frame of the password acquisition module input input
Afterwards, the input sub- frame filling is shown as into predetermined color, the predetermined color represents input
The cryptographic element input of frame is completed.
9. device according to claim 7, it is characterised in that
The instrument display module, is additionally operable in the close of the sub- frame of the password acquisition module input input
After data code, the pointer of the timetable reverts to starting point, in case by the pointer from the starting point
Start setting up Next Password element.
10. device according to claim 6, it is characterised in that the password directional information, bag
Include:Direction clockwise or counter-clockwise.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510593674.1A CN106548064A (en) | 2015-09-17 | 2015-09-17 | A kind of cipher set-up method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510593674.1A CN106548064A (en) | 2015-09-17 | 2015-09-17 | A kind of cipher set-up method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106548064A true CN106548064A (en) | 2017-03-29 |
Family
ID=58362888
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510593674.1A Pending CN106548064A (en) | 2015-09-17 | 2015-09-17 | A kind of cipher set-up method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106548064A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109816381A (en) * | 2019-02-15 | 2019-05-28 | 广东小天才科技有限公司 | A kind of method of payment and smartwatch of smartwatch |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1719565A (en) * | 2004-07-08 | 2006-01-11 | 叶博飞 | 12 hr. system dial type digital input keyboard |
CN102999295A (en) * | 2012-11-23 | 2013-03-27 | 鸿富锦精密工业(深圳)有限公司 | Electronic device provided with touch screen and method for selecting characters |
CN103150120A (en) * | 2013-03-28 | 2013-06-12 | 华为技术有限公司 | Method and device for unlocking display screen locking and terminal |
CN103777864A (en) * | 2014-01-17 | 2014-05-07 | 广东金宇恒科技有限公司 | Password login assembly |
US20140341440A1 (en) * | 2013-04-12 | 2014-11-20 | Mark A. Walch | Identity caddy: a tool for real-time determination of identity in the mobile environment |
CN104573429A (en) * | 2013-10-12 | 2015-04-29 | 鸿富锦精密工业(深圳)有限公司 | Handheld device unlocking device, handheld device unlocking method and handheld device |
-
2015
- 2015-09-17 CN CN201510593674.1A patent/CN106548064A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1719565A (en) * | 2004-07-08 | 2006-01-11 | 叶博飞 | 12 hr. system dial type digital input keyboard |
CN102999295A (en) * | 2012-11-23 | 2013-03-27 | 鸿富锦精密工业(深圳)有限公司 | Electronic device provided with touch screen and method for selecting characters |
CN103150120A (en) * | 2013-03-28 | 2013-06-12 | 华为技术有限公司 | Method and device for unlocking display screen locking and terminal |
US20140341440A1 (en) * | 2013-04-12 | 2014-11-20 | Mark A. Walch | Identity caddy: a tool for real-time determination of identity in the mobile environment |
CN104573429A (en) * | 2013-10-12 | 2015-04-29 | 鸿富锦精密工业(深圳)有限公司 | Handheld device unlocking device, handheld device unlocking method and handheld device |
CN103777864A (en) * | 2014-01-17 | 2014-05-07 | 广东金宇恒科技有限公司 | Password login assembly |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109816381A (en) * | 2019-02-15 | 2019-05-28 | 广东小天才科技有限公司 | A kind of method of payment and smartwatch of smartwatch |
CN109816381B (en) * | 2019-02-15 | 2023-07-21 | 广东小天才科技有限公司 | Payment method of intelligent watch and intelligent watch |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11263303B1 (en) | Pattern-based mobile device unlocking | |
US10176315B2 (en) | Graphical authentication | |
US9514297B2 (en) | Systems and methods for gesture lock obfuscation | |
CA2686696C (en) | Simplified biometric character sequence entry | |
US9280643B2 (en) | Establishing access to a secure network based on user-created credential indicia | |
EP2682891B1 (en) | Electronic device and method for releasing lock using element combining color and symbol | |
CN104200170B (en) | The method for secret protection and electronic equipment of a kind of electronic equipment | |
BR112015000980B1 (en) | COMPUTER IMPLEMENTED VERIFICATION METHOD | |
US8631487B2 (en) | Simple algebraic and multi-layer passwords | |
TWI544397B (en) | Dynamic unlocking method and electronic apparatus using the same | |
US20140229884A1 (en) | Terminal device, information input method, and program | |
CN102945118A (en) | Touch screen unlocking method and system as well as communication terminal | |
CN103996011A (en) | Method and device for protecting codes to be input safely | |
CN104063169A (en) | Unlocking method based on touch screen | |
CN103678962A (en) | Personal information management method and device and terminal | |
CN109472122A (en) | A kind of multimedia messages reminding method and system | |
US10108790B2 (en) | Password authenticating device for preventing leakage of passwords | |
CN106600854A (en) | System and method for SE terminal of POS to take over password keyboard of Android screen | |
CN106973157A (en) | A kind of control method and the first electronic equipment | |
CN106548064A (en) | A kind of cipher set-up method and device | |
US10019560B2 (en) | Password authenticating device for preventing leakage of passwords | |
EP3037997A1 (en) | Apparatus, login processing method, and program | |
EP3859643A1 (en) | Data processing method implemented based on nfc tag, system and tag receiving terminal thereof | |
JP2014063394A (en) | Information processing device, method, and computer program | |
US20150096012A1 (en) | Secure physical authentication input with personal display or sound device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170329 |
|
RJ01 | Rejection of invention patent application after publication |