CN107623664B - Password input method and device - Google Patents

Password input method and device Download PDF

Info

Publication number
CN107623664B
CN107623664B CN201610561416.XA CN201610561416A CN107623664B CN 107623664 B CN107623664 B CN 107623664B CN 201610561416 A CN201610561416 A CN 201610561416A CN 107623664 B CN107623664 B CN 107623664B
Authority
CN
China
Prior art keywords
password
user
login
characters
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610561416.XA
Other languages
Chinese (zh)
Other versions
CN107623664A (en
Inventor
周政
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610561416.XA priority Critical patent/CN107623664B/en
Publication of CN107623664A publication Critical patent/CN107623664A/en
Application granted granted Critical
Publication of CN107623664B publication Critical patent/CN107623664B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application relates to the technical field of communication, in particular to a password input method and a password input device, which are used for solving the problems of low account login security or low password input efficiency. The password input method provided by the embodiment of the application comprises the following steps: the client determines the environmental safety information when a user logs in; according to the environment safety information, determining a first password character which needs to be input by a user and a second password character which needs to be automatically filled by a client in the stored login password; and executing password input according to the determined first password character and the second password character. By adopting the embodiment of the application, under the condition that the current login environment security of the user is higher, the user is not required to input all characters of the login password, so that the password input efficiency is improved. In addition, the characters which need to be input by the user are determined according to the environmental security information when the current user logs in, so that the security of account login is improved.

Description

Password input method and device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a password input method and apparatus.
Background
When a user logs in a certain website on the browser, the browser prompts the user whether to save the password. If the user does not store the password, all password characters need to be input again when logging in the website every time; if the user selects to save the password, the browser can automatically log in the account with the saved password when the user opens the website login page next time, or automatically fill the login password in the password input box of the login interface.
For the situation that the password is not stored, the user needs to input the password again when logging in the website every time, the input efficiency is low, but if the user selects to store the password, certain security problems exist, for example, if the user equipment is stolen, other people can log in the user account under the situation that the password is not input, and the loss is brought to the user.
After the user selects to save the password, the website sometimes requires the user to perform short message authentication, image authentication and the like in order to protect the security of the user account.
Disclosure of Invention
The embodiment of the application provides a password input method and device, which are used for solving the problems of low account login security or low password input efficiency.
The embodiment of the application provides a password input method, which comprises the following steps:
the client determines the environmental safety information when a user logs in;
according to the environment safety information, determining a first password character which needs to be input by a user and a second password character which needs to be automatically filled by a client in the stored login password; the first password character and the second password character form the login password;
and executing password input according to the determined first password character and the second password character.
The embodiment of the application provides a password input method, which comprises the following steps:
the method comprises the steps that a client side presets a login password of a user, wherein the login password comprises a plurality of characters;
and determining the number of characters required to be input by the user during login according to the environment safety information, wherein the number of the characters required to be input by the user during login is less than or equal to the number of the characters of the login password.
The embodiment of the application provides a password input method, which comprises the following steps:
the method comprises the steps that a server presets a login password of a user, wherein the login password comprises a plurality of characters;
determining environmental safety information of a client;
and determining the number of characters in the login password required to be input by the user during login according to the environment safety information, wherein the number of characters in the login password required to be input by the user during login is less than or equal to the number of characters of a preset login password.
The embodiment of the application provides a page login method, which comprises the following steps:
providing a login page, wherein the login page comprises a password input interface for receiving a specified number of characters in a login password input by a user, the specified number is determined according to the environmental security information of a client, and the specified number is less than or equal to the number of the characters of the login password.
The embodiment of the application provides a password input client, which comprises:
the environment safety information determining module is used for determining environment safety information when a user logs in;
the password character determination module is used for determining a first password character which needs to be input by a user and a second password character which needs to be automatically filled by a client in the stored login password according to the environment safety information; the first password character and the second password character form the login password;
and the password input module is used for executing password input according to the determined first password character and the second password character.
Another embodiment of the present application provides a password input client, including:
the storage module is used for presetting a login password of a user, and the login password comprises a plurality of characters;
the determining module is used for determining the number of characters required to be input by the user during login and the number of characters automatically filled by the client according to the environmental safety information during login of the user, wherein the sum of the number of characters required to be input by the user during login and the number of characters automatically filled by the client is equal to the number of characters of the login password.
Another embodiment of the present application provides a password input client, including:
the storage module is used for presetting a login password of a user, and the login password comprises a plurality of characters;
and the determining module is used for determining the number of characters required to be input by the user during login according to the environment safety information, wherein the number of the characters required to be input by the user during login is less than or equal to the number of the characters of the login password.
The embodiment of the application provides a server for inputting passwords, which comprises:
the storage module is used for presetting a login password of a user, and the login password comprises a plurality of characters;
the environment safety information determining module is used for determining the environment safety information of the client;
and the password character determining module is used for determining the number of characters in the login password required to be input by the user during login according to the environment safety information, wherein the number of characters in the login password required to be input by the user during login is less than or equal to the number of characters of a preset login password.
By adopting the embodiment of the application, the characters in the login password needing to be input by the user are determined according to the current login environment security information of the user, and under the condition that the current login environment security of the user is higher, the user can input fewer characters and even does not need to input characters, so that the password input efficiency is improved. In addition, the characters which need to be input by the user are determined according to the security of the current login environment of the user, so that the security of account login is improved.
Drawings
FIG. 1 is a flowchart of a method for inputting a password according to an embodiment of the present disclosure;
FIG. 2 is a diagram illustrating a user entering a login password;
FIG. 3 is a schematic diagram of a user entering a login password as instructed;
FIG. 4 is a diagram illustrating the client automatically filling in the remaining characters of the login password;
FIG. 5 is a flowchart of a method for inputting a password according to a second embodiment of the present application;
FIG. 6 is a flowchart of a method for inputting a password according to a third embodiment of the present application;
FIG. 7 is a flowchart of a method for inputting a password according to the fourth embodiment of the present application;
fig. 8 is a schematic structural diagram of a client for inputting a password according to an embodiment of the present disclosure;
fig. 9 is a schematic diagram of a client-side structure for password input according to another embodiment of the present application;
FIG. 10 is a schematic diagram of a client for password entry according to yet another embodiment of the present application;
fig. 11 is a server for inputting a password according to an embodiment of the present disclosure.
Detailed Description
In website login or Application (APP) login, a user is often used to set a password to be automatically saved in order to avoid the complexity of password input, but the problem of insecurity of an account is caused. The scheme of the application is provided for coordinating password input efficiency and account security.
The embodiments of the present application will be described in further detail with reference to the drawings attached hereto.
Example one
As shown in fig. 1, a flowchart of a password input method provided in an embodiment of the present application includes the following steps:
s101: the client determines the environmental security information when the user logs in.
In the embodiment of the application, the client may refer to a website browser, or an APP client, or a user terminal.
In one embodiment, after a user opens a website or application login page, it may first be determined whether a login password is saved at the client; if so, determining the environmental security information when the user logs in, and entering the subsequent S102, otherwise, directly indicating the user to input the login password, and specifically indicating the user to input the login password in a mode of displaying a blank in a password input box.
Here, the server may determine the environmental security information of the current user login by detecting a network environment, a hardware environment, user historical behavior data, and the like of the user login. For example, the environmental security information at the time of user login may be determined from one or more of the following: whether the IP address of the user during login is the IP address commonly used by the user or not; the IP address commonly used by the user refers to the fact that the login times of the user using the IP address exceed a first set time threshold; whether the identification information of the equipment adopted by the user during login is the identification information of the equipment commonly used by the user or not; the equipment commonly used by the user means that the number of times that the user uses the equipment to log in exceeds a second set number threshold; the historical behavior data of the user, for example, whether the user has malicious bad comment behavior, whether the user has malicious list swiping behavior, the login times of the user within the latest preset time (specifically, the login times on the client) and the like. Here, the environmental security information may specifically include an environmental security level, and based on the above information, a security score of a current login environment may be determined for the user, and further, an environmental security level at the time of login may be determined based on a preset correspondence between different environmental security levels and security score ranges.
Of course, the client may also detect the environmental security information itself. The client can determine the environmental safety information when the user logs in according to the history data of the user login stored by the client or according to the history data (such as the equipment information, the history behavior data, the IP address information and the like) of the user login transmitted by the server.
S102: according to the environment safety information, determining a first password character which needs to be input by a user and a second password character which needs to be automatically filled by a client in the stored login password; the first password character and the second password character form the login password.
In specific implementation, the number of the first password characters required to be input by the user can be determined according to the environment security information (the higher the security is, the smaller the number of the first password characters is, the corresponding relationship between the security score and the number of the first password characters can be preset); according to the number of the determined first password characters and the position information of the preset first password characters in the login password (for example, the preset first password characters are the first N, the last N, the m to the m + N and the like of the login password, N is the number of the first password characters to be determined, and m is a preset positive integer), the first password characters needing to be input by a user are determined, and characters except the determined first password characters in the stored login password are determined as the second password characters.
In the implementation process, the number of the first password characters respectively corresponding to different environmental security levels can be preset, and the number of the first password characters required to be input by the user is determined according to the environmental security level when the user logs in currently.
For example, the environment security level may be divided into three levels, i.e., a high level, a medium level and a low level, and for a user login environment with a high security level, it may be determined that the first password character is null, and the second password character is all characters in the login password; for a user login environment with a medium security level, it may be determined that a first password character that needs to be input by the user is a first N (for example, N ═ 3) bit character of a login password, and the rest are automatically filled second password characters; for a user login environment with a low security level, it can be determined that the first password characters are all characters in the login password, and the second password characters are null, i.e. the user is required to input the login password himself.
The user login environment with the middle security level can be further refined into a plurality of sub-levels, different sub-levels correspond to different N values, and the higher the security is, the lower the N value is.
S103: and executing password input according to the determined first password character and the second password character.
In a specific implementation, when the determined first password characters are all characters of the login password and the second password characters are empty, displaying a blank in a password input box of the login password to indicate a user to input the login password. And when the first password character is determined to be empty and the second password character is all characters of the login password, automatically filling the login password in a password input box of the login page.
And when the determined first password character and the second password character are respectively partial characters in the login password, the first password character is input by a user, and the client automatically fills the second password character. In order to further improve the account security, when the determined first password character and the second password character are respectively partial characters in the login password, a blank space may be displayed in a password input box of a login page to indicate a user to input the login password; after determining that the user inputs the first N-bit character in the correct login password, namely the first password character, the rest characters in the login password, namely the second password character, are automatically filled in the password input box of the login page.
As shown in fig. 2, after the user opens the login page, the server detects that the current environment security level of the user is medium, and at this time, the client may display an account and display a blank in the password input box. As shown in fig. 3, after the user inputs the first 3 bits of the login password, the client verifies whether the user inputs the first 3 bits of the login password correctly according to the saved login password, and if so, the remaining characters of the login password are automatically filled, as shown in fig. 4, and then the user can click the login button to enter the website or APP page, or the client can also automatically enter the website or APP page after filling the remaining characters of the login password.
By adopting the embodiment of the application, under the condition that the security of the current user login environment is higher, the user does not need to input all characters of the login password, only part of characters can be input, the rest characters are automatically filled by the client, and even any character does not need to be input, so that the password input efficiency is improved. In addition, the characters which need to be input by the user are determined according to the security of the current login environment of the user, so that the security of account login is improved.
Example two
As shown in fig. 5, a flowchart of a password input method provided in the second embodiment of the present application includes:
s501: the client presets a login password of a user, wherein the login password comprises a plurality of characters.
Here, after the user sets the login password to auto save, the client saves the login password set by the user.
S502: and determining the number of characters required to be input by the user during login according to the environment safety information, wherein the number of the characters required to be input by the user during login is less than or equal to the number of the characters of the login password.
The environment security information may include environment security information of the client, environment security information of the user account, and environment security information of a server of the website or the application (for example, whether the server is attacked or not). The environmental security information may be determined before the user logs in, for example, the environmental security information may include the number of times that the user logs in the client within the last preset time period, and if the number of times that the user logs in the client within the last preset time period is small (for example, none of the times that the user logs in the client within the last preset time period), it indicates that the security is low. The client may periodically update the stored environmental security information for use when the user logs in. As an alternative implementation, the client may determine the environmental security information when the user logs in.
Here, the higher the security, the smaller the number of characters the user needs to input. The environment security information may include an environment security level, and the number of characters that the user needs to input when logging in is negatively related to the environment security level, where a higher environment security level indicates that the environment of the client is safer.
In specific implementation, after the number N of characters required to be input when a user logs in is determined, the user can be prompted to input a login password, and after the user inputs N correct characters, the rest characters of the login password can be automatically filled in for the user.
In the above process, the position of the N characters specifically input by the user in the login password may not be defined, that is, as long as the user inputs any N characters in the login password correctly, the rest characters are automatically filled in the login password. As a preferred embodiment, the position of the N characters in the login password may also be defined.
Further, when the number of characters which need to be input when the user logs in is determined, the position of the characters which need to be input when the user logs in the login password can be determined. For example, the number of characters that need to be input when the user logs in is N, and the position of the characters that need to be input when the user logs in the login password is the first N, the last N, or the m-th to m + N of the login password.
By adopting the embodiment of the application, under the condition that the security of the current user login environment is higher, the number of characters required to be input by the user during login can be less than that of the login password, so that the password input efficiency is improved. In addition, the number of characters required to be input by the user is determined according to the security of the current login environment of the user, so that the security of account login is improved.
EXAMPLE III
As shown in fig. 6, a flowchart of a password input method provided in the third embodiment of the present application includes:
s601: the server presets a login password of a user, wherein the login password comprises a plurality of characters.
Here, after the user is registered in the server, the server stores the login password set at the time of user registration.
S602: environmental security information of the client is determined.
The environmental security information may be predetermined by the server, for example, whether the user account is secure is determined according to the historical behavior data of the user. As a preferred embodiment, the server determines that the environmental security information of the client may be triggered by an access request of the client. Specifically, when a user triggers to open a website or Application (APP) login page, a client initiates an access request to a server, and after receiving the access request of the client, the server can trigger to detect the environmental security information of the client. In addition, after receiving the access request of the client, the server provides a login page, wherein the login page comprises a password input interface used for receiving characters in a login password input by a user.
In particular implementations, the server may determine the environmental security information at the time of the user login based on one or more of the following: whether the IP address of the user during login is the IP address commonly used by the user or not; the IP address commonly used by the user refers to the fact that the login times of the user using the IP address exceed a first set time threshold; whether the identification information of the equipment adopted by the user during login is the identification information of the equipment commonly used by the user or not; the equipment commonly used by the user means that the number of times that the user uses the equipment to log in exceeds a second set number threshold; historical behavior data of the user, such as whether the user has malicious bad comment behavior, whether the user has malicious list swiping behavior, login times of the user in a recent preset time length and the like.
S603: and determining the number of characters in the login password required to be input by the user during login according to the environment safety information, wherein the number of characters in the login password required to be input by the user during login is less than or equal to the number of characters of a preset login password.
The environment security information may specifically include an environment security level, and the number of characters that needs to be input when the user logs in is negatively related to the environment security level, where a higher environment security level indicates that the environment of the client is safer.
In a specific implementation, the server may notify the client of the determined number N of characters that need to be input by the user, and the client automatically fills the remaining characters after the user inputs N characters in the correct login password. Further, the server may also determine the location of the N characters in the login password and notify the client, or the client may determine the location of the N characters in the login password by itself.
By adopting the embodiment of the application, under the condition that the security of the current user login environment is higher, the server can allow the number of characters input by the user to be less than that of the login password, so that the password input efficiency is improved. In addition, the number of characters required to be input by the user is determined according to the security of the current login environment of the user, so that the security of account login is improved.
EXAMPLE five
As shown in fig. 7, a flowchart of a password input method provided in the fourth embodiment of the present application includes:
s701: providing a login page, wherein the login page comprises a password input interface and is used for receiving characters with a specified number N in a login password input by a user, the specified number is determined according to the environmental security information of a client, and the specified number is less than or equal to the number of the characters of the login password.
Here, for a process of specifically determining the number N of characters in the login password that needs to be input by the user, reference may be made to the description of the above embodiment, which is not described herein again.
S702: and receiving characters with the specified number in the login password input by the user on the login page.
S703: and after the character input by the user is determined to be correct, confirming that the password input by the user is correct.
Here, after the user clicks the login button, the login is completed, and the user may be provided with the content of the home page after the login.
Based on the same inventive concept, the embodiment of the present application further provides a password input device (client, server) corresponding to the password input method, and as the principle of solving the problem of the device is similar to that of the password input method of the embodiment of the present application, the implementation of the device may refer to the implementation of the method, and repeated details are omitted.
As shown in fig. 8, a schematic diagram of a client-side structure for password input provided in the embodiment of the present application includes:
an environment security information determining module 81, configured to determine environment security information when a user logs in;
a password character determination module 82, configured to determine, according to the environment security information, a first password character that needs to be input by a user and a second password character that needs to be automatically filled by a client in a stored login password; the first password character and the second password character form the login password;
and the password input module 83 is configured to perform password input according to the determined first password character and the second password character.
Optionally, the password character determination module 82 is specifically configured to:
determining the number of the first password characters according to the environment safety information; and determining the first password characters according to the determined number of the first password characters and the preset position information of the first password characters in the login password, and determining characters except the determined first password characters in the saved login password as the second password characters.
Optionally, the positions of the first password characters in the login password are the first N of the login password, where N is greater than or equal to 1 and less than or equal to the number of characters of the login password.
Optionally, the password input module 83 is specifically configured to:
when the determined first password character and the second password character are respectively partial characters in the login password, displaying a blank in a password input box of the login password; and automatically filling the second password character in a password input box of the login page after the first password character is determined to be correctly input by the user.
Optionally, the environmental security information determining module 81 is specifically configured to: and receiving the environmental safety information sent by the server.
Optionally, the environmental security information determining module 81 is specifically configured to determine the environmental security information when the user logs in according to one or more of the following information:
whether the IP address of the user during login is the IP address commonly used by the user or not; the IP address commonly used by the user refers to the fact that the login times of the user using the IP address exceed a first set time threshold;
whether the identification information of the equipment adopted by the user during login is the identification information of the equipment commonly used by the user or not; the equipment commonly used by the user means that the number of times that the user uses the equipment to log in exceeds a second set number threshold;
obtaining historical behavior data of the user from a server.
As shown in fig. 9, a schematic diagram of a client-side structure for password input provided in another embodiment of the present application includes:
the storage module 91 is used for presetting a login password of a user, wherein the login password comprises a plurality of characters;
the determining module 92 is configured to determine, according to the environmental security information when the user logs in, the number of characters that the user needs to input when logging in, where the number of characters that the user needs to input when logging in is less than or equal to the number of characters of the login password.
Optionally, the environmental security information includes an environmental security level; the number of characters required to be input by the user during login is in negative correlation with the environmental security level, wherein the higher the environmental security level is, the safer the environment of the client is.
Optionally, the determining module 92 is further configured to:
and determining the position of the character required to be input when the user logs in the login password.
Optionally, the number of characters that need to be input when the user logs in is N, the positions of the characters that need to be input when the user logs in the login password are the first N of the login password, N is greater than or equal to 1, and N is less than or equal to the number of characters of the login password.
As shown in fig. 10, a client for inputting a password according to another embodiment of the present application includes:
the system comprises a storage module 101, a password module and a password module, wherein the storage module 101 is used for presetting a login password of a user, and the login password comprises a plurality of characters;
the determining module 102 is configured to determine, according to the environment security information, the number of characters that needs to be input when the user logs in, where the number of characters that needs to be input when the user logs in is smaller than or equal to the number of characters of the login password.
As shown in fig. 11, a server for inputting a password provided for an embodiment of the present application includes:
the saving module 111 is used for presetting a login password of a user, wherein the login password comprises a plurality of characters;
an environment security information determination module 112, configured to determine environment security information of the client;
and a password character determination module 113, configured to determine, according to the environment security information, the number of characters in the login password that needs to be input when the user logs in, where the number of characters in the login password that needs to be input when the user logs in is less than or equal to the number of characters of a preset login password.
Optionally, the environmental security information determining module 112 is specifically configured to:
and after receiving the access request of the client, determining the environmental safety information of the client.
Optionally, the server further comprises:
and the pushing module 114 is configured to provide a login page after receiving the access request of the client, where the login page includes a password input interface, and is used to receive characters in a login password input by a user.
Optionally, the environmental security information determining module 112 is specifically configured to determine the environmental security information when the user logs in according to one or more of the following information:
whether the IP address of the user during login is the IP address commonly used by the user or not; the IP address commonly used by the user refers to the fact that the login times of the user using the IP address exceed a first set time threshold;
whether the identification information of the equipment adopted by the user during login is the identification information of the equipment commonly used by the user or not; the equipment commonly used by the user means that the number of times that the user uses the equipment to log in exceeds a second set number threshold;
historical behavioral data of the user.
By adopting the device provided by the embodiment of the application, under the condition that the security of the current user login environment is higher, the user does not need to input all characters of the login password, so that the password input efficiency is improved. In addition, because the characters which need to be input by the user are determined according to the login environment of the current user, the security of account login is improved.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (25)

1. A method of password entry, the method comprising:
the client determines the environmental safety information when the user logs in according to one or more of the following information:
whether the IP address of the user during login is the IP address commonly used by the user or not; the IP address commonly used by the user refers to the fact that the login times of the user using the IP address exceed a first set time threshold;
whether the identification information of the equipment adopted by the user during login is the identification information of the equipment commonly used by the user or not; the equipment commonly used by the user means that the number of times that the user uses the equipment to log in exceeds a second set number threshold;
obtaining historical behavior data of the user from a server;
determining the number of first password characters according to the environment safety information;
determining the first password characters according to the determined number of the first password characters and preset position information of the first password characters in the login password, and determining characters except the determined first password characters in the saved login password as second password characters; the first password character and the second password character form the login password;
and executing password input according to the determined first password character and the second password character.
2. The method of claim 1, wherein the first password character is located in the first N of the login passwords, N being greater than or equal to 1 and less than or equal to the number of characters of the login password.
3. The method of claim 2, wherein performing password entry based on the determined first and second password characters comprises:
when the determined first password character and the second password character are respectively partial characters in the login password, displaying a blank in a password input box of the login password;
and automatically filling the second password character in a password input box of the login page after the first password character is determined to be correctly input by the user.
4. The method of claim 1, wherein determining environmental security information at the time of user login comprises:
and receiving the environmental safety information sent by the server.
5. A method of password entry, the method comprising:
the method comprises the steps that a client side presets a login password of a user, wherein the login password comprises a plurality of characters;
determining the number of characters required to be input by a user during login according to the environment safety information, wherein the number of the characters required to be input by the user during login is less than or equal to the number of the characters of the login password;
wherein the client determines the environmental security information when the user logs in according to one or more of the following information:
whether the IP address of the user during login is the IP address commonly used by the user or not; the IP address commonly used by the user refers to the fact that the login times of the user using the IP address exceed a first set time threshold;
whether the identification information of the equipment adopted by the user during login is the identification information of the equipment commonly used by the user or not; the equipment commonly used by the user means that the number of times that the user uses the equipment to log in exceeds a second set number threshold;
obtaining historical behavior data of the user from a server.
6. The method of claim 5, wherein the environmental security information includes an environmental security level; the number of characters required to be input by the user during login is in negative correlation with the environmental security level, wherein the higher the environmental security level is, the safer the environment of the client is.
7. The method of claim 5, wherein in determining the number of characters that need to be entered when the user logs in, further comprising:
and determining the position of the character required to be input when the user logs in the login password.
8. The method of claim 5, wherein the number of characters required to be input by the user during login is N, the position of the character required to be input by the user during login in the login password is the first N characters in the login password, N is greater than or equal to 1, and N is less than or equal to the number of characters in the login password.
9. A method of password entry, the method comprising:
the method comprises the steps that a server presets a login password of a user, wherein the login password comprises a plurality of characters;
determining environmental security information of the client at the time of user login according to one or more of the following information:
whether the IP address of the user during login is the IP address commonly used by the user or not; the IP address commonly used by the user refers to the fact that the login times of the user using the IP address exceed a first set time threshold;
whether the identification information of the equipment adopted by the user during login is the identification information of the equipment commonly used by the user or not; the equipment commonly used by the user means that the number of times that the user uses the equipment to log in exceeds a second set number threshold;
historical behavioral data of the user;
and determining the number of characters in the login password required to be input by the user during login according to the environment safety information, wherein the number of characters in the login password required to be input by the user during login is less than or equal to the number of characters of a preset login password.
10. The method of claim 9, wherein determining environmental security information of the client at the time of user login comprises:
and after receiving the access request of the client, determining the environmental safety information of the client.
11. The method of claim 9 or 10, wherein the method further comprises:
and after receiving an access request of the client, providing a login page, wherein the login page comprises a password input interface for receiving characters in a login password input by a user.
12. A method for page entry, the method comprising:
providing a login page, wherein the login page comprises a password input interface for receiving a specified number of characters in a login password input by a user, the specified number is determined according to the environmental security information of a client, and the specified number is less than or equal to the number of the characters of the login password.
13. The method of claim 12, after providing the landing page, further comprising:
receiving characters with a specified number in the login password input by the user on the login page;
and after the character input by the user is determined to be correct, confirming that the password input by the user is correct.
14. A client for password entry, the client comprising:
the environment safety information determining module is used for determining the environment safety information when the user logs in according to one or more of the following information:
whether the IP address of the user during login is the IP address commonly used by the user or not; the IP address commonly used by the user refers to the fact that the login times of the user using the IP address exceed a first set time threshold;
whether the identification information of the equipment adopted by the user during login is the identification information of the equipment commonly used by the user or not; the equipment commonly used by the user means that the number of times that the user uses the equipment to log in exceeds a second set number threshold;
obtaining historical behavior data of the user from a server;
the password character determining module is used for determining the number of first password characters according to the environment safety information; determining the first password characters according to the determined number of the first password characters and preset position information of the first password characters in the login password, and determining characters except the determined first password characters in the saved login password as second password characters;
and the password input module is used for executing password input according to the determined first password character and the second password character.
15. The client of claim 14, wherein the first password character is located in the first N of the login passwords, N being greater than or equal to 1 and less than or equal to the number of characters of the login password.
16. The client of claim 15, wherein the password entry module is specifically configured to:
when the determined first password character and the second password character are respectively partial characters in the login password, displaying a blank in a password input box of the login password; and automatically filling the second password character in a password input box of the login page after the first password character is determined to be correctly input by the user.
17. The client of claim 14, wherein the environmental security information determination module is specifically configured to: and receiving the environmental safety information sent by the server.
18. A client for password entry, the client comprising:
the storage module is used for presetting a login password of a user, and the login password comprises a plurality of characters;
the determining module is used for determining the number of characters required to be input when the user logs in according to the environmental safety information when the user logs in, wherein the number of the characters required to be input when the user logs in is less than or equal to the number of the characters of the login password;
wherein the client determines the environmental security information when the user logs in according to one or more of the following information:
whether the IP address of the user during login is the IP address commonly used by the user or not; the IP address commonly used by the user refers to the fact that the login times of the user using the IP address exceed a first set time threshold;
whether the identification information of the equipment adopted by the user during login is the identification information of the equipment commonly used by the user or not; the equipment commonly used by the user means that the number of times that the user uses the equipment to log in exceeds a second set number threshold;
obtaining historical behavior data of the user from a server.
19. The client of claim 18, wherein the environmental security information includes an environmental security level; the number of characters required to be input by the user during login is in negative correlation with the environmental security level, wherein the higher the environmental security level is, the safer the environment of the client is.
20. The client of claim 18, wherein the determination module is further to:
and determining the position of the character required to be input when the user logs in the login password.
21. The client according to claim 18, wherein the number of characters required to be input by the user during login is N, the position of the character required to be input by the user during login in the login password is the first N characters in the login password, N is greater than or equal to 1, and N is less than or equal to the number of characters in the login password.
22. A client for password entry, the client comprising:
the storage module is used for presetting a login password of a user, and the login password comprises a plurality of characters;
the determining module is used for determining the number of characters required to be input by a user during login according to the environment safety information, wherein the number of the characters required to be input by the user during login is less than or equal to the number of the characters of the login password;
wherein the client determines the environmental security information when the user logs in according to one or more of the following information:
whether the IP address of the user during login is the IP address commonly used by the user or not; the IP address commonly used by the user refers to the fact that the login times of the user using the IP address exceed a first set time threshold;
whether the identification information of the equipment adopted by the user during login is the identification information of the equipment commonly used by the user or not; the equipment commonly used by the user means that the number of times that the user uses the equipment to log in exceeds a second set number threshold;
obtaining historical behavior data of the user from a server.
23. A server for password entry, the server comprising:
the storage module is used for presetting a login password of a user, and the login password comprises a plurality of characters;
the environment safety information determining module is used for determining the environment safety information of the client when the user logs in according to one or more of the following information:
whether the IP address of the user during login is the IP address commonly used by the user or not; the IP address commonly used by the user refers to the fact that the login times of the user using the IP address exceed a first set time threshold;
whether the identification information of the equipment adopted by the user during login is the identification information of the equipment commonly used by the user or not; the equipment commonly used by the user means that the number of times that the user uses the equipment to log in exceeds a second set number threshold;
obtaining historical behavior data of the user from a server;
and the password character determining module is used for determining the number of characters in the login password required to be input by the user during login according to the environment safety information, wherein the number of characters in the login password required to be input by the user during login is less than or equal to the number of characters of a preset login password.
24. The server according to claim 23, wherein the environmental security information determination module is specifically configured to:
and after receiving the access request of the client, determining the environmental safety information of the client.
25. The server according to claim 23 or 24, wherein the server further comprises:
and the pushing module is used for providing a login page after receiving the access request of the client, and the login page comprises a password input interface for receiving characters in a login password input by a user.
CN201610561416.XA 2016-07-15 2016-07-15 Password input method and device Active CN107623664B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610561416.XA CN107623664B (en) 2016-07-15 2016-07-15 Password input method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610561416.XA CN107623664B (en) 2016-07-15 2016-07-15 Password input method and device

Publications (2)

Publication Number Publication Date
CN107623664A CN107623664A (en) 2018-01-23
CN107623664B true CN107623664B (en) 2020-07-31

Family

ID=61087081

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610561416.XA Active CN107623664B (en) 2016-07-15 2016-07-15 Password input method and device

Country Status (1)

Country Link
CN (1) CN107623664B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109214161B (en) * 2018-05-31 2020-09-29 中国地质大学(武汉) Two-dimensional code security label login system
CN109214167B (en) * 2018-08-01 2021-04-16 深圳市文鼎创数据科技有限公司 Intelligent key safety equipment and key recovery method and storage medium thereof
CN111669404A (en) * 2020-06-24 2020-09-15 深圳前海微众银行股份有限公司 Verification method and device for digital certificate installation
CN113407931A (en) * 2021-06-29 2021-09-17 厦门新同事科技有限公司 Password management method and device and input terminal

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102202067A (en) * 2011-07-15 2011-09-28 席勇良 Dynamic random cipher registration method
CN103036852A (en) * 2011-09-29 2013-04-10 北大方正集团有限公司 Method and device for achieving network login
CN103297408A (en) * 2012-03-02 2013-09-11 腾讯科技(深圳)有限公司 Login method and device, terminal and network server
CN103455751A (en) * 2013-09-02 2013-12-18 小米科技有限责任公司 Password hint generation method, device and terminal equipment
CN104580075A (en) * 2013-10-14 2015-04-29 深圳市腾讯计算机系统有限公司 User login validation method, device and system
CN105141429A (en) * 2015-09-01 2015-12-09 武汉沃思财务外包服务有限公司 User verifying method, user verifying device and server
CN105141594A (en) * 2015-08-11 2015-12-09 腾讯科技(深圳)有限公司 Password retrieving method and password retrieving device
CN105281906A (en) * 2014-07-04 2016-01-27 腾讯科技(深圳)有限公司 Safety authentication method and device
CN105450612A (en) * 2014-08-29 2016-03-30 阿里巴巴集团控股有限公司 Password-based authentication method and apparatus

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080263646A1 (en) * 2007-04-18 2008-10-23 Jerez Edgar C Systems and methods for a computer network security system using dynamically generated passwords

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102202067A (en) * 2011-07-15 2011-09-28 席勇良 Dynamic random cipher registration method
CN103036852A (en) * 2011-09-29 2013-04-10 北大方正集团有限公司 Method and device for achieving network login
CN103297408A (en) * 2012-03-02 2013-09-11 腾讯科技(深圳)有限公司 Login method and device, terminal and network server
CN103455751A (en) * 2013-09-02 2013-12-18 小米科技有限责任公司 Password hint generation method, device and terminal equipment
CN104580075A (en) * 2013-10-14 2015-04-29 深圳市腾讯计算机系统有限公司 User login validation method, device and system
CN105281906A (en) * 2014-07-04 2016-01-27 腾讯科技(深圳)有限公司 Safety authentication method and device
CN105450612A (en) * 2014-08-29 2016-03-30 阿里巴巴集团控股有限公司 Password-based authentication method and apparatus
CN105141594A (en) * 2015-08-11 2015-12-09 腾讯科技(深圳)有限公司 Password retrieving method and password retrieving device
CN105141429A (en) * 2015-09-01 2015-12-09 武汉沃思财务外包服务有限公司 User verifying method, user verifying device and server

Also Published As

Publication number Publication date
CN107623664A (en) 2018-01-23

Similar Documents

Publication Publication Date Title
EP3373543B1 (en) Service processing method and apparatus
CN107623664B (en) Password input method and device
JP6585301B2 (en) Dynamic update of CAPTCHA challenge
CN107133118B (en) Fault diagnosis model training method, fault diagnosis method and related device
US9195842B2 (en) Information processing method, apparatus, and system
CN103312512A (en) Image verification code generating method, image verification code generating device, identity verification method and identity verification device
EP3178191B1 (en) Mitigating risk of account enumeration
EP3113419B1 (en) Network accessing method and router
CN107733883B (en) Method and device for detecting account numbers registered in batches
CN104901924B (en) Internet account verification method and device
CN104994060A (en) Method and device for providing verification for user login
US10127388B1 (en) Identifying visually similar text
CN109714365B (en) The cipher management method and system calculated based on multiple hash
CN102750486A (en) Method and device for updating login information by login control
CN104301875A (en) Short message processing method and device
CN108763251B (en) Personalized recommendation method and device for nuclear product and electronic equipment
CN108234441B (en) Method, apparatus, electronic device and storage medium for determining forged access request
CN109688109B (en) Verification method and device of verification code based on client information identification
CN105323145B (en) Malicious information identification method, malicious information identification device and system
WO2015164046A1 (en) Verification method and device using a magnetometer
CN112165473B (en) Method, device and medium for detecting random account password reset logic loophole
EP3059692A1 (en) System and method for antivirus checking of objects from a plurality of virtual machines
CN104618324A (en) Method and device for transmitting data and detecting data legality
CN110247931B (en) Information processing method and server
CN111666465A (en) Method and device for crawling data, storage medium and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1250096

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant