CN107871076A - A kind of cipher set-up method and device of password memorandum - Google Patents

A kind of cipher set-up method and device of password memorandum Download PDF

Info

Publication number
CN107871076A
CN107871076A CN201610861800.1A CN201610861800A CN107871076A CN 107871076 A CN107871076 A CN 107871076A CN 201610861800 A CN201610861800 A CN 201610861800A CN 107871076 A CN107871076 A CN 107871076A
Authority
CN
China
Prior art keywords
password
mask
user
beaten
region
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610861800.1A
Other languages
Chinese (zh)
Inventor
杨霞
林陆
林陆一
郝允允
袁丽娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201610861800.1A priority Critical patent/CN107871076A/en
Publication of CN107871076A publication Critical patent/CN107871076A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Abstract

The invention discloses a kind of cipher set-up method and device of password memorandum, obtaining after the password of mask, export the first prompt message and inform that user sets password to beat mask region, when user is provided with after beating mask region of password, obtain user's selection beats mask region, and confirm positioned at the code characters for beating mask region, the code characters are carried out to make mask, so as to obtain the password after dozen mask.It can thus be appreciated that, the present invention beats mask region to cater to the memory habit of user by User Defined password, realizes and is reducing password leakage risk, while ensureing cipher safety, user's memory cipher is also convenient for, so as to improve the Consumer's Experience of password memorandum.

Description

A kind of cipher set-up method and device of password memorandum
Technical field
The present invention relates to password memorandum technical field, and in particular, the password for being related to a kind of password memorandum is set Method and device.
Background technology
A kind of means of account name and password as checking user identity, often in website log, using the interconnection such as login Net logs in use in scene and arrived.The website that is used with user, application increase, user generally require to remember multiple account names and Password;Account name and password used in memory for the convenience of the user, user can be by the account name used and password storages to password Preserved in memorandum.
Because password is very sensitive, once the privacy leakage for being dragged storehouse to cause user, therefore from security consideration, When being configured the password recorded in password memorandum, generally require to make mask to password.Existing password, which makes mask, two Kind mode:One kind is that password all makes mask;Another kind is to make mask to the default location of password.It can be seen that current password is beaten In mask mode, the password position for making mask is fixed;And the present inventor has found by research, user often has The demand of the self-defined password position for making mask, therefore how a kind of cipher set-up method of password memorandum is provided, to realize User self-defined can beat the password position of mask, become the problem of those skilled in the art need to consider.
The content of the invention
In view of this, the present invention discloses a kind of cipher set-up method and device of password memorandum, close in reduction to realize Code risk of leakage, while ensureing cipher safety, is also convenient for user's memory cipher, so as to improve the user's body of password memorandum Test.
A kind of cipher set-up method of password memorandum, including:
The password of mask to be beaten is obtained, the password includes multiple code characters;
Export the first prompt message, first prompt message is used to prompting what user set the password to beat mask area Domain;
Obtain user's selection beats mask region;
It is determined that positioned at the code characters beaten in mask region;
It is pointed to the code characters beaten in mask region and makes mask, obtains the password beaten after mask;
The password beaten after mask is preserved.
Preferably, the mask region of beating for obtaining user's selection includes:
Show mask drag area;
Detect dragging position of the mask drag area on the password;
Code characters corresponding to the dragging position for the mask drag area that will confirm that, it is defined as the institute of user's selection State and beat mask region.
Preferably, the display mask drag area includes:
When the password divides multirow to show, the mask drag area branch is controlled to show, wherein, the mask dragging Region is associated with the initiation region of the next line of the lastrow in the end region of lastrow.
Preferably, also include after the display mask drag area:
Export the second prompt message, described second carries and state information and be used for the acquiescence for prompting the user whether that mask region is beaten in modification Length;
After user determines that the default-length in mask region is beaten in modification, length after the modification for beating mask region is obtained, according to After modification mask region is beaten after length determination modification length;
Dragging position of the detection mask drag area on the password includes:
Detect the dragging position for beating mask region after the modification length.
Preferably, the mask region of beating for obtaining user's selection includes:
Obtain the code characters for the mask to be beaten that user chooses;
Position of the code characters that user is chosen in the password, confirm as the described of user's selection and make mask Region.
Preferably, the mask region of beating includes:Multidigit contiguous mask bit is put.
Preferably, the password for obtaining mask to be beaten includes:
The accounts information of user's input is obtained, the accounts information comprises at least close corresponding to account name and the account name Code, the password in the accounts information is defined as to the password of mask to be beaten;
Or, the account name of user's input is obtained, pre-stored password corresponding with the account name is transferred, by what is transferred Password is defined as the password of mask to be beaten.
Preferably, the password for obtaining mask to be beaten includes:
The account name of user's input is obtained, transfers pre-stored password corresponding with the account name;
Obtain the password modification instruction of user's input;
Instruction is changed according to the password to change the pre-stored password accordingly, and by amended password Password as current mask to be beaten.
Preferably, the first prompt message of the output includes:
When detecting the password confirming instruction of user's input, first prompt message is exported.
A kind of password setting device of password memorandum, including:
First acquisition unit, for obtaining the password of mask to be beaten, the password includes multiple code characters;
First output unit, for exporting the first prompt message, first prompt message is used to prompt user to set institute That states password beats mask region;
Second acquisition unit, for obtain user selection beat mask region;
Determining unit, for determining positioned at the code characters beaten in mask region;
Masking unit is beaten, mask is made for being pointed to the code characters beaten in mask region, obtains after making mask Password;
Storage unit, for being preserved to the password beaten after mask.
Preferably, the second acquisition unit includes:
Subelement is shown, for showing mask drag area;
Detection sub-unit, for detecting dragging position of the mask drag area on the password;
First determination subelement, for the cipher word corresponding to the dragging position for the mask drag area that will confirm that Symbol, it is defined as the described of user's selection and beats mask region.
Preferably, the display subelement also includes:
When the password divides multirow to show, the mask drag area branch is controlled to show, wherein, the mask dragging Region is associated with the initiation region of the next line of the lastrow in the end region of lastrow.
Preferably, in addition to:
Subelement is exported, after being shown in the display subelement after mask drag area, the prompting letter of output second Breath, described second carries and states information and be used to prompt the user whether that the default-length in mask region is beaten in modification;
First obtains subelement, for after user determines that the default-length in mask region is beaten in modification, mask area to be beaten in acquisition Length after the modification in domain, mask region is beaten according to after length determination modification length after modification;
The detection sub-unit is additionally operable to:
Detect the dragging position for beating mask region after the modification length.
Preferably, the second acquisition unit includes:
Second obtains subelement, the code characters of the mask to be beaten for obtaining user's selection;
Second confirms subelement, for the position of the code characters of choosing user in the password, confirms as The described of user's selection beats mask region.
Preferably, the first acquisition unit includes:
3rd obtains subelement, and for obtaining the accounts information of user's input, the accounts information comprises at least account name And password corresponding to the account name, the password in the accounts information is defined as to the password of mask to be beaten;
Or, the 4th obtain subelement, for obtain user input account name, it is pre-stored right with the account name to transfer The password answered, the password transferred is defined as to the password of mask to be beaten.
Preferably, the first acquisition unit includes:
Password transfers subelement, for obtaining the account name of user's input, transfers pre-stored corresponding with the account name Password;
5th obtains subelement, and the password for obtaining user's input changes instruction;
Subelement is changed, the pre-stored password is changed accordingly for changing instruction according to the password, And the password using amended password as current mask to be beaten.
It was found from above-mentioned technical scheme, the invention discloses a kind of cipher set-up method and device of password memorandum, Obtaining after the password of mask, the first prompt message of output informs that user sets password to beat mask region, when user's setting Complete password beat mask region after, obtain that user chooses beats mask region, and confirmation is located at the cipher word for beating mask region Symbol, the code characters are carried out to make mask, so as to obtain the password after dozen mask.It follows that the present invention is made by oneself by user Adopted password beats mask region to cater to the memory habit of user, realizes and is reducing password leakage risk, ensures cryptosecurity While property, user's memory cipher is also convenient for, so as to improve the Consumer's Experience of password memorandum.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis Disclosed accompanying drawing obtains other accompanying drawings.
Fig. 1 is a kind of cipher set-up method flow chart of password memorandum disclosed in the embodiment of the present invention;
Fig. 2 is a kind of method flow diagram for beating mask region for obtaining user and choosing disclosed in the embodiment of the present invention;
Fig. 3 is a kind of display schematic diagram of mask drag area disclosed in the embodiment of the present invention;
Fig. 4 is the display schematic diagram of another mask drag area disclosed in the embodiment of the present invention;
Fig. 5 is the display schematic diagram of another mask drag area disclosed in the embodiment of the present invention;
Fig. 6 is another method flow diagram for beating mask region for obtaining user and choosing disclosed in the embodiment of the present invention;
Fig. 7 is a kind of structural representation of the password setting device of password memorandum disclosed in the embodiment of the present invention;
Fig. 8 is a kind of structural representation of second acquisition unit disclosed in the embodiment of the present invention;
Fig. 9 is the structural representation of another second acquisition unit disclosed in the embodiment of the present invention;
Figure 10 is a kind of hardware block diagram of terminal device disclosed in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
The embodiment of the invention discloses a kind of cipher set-up method and device of password memorandum, and password is being reduced to realize Risk of leakage, while ensureing cipher safety, user's memory cipher is also convenient for, so as to improve the user's body of password memorandum Test.
Referring to Fig. 1, a kind of cipher set-up method flow chart of password memorandum, this method bag disclosed in the embodiment of the present invention Include step:
Step S101, the password of mask to be beaten is obtained, the password includes multiple code characters;
Mask (Mask) refers to a string of binary digits in computer science and Digital Logic, by with code target number Step-by-step operation, reach shielding specific bit realizes demand.
Step S102, the first prompt message is exported;
Wherein, first prompt message is used to prompt user to set password to beat mask region.
Specifically, being the password bad for the mask to be beaten for avoiding obtaining or the password is not that user needs dozen mask Password, the first prompt message can be exported when detecting the password confirming instruction of user's input.
Step S103, obtain user's selection beats mask region;
Step S104, determine positioned at the code characters beaten in mask region;
Step S105, the code characters beaten in mask region are pointed to and make mask, obtain the password beaten after mask;
Step S106, the password beaten after mask is preserved.
Wherein, the password after mask of fighting each other can also export the prompting that prompting user keeps mask content firmly in mind before being preserved Information, preserved so that user is password after mask of being fought each other again after keeping mask content firmly in mind.
In summary, the present invention is being obtained after the password of mask, and the first prompt message of output informs that user sets password Beat mask region, when user is provided with after beating mask region of password, obtain that user chooses beats mask region, and confirms Positioned at the code characters for beating mask region, the code characters are carried out to make mask, so as to obtain the password after dozen mask.Thus may be used Know, the present invention beats mask region to cater to the memory habit of user by User Defined password, realizes and is reducing password Risk of leakage, while ensureing cipher safety, user's memory cipher is also convenient for, so as to improve the user's body of password memorandum Test.
It is understood that in step S101, the password of the mask to be beaten of acquisition can be user in current memorandum page The password included in the accounts information of input or the password transferred from pre-stored accounts information.
Therefore, can specifically include for further optimization above-described embodiment, step S101:
The accounts information of user's input is obtained, account information comprises at least close corresponding to account name and the account name Code, by the password that the password confirming in accounts information is mask to be beaten;
Or, the account name of user's input is obtained, pre-stored password corresponding with the account name is transferred, by what is transferred Password is defined as the password of mask to be beaten.
It should be noted that the website belonging to accounts information or application are confirmed for the convenience of the user, the account letter of user's input Also need to include website name (such as Amazon) and application name (such as U.S. group) in breath.
Wherein, when user storage accounts information in password need modification when, can according to user input account name, Password corresponding with the account name is transferred, then amended password is carried out to make mask.
Therefore, can also specifically include for further optimization above-described embodiment, step S101:
The account name of user's input is obtained, transfers pre-stored password corresponding with the account name;
Obtain the password modification instruction of user's input;
Instruction is changed according to the password to change the pre-stored password accordingly, and by amended password Password as current mask to be beaten.
Wherein, the website name or application name that can also be inputted according to user transfer corresponding password.
It is understood that the mask region of beating of password can be that multidigit contiguous mask bit is put or multidigit does not connect Continuous mask position, specifically can be according to being actually needed depending on, the present invention do not limit herein.
It is a kind of disclosed in the embodiment of the present invention referring to Fig. 2 when password is when beating mask region and being put for multidigit contiguous mask bit Obtain the method flow diagram for beating mask region that user chooses, including step:
Step S201, mask drag area is shown;
Wherein it is possible to according to mask drag area length and the magnitude relationship of Password Length, by the aobvious of mask drag area It is following several to show that state is divided into:
The first, when the difference of Password Length and mask drag area length is not more than preset length value, mask is dragged Zone length is reduced to the first length by default-length, and the concrete numerical value of the first length is according to depending on being actually needed.
Illustrate, it is assumed that password includes 5 code characters, and the default value of mask drag area length is 4 cipher words Symbol, if making mask to 4 code characters in the password, the password can only plain code show 1 code characters, it is obvious that phase For showing multidigit code characters than plain code, only show that 1 code characters is not easy to user's memory cipher, therefore, the present invention works as When the difference of Password Length and mask drag area length is not more than preset length value, by mask drag area length by default-length Reduce to the first length.For example, password includes 5 code characters, respectively GAONG, mask drag area length is 4 passwords Character, preset length value are 3 code characters length, then can be by mask drag area length by 4 code characters length of acquiescence Degree is reduced to 2 code characters length, and referring specifically to Fig. 3, code characters corresponding to mask drag area are NG, wherein, in Fig. 3 The last character 0 in password end is non-code characters.
It should be noted that can also be when Password Length be in some preset length section, by mask drag area length Reduced by default-length to the first length.For example, during 4 code characters≤6 code characters of Password Length <, can be by mask Drag area length is reduced to 2 code characters length by giving tacit consent to 4 code characters length.
Second, when the difference of Password Length and mask drag area length is more than preset length value, mask drag area length Spend for default-length.
For example, referring to a kind of display schematic diagram of mask drag area disclosed in Fig. 4 embodiment of the present invention, it is assumed that close Code includes 7 code characters, and respectively GAOJING, the default value of mask drag area length is 4 code characters, presets length Angle value is 2 code characters;
Then in the present embodiment, the difference of Password Length and mask drag area length is 3 code characters, and 3 cipher words 2 code characters of > are accorded with, therefore mask drag area length is still 4 code characters of default-length, wherein, mask drags in Fig. 4 Code characters corresponding to dynamic region are JING.
It is of course also possible in code characters (such as 6 code characters) of Password Length >=presetting digit capacity, mask is dragged Dynamic zone length is still arranged to default-length.
The third, when password divides multirow to show, control mask drag area branch shows, wherein, mask drag area It is associated with the initiation region of the next line of the lastrow in the end region of lastrow.
For example, referring to Fig. 5, a kind of display schematic diagram of mask drag area disclosed in another embodiment of the present invention, Assuming that password includes 12 code characters, respectively GAOJING12352, often go and show 10 code characters, then mask dragging area Domain is also shown in lines in the end region of lastrow and the initiation region of the next line of lastrow, such as mask drag area in Fig. 5 Corresponding code characters are 2352.
It should be noted that when Password Length is less than mask drag area length, mask all can be made to the password, Or do not make mask entirely.
Step S202, dragging position of the mask drag area on the password is detected;
Step S203, the code characters corresponding to the dragging position for the mask drag area that will confirm that, are defined as using The described of family selection beats mask region.
It should be noted that code characters corresponding to mask region are beaten in memory for the convenience of the user, will can beat in mask Appearance is recorded in remarks with the form of code word, for example, password is " 1989****27 ", can be recorded in remarks " birthday ".So, When user forgets to beat code characters corresponding to mask region, " birthday " in remarks, which will may be remembered, beats mask region Corresponding code characters are birthday date.The main purpose of remarks is auxiliary user's memory cipher.
Wherein, user can also change the default-length for beating mask region according to being actually needed.
Therefore, it is further optimization above-described embodiment, referring to Fig. 6, a kind of obtain is used disclosed in another embodiment of the present invention The method flow diagram for beating mask region that family is chosen, including step:
Step S301, mask drag area is shown;
Step S302, the second prompt message is exported;
Wherein, described second carry and state information and be used to prompt the user whether that the default-length in mask region is beaten in modification.
Second prompt message can be shown in the form of dialog box.
Step S303, after user determines that the default-length in mask region is beaten in modification, after the modification in mask region is played in acquisition Length, mask region is beaten according to after length determination modification length after modification;
In actual applications, the default-length in dozen mask region, such as 4 can be shown in current interface, when user needs When the length in mask region is beaten in modification, it is only necessary to which default-length value 4 is revised as to required numerical value.
Step S304, the dragging position for beating mask region after the modification length is detected;
Step S305, the code characters corresponding to the dragging position for the mask drag area that will confirm that, are defined as using The described of family selection beats mask region.
When password is when to beat mask region be multidigit discontinuous mask position, the step S103 in above-described embodiment specifically may be used With including:
Obtain the code characters for the mask to be beaten that user chooses;
Position of the code characters that user is chosen in the password, confirm as the described of user's selection and make mask Region.
It should be noted that when user needs to add new accounts information, can with a newly-built memorandum page, then according to The various embodiments described above content carries out making mask to the password in new accounts information, and preserves comprising the account for playing password after mask Information.
, can be according to website name, application name or account when user needs to change or delete the accounts information pre-saved Name transfers corresponding accounts information, and then the accounts information transferred is modified or deleted again.
It should be noted that user's data required in operator password memorandum and operating process generation in the present invention Data can be stored in terminal.Certainly, when terminal is connected with server, user is required in operator password memorandum Data and operating process generation data can store in the server.
Corresponding with above method embodiment, the invention also discloses a kind of password setting device of password memorandum.
Referring to Fig. 7, a kind of structural representation of the password setting device of password memorandum disclosed in the embodiment of the present invention should Device includes:
First acquisition unit 401, for obtaining the password of mask to be beaten, the password includes multiple code characters;
First output unit 402, for exporting the first prompt message, first prompt message is used to prompt user to set The password beats mask region;
Specifically, being the password bad for the mask to be beaten for avoiding obtaining or the password is not that user needs dozen mask Password, the first output unit 402 can export the first prompt message when detecting the password confirming instruction of user's input.
Second acquisition unit 403, for obtain user selection beat mask region;
Determining unit 404, for determining positioned at the code characters beaten in mask region;
Masking unit 405 is beaten, mask is made for being pointed to the code characters beaten in mask region, obtains after making mask Password;
Storage unit 406, for being preserved to the password beaten after mask.
Wherein, the password after mask of fighting each other can also export the prompting that prompting user keeps mask content firmly in mind before being preserved Information, preserved so that user is password after mask of being fought each other again after keeping mask content firmly in mind.
In summary, the present invention is being obtained after the password of mask, and the first prompt message of output informs that user sets password Beat mask region, when user is provided with after beating mask region of password, obtain that user chooses beats mask region, and confirms Positioned at the code characters for beating mask region, the code characters are carried out to make mask, so as to obtain the password after dozen mask.Thus may be used Know, the present invention beats mask region to cater to the memory habit of user by User Defined password, realizes and is reducing password Risk of leakage, while ensureing cipher safety, user's memory cipher is also convenient for, so as to improve the user's body of password memorandum Test.
It is understood that the password for the mask to be beaten that first acquisition unit 401 obtains can be user in current memorandum The password included or the password transferred from pre-stored accounts information in the accounts information of page input.
Therefore, can include for further optimization above-described embodiment, first acquisition unit 401:
3rd obtains subelement, and for obtaining the accounts information of user's input, the accounts information comprises at least account name And password corresponding to the account name, the password in the accounts information is defined as to the password of mask to be beaten;
Or, the 4th obtain subelement, for obtain user input account name, it is pre-stored right with the account name to transfer The password answered, the password transferred is defined as to the password of mask to be beaten.
It should be noted that the website belonging to accounts information or application are confirmed for the convenience of the user, the account letter of user's input Also need to include website name (such as Amazon) and application name (such as U.S. group) in breath.
Wherein, when user storage accounts information in password need modification when, can according to user input account name, Password corresponding with the account name is transferred, then amended password is carried out to make mask.
Therefore, can also include for further optimization above-described embodiment, first acquisition unit 401:
Password transfers subelement, for obtaining the account name of user's input, transfers pre-stored corresponding with the account name Password;
5th obtains subelement, and the password for obtaining user's input changes instruction;
Subelement is changed, the pre-stored password is changed accordingly for changing instruction according to the password, And the password using amended password as current mask to be beaten.
It is understood that the mask region of beating of password can be that multidigit contiguous mask bit is put or multidigit does not connect Continuous mask position.
It is a kind of disclosed in the embodiment of the present invention referring to Fig. 8 when password is when beating mask region and being put for multidigit contiguous mask bit The structural representation of second acquisition unit, second acquisition unit include:
Subelement 501 is shown, for showing mask drag area;
Wherein, according to mask drag area length and the magnitude relationship of Password Length, by the display shape of mask drag area Four kinds of dispaly states that state is divided into, reference can be made to embodiment of the method corresponding part, is no longer traced herein.
Detection sub-unit 502, for detecting dragging position of the mask drag area on the password;
First determination subelement 503, for the password corresponding to the dragging position for the mask drag area that will confirm that Character, it is defined as the described of user's selection and beats mask region.
It should be noted that code characters corresponding to mask region are beaten in memory for the convenience of the user, will can beat in mask Appearance is recorded in remarks with the form of code word, for example, password is " 1989****27 ", can be recorded in remarks " birthday ".So, When user forgets to beat code characters corresponding to mask region, " birthday " in remarks, which will may be remembered, beats mask region Corresponding code characters are birthday date.The main purpose of remarks is auxiliary user's memory cipher.
Wherein, user can also change the default-length for beating mask region according to being actually needed.
Therefore, it is further optimization above-described embodiment, referring to Fig. 9, one kind second obtains disclosed in another embodiment of the present invention The structural representation of unit is taken, second acquisition unit includes:
Subelement 601 is shown, for showing mask drag area;
Subelement 602 is exported, after being shown in display subelement 601 after mask drag area, the prompting of output second Information, described second carries and states information and be used to prompt the user whether that the default-length in mask region is beaten in modification;
First obtains subelement 603, for after user determines that the default-length in mask region is beaten in modification, mask to be made in acquisition Length after the modification in region, mask region is beaten according to after length determination modification length after modification;
In actual applications, the default-length in dozen mask region, such as 4 can be shown in current interface, when user needs When the length in mask region is beaten in modification, it is only necessary to which default-length value 4 is revised as to required numerical value.
Detection sub-unit 604 is used to detect the dragging position for beating mask region after the modification length;
First determination subelement 605, for the password corresponding to the dragging position for the mask drag area that will confirm that Character, it is defined as the described of user's selection and beats mask region.
When password is when to beat mask region be multidigit discontinuous mask position, the second acquisition unit in above-described embodiment 403 can also include:
Second obtains subelement, the code characters of the mask to be beaten for obtaining user's selection;
Second confirms subelement, for the position of the code characters of choosing user in the password, confirms as The described of user's selection beats mask region.
It should be noted that when user needs to add new accounts information, the password setting device of password memorandum is also Including:
Memorandum page establishes unit, in the newly-built memorandum page of password memorandum.
Wherein, the adding procedure of new memorandum page accounts information and to the password in new accounts information carry out beat mask Process referring specifically to above-described embodiment, here is omitted.
When user needs to change or delete the accounts information pre-saved, the password setting device of password memorandum also wraps Include:
Modification delete unit, website name, application name or account name for being inputted according to user transfer corresponding to account believe Breath, and the modification inputted according to user is instructed or deleted and instructs, and the accounts information transferred is modified or deleted.
It should be noted that in device embodiment each part concrete operating principle, refer to embodiment of the method pair Part is answered, here is omitted.
Present invention also offers a kind of terminal device, the terminal device includes password setting device described above, Figure 10 The hardware configuration of the terminal device is shown, referring to Figure 10, the terminal device can include:Processor 1, communication interface 2, storage Device 3 and communication bus 4;
Wherein processor 1, communication interface 2, memory 3 complete mutual communication by communication bus 4;
Optionally, communication interface 2 can be the interface of communication module, such as the interface of gsm module;
Processor 1, for configuration processor;
Memory 3, for depositing program;
Program can include program code, and described program code includes computer-managed instruction.
Processor 1 is probably a central processor CPU, or specific integrated circuit ASIC (Application Specific Integrated Circuit), or it is arranged to implement the integrated electricity of one or more of the embodiment of the present invention Road.
Memory 3 may include high-speed RAM memory, it is also possible to also including nonvolatile memory (non-volatile Memory), a for example, at least magnetic disk storage.
Wherein, program can be specifically used for:
The password of mask to be beaten is obtained, the password includes multiple code characters;
Export the first prompt message, first prompt message is used to prompting what user set the password to beat mask area Domain;
Obtain user's selection beats mask region;
It is determined that positioned at the code characters beaten in mask region;
It is pointed to the code characters beaten in mask region and makes mask, obtains the password beaten after mask;
The password beaten after mask is preserved.
Finally, it is to be noted that, herein, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between any this actual relation or order be present.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, article or equipment including a series of elements not only include that A little key elements, but also the other element including being not expressly set out, or also include for this process, method, article or The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged Except other identical element in the process including the key element, method, article or equipment being also present.
Each embodiment is described by the way of progressive in this specification, what each embodiment stressed be and other The difference of embodiment, between each embodiment identical similar portion mutually referring to.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or using the present invention. A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one The most wide scope caused.

Claims (16)

  1. A kind of 1. cipher set-up method of password memorandum, it is characterised in that including:
    The password of mask to be beaten is obtained, the password includes multiple code characters;
    Export the first prompt message, first prompt message is used to prompting what user set the password to beat mask region;
    Obtain user's selection beats mask region;
    It is determined that positioned at the code characters beaten in mask region;
    It is pointed to the code characters beaten in mask region and makes mask, obtains the password beaten after mask;
    The password beaten after mask is preserved.
  2. 2. cipher set-up method according to claim 1, it is characterised in that what the acquisition user chose beats mask region Including:
    Show mask drag area;
    Detect dragging position of the mask drag area on the password;
    Code characters corresponding to the dragging position for the mask drag area that will confirm that, are defined as described the beating of user's selection Mask region.
  3. 3. cipher set-up method according to claim 2, it is characterised in that the display mask drag area includes:
    When the password divides multirow to show, the mask drag area branch is controlled to show, wherein, the mask drag area It is associated with the initiation region of the next line of the lastrow in the end region of lastrow.
  4. 4. cipher set-up method according to claim 2, it is characterised in that also wrapped after the display mask drag area Include:
    Export the second prompt message, described second carries and state information and be used to prompting the user whether that modification to be beaten the acquiescence in mask region and grown Degree;
    After user determines that the default-length in mask region is beaten in modification, length after the modification for beating mask region is obtained, according to modification Afterwards mask region is beaten after length determination modification length;
    Dragging position of the detection mask drag area on the password includes:
    Detect the dragging position for beating mask region after the modification length.
  5. 5. cipher set-up method according to claim 1, it is characterised in that what the acquisition user chose beats mask region Including:
    Obtain the code characters for the mask to be beaten that user chooses;
    Position of the code characters that user is chosen in the password, confirm as the described of user's selection and beat mask area Domain.
  6. 6. cipher set-up method according to claim 1, it is characterised in that the mask region of beating includes:Multidigit is continuous Mask position.
  7. 7. cipher set-up method according to claim 1, it is characterised in that the password for obtaining mask to be beaten includes:
    The accounts information of user's input is obtained, the accounts information comprises at least password corresponding to account name and the account name, Password in the accounts information is defined as to the password of mask to be beaten;
    Or, the account name of user's input is obtained, transfer pre-stored password corresponding with the account name, the password that will be transferred It is defined as the password of mask to be beaten.
  8. 8. cipher set-up method according to claim 1, it is characterised in that the password for obtaining mask to be beaten includes:
    The account name of user's input is obtained, transfers pre-stored password corresponding with the account name;
    Obtain the password modification instruction of user's input;
    According to the password instruction is changed to change the pre-stored password accordingly, and using amended password as The password of current mask to be beaten.
  9. 9. cipher set-up method according to claim 1, it is characterised in that the first prompt message of the output includes:
    When detecting the password confirming instruction of user's input, first prompt message is exported.
  10. A kind of 10. password setting device of password memorandum, it is characterised in that including:
    First acquisition unit, for obtaining the password of mask to be beaten, the password includes multiple code characters;
    First output unit, for exporting the first prompt message, first prompt message is used to prompt user that setting is described close Code beats mask region;
    Second acquisition unit, for obtain user selection beat mask region;
    Determining unit, for determining positioned at the code characters beaten in mask region;
    Masking unit is beaten, mask is made for being pointed to the code characters beaten in mask region, obtains the password beaten after mask;
    Storage unit, for being preserved to the password beaten after mask.
  11. 11. password setting device according to claim 10, it is characterised in that the second acquisition unit includes:
    Subelement is shown, for showing mask drag area;
    Detection sub-unit, for detecting dragging position of the mask drag area on the password;
    First determination subelement, for the code characters corresponding to the dragging position of the mask drag area that will confirm that, really It is set to the described of user's selection and beats mask region.
  12. 12. password setting device according to claim 11, it is characterised in that the display subelement also includes:
    When the password divides multirow to show, the mask drag area branch is controlled to show, wherein, the mask drag area It is associated with the initiation region of the next line of the lastrow in the end region of lastrow.
  13. 13. password setting device according to claim 11, it is characterised in that also include:
    Subelement is exported, after being shown in the display subelement after mask drag area, exports the second prompt message, institute State second and carry and state information and be used to prompt the user whether that the default-length in mask region is beaten in modification;
    First obtains subelement, for after user determines that the default-length in mask region is beaten in modification, mask region to be beaten in acquisition Length after modification, mask region is beaten according to after length determination modification length after modification;
    The detection sub-unit is additionally operable to:
    Detect the dragging position for beating mask region after the modification length.
  14. 14. password setting device according to claim 10, it is characterised in that the second acquisition unit includes:
    Second obtains subelement, the code characters of the mask to be beaten for obtaining user's selection;
    Second confirms subelement, for the position of the code characters of choosing user in the password, confirms as user The described of selection beats mask region.
  15. 15. password setting device according to claim 10, it is characterised in that the first acquisition unit includes:
    3rd obtains subelement, and for obtaining the accounts information of user's input, the accounts information comprises at least account name and institute Password corresponding to account name is stated, the password in the accounts information is defined as to the password of mask to be beaten;
    Or, the 4th obtain subelement, for obtain user input account name, transfer pre-stored corresponding with the account name Password, the password transferred is defined as to the password of mask to be beaten.
  16. 16. password setting device according to claim 10, it is characterised in that the first acquisition unit includes:
    Password transfers subelement, for obtaining the account name of user's input, transfers pre-stored corresponding close with the account name Code;
    5th obtains subelement, and the password for obtaining user's input changes instruction;
    Subelement is changed, the pre-stored password is changed accordingly for changing instruction according to the password, and will Password of the amended password as current mask to be beaten.
CN201610861800.1A 2016-09-28 2016-09-28 A kind of cipher set-up method and device of password memorandum Pending CN107871076A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610861800.1A CN107871076A (en) 2016-09-28 2016-09-28 A kind of cipher set-up method and device of password memorandum

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610861800.1A CN107871076A (en) 2016-09-28 2016-09-28 A kind of cipher set-up method and device of password memorandum

Publications (1)

Publication Number Publication Date
CN107871076A true CN107871076A (en) 2018-04-03

Family

ID=61762040

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610861800.1A Pending CN107871076A (en) 2016-09-28 2016-09-28 A kind of cipher set-up method and device of password memorandum

Country Status (1)

Country Link
CN (1) CN107871076A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077361A (en) * 2012-12-28 2013-05-01 东莞宇龙通信科技有限公司 Mobile terminal and anti-spy method thereof
US20130132843A1 (en) * 2011-11-23 2013-05-23 BenchFly Inc. Methods of editing personal videograpghic media
CN104299186A (en) * 2014-09-30 2015-01-21 珠海市君天电子科技有限公司 Method and device for conducting mosaic processing on picture
CN104471522A (en) * 2012-07-13 2015-03-25 三星电子株式会社 User interface apparatus and method for user terminal
CN105320906A (en) * 2014-06-10 2016-02-10 腾讯科技(深圳)有限公司 Information safety protecting method and device for mobile terminal
CN105376287A (en) * 2014-08-29 2016-03-02 优视科技有限公司 Identification data processing method and system, and server

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130132843A1 (en) * 2011-11-23 2013-05-23 BenchFly Inc. Methods of editing personal videograpghic media
CN104471522A (en) * 2012-07-13 2015-03-25 三星电子株式会社 User interface apparatus and method for user terminal
CN103077361A (en) * 2012-12-28 2013-05-01 东莞宇龙通信科技有限公司 Mobile terminal and anti-spy method thereof
CN105320906A (en) * 2014-06-10 2016-02-10 腾讯科技(深圳)有限公司 Information safety protecting method and device for mobile terminal
CN105376287A (en) * 2014-08-29 2016-03-02 优视科技有限公司 Identification data processing method and system, and server
CN104299186A (en) * 2014-09-30 2015-01-21 珠海市君天电子科技有限公司 Method and device for conducting mosaic processing on picture

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
李永红等: "基于安卓系统的邮政储蓄移动支付方案设计", 《西安邮电大学学报》 *
王霞: "显星添杠皆简单", 《微电脑世界》 *
闻翔军 编辑: "Q来A去", 《电脑知识与技术》 *

Similar Documents

Publication Publication Date Title
CN105204823B (en) Generate the method and device of application program installation kit
CN105117632B (en) The method and terminal of a kind of terminal unlocking
CN107592636A (en) A kind of method of processing information, terminal and server
CN107483581A (en) The method of password authentication of shared equipment, shared equipment, cloud server and system
CN106406867A (en) Android system-based screen reading method and apparatus
CN106502499A (en) The method and device that a kind of application is opened
CN107480001A (en) System recovery method and device
CN107404740A (en) Method for switching network, device and the terminal device of safety
CN103218551B (en) A kind of method protecting java program
CN104517049A (en) Terminal unlocking method
CN107871076A (en) A kind of cipher set-up method and device of password memorandum
CN108510327A (en) Discount coupon generation method and system
CN107154853A (en) A kind of signature verification method, terminal and system
CN109918877A (en) A kind of data ciphering method, system, client and computer readable storage medium
CN108171043A (en) A kind of computer interface communications protection and abnormality alarming method and device
CN105487807A (en) Theme replacing method and system
CN106570359A (en) Input method and device, and user equipment
CN105072486B (en) Method and device for adding visual effect to spliced video
CN105392087A (en) Loudspeaker box management method and user terminal
CN105809056A (en) Communication message management method, device and related equipment
CN109033831A (en) A kind of method for detecting virus, device, electronic equipment and storage medium
CN109271783A (en) A kind of virus hold-up interception method, device and electronic equipment
CN105989516B (en) A kind of method for information display and terminal
CN105975859B (en) A kind of method and system of assistant analysis malicious code
CN107800776A (en) A kind of document handling method, terminal, server and computer-readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180403