CN107871076A - A kind of cipher set-up method and device of password memorandum - Google Patents
A kind of cipher set-up method and device of password memorandum Download PDFInfo
- Publication number
- CN107871076A CN107871076A CN201610861800.1A CN201610861800A CN107871076A CN 107871076 A CN107871076 A CN 107871076A CN 201610861800 A CN201610861800 A CN 201610861800A CN 107871076 A CN107871076 A CN 107871076A
- Authority
- CN
- China
- Prior art keywords
- password
- mask
- user
- beaten
- region
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Abstract
The invention discloses a kind of cipher set-up method and device of password memorandum, obtaining after the password of mask, export the first prompt message and inform that user sets password to beat mask region, when user is provided with after beating mask region of password, obtain user's selection beats mask region, and confirm positioned at the code characters for beating mask region, the code characters are carried out to make mask, so as to obtain the password after dozen mask.It can thus be appreciated that, the present invention beats mask region to cater to the memory habit of user by User Defined password, realizes and is reducing password leakage risk, while ensureing cipher safety, user's memory cipher is also convenient for, so as to improve the Consumer's Experience of password memorandum.
Description
Technical field
The present invention relates to password memorandum technical field, and in particular, the password for being related to a kind of password memorandum is set
Method and device.
Background technology
A kind of means of account name and password as checking user identity, often in website log, using the interconnection such as login
Net logs in use in scene and arrived.The website that is used with user, application increase, user generally require to remember multiple account names and
Password;Account name and password used in memory for the convenience of the user, user can be by the account name used and password storages to password
Preserved in memorandum.
Because password is very sensitive, once the privacy leakage for being dragged storehouse to cause user, therefore from security consideration,
When being configured the password recorded in password memorandum, generally require to make mask to password.Existing password, which makes mask, two
Kind mode:One kind is that password all makes mask;Another kind is to make mask to the default location of password.It can be seen that current password is beaten
In mask mode, the password position for making mask is fixed;And the present inventor has found by research, user often has
The demand of the self-defined password position for making mask, therefore how a kind of cipher set-up method of password memorandum is provided, to realize
User self-defined can beat the password position of mask, become the problem of those skilled in the art need to consider.
The content of the invention
In view of this, the present invention discloses a kind of cipher set-up method and device of password memorandum, close in reduction to realize
Code risk of leakage, while ensureing cipher safety, is also convenient for user's memory cipher, so as to improve the user's body of password memorandum
Test.
A kind of cipher set-up method of password memorandum, including:
The password of mask to be beaten is obtained, the password includes multiple code characters;
Export the first prompt message, first prompt message is used to prompting what user set the password to beat mask area
Domain;
Obtain user's selection beats mask region;
It is determined that positioned at the code characters beaten in mask region;
It is pointed to the code characters beaten in mask region and makes mask, obtains the password beaten after mask;
The password beaten after mask is preserved.
Preferably, the mask region of beating for obtaining user's selection includes:
Show mask drag area;
Detect dragging position of the mask drag area on the password;
Code characters corresponding to the dragging position for the mask drag area that will confirm that, it is defined as the institute of user's selection
State and beat mask region.
Preferably, the display mask drag area includes:
When the password divides multirow to show, the mask drag area branch is controlled to show, wherein, the mask dragging
Region is associated with the initiation region of the next line of the lastrow in the end region of lastrow.
Preferably, also include after the display mask drag area:
Export the second prompt message, described second carries and state information and be used for the acquiescence for prompting the user whether that mask region is beaten in modification
Length;
After user determines that the default-length in mask region is beaten in modification, length after the modification for beating mask region is obtained, according to
After modification mask region is beaten after length determination modification length;
Dragging position of the detection mask drag area on the password includes:
Detect the dragging position for beating mask region after the modification length.
Preferably, the mask region of beating for obtaining user's selection includes:
Obtain the code characters for the mask to be beaten that user chooses;
Position of the code characters that user is chosen in the password, confirm as the described of user's selection and make mask
Region.
Preferably, the mask region of beating includes:Multidigit contiguous mask bit is put.
Preferably, the password for obtaining mask to be beaten includes:
The accounts information of user's input is obtained, the accounts information comprises at least close corresponding to account name and the account name
Code, the password in the accounts information is defined as to the password of mask to be beaten;
Or, the account name of user's input is obtained, pre-stored password corresponding with the account name is transferred, by what is transferred
Password is defined as the password of mask to be beaten.
Preferably, the password for obtaining mask to be beaten includes:
The account name of user's input is obtained, transfers pre-stored password corresponding with the account name;
Obtain the password modification instruction of user's input;
Instruction is changed according to the password to change the pre-stored password accordingly, and by amended password
Password as current mask to be beaten.
Preferably, the first prompt message of the output includes:
When detecting the password confirming instruction of user's input, first prompt message is exported.
A kind of password setting device of password memorandum, including:
First acquisition unit, for obtaining the password of mask to be beaten, the password includes multiple code characters;
First output unit, for exporting the first prompt message, first prompt message is used to prompt user to set institute
That states password beats mask region;
Second acquisition unit, for obtain user selection beat mask region;
Determining unit, for determining positioned at the code characters beaten in mask region;
Masking unit is beaten, mask is made for being pointed to the code characters beaten in mask region, obtains after making mask
Password;
Storage unit, for being preserved to the password beaten after mask.
Preferably, the second acquisition unit includes:
Subelement is shown, for showing mask drag area;
Detection sub-unit, for detecting dragging position of the mask drag area on the password;
First determination subelement, for the cipher word corresponding to the dragging position for the mask drag area that will confirm that
Symbol, it is defined as the described of user's selection and beats mask region.
Preferably, the display subelement also includes:
When the password divides multirow to show, the mask drag area branch is controlled to show, wherein, the mask dragging
Region is associated with the initiation region of the next line of the lastrow in the end region of lastrow.
Preferably, in addition to:
Subelement is exported, after being shown in the display subelement after mask drag area, the prompting letter of output second
Breath, described second carries and states information and be used to prompt the user whether that the default-length in mask region is beaten in modification;
First obtains subelement, for after user determines that the default-length in mask region is beaten in modification, mask area to be beaten in acquisition
Length after the modification in domain, mask region is beaten according to after length determination modification length after modification;
The detection sub-unit is additionally operable to:
Detect the dragging position for beating mask region after the modification length.
Preferably, the second acquisition unit includes:
Second obtains subelement, the code characters of the mask to be beaten for obtaining user's selection;
Second confirms subelement, for the position of the code characters of choosing user in the password, confirms as
The described of user's selection beats mask region.
Preferably, the first acquisition unit includes:
3rd obtains subelement, and for obtaining the accounts information of user's input, the accounts information comprises at least account name
And password corresponding to the account name, the password in the accounts information is defined as to the password of mask to be beaten;
Or, the 4th obtain subelement, for obtain user input account name, it is pre-stored right with the account name to transfer
The password answered, the password transferred is defined as to the password of mask to be beaten.
Preferably, the first acquisition unit includes:
Password transfers subelement, for obtaining the account name of user's input, transfers pre-stored corresponding with the account name
Password;
5th obtains subelement, and the password for obtaining user's input changes instruction;
Subelement is changed, the pre-stored password is changed accordingly for changing instruction according to the password,
And the password using amended password as current mask to be beaten.
It was found from above-mentioned technical scheme, the invention discloses a kind of cipher set-up method and device of password memorandum,
Obtaining after the password of mask, the first prompt message of output informs that user sets password to beat mask region, when user's setting
Complete password beat mask region after, obtain that user chooses beats mask region, and confirmation is located at the cipher word for beating mask region
Symbol, the code characters are carried out to make mask, so as to obtain the password after dozen mask.It follows that the present invention is made by oneself by user
Adopted password beats mask region to cater to the memory habit of user, realizes and is reducing password leakage risk, ensures cryptosecurity
While property, user's memory cipher is also convenient for, so as to improve the Consumer's Experience of password memorandum.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
Disclosed accompanying drawing obtains other accompanying drawings.
Fig. 1 is a kind of cipher set-up method flow chart of password memorandum disclosed in the embodiment of the present invention;
Fig. 2 is a kind of method flow diagram for beating mask region for obtaining user and choosing disclosed in the embodiment of the present invention;
Fig. 3 is a kind of display schematic diagram of mask drag area disclosed in the embodiment of the present invention;
Fig. 4 is the display schematic diagram of another mask drag area disclosed in the embodiment of the present invention;
Fig. 5 is the display schematic diagram of another mask drag area disclosed in the embodiment of the present invention;
Fig. 6 is another method flow diagram for beating mask region for obtaining user and choosing disclosed in the embodiment of the present invention;
Fig. 7 is a kind of structural representation of the password setting device of password memorandum disclosed in the embodiment of the present invention;
Fig. 8 is a kind of structural representation of second acquisition unit disclosed in the embodiment of the present invention;
Fig. 9 is the structural representation of another second acquisition unit disclosed in the embodiment of the present invention;
Figure 10 is a kind of hardware block diagram of terminal device disclosed in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
The embodiment of the invention discloses a kind of cipher set-up method and device of password memorandum, and password is being reduced to realize
Risk of leakage, while ensureing cipher safety, user's memory cipher is also convenient for, so as to improve the user's body of password memorandum
Test.
Referring to Fig. 1, a kind of cipher set-up method flow chart of password memorandum, this method bag disclosed in the embodiment of the present invention
Include step:
Step S101, the password of mask to be beaten is obtained, the password includes multiple code characters;
Mask (Mask) refers to a string of binary digits in computer science and Digital Logic, by with code target number
Step-by-step operation, reach shielding specific bit realizes demand.
Step S102, the first prompt message is exported;
Wherein, first prompt message is used to prompt user to set password to beat mask region.
Specifically, being the password bad for the mask to be beaten for avoiding obtaining or the password is not that user needs dozen mask
Password, the first prompt message can be exported when detecting the password confirming instruction of user's input.
Step S103, obtain user's selection beats mask region;
Step S104, determine positioned at the code characters beaten in mask region;
Step S105, the code characters beaten in mask region are pointed to and make mask, obtain the password beaten after mask;
Step S106, the password beaten after mask is preserved.
Wherein, the password after mask of fighting each other can also export the prompting that prompting user keeps mask content firmly in mind before being preserved
Information, preserved so that user is password after mask of being fought each other again after keeping mask content firmly in mind.
In summary, the present invention is being obtained after the password of mask, and the first prompt message of output informs that user sets password
Beat mask region, when user is provided with after beating mask region of password, obtain that user chooses beats mask region, and confirms
Positioned at the code characters for beating mask region, the code characters are carried out to make mask, so as to obtain the password after dozen mask.Thus may be used
Know, the present invention beats mask region to cater to the memory habit of user by User Defined password, realizes and is reducing password
Risk of leakage, while ensureing cipher safety, user's memory cipher is also convenient for, so as to improve the user's body of password memorandum
Test.
It is understood that in step S101, the password of the mask to be beaten of acquisition can be user in current memorandum page
The password included in the accounts information of input or the password transferred from pre-stored accounts information.
Therefore, can specifically include for further optimization above-described embodiment, step S101:
The accounts information of user's input is obtained, account information comprises at least close corresponding to account name and the account name
Code, by the password that the password confirming in accounts information is mask to be beaten;
Or, the account name of user's input is obtained, pre-stored password corresponding with the account name is transferred, by what is transferred
Password is defined as the password of mask to be beaten.
It should be noted that the website belonging to accounts information or application are confirmed for the convenience of the user, the account letter of user's input
Also need to include website name (such as Amazon) and application name (such as U.S. group) in breath.
Wherein, when user storage accounts information in password need modification when, can according to user input account name,
Password corresponding with the account name is transferred, then amended password is carried out to make mask.
Therefore, can also specifically include for further optimization above-described embodiment, step S101:
The account name of user's input is obtained, transfers pre-stored password corresponding with the account name;
Obtain the password modification instruction of user's input;
Instruction is changed according to the password to change the pre-stored password accordingly, and by amended password
Password as current mask to be beaten.
Wherein, the website name or application name that can also be inputted according to user transfer corresponding password.
It is understood that the mask region of beating of password can be that multidigit contiguous mask bit is put or multidigit does not connect
Continuous mask position, specifically can be according to being actually needed depending on, the present invention do not limit herein.
It is a kind of disclosed in the embodiment of the present invention referring to Fig. 2 when password is when beating mask region and being put for multidigit contiguous mask bit
Obtain the method flow diagram for beating mask region that user chooses, including step:
Step S201, mask drag area is shown;
Wherein it is possible to according to mask drag area length and the magnitude relationship of Password Length, by the aobvious of mask drag area
It is following several to show that state is divided into:
The first, when the difference of Password Length and mask drag area length is not more than preset length value, mask is dragged
Zone length is reduced to the first length by default-length, and the concrete numerical value of the first length is according to depending on being actually needed.
Illustrate, it is assumed that password includes 5 code characters, and the default value of mask drag area length is 4 cipher words
Symbol, if making mask to 4 code characters in the password, the password can only plain code show 1 code characters, it is obvious that phase
For showing multidigit code characters than plain code, only show that 1 code characters is not easy to user's memory cipher, therefore, the present invention works as
When the difference of Password Length and mask drag area length is not more than preset length value, by mask drag area length by default-length
Reduce to the first length.For example, password includes 5 code characters, respectively GAONG, mask drag area length is 4 passwords
Character, preset length value are 3 code characters length, then can be by mask drag area length by 4 code characters length of acquiescence
Degree is reduced to 2 code characters length, and referring specifically to Fig. 3, code characters corresponding to mask drag area are NG, wherein, in Fig. 3
The last character 0 in password end is non-code characters.
It should be noted that can also be when Password Length be in some preset length section, by mask drag area length
Reduced by default-length to the first length.For example, during 4 code characters≤6 code characters of Password Length <, can be by mask
Drag area length is reduced to 2 code characters length by giving tacit consent to 4 code characters length.
Second, when the difference of Password Length and mask drag area length is more than preset length value, mask drag area length
Spend for default-length.
For example, referring to a kind of display schematic diagram of mask drag area disclosed in Fig. 4 embodiment of the present invention, it is assumed that close
Code includes 7 code characters, and respectively GAOJING, the default value of mask drag area length is 4 code characters, presets length
Angle value is 2 code characters;
Then in the present embodiment, the difference of Password Length and mask drag area length is 3 code characters, and 3 cipher words
2 code characters of > are accorded with, therefore mask drag area length is still 4 code characters of default-length, wherein, mask drags in Fig. 4
Code characters corresponding to dynamic region are JING.
It is of course also possible in code characters (such as 6 code characters) of Password Length >=presetting digit capacity, mask is dragged
Dynamic zone length is still arranged to default-length.
The third, when password divides multirow to show, control mask drag area branch shows, wherein, mask drag area
It is associated with the initiation region of the next line of the lastrow in the end region of lastrow.
For example, referring to Fig. 5, a kind of display schematic diagram of mask drag area disclosed in another embodiment of the present invention,
Assuming that password includes 12 code characters, respectively GAOJING12352, often go and show 10 code characters, then mask dragging area
Domain is also shown in lines in the end region of lastrow and the initiation region of the next line of lastrow, such as mask drag area in Fig. 5
Corresponding code characters are 2352.
It should be noted that when Password Length is less than mask drag area length, mask all can be made to the password,
Or do not make mask entirely.
Step S202, dragging position of the mask drag area on the password is detected;
Step S203, the code characters corresponding to the dragging position for the mask drag area that will confirm that, are defined as using
The described of family selection beats mask region.
It should be noted that code characters corresponding to mask region are beaten in memory for the convenience of the user, will can beat in mask
Appearance is recorded in remarks with the form of code word, for example, password is " 1989****27 ", can be recorded in remarks " birthday ".So,
When user forgets to beat code characters corresponding to mask region, " birthday " in remarks, which will may be remembered, beats mask region
Corresponding code characters are birthday date.The main purpose of remarks is auxiliary user's memory cipher.
Wherein, user can also change the default-length for beating mask region according to being actually needed.
Therefore, it is further optimization above-described embodiment, referring to Fig. 6, a kind of obtain is used disclosed in another embodiment of the present invention
The method flow diagram for beating mask region that family is chosen, including step:
Step S301, mask drag area is shown;
Step S302, the second prompt message is exported;
Wherein, described second carry and state information and be used to prompt the user whether that the default-length in mask region is beaten in modification.
Second prompt message can be shown in the form of dialog box.
Step S303, after user determines that the default-length in mask region is beaten in modification, after the modification in mask region is played in acquisition
Length, mask region is beaten according to after length determination modification length after modification;
In actual applications, the default-length in dozen mask region, such as 4 can be shown in current interface, when user needs
When the length in mask region is beaten in modification, it is only necessary to which default-length value 4 is revised as to required numerical value.
Step S304, the dragging position for beating mask region after the modification length is detected;
Step S305, the code characters corresponding to the dragging position for the mask drag area that will confirm that, are defined as using
The described of family selection beats mask region.
When password is when to beat mask region be multidigit discontinuous mask position, the step S103 in above-described embodiment specifically may be used
With including:
Obtain the code characters for the mask to be beaten that user chooses;
Position of the code characters that user is chosen in the password, confirm as the described of user's selection and make mask
Region.
It should be noted that when user needs to add new accounts information, can with a newly-built memorandum page, then according to
The various embodiments described above content carries out making mask to the password in new accounts information, and preserves comprising the account for playing password after mask
Information.
, can be according to website name, application name or account when user needs to change or delete the accounts information pre-saved
Name transfers corresponding accounts information, and then the accounts information transferred is modified or deleted again.
It should be noted that user's data required in operator password memorandum and operating process generation in the present invention
Data can be stored in terminal.Certainly, when terminal is connected with server, user is required in operator password memorandum
Data and operating process generation data can store in the server.
Corresponding with above method embodiment, the invention also discloses a kind of password setting device of password memorandum.
Referring to Fig. 7, a kind of structural representation of the password setting device of password memorandum disclosed in the embodiment of the present invention should
Device includes:
First acquisition unit 401, for obtaining the password of mask to be beaten, the password includes multiple code characters;
First output unit 402, for exporting the first prompt message, first prompt message is used to prompt user to set
The password beats mask region;
Specifically, being the password bad for the mask to be beaten for avoiding obtaining or the password is not that user needs dozen mask
Password, the first output unit 402 can export the first prompt message when detecting the password confirming instruction of user's input.
Second acquisition unit 403, for obtain user selection beat mask region;
Determining unit 404, for determining positioned at the code characters beaten in mask region;
Masking unit 405 is beaten, mask is made for being pointed to the code characters beaten in mask region, obtains after making mask
Password;
Storage unit 406, for being preserved to the password beaten after mask.
Wherein, the password after mask of fighting each other can also export the prompting that prompting user keeps mask content firmly in mind before being preserved
Information, preserved so that user is password after mask of being fought each other again after keeping mask content firmly in mind.
In summary, the present invention is being obtained after the password of mask, and the first prompt message of output informs that user sets password
Beat mask region, when user is provided with after beating mask region of password, obtain that user chooses beats mask region, and confirms
Positioned at the code characters for beating mask region, the code characters are carried out to make mask, so as to obtain the password after dozen mask.Thus may be used
Know, the present invention beats mask region to cater to the memory habit of user by User Defined password, realizes and is reducing password
Risk of leakage, while ensureing cipher safety, user's memory cipher is also convenient for, so as to improve the user's body of password memorandum
Test.
It is understood that the password for the mask to be beaten that first acquisition unit 401 obtains can be user in current memorandum
The password included or the password transferred from pre-stored accounts information in the accounts information of page input.
Therefore, can include for further optimization above-described embodiment, first acquisition unit 401:
3rd obtains subelement, and for obtaining the accounts information of user's input, the accounts information comprises at least account name
And password corresponding to the account name, the password in the accounts information is defined as to the password of mask to be beaten;
Or, the 4th obtain subelement, for obtain user input account name, it is pre-stored right with the account name to transfer
The password answered, the password transferred is defined as to the password of mask to be beaten.
It should be noted that the website belonging to accounts information or application are confirmed for the convenience of the user, the account letter of user's input
Also need to include website name (such as Amazon) and application name (such as U.S. group) in breath.
Wherein, when user storage accounts information in password need modification when, can according to user input account name,
Password corresponding with the account name is transferred, then amended password is carried out to make mask.
Therefore, can also include for further optimization above-described embodiment, first acquisition unit 401:
Password transfers subelement, for obtaining the account name of user's input, transfers pre-stored corresponding with the account name
Password;
5th obtains subelement, and the password for obtaining user's input changes instruction;
Subelement is changed, the pre-stored password is changed accordingly for changing instruction according to the password,
And the password using amended password as current mask to be beaten.
It is understood that the mask region of beating of password can be that multidigit contiguous mask bit is put or multidigit does not connect
Continuous mask position.
It is a kind of disclosed in the embodiment of the present invention referring to Fig. 8 when password is when beating mask region and being put for multidigit contiguous mask bit
The structural representation of second acquisition unit, second acquisition unit include:
Subelement 501 is shown, for showing mask drag area;
Wherein, according to mask drag area length and the magnitude relationship of Password Length, by the display shape of mask drag area
Four kinds of dispaly states that state is divided into, reference can be made to embodiment of the method corresponding part, is no longer traced herein.
Detection sub-unit 502, for detecting dragging position of the mask drag area on the password;
First determination subelement 503, for the password corresponding to the dragging position for the mask drag area that will confirm that
Character, it is defined as the described of user's selection and beats mask region.
It should be noted that code characters corresponding to mask region are beaten in memory for the convenience of the user, will can beat in mask
Appearance is recorded in remarks with the form of code word, for example, password is " 1989****27 ", can be recorded in remarks " birthday ".So,
When user forgets to beat code characters corresponding to mask region, " birthday " in remarks, which will may be remembered, beats mask region
Corresponding code characters are birthday date.The main purpose of remarks is auxiliary user's memory cipher.
Wherein, user can also change the default-length for beating mask region according to being actually needed.
Therefore, it is further optimization above-described embodiment, referring to Fig. 9, one kind second obtains disclosed in another embodiment of the present invention
The structural representation of unit is taken, second acquisition unit includes:
Subelement 601 is shown, for showing mask drag area;
Subelement 602 is exported, after being shown in display subelement 601 after mask drag area, the prompting of output second
Information, described second carries and states information and be used to prompt the user whether that the default-length in mask region is beaten in modification;
First obtains subelement 603, for after user determines that the default-length in mask region is beaten in modification, mask to be made in acquisition
Length after the modification in region, mask region is beaten according to after length determination modification length after modification;
In actual applications, the default-length in dozen mask region, such as 4 can be shown in current interface, when user needs
When the length in mask region is beaten in modification, it is only necessary to which default-length value 4 is revised as to required numerical value.
Detection sub-unit 604 is used to detect the dragging position for beating mask region after the modification length;
First determination subelement 605, for the password corresponding to the dragging position for the mask drag area that will confirm that
Character, it is defined as the described of user's selection and beats mask region.
When password is when to beat mask region be multidigit discontinuous mask position, the second acquisition unit in above-described embodiment
403 can also include:
Second obtains subelement, the code characters of the mask to be beaten for obtaining user's selection;
Second confirms subelement, for the position of the code characters of choosing user in the password, confirms as
The described of user's selection beats mask region.
It should be noted that when user needs to add new accounts information, the password setting device of password memorandum is also
Including:
Memorandum page establishes unit, in the newly-built memorandum page of password memorandum.
Wherein, the adding procedure of new memorandum page accounts information and to the password in new accounts information carry out beat mask
Process referring specifically to above-described embodiment, here is omitted.
When user needs to change or delete the accounts information pre-saved, the password setting device of password memorandum also wraps
Include:
Modification delete unit, website name, application name or account name for being inputted according to user transfer corresponding to account believe
Breath, and the modification inputted according to user is instructed or deleted and instructs, and the accounts information transferred is modified or deleted.
It should be noted that in device embodiment each part concrete operating principle, refer to embodiment of the method pair
Part is answered, here is omitted.
Present invention also offers a kind of terminal device, the terminal device includes password setting device described above, Figure 10
The hardware configuration of the terminal device is shown, referring to Figure 10, the terminal device can include:Processor 1, communication interface 2, storage
Device 3 and communication bus 4;
Wherein processor 1, communication interface 2, memory 3 complete mutual communication by communication bus 4;
Optionally, communication interface 2 can be the interface of communication module, such as the interface of gsm module;
Processor 1, for configuration processor;
Memory 3, for depositing program;
Program can include program code, and described program code includes computer-managed instruction.
Processor 1 is probably a central processor CPU, or specific integrated circuit ASIC (Application
Specific Integrated Circuit), or it is arranged to implement the integrated electricity of one or more of the embodiment of the present invention
Road.
Memory 3 may include high-speed RAM memory, it is also possible to also including nonvolatile memory (non-volatile
Memory), a for example, at least magnetic disk storage.
Wherein, program can be specifically used for:
The password of mask to be beaten is obtained, the password includes multiple code characters;
Export the first prompt message, first prompt message is used to prompting what user set the password to beat mask area
Domain;
Obtain user's selection beats mask region;
It is determined that positioned at the code characters beaten in mask region;
It is pointed to the code characters beaten in mask region and makes mask, obtains the password beaten after mask;
The password beaten after mask is preserved.
Finally, it is to be noted that, herein, such as first and second or the like relational terms be used merely to by
One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation
Between any this actual relation or order be present.Moreover, term " comprising ", "comprising" or its any other variant meaning
Covering including for nonexcludability, so that process, method, article or equipment including a series of elements not only include that
A little key elements, but also the other element including being not expressly set out, or also include for this process, method, article or
The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged
Except other identical element in the process including the key element, method, article or equipment being also present.
Each embodiment is described by the way of progressive in this specification, what each embodiment stressed be and other
The difference of embodiment, between each embodiment identical similar portion mutually referring to.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or using the present invention.
A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention
The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one
The most wide scope caused.
Claims (16)
- A kind of 1. cipher set-up method of password memorandum, it is characterised in that including:The password of mask to be beaten is obtained, the password includes multiple code characters;Export the first prompt message, first prompt message is used to prompting what user set the password to beat mask region;Obtain user's selection beats mask region;It is determined that positioned at the code characters beaten in mask region;It is pointed to the code characters beaten in mask region and makes mask, obtains the password beaten after mask;The password beaten after mask is preserved.
- 2. cipher set-up method according to claim 1, it is characterised in that what the acquisition user chose beats mask region Including:Show mask drag area;Detect dragging position of the mask drag area on the password;Code characters corresponding to the dragging position for the mask drag area that will confirm that, are defined as described the beating of user's selection Mask region.
- 3. cipher set-up method according to claim 2, it is characterised in that the display mask drag area includes:When the password divides multirow to show, the mask drag area branch is controlled to show, wherein, the mask drag area It is associated with the initiation region of the next line of the lastrow in the end region of lastrow.
- 4. cipher set-up method according to claim 2, it is characterised in that also wrapped after the display mask drag area Include:Export the second prompt message, described second carries and state information and be used to prompting the user whether that modification to be beaten the acquiescence in mask region and grown Degree;After user determines that the default-length in mask region is beaten in modification, length after the modification for beating mask region is obtained, according to modification Afterwards mask region is beaten after length determination modification length;Dragging position of the detection mask drag area on the password includes:Detect the dragging position for beating mask region after the modification length.
- 5. cipher set-up method according to claim 1, it is characterised in that what the acquisition user chose beats mask region Including:Obtain the code characters for the mask to be beaten that user chooses;Position of the code characters that user is chosen in the password, confirm as the described of user's selection and beat mask area Domain.
- 6. cipher set-up method according to claim 1, it is characterised in that the mask region of beating includes:Multidigit is continuous Mask position.
- 7. cipher set-up method according to claim 1, it is characterised in that the password for obtaining mask to be beaten includes:The accounts information of user's input is obtained, the accounts information comprises at least password corresponding to account name and the account name, Password in the accounts information is defined as to the password of mask to be beaten;Or, the account name of user's input is obtained, transfer pre-stored password corresponding with the account name, the password that will be transferred It is defined as the password of mask to be beaten.
- 8. cipher set-up method according to claim 1, it is characterised in that the password for obtaining mask to be beaten includes:The account name of user's input is obtained, transfers pre-stored password corresponding with the account name;Obtain the password modification instruction of user's input;According to the password instruction is changed to change the pre-stored password accordingly, and using amended password as The password of current mask to be beaten.
- 9. cipher set-up method according to claim 1, it is characterised in that the first prompt message of the output includes:When detecting the password confirming instruction of user's input, first prompt message is exported.
- A kind of 10. password setting device of password memorandum, it is characterised in that including:First acquisition unit, for obtaining the password of mask to be beaten, the password includes multiple code characters;First output unit, for exporting the first prompt message, first prompt message is used to prompt user that setting is described close Code beats mask region;Second acquisition unit, for obtain user selection beat mask region;Determining unit, for determining positioned at the code characters beaten in mask region;Masking unit is beaten, mask is made for being pointed to the code characters beaten in mask region, obtains the password beaten after mask;Storage unit, for being preserved to the password beaten after mask.
- 11. password setting device according to claim 10, it is characterised in that the second acquisition unit includes:Subelement is shown, for showing mask drag area;Detection sub-unit, for detecting dragging position of the mask drag area on the password;First determination subelement, for the code characters corresponding to the dragging position of the mask drag area that will confirm that, really It is set to the described of user's selection and beats mask region.
- 12. password setting device according to claim 11, it is characterised in that the display subelement also includes:When the password divides multirow to show, the mask drag area branch is controlled to show, wherein, the mask drag area It is associated with the initiation region of the next line of the lastrow in the end region of lastrow.
- 13. password setting device according to claim 11, it is characterised in that also include:Subelement is exported, after being shown in the display subelement after mask drag area, exports the second prompt message, institute State second and carry and state information and be used to prompt the user whether that the default-length in mask region is beaten in modification;First obtains subelement, for after user determines that the default-length in mask region is beaten in modification, mask region to be beaten in acquisition Length after modification, mask region is beaten according to after length determination modification length after modification;The detection sub-unit is additionally operable to:Detect the dragging position for beating mask region after the modification length.
- 14. password setting device according to claim 10, it is characterised in that the second acquisition unit includes:Second obtains subelement, the code characters of the mask to be beaten for obtaining user's selection;Second confirms subelement, for the position of the code characters of choosing user in the password, confirms as user The described of selection beats mask region.
- 15. password setting device according to claim 10, it is characterised in that the first acquisition unit includes:3rd obtains subelement, and for obtaining the accounts information of user's input, the accounts information comprises at least account name and institute Password corresponding to account name is stated, the password in the accounts information is defined as to the password of mask to be beaten;Or, the 4th obtain subelement, for obtain user input account name, transfer pre-stored corresponding with the account name Password, the password transferred is defined as to the password of mask to be beaten.
- 16. password setting device according to claim 10, it is characterised in that the first acquisition unit includes:Password transfers subelement, for obtaining the account name of user's input, transfers pre-stored corresponding close with the account name Code;5th obtains subelement, and the password for obtaining user's input changes instruction;Subelement is changed, the pre-stored password is changed accordingly for changing instruction according to the password, and will Password of the amended password as current mask to be beaten.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610861800.1A CN107871076A (en) | 2016-09-28 | 2016-09-28 | A kind of cipher set-up method and device of password memorandum |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610861800.1A CN107871076A (en) | 2016-09-28 | 2016-09-28 | A kind of cipher set-up method and device of password memorandum |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107871076A true CN107871076A (en) | 2018-04-03 |
Family
ID=61762040
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610861800.1A Pending CN107871076A (en) | 2016-09-28 | 2016-09-28 | A kind of cipher set-up method and device of password memorandum |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107871076A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103077361A (en) * | 2012-12-28 | 2013-05-01 | 东莞宇龙通信科技有限公司 | Mobile terminal and anti-spy method thereof |
US20130132843A1 (en) * | 2011-11-23 | 2013-05-23 | BenchFly Inc. | Methods of editing personal videograpghic media |
CN104299186A (en) * | 2014-09-30 | 2015-01-21 | 珠海市君天电子科技有限公司 | Method and device for conducting mosaic processing on picture |
CN104471522A (en) * | 2012-07-13 | 2015-03-25 | 三星电子株式会社 | User interface apparatus and method for user terminal |
CN105320906A (en) * | 2014-06-10 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Information safety protecting method and device for mobile terminal |
CN105376287A (en) * | 2014-08-29 | 2016-03-02 | 优视科技有限公司 | Identification data processing method and system, and server |
-
2016
- 2016-09-28 CN CN201610861800.1A patent/CN107871076A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130132843A1 (en) * | 2011-11-23 | 2013-05-23 | BenchFly Inc. | Methods of editing personal videograpghic media |
CN104471522A (en) * | 2012-07-13 | 2015-03-25 | 三星电子株式会社 | User interface apparatus and method for user terminal |
CN103077361A (en) * | 2012-12-28 | 2013-05-01 | 东莞宇龙通信科技有限公司 | Mobile terminal and anti-spy method thereof |
CN105320906A (en) * | 2014-06-10 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Information safety protecting method and device for mobile terminal |
CN105376287A (en) * | 2014-08-29 | 2016-03-02 | 优视科技有限公司 | Identification data processing method and system, and server |
CN104299186A (en) * | 2014-09-30 | 2015-01-21 | 珠海市君天电子科技有限公司 | Method and device for conducting mosaic processing on picture |
Non-Patent Citations (3)
Title |
---|
李永红等: "基于安卓系统的邮政储蓄移动支付方案设计", 《西安邮电大学学报》 * |
王霞: "显星添杠皆简单", 《微电脑世界》 * |
闻翔军 编辑: "Q来A去", 《电脑知识与技术》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105204823B (en) | Generate the method and device of application program installation kit | |
CN105117632B (en) | The method and terminal of a kind of terminal unlocking | |
CN107592636A (en) | A kind of method of processing information, terminal and server | |
CN107483581A (en) | The method of password authentication of shared equipment, shared equipment, cloud server and system | |
CN106406867A (en) | Android system-based screen reading method and apparatus | |
CN106502499A (en) | The method and device that a kind of application is opened | |
CN107480001A (en) | System recovery method and device | |
CN107404740A (en) | Method for switching network, device and the terminal device of safety | |
CN103218551B (en) | A kind of method protecting java program | |
CN104517049A (en) | Terminal unlocking method | |
CN107871076A (en) | A kind of cipher set-up method and device of password memorandum | |
CN108510327A (en) | Discount coupon generation method and system | |
CN107154853A (en) | A kind of signature verification method, terminal and system | |
CN109918877A (en) | A kind of data ciphering method, system, client and computer readable storage medium | |
CN108171043A (en) | A kind of computer interface communications protection and abnormality alarming method and device | |
CN105487807A (en) | Theme replacing method and system | |
CN106570359A (en) | Input method and device, and user equipment | |
CN105072486B (en) | Method and device for adding visual effect to spliced video | |
CN105392087A (en) | Loudspeaker box management method and user terminal | |
CN105809056A (en) | Communication message management method, device and related equipment | |
CN109033831A (en) | A kind of method for detecting virus, device, electronic equipment and storage medium | |
CN109271783A (en) | A kind of virus hold-up interception method, device and electronic equipment | |
CN105989516B (en) | A kind of method for information display and terminal | |
CN105975859B (en) | A kind of method and system of assistant analysis malicious code | |
CN107800776A (en) | A kind of document handling method, terminal, server and computer-readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180403 |