CN108229139A - A kind of cipher-code input method and mobile terminal - Google Patents

A kind of cipher-code input method and mobile terminal Download PDF

Info

Publication number
CN108229139A
CN108229139A CN201810067745.8A CN201810067745A CN108229139A CN 108229139 A CN108229139 A CN 108229139A CN 201810067745 A CN201810067745 A CN 201810067745A CN 108229139 A CN108229139 A CN 108229139A
Authority
CN
China
Prior art keywords
data
password
compared
target
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810067745.8A
Other languages
Chinese (zh)
Inventor
邹云浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810067745.8A priority Critical patent/CN108229139A/en
Publication of CN108229139A publication Critical patent/CN108229139A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The present invention provides a kind of cipher-code input method and mobile terminal, this method include:After code input control is shown, detect whether to receive data to be compared input by user, data to be compared include finger print data or gesture data;If receive data to be compared, it is determined that with the presence or absence of the target component with Data Matching to be compared in the mapping relations stored in advance;If it is determined that there are the target components of Data Matching to be compared in the mapping relations stored in advance, according to the corresponding input rule of target component, user is adjusted to target password based on the initial password that code input control inputs;Using target password as clear crytpographic key.Due to that can determine Password Input rule first by treating the input of correction data, true password input by user is determined according to input rule, so that being had differences between password and the password of actual decrypted that user inputs in code input control, therefore improve the safety of Password Input.

Description

A kind of cipher-code input method and mobile terminal
Technical field
The present invention relates to field of communication technology more particularly to a kind of cipher-code input methods and mobile terminal.
Background technology
In Internet era, for mobile phone user, account password is to prove the most important means of user identity.Mesh Before, the landfall process of website and application is substantially to call entering method keyboard, and the mode for then inputting account number cipher has been come Into.However, many times mobile phone user is required for completing the operation of input password in public.Due to the operation oriented manipulation Person, while also it is easy for being photographed the password of user by the high-definition camera of bystander or top, however not excluded that it is certain not useful The people of the heart can take advantage of the occasion to remember, threaten the account safety of user.At present, only a few application (such as Alipay) can be in payment Fingerprint is licensed instead of password to be operated, most situations are required for being manually entered password, and user can do most Namely cover input password with hand and prevent others from seeing, it is also unavoidable in this way that password is caused to leak.Therefore it is existing In technology, there are Password Input safety it is relatively low the problem of.
Invention content
The embodiment of the present invention provides a kind of cipher-code input method and mobile terminal, relatively low to solve the safety of Password Input The problem of.
In order to solve the above-mentioned technical problem, the invention is realized in this way:
In a first aspect, an embodiment of the present invention provides a kind of cipher-code input method, including:
After code input control is shown, detect whether to receive data to be compared input by user, the number to be compared According to including finger print data or gesture data;
If receive the data to be compared, it is determined that in the mapping relations stored in advance whether there is with it is described to be compared The target component of Data Matching, the mapping relations are parameter and the correspondence of input rule;
If it is determined that there are the target component of the Data Matching to be compared in the mapping relations stored in advance, according to the mesh The corresponding input rule of parameter is marked, user is adjusted to target password based on the initial password that the code input control inputs;
Using the target password as clear crytpographic key.
Second aspect, the embodiment of the present invention additionally provide a kind of mobile terminal, including:
Detection module, for after code input control is shown, detecting whether to receive data to be compared input by user, The data to be compared include finger print data or gesture data;
Determining module, if for receiving the data to be compared, it is determined that whether deposited in the mapping relations stored in advance In the target component with the Data Matching to be compared, the mapping relations are parameter and the correspondence of input rule;
Module is adjusted, for if it is determined that there are the target of the Data Matching to be compared ginsengs in the mapping relations stored in advance Number, according to the corresponding input rule of the target component, the initial password tune that user is inputted based on the code input control Whole is target password;
Setup module, for using the target password as clear crytpographic key.
The third aspect, the embodiment of the present invention additionally provide a kind of mobile terminal, including processor, memory and are stored in institute The computer program that can be run on memory and on the processor is stated, when the computer program is performed by the processor The step of realizing above-mentioned cipher-code input method.
Fourth aspect, the embodiment of the present invention additionally provide a kind of computer readable storage medium, are stored thereon with computer The step of program, the computer program realizes above-mentioned cipher-code input method when being executed by processor.
In the embodiment of the present invention, after code input control is shown, detect whether to receive number to be compared input by user According to the data to be compared include finger print data or gesture data;If receive the data to be compared, it is determined that storage in advance Mapping relations in advised with the presence or absence of target component with the Data Matching to be compared, the mapping relations for parameter and input Correspondence then;If it is determined that there are the target component of the Data Matching to be compared in the mapping relations stored in advance, according to The corresponding input rule of the target component, target is adjusted to by user based on the initial password that the code input control inputs Password;Using the target password as clear crytpographic key.In this way, due to that can determine password first by treating the input of correction data Input rule determines true password input by user, so that user inputted in code input control according to input rule It is had differences between password and the password of actual decrypted, therefore improves the safety of Password Input.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention Attached drawing to be used is briefly described, it should be apparent that, the accompanying drawings in the following description is only some embodiments of the present invention, For those of ordinary skill in the art, without having to pay creative labor, it can also be obtained according to these attached drawings Obtain other attached drawings.
Fig. 1 is one of flow chart of cipher-code input method provided in an embodiment of the present invention;
Fig. 2 is the two of the flow chart of cipher-code input method provided in an embodiment of the present invention;
Fig. 3 is one of schematic diagram of code input control in cipher-code input method provided in an embodiment of the present invention;
Fig. 4 is two of the schematic diagram of code input control in cipher-code input method provided in an embodiment of the present invention;
Fig. 5 is one of structure chart of mobile terminal provided in an embodiment of the present invention;
Fig. 6 is the two of the structure chart of mobile terminal provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts Example, shall fall within the protection scope of the present invention.
Referring to Fig. 1, Fig. 1 is a kind of flow chart of cipher-code input method provided in an embodiment of the present invention, as shown in Figure 1, packet Include following steps:
Step 101, it after code input control is shown, detects whether to receive data to be compared input by user, it is described Data to be compared include finger print data or gesture data.
Cipher-code input method provided in an embodiment of the present invention is mainly used in mobile terminal, input by user close for handling Code.
In the step, above-mentioned code input control can be the keyboard for inputting number and/or letter, can also be to use In code input control of input the unlocking pattern etc..Specifically, mobile terminal is when detecting that user needs that operation is decrypted, Show above-mentioned code input control.For example, in the case where detecting the scenes such as unlock or payment, above-mentioned code input control is shown, So that user carries out Password Input.
In the present embodiment, after above-mentioned code input control is shown, user can carry out data input to be compared first, To set Password Input regular.If user need not set Password Input regular, Password Input can be directly carried out, is then at this time Common password input mode.Wherein, above-mentioned data to be compared can include finger print data or gesture data, i.e. user can lead to The mode for crossing input fingerprint or gesture pre-sets Password Input rule.For example, one or more finger can be set Finger print data corresponds to same Password Input rule, while one or more kinds of gesture datas can be set to correspond to same Password Input Rule.
Step 102, if receiving the data to be compared, it is determined that whether there is and institute in the mapping relations stored in advance The target component of Data Matching to be compared is stated, the mapping relations are parameter and the correspondence of input rule.
In the step, above-mentioned target component is the data with Data Matching to be compared in parameter;Above-mentioned mapping relations are pre- First store in the terminal, for example, user can beforehand through setting interface arrange parameter and input rule correspondence, The parameter can include finger print data and/or gesture data.After above-mentioned data to be compared are received, it is determined whether there are this to treat The corresponding mapping relations of comparison data.
Step 103, however, it is determined that there are the target component of the Data Matching to be compared, roots in the mapping relations stored in advance According to the corresponding input rule of the target component, user is adjusted to mesh based on the initial password that the code input control inputs Mark password;
Step 104, using the target password as clear crytpographic key.
In the step, however, it is determined that there are the target component of the Data Matching to be compared in the mapping relations stored in advance, Then determine that there are the corresponding mapping relations of the data to be compared.At this point it is possible to the corresponding input rule of the target component is obtained, so Afterwards according to the input rule, true password input by user (i.e. above-mentioned target password) is determined.Then using the target password as Clear crytpographic key performs decryption verification operation.
It, can be by mobile terminal to the target password specifically, if current operation is operated for the unlock of mobile terminal It is compared with pre-stored unlocking pin, if comparing successfully, you can unlock.If the behaviour such as payment of the current operation for application Make, which can be sent to corresponding server by application and carry out password authentification by mobile terminal, when being verified I.e. executable corresponding operation afterwards.
In the embodiment of the present invention, after code input control is shown, detect whether to receive number to be compared input by user According to the data to be compared include finger print data or gesture data;If receive the data to be compared, it is determined that storage in advance Mapping relations in advised with the presence or absence of target component with the Data Matching to be compared, the mapping relations for parameter and input Correspondence then;If it is determined that there are the target component of the Data Matching to be compared in the mapping relations stored in advance, according to The corresponding input rule of the target component, target is adjusted to by user based on the initial password that the code input control inputs Password;Using the target password as clear crytpographic key.In this way, due to that can determine password first by treating the input of correction data Input rule determines true password input by user, so that user inputted in code input control according to input rule It is had differences between password and the password of actual decrypted, therefore improves the safety of Password Input.
It should be noted that the input mode of above-mentioned data to be compared can be configured according to actual needs, such as In the present embodiment, it is preferred that fingerprint identification module can be based on and input data to be compared.I.e. in the present embodiment, above-mentioned steps 101 include:
After code input control is shown, detect whether to receive the number to be compared that user is inputted based on fingerprint identification module According to.
In the present embodiment, above-mentioned fingerprint identification module can be arranged on mobile terminal front, can also be arranged on mobile whole The back side at end.Under normal conditions, when carrying out Password Input, the sight of other users concern is mainly code input control, by In inputting data to be compared by fingerprint identification module, the primary viewing of other users concern can be avoided, hides number to be compared According to input, so as to further improve the safety of Password Input.
Further, with reference to Fig. 2, after above-mentioned steps 102, this method further includes:
Step 105, if not receiving the data to be compared or if it is determined that being not present in the mapping relations stored in advance The target component of the Data Matching to be compared, then using user based on the initial password that the code input control inputs as solution Password.
For the normal Password Input of user in the step, user needs to input true password and can decrypt.Such as user Public place is left, is reached safety zone (for example, in going back home or situations such as returning to office), then can be directly inputted true Real password, so as to simplify the operation difficulty of Password Input.
It is a variety of to should be noted that above-mentioned input rule can include, such as can directly ignore through Password Input control The initial password of part input can also close the initial password that code input control inputs according to the corresponding conversion of data to be compared System changes etc., this is described in detail in following embodiment.
In one embodiment, above-mentioned data to be compared are finger print data.
Above-mentioned steps 103, including:
The corresponding password that prestores of the finger print data is determined as the target password;
Alternatively, according to the corresponding transformational relation of the finger print data, the initial password is converted, obtains the mesh Mark password.
In the step, in one embodiment, each fingerprint can correspond to a password, can be with when determining target password The corresponding password of the finger print data for pressing fingerprint is directly determined as target password.Due to what is uniquely determined during fingerprint, because The safety of this Password Input is higher.
In another embodiment, each fingerprint can correspond to a transformational relation, can be according to when determining target password The corresponding transformational relation of finger print data carries out initial password input by user to be converted to target password.Accordingly even when other people obtain True password can not also be directly obtained, therefore can further increase the safety of Password Input by taking the finger print data at family.
In another embodiment, above-mentioned data to be compared are gesture data.
Above-mentioned steps 103, including:
According to the corresponding transformational relation of the gesture data, the initial password is converted, it is close to obtain the target Code.
In the present embodiment, above-mentioned gesture data can be the independent slide gesture of single, or multiple combination is slided It starts gesture;Such as finger slides a kind of corresponding transformational relation to the left, finger slides to the right corresponding another transformational relation.Due to Due to using gesture corresponding conversion relationship in the present embodiment, so as to which password input mode is extended household or friend Friend uses, when the household of mobile terminal owner or friend are when using the mobile terminal, input that also can be safer Password, therefore the embodiment of the present invention can improve the application range of cryptosecurity input.
Further, the type of above-mentioned transformational relation can be defined according to actual needs, for example, in the present embodiment In, above-mentioned transformational relation includes following any relationship:
Transformational relation 1:All characters are replaced with into n-th character before putting in order positioned at it or positioned at its arrangement M-th character before sequence, wherein, N and M are positive integer;
Transformational relation 2:Alphabet size is write and is negated;
Transformational relation 3:Number is increasedd or decreased into preset value;
Transformational relation 4:Pre-set unordered alphabetical and digital correspondence;
Transformational relation 5:Alphabet size is write and is negated, and number is increasedd or decreased into preset value.
In the present embodiment, for transformational relation 1, the numerical values recited of above-mentioned N and M can be configured according to actual needs, For example, in the present embodiment, N and M are 1.If initial password input by user is " a12131 ", according to by all alphabetical numbers Word replace with the top n character of its sequence transformational relation converted after, obtained target password is " p01020 ";According to general All alphanumerics replace with the rear M character of its sequence transformational relation converted after, obtained target password is “s23242”。
Initial password for transformational relation 2, such as input is " a12131 ", then transformed target password is “A12131”。
For transformational relation 3, the size of above-mentioned preset value can be configured according to actual needs, for example, in this implementation In example, preset value 1, preset value 1, corresponding transformational relation is that number subtracts 1.If initial password input by user is " a12131 ", then transformed target password is " a01020 ".
Can be preset unordered transformation rule for above-mentioned transformational relation 4, for example, between letter can be included Exchange, exchanging between number or exchanging etc. between letter and number.For example, it can include in above-mentioned transformational relation 3 " a " is converted into " c ", " c " is converted into " a ", is converted to " 1 " " 2 ".If initial password input by user is at this time " a12131 ", then transformed target password is " c22232 ".
For transformational relation 5, which includes transformational relation 2 and 3, and the size of above-mentioned preset value can be according to reality Border needs to be configured, for example, in the present embodiment, preset value 1, corresponding transformational relation for number subtracts 1 and big small character Mother negates.If initial password input by user is " a12131 " at this time, transformed target password is " A01020 ".
In order to better understand the present invention, it is illustrated below by way of concrete implementation mode.
First can be in setting interface definition slip gesture, such as finger can be defined and slide one to the left on fingerprint module It is secondary, it represents that password input by user is moved to the left one, slides to the right primary, then it represents that slide password input by user to the right One.
As shown in Figure 3, it is assumed that the true password of user setting is " 567890 ".So user pops up keyboard in mobile terminal After (i.e. above-mentioned code input control), can to the left it be slided once first on the fingerprint identification module at mobile terminal back, this When user calculate need the password that inputs, and initial password is sequentially input on keyboard as shown in Figure 4 in the heart " 678901 ", after Password Input is completed, mobile terminal converts initial password input by user true close so as to obtain Code (i.e. above-mentioned target password) " 567890 ".So as to be effectively protected the safety of true password in public, avoid True password is stolen by others.
It should be noted that above-mentioned gesture data can be the independent slide gesture of single, or multiple combination Slip gesture, when for combination slip gesture, initial password to the displacement mode between target password can be with gesture to matching. For example, if initial password is obtained target password by gesture data to slide an independent slide gesture to the left to moving to left one; If gesture data is the combination gesture slided to the left twice, initial password is obtained into target password to moving to left two;If gesture Data are the combination gesture taken a slide He taken a slide upwards to the left, then by initial password to moving to left one and to moving up one To target password.The corresponding transformational relation of others combination gesture will not enumerate again.
It should be noted that the embodiment for the plurality of optional introduced in the embodiment of the present invention, can be combined with each other each other It realizes, can also be implemented separately, this embodiment of the present invention is not construed as limiting.
Referring to Fig. 5, Fig. 5 is the structure chart of mobile terminal provided in an embodiment of the present invention, as shown in figure 5, mobile terminal packet It includes:
Detection module 501, for after code input control is shown, detecting whether to receive number to be compared input by user According to the data to be compared include finger print data or gesture data;
Determining module 502, if for receiving the data to be compared, it is determined that in the mapping relations stored in advance whether In the presence of the target component with the Data Matching to be compared, the mapping relations are parameter and the correspondence of input rule;
Module 503 is adjusted, for if it is determined that there are the mesh of the Data Matching to be compared in the mapping relations stored in advance Parameter is marked, according to the corresponding input rule of the target component, user is inputted based on the code input control initial close Code is adjusted to target password;
Setup module 504, for using the target password as clear crytpographic key.
Optionally, the detection module 501 is specifically used for, and after code input control is shown, detects whether to receive use The data to be compared that family is inputted based on fingerprint identification module.
Optionally, the setup module 504, is additionally operable to, if not receiving the data to be compared or if it is determined that advance The target component of the Data Matching to be compared is not present in the mapping relations of storage, then user is based on the Password Input control The initial password of part input is as clear crytpographic key.
Optionally, the data to be compared are finger print data, and the adjustment module 503 is specifically used for, by the fingerprint number It is determined as the target password according to the corresponding password that prestores;
Alternatively, according to the corresponding transformational relation of the finger print data, the initial password is converted, obtains the mesh Mark password.
Optionally, the data to be compared are gesture data, and the adjustment module 503 is specifically used for, according to the gesture The corresponding transformational relation of data, converts the initial password, obtains the target password.
Optionally, the transformational relation includes following any relationship:
Transformational relation 1:All characters are replaced with into n-th character before putting in order positioned at it or positioned at its arrangement M-th character before sequence, wherein, N and M are positive integer;
Transformational relation 2:Alphabet size is write and is negated;
Transformational relation 3:Number is increasedd or decreased into preset value;
Transformational relation 4:Pre-set unordered alphabetical and digital correspondence;
Transformational relation 5:Alphabet size is write and is negated, and number is increasedd or decreased into preset value.
Mobile terminal provided in an embodiment of the present invention can realize that mobile terminal is realized in the embodiment of the method for Fig. 1 to Fig. 4 Each process, repeated to avoid, which is not described herein again.Due to that can determine that password is defeated first by treating the input of correction data Enter rule, true password input by user determined according to input rule so that user inputted in code input control it is close It is had differences, therefore improve the safety of Password Input between code and the password of actual decrypted.
A kind of hardware architecture diagram of Fig. 6 mobile terminals of each embodiment to realize the present invention.
The mobile terminal 600 includes but not limited to:It is radio frequency unit 601, network module 602, audio output unit 603, defeated Enter unit 604, sensor 605, display unit 606, user input unit 607, interface unit 608, memory 609, processor The components such as 610 and power supply 611.It will be understood by those skilled in the art that mobile terminal structure shown in Fig. 6 is not formed Restriction to mobile terminal, mobile terminal can include than illustrate more or fewer components either combine certain components or Different component arrangements.In embodiments of the present invention, mobile terminal include but not limited to mobile phone, tablet computer, laptop, Palm PC, car-mounted terminal, wearable device and pedometer etc..
Wherein, processor 610 input by user wait to compare for after code input control is shown, detecting whether to receive To data, the data to be compared include finger print data or gesture data;If receive the data to be compared, it is determined that in advance With the presence or absence of target component with the Data Matching to be compared in the mapping relations of storage, the mapping relations for parameter with it is defeated Enter the correspondence of rule;If it is determined that there are the target component of the Data Matching to be compared in the mapping relations stored in advance, According to the corresponding input rule of the target component, user is adjusted to based on the initial password that the code input control inputs Target password;Using the target password as clear crytpographic key.
Optionally, processor 610 are additionally operable to after code input control is shown, detect whether that receiving user is based on referring to The data to be compared of line identification module input.
Optionally, processor 610, if being additionally operable to not receive the data to be compared or if it is determined that storing in advance The target component of the Data Matching to be compared is not present in mapping relations, then inputs user based on the code input control Initial password as clear crytpographic key.
Optionally, the data to be compared are finger print data, and processor 610 is additionally operable to the finger print data is corresponding The password that prestores is determined as the target password;Alternatively, according to the corresponding transformational relation of the finger print data, to the initial password It is converted, obtains the target password.
Optionally, the data to be compared are gesture data, and processor 610 is additionally operable to correspond to according to the gesture data Transformational relation, the initial password is converted, obtains the target password.
Optionally, the transformational relation includes following any relationship:
Transformational relation 1:All characters are replaced with into n-th character before putting in order positioned at it or positioned at its arrangement M-th character before sequence, wherein, N and M are positive integer;
Transformational relation 2:Alphabet size is write and is negated;
Transformational relation 3:Number is increasedd or decreased into preset value;
Transformational relation 4:Pre-set unordered alphabetical and digital correspondence;
Transformational relation 5:Alphabet size is write and is negated, and number is increasedd or decreased into preset value.
In the embodiment of the present invention, after code input control is shown, detect whether to receive number to be compared input by user According to the data to be compared include finger print data or gesture data;If receive the data to be compared, it is determined that storage in advance Mapping relations in advised with the presence or absence of target component with the Data Matching to be compared, the mapping relations for parameter and input Correspondence then;If it is determined that there are the target component of the Data Matching to be compared in the mapping relations stored in advance, according to The corresponding input rule of the target component, target is adjusted to by user based on the initial password that the code input control inputs Password;Using the target password as clear crytpographic key.In this way, due to that can determine password first by treating the input of correction data Input rule determines true password input by user, so that user inputted in code input control according to input rule It is had differences between password and the password of actual decrypted, therefore improves the safety of Password Input.
It should be understood that the embodiment of the present invention in, radio frequency unit 601 can be used for receive and send messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, handled to processor 610;In addition, by uplink Data are sent to base station.In general, radio frequency unit 601 includes but not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 601 can also by radio communication system and network and other set Standby communication.
Mobile terminal has provided wireless broadband internet to the user by network module 602 and has accessed, and such as user is helped to receive It sends e-mails, browse webpage and access streaming video etc..
It is that audio output unit 603 can receive radio frequency unit 601 or network module 602 or in memory 609 The audio data of storage is converted into audio signal and exports as sound.Moreover, audio output unit 603 can also be provided and be moved The relevant audio output of specific function that dynamic terminal 600 performs is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 603 includes loud speaker, buzzer and receiver etc..
Input unit 604 is used to receive audio or video signal.Input unit 604 can include graphics processor (Graphics Processing Unit, GPU) 6041 and microphone 6042, graphics processor 6041 is in video acquisition mode Or the static images or the image data of video obtained in image capture mode by image capture apparatus (such as camera) carry out Reason.Treated, and picture frame may be displayed on display unit 606.Through graphics processor 6041, treated that picture frame can be deposited Storage is sent in memory 609 (or other storage mediums) or via radio frequency unit 601 or network module 602.Mike Wind 6042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The form output of mobile communication base station can be sent to via radio frequency unit 601 by being converted in the case of telephone calling model.
Mobile terminal 600 further includes at least one sensor 605, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 6061, and proximity sensor can close when mobile terminal 600 is moved in one's ear Display panel 6061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, size and the direction of gravity are can detect that when static, can be used to identify mobile terminal posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes Sensor 605 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared ray sensor etc. are spent, details are not described herein.
Display unit 606 is used to show by information input by user or be supplied to the information of user.Display unit 606 can wrap Display panel 6061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be used Display panel 6061 is configured in forms such as (Organic Light-Emitting Diode, OLED).
User input unit 607 can be used for receiving the number inputted or character information and generation and the use of mobile terminal The key signals input that family is set and function control is related.Specifically, user input unit 607 include touch panel 6071 and Other input equipments 6072.Touch panel 6071, also referred to as touch screen collect user on it or neighbouring touch operation (for example user uses any suitable objects such as finger, stylus or attachment on touch panel 6071 or in touch panel 6071 Neighbouring operation).Touch panel 6071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects the signal that touch operation is brought, and transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 610, receiving area It manages the order that device 610 is sent and is performed.It is furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Type realizes touch panel 6071.In addition to touch panel 6071, user input unit 607 can also include other input equipments 6072.Specifically, other input equipments 6072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, operating lever, details are not described herein.
Further, touch panel 6071 can be covered on display panel 6061, when touch panel 6071 is detected at it On or near touch operation after, send to processor 610 with determine touch event type, be followed by subsequent processing device 610 according to touch The type for touching event provides corresponding visual output on display panel 6061.Although in figure 6, touch panel 6071 and display Panel 6061 is the component independent as two to realize the function that outputs and inputs of mobile terminal, but in some embodiments In, can be integrated by touch panel 6071 and display panel 6061 and realize the function that outputs and inputs of mobile terminal, it is specific this Place does not limit.
Interface unit 608 is the interface that external device (ED) is connect with mobile terminal 600.For example, external device (ED) can include Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, audio input/output (I/O) port, video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 608 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and One or more elements that the input received is transferred in mobile terminal 600 can be used in 600 He of mobile terminal Data are transmitted between external device (ED).
Memory 609 can be used for storage software program and various data.Memory 609 can mainly include storing program area And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 609 can include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 610 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part is stored in storage by running or performing the software program being stored in memory 609 and/or module and call Data in device 609 perform the various functions of mobile terminal and processing data, so as to carry out integral monitoring to mobile terminal.Place Reason device 610 may include one or more processing units;Preferably, processor 610 can integrate application processor and modulatedemodulate is mediated Device is managed, wherein, the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 610.
Mobile terminal 600 can also include the power supply 611 (such as battery) powered to all parts, it is preferred that power supply 611 Can be logically contiguous by power-supply management system and processor 610, so as to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, mobile terminal 600 includes some unshowned function modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of mobile terminal, and including processor 610, memory 609 is stored in On memory 609 and the computer program that can be run on the processor 610, the computer program are performed by processor 610 Each process of the above-mentioned cipher-code input method embodiments of Shi Shixian, and identical technique effect can be reached, it is repeated to avoid, here It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize each process of above-mentioned cipher-code input method embodiment, and energy when being executed by processor Reach identical technique effect, repeated to avoid, which is not described herein again.Wherein, the computer readable storage medium, such as only Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic disc or CD etc..
Those of ordinary skill in the art may realize that each exemplary lists described with reference to the embodiments described herein Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is performed with hardware or software mode, specific application and design constraint depending on technical solution.Professional technician Described function can be realized using distinct methods to each specific application, but this realization is it is not considered that exceed The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit can refer to the corresponding process in preceding method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only A kind of division of logic function, can there is an other dividing mode in actual implementation, for example, multiple units or component can combine or Person is desirably integrated into another system or some features can be ignored or does not perform.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit It connects, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit The component shown may or may not be physical unit, you can be located at a place or can also be distributed to multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the embodiment of the present invention Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also That each unit is individually physically present, can also two or more units integrate in a unit.
If the function is realized in the form of SFU software functional unit and is independent product sale or in use, can be with It is stored in a computer read/write memory medium.Based on such understanding, technical scheme of the present invention is substantially in other words The part contribute to the prior art or the part of the technical solution can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be People's computer, server or network equipment etc.) perform all or part of the steps of the method according to each embodiment of the present invention. And aforementioned storage medium includes:USB flash disk, mobile hard disk, ROM, RAM, magnetic disc or CD etc. are various can to store program code Medium.
The above description is merely a specific embodiment, but protection scope of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in change or replacement, should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (13)

1. a kind of cipher-code input method, which is characterized in that including:
After code input control is shown, detect whether to receive data to be compared input by user, the data packet to be compared Include finger print data or gesture data;
If receive the data to be compared, it is determined that whether there is and the data to be compared in the mapping relations stored in advance Matched target component, the mapping relations are parameter and the correspondence of input rule;
If it is determined that there are the target components of the Data Matching to be compared in the mapping relations stored in advance, joined according to the target The corresponding input rule of number, target password is adjusted to by user based on the initial password that the code input control inputs;
Using the target password as clear crytpographic key.
2. according to the method described in claim 1, it is characterized in that, described after code input control is shown, detect whether to connect Data to be compared input by user are received, including:
After code input control is shown, detect whether to receive the data to be compared that user is inputted based on fingerprint identification module.
3. according to the method described in claim 1, it is characterized in that, described after code input control is shown, detect whether to connect After the step of receiving data to be compared input by user, the method further includes:
If the data to be compared are not received or if it is determined that the number to be compared are not present in the mapping relations stored in advance According to matched target component, then the initial password inputted user based on the code input control is as clear crytpographic key.
4. according to the method described in claim 1, it is characterized in that, the data to be compared be finger print data, it is described according to institute The corresponding input rule of data to be compared is stated, user is adjusted to target based on the initial password that the code input control inputs Password, including:
The corresponding password that prestores of the finger print data is determined as the target password;
Alternatively, according to the corresponding transformational relation of the finger print data, the initial password is converted, it is close to obtain the target Code.
5. according to the method described in claim 1, it is characterized in that, the data to be compared be gesture data, it is described according to institute The corresponding input rule of data to be compared is stated, user is adjusted to target based on the initial password that the code input control inputs Password, including:
According to the corresponding transformational relation of the gesture data, the initial password is converted, obtains the target password.
6. method according to claim 4 or 5, which is characterized in that the transformational relation includes following any relationship:
Transformational relation 1:All characters are replaced with into n-th character before putting in order positioned at it or are put in order positioned at it M-th character before, wherein, N and M are positive integer;
Transformational relation 2:Alphabet size is write and is negated;
Transformational relation 3:Number is increasedd or decreased into preset value;
Transformational relation 4:Pre-set unordered alphabetical and digital correspondence;
Transformational relation 5:Alphabet size is write and is negated, and number is increasedd or decreased into preset value.
7. a kind of mobile terminal, which is characterized in that including:
Detection module, it is described for after code input control is shown, detecting whether to receive data to be compared input by user Data to be compared include finger print data or gesture data;
Determining module, if for receiving the data to be compared, it is determined that in the mapping relations stored in advance whether there is with The target component of the Data Matching to be compared, the mapping relations are parameter and the correspondence of input rule;
Module is adjusted, for if it is determined that there are the target component of the Data Matching to be compared in the mapping relations stored in advance, According to the corresponding input rule of the target component, user is adjusted to based on the initial password that the code input control inputs Target password;
Setup module, for using the target password as clear crytpographic key.
8. mobile terminal according to claim 7, which is characterized in that the detection module is specifically used for, in display password After input control, detect whether to receive the data to be compared that user is inputted based on fingerprint identification module.
9. mobile terminal according to claim 7, which is characterized in that the setup module is additionally operable to, if not receiving institute It states data to be compared or if it is determined that there is no the target of the Data Matching to be compared ginsengs in the mapping relations stored in advance Number, then the initial password inputted user based on the code input control is as clear crytpographic key.
10. mobile terminal according to claim 7, which is characterized in that the data to be compared be finger print data, the tune Mould preparation block is specifically used for, and the corresponding password that prestores of the finger print data is determined as the target password;
Alternatively, according to the corresponding transformational relation of the finger print data, the initial password is converted, it is close to obtain the target Code.
11. mobile terminal according to claim 7, which is characterized in that the data to be compared be gesture data, the tune Mould preparation block is specifically used for, and according to the corresponding transformational relation of the gesture data, the initial password is converted, and obtains described Target password.
12. the mobile terminal according to claim 10 or 11, which is characterized in that the transformational relation includes following any Relationship:
Transformational relation 1:All characters are replaced with into n-th character before putting in order positioned at it or are put in order positioned at it M-th character before, wherein, N and M are positive integer;
Transformational relation 2:Alphabet size is write and is negated;
Transformational relation 3:Number is increasedd or decreased into preset value;
Transformational relation 4:Pre-set unordered alphabetical and digital correspondence;
Transformational relation 5:Alphabet size is write and is negated, and number is increasedd or decreased into preset value.
13. a kind of mobile terminal, which is characterized in that including processor, memory and be stored on the memory and can be in institute The computer program run on processor is stated, such as claim 1 to 6 is realized when the computer program is performed by the processor Any one of described in cipher-code input method the step of.
CN201810067745.8A 2018-01-24 2018-01-24 A kind of cipher-code input method and mobile terminal Pending CN108229139A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810067745.8A CN108229139A (en) 2018-01-24 2018-01-24 A kind of cipher-code input method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810067745.8A CN108229139A (en) 2018-01-24 2018-01-24 A kind of cipher-code input method and mobile terminal

Publications (1)

Publication Number Publication Date
CN108229139A true CN108229139A (en) 2018-06-29

Family

ID=62668723

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810067745.8A Pending CN108229139A (en) 2018-01-24 2018-01-24 A kind of cipher-code input method and mobile terminal

Country Status (1)

Country Link
CN (1) CN108229139A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109740361A (en) * 2018-12-29 2019-05-10 深圳Tcl新技术有限公司 Data processing method, device and computer readable storage medium
CN110084009A (en) * 2019-04-22 2019-08-02 惠州Tcl移动通信有限公司 Digital unlocking method, device, storage medium and mobile terminal
CN112231716A (en) * 2019-07-15 2021-01-15 珠海艾派克微电子有限公司 Data anti-theft device and anti-theft method
CN116627272A (en) * 2023-07-21 2023-08-22 深圳市则成电子股份有限公司 Touch control method and device and computer equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069332A (en) * 2015-08-17 2015-11-18 广东欧珀移动通信有限公司 Fingerprint-based password authentication method and password authentication apparatus
CN105138887A (en) * 2015-08-27 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Input method and device of login information and terminal equipment
CN105335633A (en) * 2015-10-08 2016-02-17 广东欧珀移动通信有限公司 Mobile terminal anti-peeping method and mobile terminal
CN106485132A (en) * 2016-09-30 2017-03-08 上海林果实业股份有限公司 A kind of Password Input detection method and terminal
CN106611110A (en) * 2015-10-26 2017-05-03 腾讯科技(深圳)有限公司 Identity verification method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069332A (en) * 2015-08-17 2015-11-18 广东欧珀移动通信有限公司 Fingerprint-based password authentication method and password authentication apparatus
CN105138887A (en) * 2015-08-27 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Input method and device of login information and terminal equipment
CN105335633A (en) * 2015-10-08 2016-02-17 广东欧珀移动通信有限公司 Mobile terminal anti-peeping method and mobile terminal
CN106611110A (en) * 2015-10-26 2017-05-03 腾讯科技(深圳)有限公司 Identity verification method and system
CN106485132A (en) * 2016-09-30 2017-03-08 上海林果实业股份有限公司 A kind of Password Input detection method and terminal

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109740361A (en) * 2018-12-29 2019-05-10 深圳Tcl新技术有限公司 Data processing method, device and computer readable storage medium
CN109740361B (en) * 2018-12-29 2021-08-06 深圳Tcl新技术有限公司 Data processing method, device and computer readable storage medium
CN110084009A (en) * 2019-04-22 2019-08-02 惠州Tcl移动通信有限公司 Digital unlocking method, device, storage medium and mobile terminal
CN112231716A (en) * 2019-07-15 2021-01-15 珠海艾派克微电子有限公司 Data anti-theft device and anti-theft method
CN116627272A (en) * 2023-07-21 2023-08-22 深圳市则成电子股份有限公司 Touch control method and device and computer equipment
CN116627272B (en) * 2023-07-21 2024-01-26 深圳市则成电子股份有限公司 Touch control method and device and computer equipment

Similar Documents

Publication Publication Date Title
CN105975833B (en) A kind of unlocked by fingerprint method and terminal
CN108200289A (en) A kind of unread message processing method and mobile terminal
CN107437009A (en) Authority control method and related product
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN108229139A (en) A kind of cipher-code input method and mobile terminal
CN109257336A (en) It is a kind of based on the encrypted message processing method of block chain, terminal device
CN107784089A (en) A kind of storage method of multi-medium data, processing method and mobile terminal
CN109145552A (en) Information ciphering method and terminal device
CN108551521A (en) A kind of log-on message reminding method and mobile terminal
CN108985034A (en) A kind of unlocking method and terminal device
CN108710806A (en) A kind of terminal unlock method, mobile terminal
CN108376096A (en) A kind of message display method and mobile terminal
CN108287745A (en) A kind of display methods and terminal device at the interfaces WebApp
CN108933670A (en) A kind of digital signature method, device, mobile device and storage medium
CN109800606A (en) A kind of display control method and mobile terminal
CN109145644A (en) Private key obscures and digital signature generation method, device, smart machine
CN108874281A (en) A kind of application program launching method and terminal device
CN108109188A (en) A kind of image processing method and mobile terminal
CN107835297A (en) Information updating method and mobile terminal
CN109446794B (en) Password input method and mobile terminal thereof
CN108563983A (en) A kind of fingerprint identification method, terminal device based on touch screen
CN109062492A (en) A kind of application access method and terminal
CN108171036A (en) The control method and mobile terminal of a kind of application program
CN108520456A (en) A kind of decoration element procurement practice and decoration element procurement platform
CN107895108A (en) A kind of operation management method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180629

RJ01 Rejection of invention patent application after publication