CN108256301A - A kind of unlocking method and tripper - Google Patents

A kind of unlocking method and tripper Download PDF

Info

Publication number
CN108256301A
CN108256301A CN201810012152.1A CN201810012152A CN108256301A CN 108256301 A CN108256301 A CN 108256301A CN 201810012152 A CN201810012152 A CN 201810012152A CN 108256301 A CN108256301 A CN 108256301A
Authority
CN
China
Prior art keywords
location information
matrix
unlocking pin
encrypted characters
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810012152.1A
Other languages
Chinese (zh)
Inventor
王甲强
王亚峰
郭亚军
唐建业
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BOE Technology Group Co Ltd
Beijing BOE Optoelectronics Technology Co Ltd
Original Assignee
BOE Technology Group Co Ltd
Beijing BOE Optoelectronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BOE Technology Group Co Ltd, Beijing BOE Optoelectronics Technology Co Ltd filed Critical BOE Technology Group Co Ltd
Priority to CN201810012152.1A priority Critical patent/CN108256301A/en
Publication of CN108256301A publication Critical patent/CN108256301A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Abstract

The present invention provides a kind of unlocking method and a device, including:Show unlock interface;Receive the location information of unlocking pin that the first user inputted by the unlock interface and the unlocking pin;The location information of the unlocking pin and presetting cipher and the unlocking pin is matched respectively with the preset position information of the presetting cipher;Corresponding operation is performed according to matching result, it is single so as to solve existing mobile equipment screen locking cipher mode, the problem of so as to which user data information be caused to reveal.

Description

A kind of unlocking method and tripper
Technical field
The present invention relates to technical field of mobile terminals, more particularly to a kind of unlocking method and tripper.
Background technology
As social informatization degree is higher and higher and the continuous development of the communication technology, mobile terminal have become people Indispensable product in life.The characteristics of mobile terminal is maximum is exactly the privacy for having height, and each mobile terminal can The personal information of a large amount of user can be stored with, such as:The address list of important business parnter, private short message, message registration, photograph Piece etc., therefore, user have these important informations the demand of secrecy, in order to cater to the privacy requirements of user, existing shifting The screen locking cipher mode of dynamic terminal generally use is digital or matrix line or pictorial etc., and cipher mode is single And it is fixed, it is easily found rule and is cracked, so as to cause the leakage of user data information to being stored in mobile equipment.
Invention content
The present invention provides a kind of unlocking method and tripper, to solve existing mobile equipment screen locking cipher mode list One, the problem of so as to which user data information be caused to reveal.
To solve the above-mentioned problems, the invention discloses a kind of unlocking method, including:Show unlock interface;
Receive the location information of unlocking pin that the first user inputted by the unlock interface and the unlocking pin;
By the pre- of the location information of the unlocking pin and presetting cipher and the unlocking pin and the presetting cipher Seated position information is matched respectively;
Corresponding operation is performed according to matching result.
Optionally, the unlock interface includes at least two decryption characters to be selected and at least two decrypted positions areas to be selected, The location information for receiving unlocking pin that the first user inputted by the unlock interface and the unlocking pin, including:
Receive the decryption character that first user selectes in the decryption character to be selected;
According to the decrypted positions area to be selected that the decryption character is dragged in by first user, the decryption character pair is determined The location information answered;
According to the decryption character and the corresponding location information of the decryption character, the described first solution input by user is determined The location information of lock cipher and the unlocking pin.
Optionally, in the location information and institute by the unlocking pin and presetting cipher and the unlocking pin State presetting cipher preset position information matched respectively before, further include:
Show password setting interface;It is treated including at least two encrypted characters to be selected and at least two at the password setting interface Select encrypted location area;
Receive the encrypted characters that second user is selected in the encrypted characters to be selected;
According to the encrypted location area to be selected that the encrypted characters are dragged in by the second user, the encrypted characters pair are determined The location information answered;
By the encrypted characters and the corresponding location information of the encrypted characters, it is stored as the presetting cipher and described pre- Put the location information of password.
Optionally, it is described by the encrypted characters and the corresponding location information of the encrypted characters, it is stored as described preset The location information of password and the presetting cipher, including:
By the first matrix formed by described at least two encrypted characters to be selected and by described at least two encrypted bits to be selected Put the second matrix multiple generation Crypted password matrix of area's formation;
By the product of encrypted characters location information corresponding with the encrypted characters in the Crypted password matrix Position, be recorded as the location information of the presetting cipher and the presetting cipher.
Optionally, it is described by the location information of the unlocking pin and presetting cipher and the unlocking pin with it is described The preset position information of presetting cipher is matched respectively, including:
By the third matrix formed by described at least two decryption characters to be selected and by described at least two solution dense bits to be selected The 4th matrix multiple of area's formation is put, generates clear crytpographic key matrix;Wherein, the third matrix is identical with first matrix, 4th matrix is identical with second matrix;
By the product of the close character of decryption location information corresponding with the close character of decryption in the clear crytpographic key square Position in battle array, the product of location information corresponding with the encrypted characters with the encrypted characters is in the Crypted password matrix In position be compared, position consistency then successful match, then it fails to match for position difference.
To solve the above-mentioned problems, the invention also discloses a kind of tripper, including:
Display module, for showing unlock interface;
First receiving module, for receiving unlocking pin and the unlock that the first user is inputted by the unlock interface The location information of password;
Matching module, for by the location information of the unlocking pin and presetting cipher and the unlocking pin and institute The preset position information for stating presetting cipher is matched respectively;
Execution module, for performing corresponding operation according to matching result.
Optionally, the unlock interface includes at least two decryption characters to be selected and at least two decrypted positions areas to be selected, First receiving module, including:
First chosen module, for receiving the decryption character that first user selectes in the decryption character to be selected;
First position information module, for the decrypted positions to be selected for being dragged in the decryption character according to first user Area determines the corresponding location information of the decryption character;
Determining module, for according to the decryption character and the corresponding location information of the decryption character, determining described the The location information of one unlocking pin input by user and the unlocking pin.
Optionally, before the matching module, described device further includes:
Setup module, for showing that password sets interface;The password setting interface includes at least two encrypted words to be selected Symbol and at least two encrypted location areas to be selected;
Second receiving module, for receiving the encrypted characters that second user is selected in the encrypted characters to be selected;
Second position information module, for the encrypted location to be selected for being dragged in the encrypted characters according to the second user Area determines the corresponding location information of the encrypted characters;
Memory module, for by the encrypted characters and the corresponding location information of the encrypted characters, being stored as described pre- Put the location information of password and the presetting cipher.
Optionally, the memory module, including:
Generation module, for the first matrix that will be formed by described at least two encrypted characters to be selected and by described at least two The second matrix multiple generation Crypted password matrix that a encrypted location area to be selected is formed;
Logging modle, for the product of encrypted characters location information corresponding with the encrypted characters to be added described Position in close scrambling matrix is recorded as the location information of the presetting cipher and the presetting cipher.
Optionally, the matching module includes:
Deciphering module, for the third matrix that will be formed by described at least two decryption characters to be selected and by described at least two The 4th matrix multiple that a decrypted positions area to be selected is formed, generates clear crytpographic key matrix;Wherein, the third matrix and described the One matrix is identical, and the 4th matrix is identical with second matrix;
Comparing module, for by the close character of the decryption with the product for decrypting the corresponding location information of close character in institute The position in clear crytpographic key matrix is stated, the product of location information corresponding with the encrypted characters with the encrypted characters is described Position in Crypted password matrix is compared, and position consistency then successful match, then it fails to match for position difference.
Compared with prior art, the present invention includes advantages below:
The present invention receives the position of the unlocking pin that the first user inputted by the unlock interface and the unlocking pin Information carries out the location information of unlocking pin and prestore password and the unlocking pin and preset position information respectively Match, and corresponding operation is performed according to matching result.The present invention passes through unlocking pin location information point corresponding with unlocking pin Not with prestoring password and preset position information is matched respectively, the complexity of unlocking pin is increased so that non-user sheet People or other staff's decoding difficulty are very big, improve the safety of password, while are conducive to carry out user data information Safeguard protection.
Certainly, it implements any of the products of the present invention and is not necessarily required to reach all the above advantage simultaneously.
Description of the drawings
Fig. 1 is a kind of flow chart of unlocking method described in the embodiment of the present invention one;
Fig. 2 is a kind of schematic diagram of unlock interface of the present invention;
Fig. 3 is the schematic diagram of another unlock interface of the present invention;
Fig. 4 is a kind of flow chart of unlocking method described in the embodiment of the present invention two;
Fig. 5 is a kind of flow chart of encryption method described in the embodiment of the present invention three;
Fig. 6 is a kind of structure diagram of tripper described in the embodiment of the present invention four.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, it is below in conjunction with the accompanying drawings and specific real Applying mode, the present invention is described in further detail.
Embodiment one
With reference to Fig. 1, it illustrates the flow charts of unlocking method a kind of described in the embodiment of the present invention one, specifically include:
Step 101:Show unlock interface.
Step 102:Receive the position of unlocking pin that the first user inputted by the unlock interface and the unlocking pin Confidence ceases.
Wherein, the unlock interface includes:At least two decryption characters to be selected and at least two decrypted positions areas to be selected, In practical applications, it is to be selected decryption character may be it is multiple, decrypted positions area may be it is multiple, can setting according to user The custom for putting password chooses at random, this present invention is not particularly limited.
A kind of schematic diagram of unlock interface of the embodiment of the present invention is shown in Fig. 2, is specifically included:The information of unlock interface is shown Show area 201, the encrypted message input viewing area 202 of unlock interface, encrypted message position area 203 and input password area 204, In, the location information in encrypted message position area is two, and decryption character is 6.
Show unlock interface, the first user is the first of the selected decryption character of the input password area selection of unlock interface First decryption by first any one position being dragged in the area of encrypted message position of the selected decryption character, is completed in position The input of character.Then the second of decryption character that the first user selectes in the input password area selection of unlock interface, by this The second of selected decryption character is dragged in any one position in the area of encrypted message position, completes the defeated of second decryption character Enter, then carry out the input of third position-the six, the input of 6 passwords of completion and the input of location information successively, that is, determine The location information of first unlocking pin input by user and the unlocking pin, then by the unlocking pin and presetting cipher, And the location information of the unlocking pin is matched respectively with the preset position information of the presetting cipher, if matching into Work(is then completed to unlock.
It should be noted that this example is to be two by number and location information of the password of input as case and carry out Illustrate, in practical applications can be with input Pinyin or letter etc., location information may be multiple, be referred to input Password is inputted for the mode of number.
Fig. 3 shows the schematic diagram of another unlock interface of the embodiment of the present invention, specifically includes:The information of unlock interface Viewing area 301, encrypted message input viewing area 302, encrypted message position area 303 and the input password area 304 of unlock interface, In, the location information in encrypted message position area is matrix arrangement (2*2 matrixes), and decryption character is 6.
Show unlock interface, the first user is the first of the selected decryption character of the input password area selection of unlock interface First decryption by first any one position being dragged in the area of encrypted message position of the selected decryption character, is completed in position The input of character.Then the first user selects the selected second for decrypting character in the input password area in unlock interface, will The second of the selected decryption character is dragged in any one position in the area of encrypted message position, completes second decryption character Then input carries out the input of third position-the six, the input of 6 passwords of completion and the input of location information, that is, determines successively The location information of first unlocking pin input by user and the unlocking pin, then by the unlocking pin with it is preset close The location information of code and the unlocking pin is matched respectively with the preset position information of the presetting cipher, if matching Success, then complete to unlock.
It should be noted that this example is said so that the password of input is number and location information is matrix arrangement as an example It is bright, in practical applications can be with input Pinyin or letter etc., location information area may be 3*3 matrixes or more matrix Formula, the mode for being referred to input password as number are inputted.
Step 103:By the location information of the unlocking pin and presetting cipher and the unlocking pin with it is described preset The preset position information of password is matched respectively.
In actual application, can be after the completion of the unlocking pin and unlocked position information of password fully enter, Matched respectively with the location information of presetting cipher and presetting cipher or inputting a unlocking pin It after unlocked position information, is matched respectively with the location information of presetting cipher and presetting cipher, to this present invention not Do concrete restriction.
Step 104:Corresponding operation is performed according to matching result.
If matching result success, is unlocked operation, if matching result fails, failure is unlocked.
The present embodiment, the present invention receives the unlocking pin that the first user inputted by the unlock interface and the unlock is close The location information of code, by unlocking pin and prestore password and the location information of the unlocking pin and preset position information point It is not matched, and corresponding operation is performed according to matching result.The present invention passes through unlocking pin position corresponding with unlocking pin Confidence breath with prestoring password and preset position information is matched respectively, increases the complexity of unlocking pin respectively so that Non-user or other staff's decoding difficulty are very big, improve the safety of password, while be conducive to user data Information carries out safeguard protection.
Embodiment two
With reference to Fig. 4, it illustrates the flow charts of unlocking method a kind of described in the embodiment of the present invention two, specifically include:
Step 401:Show unlock interface.
Step 402:Receive the position of unlocking pin that the first user inputted by the unlock interface and the unlocking pin Confidence ceases.
Wherein, the unlock interface includes:At least two decryption characters to be selected and at least two decrypted positions areas to be selected, In practical applications, it is to be selected decryption character may be it is multiple, decrypted positions area may be it is multiple, can setting according to user The custom for putting password chooses at random, this present invention is not particularly limited.
As a kind of realization method:Step 402 includes:
Step 4021:Receive the decryption character that first user selectes in the decryption character to be selected.
Decryption character can include letter, number, phonetic etc. or letter, digital, phonetic combination etc..
Step 4022:According to the decrypted positions area to be selected that the decryption character is dragged in by first user, determine described Decrypt the corresponding location information of character.
The decryption character that first user selectes is dragged in decrypted positions area to be selected, determines the corresponding position of the decryption character Information.
First user can be according to the demand or custom of oneself, and with being intended to, decrypted positions area selection decryption character is corresponding Location information.
Step 4023:According to the decryption character and the corresponding location information of the decryption character, determine that described first uses The unlocking pin of family input and the location information of the unlocking pin.
First user sequentially inputs decryption character and the corresponding location information of the decryption character, until completing all decryption The input of character and location information, and then determine the position letter of first unlocking pin input by user and the unlocking pin Breath.
Step 403:By the location information of the unlocking pin and presetting cipher and the unlocking pin with it is described preset The preset position information of password is matched respectively.
In actual application, can be after the completion of the unlocking pin and unlocked position information of password fully enter, Matched respectively with the location information of presetting cipher and presetting cipher or inputting a unlocking pin It after unlocked position information, is matched respectively with the location information of presetting cipher and presetting cipher, to this present invention not Do concrete restriction.
It is being unlocked the pre- of password and the location information of presetting cipher and the unlocking pin and the presetting cipher When seated position information is matched respectively, decryption character and encrypted characters can be first compared, if it is identical, then compare each decryption character Location information and encrypted characters location information, if it is different, directly determine it fails to match, if identical, it is determined that successful match.
It is being unlocked the pre- of password and the location information of presetting cipher and the unlocking pin and the presetting cipher When seated position information is matched respectively, the location information of decryption character and the location information of encrypted characters can also be first compared, If identical, decryption character and encrypted characters are being compared, if it is different, directly determine that it fails to match, if it is identical, then compare next group and add Close character and position, if it is different, then it fails to match, if identical, it is determined that successful match, until whole unlocking pins have been compared Into.
As one of which realization method, unlocking pin and presetting cipher are described by the solution using the form of matrix The preset position information of the location information of lock cipher and presetting cipher and the unlocking pin and the presetting cipher respectively into Row matching, including:
By the third matrix formed by described at least two decryption characters to be selected and by described at least two solution dense bits to be selected The 4th matrix multiple of area's formation is put, generates clear crytpographic key matrix;Wherein, the third matrix is identical with the first matrix, and the 4th Matrix is identical with the second matrix.
By the product of the close character of decryption location information corresponding with the close character of decryption in the clear crytpographic key square Position in battle array, the product of location information corresponding with the encrypted characters with the encrypted characters is in the Crypted password matrix In position be compared, position consistency, then successful match, then it fails to match for position difference.
As wherein another realization method, unlocking pin and presetting cipher can also use other forms, i.e. non-matrix Mode, such as:Area is put to each decryption character reconciliation dense bit to be numbered or identify, and number or mark are stored in memory In, such as:4 (decryption character) -112 (Location Area Identification), it is described by the unlocking pin and presetting cipher and the solution The location information of lock cipher is matched respectively with the preset position information of the presetting cipher, including:
Decryption character and encrypted characters can be first compared, if it is identical, then the Location Area Identification of each decryption character is compared with adding The Location Area Identification of close character, if it is different, directly determining that it fails to match, if identical, it is determined that successful match.It can also first compare The location information of character and the location information of encrypted characters are decrypted, if identical, decryption character and encrypted characters are being compared, if not Together, directly determine that it fails to match, if it is identical, then next group of decryption character and position are compared, if it is different, then it fails to match, if phase Together, it is determined that successful match is completed until whole unlocking pins are compared.
Step 404:Corresponding operation is performed according to matching result.
If matching result success, is unlocked operation, if matching result fails, failure is unlocked.
The present embodiment, the present invention receives the unlocking pin that the first user inputted by the unlock interface and the unlock is close The location information of code, by unlocking pin and prestore password and the location information of the unlocking pin and preset position information point It is not matched, and corresponding operation is performed according to matching result.The present invention passes through unlocking pin position corresponding with unlocking pin Confidence breath with prestoring password and preset position information is matched respectively, increases the complexity of unlocking pin respectively so that Non-user or other staff's decoding difficulty are very big, improve the safety of password, while be conducive to user data Information carries out safeguard protection.
Embodiment three
In another embodiment of the invention, can be specifically first before above-mentioned step 103 or step 403 is performed Before user's decryption, second user can carry out password setting according to method as shown in Figure 5.Certainly, should " first user ", It can be same people that " second user ", which is intended merely to distinguish password setting user and decrypted user, two users,.This method has Body can include:
Step 501:Show password setting interface.
Wherein, the password setting interface includes at least two encrypted characters to be selected and at least two encrypted locations to be selected Area.
Encrypted characters can include letter, number, phonetic etc. or letter, digital, phonetic combination etc., i.e. user Can content included in self-defined password according to demand, this is not limited.
Step 502:Receive the encrypted characters that second user is selected in the encrypted characters to be selected.
Step 503:According to the encrypted location area to be selected that the encrypted characters are dragged in by the second user, described add is determined The corresponding location information of close character.
Encrypted characters can be dragged in encrypted location area to be selected according to second user to the drag gesture of encrypted characters, Determine the corresponding location information of encrypted characters.
Step 504:By the encrypted characters and the corresponding location information of the encrypted characters, it is stored as the presetting cipher And the location information of the presetting cipher.
It is described by the encrypted characters and the encrypted word when encrypted characters and encrypted location area use the form of matrix Corresponding location information is accorded with, is stored as the location information of the presetting cipher and the presetting cipher, including:
By the first matrix formed by described at least two encrypted characters to be selected and by described at least two encrypted bits to be selected Put the second matrix multiple generation Crypted password matrix of area's formation.
By the product of encrypted characters location information corresponding with the encrypted characters in the Crypted password matrix Position, be recorded as the location information of the presetting cipher and the presetting cipher.
Such as:Encrypted characters formed the first matrix be:
Second matrix is:[the 4th, position password of the 1st, position password the 3rd, position password of the 2nd, position password].
The Crypted password matrix of generation is:
Wherein, digital 1 row 2 of * positions arranges, 2 row 3 of number * positions arranges, 3 row 4 of number * positions arranges, 4 row 4 of number * positions arranges, The location information that digital 5 row 3 of * positions arranges, 6 row 3 of number * positions row are the presetting cipher and the presetting cipher.Rear During continuous unlock, unlocking pin and the corresponding location information of unlocking pin are arranged respectively with digital 1 row 2 of * positions, 2 row of number * positions 3 row, 3 row 4 of number * positions arranges, 4 row 4 of number * positions arranges, 5 row 3 of number * positions arranges, 6 row 3 of number * positions row corresponding position into Row compares, if identical, unlocks.
It should be noted that the form of matrix may be used in the encrypted characters and encrypted location area, can also use other Mode, such as:Each encrypted characters and encrypted location area are numbered or identified, number or mark are stored in memory In, such as:3 (encrypted characters) -111 (Location Area Identification).
When encrypted characters and encrypted location area are using other forms, i.e. non-matrix form is described by the encrypted word Symbol and the corresponding location information of the encrypted characters are stored as the location information of the presetting cipher and the presetting cipher, packet It includes:
Encrypted characters are numbered, and corresponding encrypted location area is identified, and establish encrypted word to encrypted characters The mapping relations of the number of symbol and encrypted location area mark, using mapping relations storage in memory as presetting cipher and The location information of the presetting cipher.
The present embodiment, the encrypted characters selected in the encrypted characters to be selected by receiving second user, according to described The encrypted location area to be selected that the encrypted characters are dragged in by second user, determines the corresponding location information of the encrypted characters;It will The encrypted characters and the corresponding location information of the encrypted characters are stored as the position of the presetting cipher and the presetting cipher Confidence ceases.The present invention is overlapped by encrypted characters location information corresponding with encrypted location, increases answering for password setting Miscellaneous degree so that it is very big that non-user or other staff decode difficulty, improves the safety of password, while is conducive to pair User data information carries out safeguard protection.
It should be noted that for aforementioned embodiment of the method, in order to be briefly described, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement, because according to According to the present invention, certain steps may be used other sequences or be carried out at the same time.Secondly, those skilled in the art should also know, Embodiment described in this description belongs to preferred embodiment, and involved action is not necessarily essential to the invention.
Based on the explanation of above method embodiment, the present invention also provides corresponding device embodiment, to realize above-mentioned side Content described in method embodiment.
Example IV
With reference to Fig. 6, it illustrates the structure charts of tripper a kind of described in the embodiment of the present invention four, specifically include:
Display module 601, for showing unlock interface.
First receiving module 602, for receiving unlocking pin that the first user inputted by the unlock interface and described The location information of unlocking pin.
Matching module 603, for by the location information of the unlocking pin and presetting cipher and the unlocking pin with The preset position information of the presetting cipher is matched respectively.
Execution module 604, for performing corresponding operation according to matching result.
Optionally, the unlock interface includes at least two decryption characters to be selected and at least two decrypted positions areas to be selected, First receiving module, including:
First chosen module, for receiving the decryption character that first user selectes in the decryption character to be selected;
First position information module, for the decrypted positions to be selected for being dragged in the decryption character according to first user Area determines the corresponding location information of the decryption character;
Determining module, for according to the decryption character and the corresponding location information of the decryption character, determining described the The location information of one unlocking pin input by user and the unlocking pin.
Optionally, before the matching module, described device further includes:
Setup module, for showing that password sets interface;The password setting interface includes at least two encrypted words to be selected Symbol and at least two encrypted location areas to be selected.
Second receiving module, for receiving the encrypted characters that second user is selected in the encrypted characters to be selected.
Second position information module, for the encrypted location to be selected for being dragged in the encrypted characters according to the second user Area determines the corresponding location information of the encrypted characters.
Memory module, for by the encrypted characters and the corresponding location information of the encrypted characters, being stored as described pre- Put the location information of password and the presetting cipher.
Optionally, the memory module, including:
Generation module, for the first matrix that will be formed by described at least two encrypted characters to be selected and by described at least two The second matrix multiple generation Crypted password matrix that a encrypted location area to be selected is formed.
Logging modle, for the product of encrypted characters location information corresponding with the encrypted characters to be added described Position in close scrambling matrix is recorded as the location information of the presetting cipher and the presetting cipher.
Optionally, the matching module includes:
Deciphering module, for the third matrix that will be formed by described at least two decryption characters to be selected and by described at least two The 4th matrix multiple that a decrypted positions area to be selected is formed, generates clear crytpographic key matrix;Wherein, the third matrix and described the One matrix is identical, and the 4th matrix is identical with second matrix.
Comparing module, for by the close character of the decryption with the product for decrypting the corresponding location information of close character in institute The position in clear crytpographic key matrix is stated, the product of location information corresponding with the encrypted characters with the encrypted characters is described Position in Crypted password matrix is compared, and position consistency then successful match, then it fails to match for position difference.
The present embodiment, by receiving unlocking pin and the unlocking pin that the first user is inputted by the unlock interface Location information, the location information of unlocking pin and prestore password and the unlocking pin and preset position information are distinguished It is matched, and corresponding operation is performed according to matching result.The present invention passes through unlocking pin position corresponding with unlocking pin Information with prestoring password and preset position information is matched respectively, increases the complexity of unlocking pin so that non-respectively It is very big that user or other staff decode difficulty, improves the safety of password, at the same be conducive to number of users it is believed that Breath carries out safeguard protection.
For above device embodiment, since it is basicly similar to embodiment of the method, so description is fairly simple, The relevent part can refer to the partial explaination of embodiments of method.
Each embodiment in this specification is described by the way of progressive, the highlights of each of the examples are with The difference of other embodiment, just to refer each other for identical similar part between each embodiment.
It would have readily occurred to a person skilled in the art that be:The arbitrary combination application of above-mentioned each embodiment is all feasible, therefore Arbitrary combination between above-mentioned each embodiment is all embodiment of the present invention, but this specification exists as space is limited, This is not just detailed one by one.
The present invention can be used in numerous general or special purpose computing system environments or configuration.Such as:Personal computer, service Device computer, handheld device or portable device, laptop device, multicomputer system, the system based on microprocessor, top set Box, programmable consumer-elcetronics devices, network PC, minicomputer, mainframe computer, including any of the above system or equipment Distributed computing environment etc..
In the present invention, " component ", " device ", " system " etc. refer to the related entities applied to computer, such as hardware, firmly Combination, software or software in execution of part and software etc..In detail, for example, component can with but be not limited to run on place Manage process, processor, object, executable component, execution thread, program and/or the computer of device.In addition, run on server On application program or shell script, server can be component.One or more components can be in the process and/or line of execution Cheng Zhong, and component can be localized and/or be distributed between two or multiple stage computers on one computer, and can be by Various computer-readable medium operations.Component can also be according to the signal with one or more data packets, for example, from one It is handed over component interaction another in local system, distributed system and/or in internet network by signal and other systems The signal of mutual data is communicated by locally and/or remotely process.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, term " comprising ", "comprising", not only including those elements, and And it further includes other elements that are not explicitly listed or further includes intrinsic for this process, method, article or equipment institute Element.In the absence of more restrictions, the element limited by sentence " including ... ", it is not excluded that including it is described will Also there are other identical elements in the process of element, method, article or equipment.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation Property concept, then can make these embodiments other change and modification.So appended claims be intended to be construed to include it is excellent It selects embodiment and falls into all change and modification of the scope of the invention.
Above to a kind of unlocking method provided by the present invention and tripper, it is described in detail, it is used herein Specific case is expounded the principle of the present invention and embodiment, to understand the explanation of above example is only intended to helping The method and its core concept of the present invention;Meanwhile for those of ordinary skill in the art, thought according to the present invention is having There will be changes in body embodiment and application range, in conclusion the content of the present specification should not be construed as to the present invention Limitation.

Claims (10)

1. a kind of unlocking method, which is characterized in that including:
Show unlock interface;
Receive the location information of unlocking pin that the first user inputted by the unlock interface and the unlocking pin;
By the presetting bit of the location information of the unlocking pin and presetting cipher and the unlocking pin and the presetting cipher Confidence breath is matched respectively;
Corresponding operation is performed according to matching result.
2. according to the method described in claim 1, it is characterized in that, the unlock interface includes at least two decryption characters to be selected And at least two decrypted positions areas to be selected, the unlocking pin that the first user inputted by the unlock interface and described of receiving The location information of unlocking pin, including:
Receive the decryption character that first user selectes in the decryption character to be selected;
According to the decrypted positions area to be selected that the decryption character is dragged in by first user, determine that the decryption character is corresponding Location information;
According to the decryption character and the corresponding location information of the decryption character, determine that the described first unlock input by user is close The location information of code and the unlocking pin.
3. according to the method described in claim 1, it is characterized in that, it is described by the unlocking pin and presetting cipher and Before the location information of the unlocking pin is matched respectively with the preset position information of the presetting cipher, further include:
Show password setting interface;Password setting interface include at least two encrypted characters to be selected and at least two it is to be selected plus Dense bit puts area;
Receive the encrypted characters that second user is selected in the encrypted characters to be selected;
According to the encrypted location area to be selected that the encrypted characters are dragged in by the second user, determine that the encrypted characters are corresponding Location information;
By the encrypted characters and the corresponding location information of the encrypted characters, it is stored as the presetting cipher and described preset close The location information of code.
4. according to the method described in claim 3, it is characterized in that, described correspond to the encrypted characters and the encrypted characters Location information, be stored as the location information of the presetting cipher and the presetting cipher, including:
By the first matrix formed by described at least two encrypted characters to be selected and by described at least two encrypted location areas to be selected The the second matrix multiple generation Crypted password matrix formed;
By position of the product of encrypted characters location information corresponding with the encrypted characters in the Crypted password matrix It puts, is recorded as the location information of the presetting cipher and the presetting cipher.
It is 5. according to the method described in claim 4, it is characterized in that, described by the unlocking pin and presetting cipher, Yi Jisuo The location information for stating unlocking pin is matched respectively with the preset position information of the presetting cipher, including:
By the third matrix formed by described at least two decryption characters to be selected and by described at least two decrypted positions areas to be selected The 4th matrix multiple formed generates clear crytpographic key matrix;Wherein, the third matrix is identical with first matrix, and the 4th Matrix is identical with second matrix;
By the product of the close character of decryption location information corresponding with the close character of decryption in the clear crytpographic key matrix Position, the product of location information corresponding with the encrypted characters with the encrypted characters is in the Crypted password matrix Position is compared, and position consistency then successful match, then it fails to match for position difference.
6. a kind of tripper, which is characterized in that including:
Display module, for showing unlock interface;
First receiving module, for receiving unlocking pin and the unlocking pin that the first user is inputted by the unlock interface Location information;
Matching module, for by the location information of the unlocking pin and presetting cipher and the unlocking pin with it is described pre- The preset position information for putting password is matched respectively;
Execution module, for performing corresponding operation according to matching result.
7. device according to claim 6, which is characterized in that the unlock interface includes at least two decryption characters to be selected And at least two decrypted positions areas to be selected, first receiving module, including:
First chosen module, for receiving the decryption character that first user selectes in the decryption character to be selected;
First position information module, for according to first user by the decrypted positions area to be selected that is dragged in of decryption character, Determine the corresponding location information of the decryption character;
Determining module, for according to the decryption character and the corresponding location information of the decryption character, determining that described first uses The unlocking pin of family input and the location information of the unlocking pin.
8. device according to claim 6, which is characterized in that before the matching module, described device further includes:
Setup module, for showing that password sets interface;Password setting interface include at least two encrypted characters to be selected and At least two encrypted location areas to be selected;
Second receiving module, for receiving the encrypted characters that second user is selected in the encrypted characters to be selected;
Second position information module, for the encrypted location area to be selected for being dragged in the encrypted characters according to the second user, Determine the corresponding location information of the encrypted characters;
Memory module, for by the encrypted characters and the corresponding location information of the encrypted characters, being stored as described preset close The location information of code and the presetting cipher.
9. device according to claim 8, which is characterized in that the memory module, including:
Generation module, for the first matrix for will being formed by described at least two encrypted characters to be selected with being treated by described at least two Select the second matrix multiple generation Crypted password matrix that encrypted location area is formed;
Logging modle, for the product of encrypted characters location information corresponding with the encrypted characters is close in the encryption Position in code matrix is recorded as the location information of the presetting cipher and the presetting cipher.
10. device according to claim 9, which is characterized in that the matching module includes:
Deciphering module, for will be by the described at least two third matrixes that are formed of decryption characters to be selected with being treated by described at least two The 4th matrix multiple that decrypted positions area is selected to be formed generates clear crytpographic key matrix;Wherein, the third matrix and first square Battle array is identical, and the 4th matrix is identical with second matrix;
Comparing module, for by the close character of the decryption with the product for decrypting the corresponding location information of close character in the solution Position in close scrambling matrix, the product of location information corresponding with the encrypted characters with the encrypted characters is in the encryption Position in scrambling matrix is compared, and position consistency then successful match, then it fails to match for position difference.
CN201810012152.1A 2018-01-05 2018-01-05 A kind of unlocking method and tripper Pending CN108256301A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810012152.1A CN108256301A (en) 2018-01-05 2018-01-05 A kind of unlocking method and tripper

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810012152.1A CN108256301A (en) 2018-01-05 2018-01-05 A kind of unlocking method and tripper

Publications (1)

Publication Number Publication Date
CN108256301A true CN108256301A (en) 2018-07-06

Family

ID=62725865

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810012152.1A Pending CN108256301A (en) 2018-01-05 2018-01-05 A kind of unlocking method and tripper

Country Status (1)

Country Link
CN (1) CN108256301A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112016079A (en) * 2020-08-27 2020-12-01 深圳市亲邻科技有限公司 Equipment terminal verification method, device and storage medium
CN114448650A (en) * 2022-04-12 2022-05-06 深圳市乐凡信息科技有限公司 Encryption authentication method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102081488A (en) * 2009-11-30 2011-06-01 比亚迪股份有限公司 Safe lock input interface device and safe lock unlocking method
CN102890614A (en) * 2012-09-20 2013-01-23 清华大学 Random screen unlocking system and method of mobile terminal equipment
CN103116718A (en) * 2013-03-06 2013-05-22 无锡德飞科技有限公司 Password setting and verification method based on spatial position code log-in computer system
CN106301760A (en) * 2016-08-04 2017-01-04 北京电子科技学院 A kind of 3D point cloud model encryption method based on chaotic maps

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102081488A (en) * 2009-11-30 2011-06-01 比亚迪股份有限公司 Safe lock input interface device and safe lock unlocking method
CN102890614A (en) * 2012-09-20 2013-01-23 清华大学 Random screen unlocking system and method of mobile terminal equipment
CN103116718A (en) * 2013-03-06 2013-05-22 无锡德飞科技有限公司 Password setting and verification method based on spatial position code log-in computer system
CN106301760A (en) * 2016-08-04 2017-01-04 北京电子科技学院 A kind of 3D point cloud model encryption method based on chaotic maps

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112016079A (en) * 2020-08-27 2020-12-01 深圳市亲邻科技有限公司 Equipment terminal verification method, device and storage medium
CN114448650A (en) * 2022-04-12 2022-05-06 深圳市乐凡信息科技有限公司 Encryption authentication method, device, equipment and storage medium
CN114448650B (en) * 2022-04-12 2022-07-01 深圳市乐凡信息科技有限公司 Encryption authentication method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
Sabzevar et al. Universal multi-factor authentication using graphical passwords
US20120291108A1 (en) Secure user credential control
CN106534570A (en) Privacy protection method and device
CN104424409A (en) Application unlocking method and device
KR102055625B1 (en) Authentication server device, program, and authentication method
KR100954841B1 (en) Method and Apparatus of managing unity data on mobile device and Recording medium using this
CN105703901A (en) Encrypted data input method and encrypted data input device
CN106656471B (en) A kind of guard method and system of user sensitive information
Shaju et al. BISC authentication algorithm: An efficient new authentication algorithm using three factor authentication for mobile banking
US9336376B2 (en) Multi-touch methods and devices
CN108256301A (en) A kind of unlocking method and tripper
RU2730386C2 (en) Authentication and encryption system and method with interception protection
CN111008400A (en) Data processing method, device and system
CN112822010B (en) Removable storage medium management method based on quantum key and block chain
CN103780756B (en) The method of client identification card data secrecy and mobile terminal thereof
CN104966014A (en) Terminal encryption method and apparatus and terminal decryption method and apparatus
US7715560B2 (en) Systems and methods for hiding a data group
Latvala et al. " Speak, Friend, and Enter"-Secure, Spoken One-Time Password Authentication
CN108337233A (en) It is a kind of to the encrypted method of content information, electronic equipment and storage medium
Chhetri Novel approach towards authentication using multi level password system
Boonkrong et al. Password-based authentication
CN110493006A (en) Anti- quantum calculation two dimensional code authentication method and system based on unsymmetrical key pond and sequence number
Pawar et al. Survey of cryptography techniques for data security
Behl et al. Multi-level scalable textual-graphical password authentication scheme for web based applications
TWI780461B (en) Encryption and protection for information transmission method and implementation system thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180706

RJ01 Rejection of invention patent application after publication