CN109446794A - A kind of cipher-code input method and its mobile terminal - Google Patents

A kind of cipher-code input method and its mobile terminal Download PDF

Info

Publication number
CN109446794A
CN109446794A CN201811195514.1A CN201811195514A CN109446794A CN 109446794 A CN109446794 A CN 109446794A CN 201811195514 A CN201811195514 A CN 201811195514A CN 109446794 A CN109446794 A CN 109446794A
Authority
CN
China
Prior art keywords
password
screen
user
original
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811195514.1A
Other languages
Chinese (zh)
Other versions
CN109446794B (en
Inventor
余维杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201811195514.1A priority Critical patent/CN109446794B/en
Publication of CN109446794A publication Critical patent/CN109446794A/en
Application granted granted Critical
Publication of CN109446794B publication Critical patent/CN109446794B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of cipher-code input method and its mobile terminal, for solving the problems, such as that existing Password Input is difficult to avoid that other people peep or use a hidden recorder etc. and make the safety of Password Input lower.The described method includes: obtaining the original password that user inputs in the first screen side of mobile terminal, first screen is the display screen for deviating from user's sight side in the mobile terminal;Based on preset password mapping table, the original password is encrypted;The encrypted information of the original password is fed back into the user.

Description

A kind of cipher-code input method and its mobile terminal
Technical field
The present invention relates to field of computer technology more particularly to a kind of cipher-code input methods and its mobile terminal.
Background technique
With the development of mobile internet, the effect that mobile terminal is played the part of in life is also more and more important, and user can be with The operation such as paid, done shopping by mobile terminal, this safety for allowing for mobile terminal more shows important.
Currently, fingerprint identification technology is since its operation is more convenient, identification is rapidly and the features such as safety is higher, and it is fast Speed is popularized in the application scenarios such as mobile payment and identification.But in some mobile payments and identification scene, fingerprint is known Other technology can not replace password identification completely, such as still can trigger password knowledge after user repeatedly inputs fingerprint recognition failure Not, fingerprint typing or modification etc. are also required to user and input password to verify.Therefore, authentication of the password identification as most original Formula still has irreplaceable role and meaning.
However, the display screen with mobile terminal is increasing, user is defeated in subway, public transport or other public arenas When entering password, it is difficult to the problem of avoiding will receive other people peep, or using a hidden recorder password.Therefore, there is still a need for a kind of solution party Case come improve user input password security level.
Summary of the invention
The embodiment of the present invention provides a kind of cipher-code input method and its mobile terminal, is difficult to solving existing Password Input Avoid other people from the problem for making the safety of Password Input lower such as peeping or use a hidden recorder.
In order to solve the above-mentioned technical problem, the present invention is implemented as follows: in a first aspect, the embodiment of the invention provides one Kind cipher-code input method, comprising:
The original password that user inputs in the first screen side of mobile terminal is obtained, first screen is described mobile whole Deviate from the display screen of user's sight side in end;
Based on preset password mapping table, the original password is encrypted;
The encrypted information of the original password is fed back into the user.
Second aspect, the embodiment of the invention provides a kind of mobile terminals, comprising:
Acquiring unit, the original password inputted for obtaining user in the first screen side of mobile terminal, first screen Curtain is the display screen for deviating from user's sight side in the mobile terminal;
Encryption unit encrypts the original password for being based on preset password mapping table;
Feedback unit, for the encrypted information of the original password to be fed back to the user.
The third aspect, the embodiment of the invention provides a kind of mobile terminals, comprising: memory, processor and is stored in institute The computer program that can be run on memory and on the processor is stated, when the computer program is executed by the processor The step of realizing method as described in relation to the first aspect.
Fourth aspect, the embodiment of the present invention also provide a kind of readable storage medium storing program for executing, on the computer readable storage medium The step of being stored with computer program, method as described in relation to the first aspect realized when the computer program is executed by processor.
In the embodiment of the present invention, the original password inputted since user can be obtained in the first screen side of mobile terminal, First screen is the display screen for deviating from user's sight side in mobile terminal, is then based on preset password mapping relations Table encrypts original password, and the encrypted information of original password is finally fed back to the user.In this way when user inputs When password, can using have double-sided screen mobile terminal the characteristics of, away from user's sight screen on input password, by In input password side display screen not in the range of visibility of user, therefore, the other staff around user are also with regard to nothing The password of user's input is peeped or used a hidden recorder to method, so as to improve the security level that user inputs password.Moreover it is possible to based on using The ciphertext password of family input is fed back accordingly, allows users to the password correctness for knowing input.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is a kind of specific implementation flow diagram of cipher-code input method provided in an embodiment of the present invention;
Fig. 2 is that cipher-code input method provided in an embodiment of the present invention applies the flow diagram in actual scene;
Fig. 3 is the dummy keyboard schematic diagram of the Password Input generated in cipher-code input method provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of mobile terminal provided in an embodiment of the present invention;
Fig. 5 is the structural schematic diagram of another mobile terminal provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
The technical solution provided below in conjunction with attached drawing, each embodiment that the present invention will be described in detail.
Other people peep or use a hidden recorder etc. and make the safety of Password Input is difficult to avoid that solve existing Password Input Lower problem, the present invention provide a kind of cipher-code input method, and the executing subject of this method can be, but not limited to mobile phone, plate Computer etc. can be configured as executing at least one of this method user terminal provided in an embodiment of the present invention.
For ease of description, hereafter executing subject in this way is to be able to carry out for the mobile terminal of this method, to this The embodiment of method is introduced.It is appreciated that it is that one kind is illustratively said that the executing subject of this method, which is mobile terminal, It is bright, it is not construed as the restriction to this method.
Specifically, cipher-code input method provided by the invention includes: firstly, obtaining user in the first screen of mobile terminal The original password of side input, first screen are the display screen for deviating from user's sight side in the mobile terminal; Then, it is based on preset password mapping table, the original password is encrypted;Finally, original password is encrypted Information feeds back to the user.
In the embodiment of the present invention, the original password inputted since user can be obtained in the first screen side of mobile terminal, First screen is the display screen for deviating from user's sight side in mobile terminal, is then based on preset password mapping relations Table encrypts original password, and the encrypted information of original password is finally fed back to the user.In this way when user inputs When password, can using have double-sided screen mobile terminal the characteristics of, away from user's sight screen on input password, by In input password side display screen not in the range of visibility of user, therefore, the other staff around user are also with regard to nothing The password of user's input is peeped or used a hidden recorder to method, so as to improve the security level that user inputs password.Moreover it is possible to based on using The ciphertext password of family input is fed back accordingly, allows users to the password correctness for knowing input.
Below with reference to the specific implementation flow diagram of cipher-code input method shown in FIG. 1, to the implementation process of this method It describes in detail, comprising:
Step 101, the original password that user inputs in the first screen side of mobile terminal is obtained, which is movement Deviate from the display screen of user's sight side in terminal.
As described in the background art, the display screen of existing mobile terminal is increasing, user's public affairs more in crowd Altogether when occasion input password, it is difficult to avoid will receive other people peep, even use a hidden recorder, this usurps other people passwords to criminal Create chance.Obviously, there is also some security risks for the mode of existing Password Input, in order to solve this problem, this hair For bright embodiment using having the characteristics of double-sided screen mobile terminal, that is, the mobile terminal for having double-sided screen includes the first screen and second Screen, and first screen and the second screen are located at the two sides of mobile terminal, user can deviate from user's sight side Display screen on input password, to avoid other people peep.
Therefore, when user away from user's sight the first screen side carry out input password operation when, it is available The original password that user inputs in the first screen side of mobile terminal.
Optionally, when original password only includes number, for example, bank trading password setting range be 1~9, this 1 ~9 numeric keypad can be shown on the first screen in the form of nine grids, then obtaining user the first of mobile terminal The original password of screen side input, can specifically include:
Firstly, can show dummy keyboard in the first screen based on object run if detecting the object run of user; Wherein, which can be the form of nine grids, as shown in Figure 3.
Then, input auxiliary corresponding with the dummy keyboard in the first screen is shown in the second screen of mobile terminal Line, to assist user to input original password in the dummy keyboard in the first screen;Since the display content of the first screen does not exist In the range of visibility of user, in order to avoid user frequently inputs by mistake, can be shown on the second screen with it is virtual in the first screen The corresponding input auxiliary line of keyboard, for example can show nine grids auxiliary line corresponding with nine grids position shown in Fig. 3, To assist user to input original password in the nine grids numeric keypad in the first screen.
Finally, obtaining the original password that user inputs in the dummy keyboard of the first screen.
Step 102, it is based on preset password mapping table, original password is encrypted.
Since user is when the first screen inputs password, user can not be immediately seen the password of input, to avoid user The problem of just finding the time that the password expends user not over verification after completing to input password, the present invention are implemented Example can just be based on preset password mapping table, original password is carried out after user's one code characters of every input Encryption is to feed back to user.
Optionally, when the mapping relations in preset password mapping table including original password and clear-text passwords, and it is former When in beginning password comprising letter, number or other spcial characters, since the original password is complex, then based on preset close Code mapping table, original password is encrypted, following two situation is specifically included:
The first situation: if it is close in plain text to there is target corresponding with original password in preset password mapping table Code, then can be based on the mapping relations of target clear-text passwords and original password in preset password mapping table, to original close Code is encrypted.
Second situation, it is close in plain text if there is no targets corresponding with original password in preset password mapping table Code can then encrypt the original password based on preset character.
As shown in Fig. 2, being the password input method that the embodiment of the present invention is realized by preset password mapping table Implementation process schematic diagram, the concrete application scene of implementation process schematic diagram shown in Fig. 2 are the hand-held shifting for having double-sided screen of user The scene of dynamic terminal input password, wherein the first screen is the display screen for deviating from user's sight side in mobile terminal, the Two screens are the display screen towards the user in mobile terminal.
By taking the trading password of bank as an example, it should be appreciated that user has pre-set the friendship before inputting the trading password Easy password (i.e. original password) and preset password mapping table, i.e., there are the plaintexts of one-to-one relationship with the trading password Password is as shown in table 1 below the pre-set trading password of user, and clear-text passwords corresponding with the trading password.By table 1 it is found that the pre-set trading password of user is " 4a7dek ", and corresponding clear-text passwords is " ybrbfa ".
It is when having input trading password " 4 ", then preset based on this when user inputs trading password by the first screen Password mapping table determines clear-text passwords " y " corresponding with trading password " 4 ", and the second screen just shows the clear-text passwords " y ", user can determine that the trading password " 4 " of its input is correct after the feedback for seeing the clear-text passwords " y " ... ..., and so on, the input until completing the trading password.And if in the process, user input trading password in Some character there is mistake, then some preset character can be shown on the second screen to prompt user password input wrong Accidentally.In this case, user can delete the bad password of input by double-clicking the first screen or other predetermined registration operations.
The preset password mapping table of table 1
Trading password 4 a 7 d e k
Clear-text passwords y b R b f a
When the corresponding relationship in preset password mapping table comprising number with shock levels, and original password only includes When digital, for example, bank trading password setting range be 1~9,1~9 numeric keypad can in the form of nine grids, Nine grids i.e. shown in Fig. 3 are shown on the first screen.When inputting password due to user's nine grids keyboard shown in Fig. 3, easily The region obscured is inputed by mistake often in adjacent area, such as on the obscuring of number 2 and digital 3 regions, without in digital 1 He On the obscuring of digital 9 regions.It can be so number 1, number 2, number 7 by the number on the diagonal line for being located at nine grids keyboard Correspond to same shock levels A with number 9, is number 2, number 4, number by the number for being located at four border regions of nine grids keyboard Word 6 and number 8 correspond to same shock levels B, and the number 5 for being located at nine grids keyboard centerline region is corresponded to a kind of shake Dynamic grade C.
So, it is based on preset password mapping table, original password is encrypted, is specifically included:
Firstly, obtaining target shock levels corresponding with original password from preset password mapping table, preset Password mapping table in include shock levels and original password mapping relations;
Then, the mapping relations based on target shock levels and original password in password mapping table, to original password It is encrypted.
Step 103, the encrypted information of original password is fed back into user.
Optionally, when the mapping relations in preset password mapping table including original password and clear-text passwords, and it is former Comprising letter, number or when other spcial characters in beginning password, the encrypted information of original password is fed back into user, including with Lower two kinds of situations:
If there is target clear-text passwords corresponding with original password in preset password mapping table, mobile whole The second screen feedback target clear-text passwords corresponding with original password at end;
If target clear-text passwords corresponding with original password is not present in preset password mapping table, in movement The preset character of the second screen feedback of terminal, to prompt user password input wrong;Wherein, the second screen is in mobile terminal User oriented display screen.
Optionally, when in preset password mapping table comprising number and the corresponding relationships of shock levels, and it is original close When code only includes number, target shock levels corresponding with original password can be based on, vibrational feedback is carried out to user.Such as Fig. 3 It is shown, when user inputs password by the first screen, if input number 1, can be determined by preset password mapping table Shock levels corresponding with the number 1 are A, are based on shock levels A, vibrational feedback is to user, so that user knows its touching Number 1 is touched.
As shown in Fig. 2, the process that user inputs password includes following key steps:
Step 201, user enters the interface for password input of the first screen;
When wherein the first screen is user's hand-held mobile terminal, the password of user's sight side is deviated from mobile terminal.
Step 202, user inputs original password by the first screen;
It should be understood that since the content shown in the first screen is not in the range of visibility of user, then user passes through the As soon as the original password of screen input cannot also be seen by user, then other people around user can not also see user The original password of input.
Step 203, determine whether the original password of user's input is correct;
By user by the first screen input original password cannot also be seen by user, then just it needs to be determined that Whether the original password of user's input is correct, to feed back accordingly to user.
Step 204, however, it is determined that the original password of user's input is correct, then display and the original password pair on the second screen The clear-text passwords answered;
Step 205, however, it is determined that the original password of user's input is wrong, then random character is shown on the second screen, to mention Show that the original password of user's input is wrong;
Step 206, user is by double-clicking the first screen, with deletion error password;
User can carry out the password of deletion error, can also by other means, for example slide by double-clicking the first screen Or the operations such as click carry out the password of deletion error, the present invention is not especially limit this.
Step 207, determine whether user completes to input;
Assuming that including 6 characters in the original password of user's input, then determining that user completes the defeated of 6 characters After entering, it can determine that user inputs and complete, otherwise, it is determined that user does not complete to input, then continues to execute step 202.
Step 208, however, it is determined that user, which inputs, to complete then to terminate to input.
In the embodiment of the present invention, the original password inputted since user can be obtained in the first screen side of mobile terminal, First screen is the display screen for deviating from user's sight side in mobile terminal, is then based on preset password mapping relations Table encrypts original password, and the encrypted information of original password is finally fed back to user.In this way when user inputs password When, can using have double-sided screen mobile terminal the characteristics of, away from user's sight screen on input password, due to defeated Enter the display screen of password side not in the range of visibility of user, therefore, the other staff around user also can not just steal The password of user's input is peeped or uses a hidden recorder, so as to improve the security level that user inputs password.Moreover it is possible to defeated based on user The ciphertext password entered is fed back accordingly, allows users to the password correctness for knowing input.
Referring to Fig. 4, being the structural schematic diagram of mobile terminal 400 provided in an embodiment of the present invention, as shown in figure 4, including Acquiring unit 401, encryption unit 402 and feedback unit 403, in which:
Acquiring unit 401, the original password inputted for obtaining user in the first screen side of mobile terminal, described first Screen is the display screen for deviating from user's sight side in the mobile terminal;
Encryption unit 402 encrypts the original password for being based on preset password mapping table;
Feedback unit 403, for the encrypted information of the original password to be fed back to the user.
Optionally, in one embodiment, the encryption unit 402, is used for:
If there is target clear-text passwords corresponding with the original password in the preset password mapping table, Based on the mapping relations of target clear-text passwords and the original password described in the preset password mapping table, to described original Password is encrypted;
If target clear-text passwords corresponding with the original password is not present in the preset password mapping table, Then the original password is encrypted based on preset character;
It wherein, include the mapping relations of the original password and clear-text passwords in the preset password mapping table.
Optionally, in one embodiment, the feedback unit 403, is used for:
If there is target clear-text passwords corresponding with the original password in the preset password mapping table, The target clear-text passwords described in the second screen feedback of the mobile terminal;
If target clear-text passwords corresponding with the original password is not present in the preset password mapping table, Then in the preset character of the second screen feedback of the mobile terminal, to prompt the user password input wrong;
Wherein, second screen is the display screen towards the user in the mobile terminal.
Optionally, in one embodiment, the acquiring unit 401, is used for:
If detecting the object run of the user, virtual key is shown in first screen based on the object run Disk;
Show that input corresponding with the dummy keyboard in first screen is auxiliary in the second screen of the mobile terminal Index contour inputs original password in the dummy keyboard in first screen with assist said user;
Obtain the original password that the user inputs in the dummy keyboard of first screen.
Optionally, in one embodiment, the encryption unit 402, is used for:
Shock levels corresponding with the original password are obtained from the preset password mapping table, it is described pre- If password mapping table in include shock levels and the original password mapping relations;
Based on the mapping relations of target shock levels and the original password described in the password mapping table, to institute Original password is stated to be encrypted.
It is real that mobile terminal 400 provided in an embodiment of the present invention can be realized mobile terminal in the embodiment of the method for FIG. 1 to FIG. 3 Existing each process, to avoid repeating, which is not described herein again.
A kind of hardware structural diagram of Fig. 5 mobile terminal 500 of each embodiment to realize the present invention,
The mobile terminal 500 includes but is not limited to: radio frequency unit 501, network module 502, audio output unit 503, defeated Enter unit 504, sensor 505, display unit 506, user input unit 507, interface unit 508, memory 509, processor The components such as 510 and power supply 511.It will be understood by those skilled in the art that mobile terminal structure shown in Fig. 5 is not constituted Restriction to mobile terminal, mobile terminal may include than illustrating more or fewer components, perhaps combine certain components or Different component layouts.In embodiments of the present invention, mobile terminal include but is not limited to mobile phone, tablet computer, laptop, Palm PC, car-mounted terminal, wearable device and pedometer etc..
Wherein, processor 510, the original password inputted for obtaining user in the first screen side of mobile terminal are described First screen is the display screen for deviating from user's sight side in the mobile terminal;Based on preset password mapping relations Table encrypts the original password;The encrypted original password is fed back into the user.
In the embodiment of the present invention, the original password inputted since user can be obtained in the first screen side of mobile terminal, First screen is the display screen for deviating from user's sight side in mobile terminal, is then based on preset password mapping relations Table encrypts original password, and encrypted original password is finally fed back to user.In this way when user inputs password, Can be using the mobile terminal for having double-sided screen the characteristics of, password is inputted on the screen away from user's sight, due to input The display screen of password side is not in the range of visibility of user, and therefore, the other staff around user also can not just peep Or the password of user's input is used a hidden recorder, so as to improve the security level that user inputs password.Moreover it is possible to be inputted based on user Ciphertext password fed back accordingly, allow users to the password correctness for knowing input.
It should be understood that the embodiment of the present invention in, radio frequency unit 501 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 510 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 501 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 501 can also by wireless communication system and network and other set Standby communication.
Mobile terminal provides wireless broadband internet by network module 502 for user and accesses, and such as user is helped to receive It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 503 can be received by radio frequency unit 501 or network module 502 or in memory 509 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 503 can also be provided and be moved The relevant audio output of specific function that dynamic terminal 500 executes is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 503 includes loudspeaker, buzzer and receiver etc..
Input unit 504 is for receiving audio or video signal.Input unit 504 may include graphics processor (Graphics Processing Unit, GPU) 5041 and microphone 5042, graphics processor 5041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 503.Through graphics processor 5041, treated that picture frame can be deposited Storage is sent in memory 509 (or other storage mediums) or via radio frequency unit 501 or network module 502.Mike Wind 5042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output that mobile communication base station can be sent to via radio frequency unit 501 is converted in the case where telephone calling model.
Mobile terminal 500 further includes at least one sensor 505, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 5061, and proximity sensor can close when mobile terminal 500 is moved in one's ear Display panel 5061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify mobile terminal posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes Sensor 505 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 506 is for showing information input by user or being supplied to the information of user.Display unit 506 can wrap Display panel 5061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 5061.
User input unit 507 can be used for receiving the number or character information of input, and generate the use with mobile terminal Family setting and the related key signals input of function control.Specifically, user input unit 507 include touch panel 5071 and Other input equipments 5072.Touch panel 5071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 5071 or in touch panel 5071 Neighbouring operation).Touch panel 5071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 510, receiving area It manages the order that device 510 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Seed type realizes touch panel 5071.In addition to touch panel 5071, user input unit 507 can also include other input equipments 5072.Specifically, other input equipments 5072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 5071 can be covered on display panel 5061, when touch panel 5071 is detected at it On or near touch operation after, send processor 510 to determine the type of touch event, be followed by subsequent processing device 510 according to touching The type for touching event provides corresponding visual output on display panel 5061.Although in Fig. 5, touch panel 5071 and display Panel 5061 is the function that outputs and inputs of realizing mobile terminal as two independent components, but in some embodiments In, can be integrated by touch panel 5071 and display panel 5061 and realize the function that outputs and inputs of mobile terminal, it is specific this Place is without limitation.
Interface unit 508 is the interface that external device (ED) is connect with mobile terminal 500.For example, external device (ED) may include having Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 508 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in mobile terminal 500 or can be used in 500 He of mobile terminal Data are transmitted between external device (ED).
Memory 509 can be used for storing software program and various data.Memory 509 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 509 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 510 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part by running or execute the software program and/or module that are stored in memory 509, and calls and is stored in storage Data in device 509 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place Managing device 510 may include one or more processing units;Preferably, processor 510 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 510.
Mobile terminal 500 can also include the power supply 511 (such as battery) powered to all parts, it is preferred that power supply 511 Can be logically contiguous by power-supply management system and processor 510, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, mobile terminal 500 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of mobile terminal, including processor 510, and memory 509 is stored in On memory 509 and the computer program that can run on the processor 510, the computer program are executed by processor 510 Each process of the above-mentioned voice drafting method embodiment of Shi Shixian, and identical technical effect can be reached, to avoid repeating, here It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize each process of above-mentioned voice drafting method embodiment, and energy when being executed by processor Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
It should be noted that, in this document, term " includes ", " comprising " or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (11)

1. a kind of cipher-code input method characterized by comprising
The original password that user inputs in the first screen side of mobile terminal is obtained, first screen is in the mobile terminal Display screen away from user's sight side;
Based on preset password mapping table, the original password is encrypted;
The encrypted information of the original password is fed back into the user.
2. the method as described in claim 1, which is characterized in that it is based on preset password mapping table, it will be described original close Code is encrypted, comprising:
If there is target clear-text passwords corresponding with the original password in the preset password mapping table, it is based on The mapping relations of target clear-text passwords and the original password described in the preset password mapping table, to described original Password is encrypted;
If target clear-text passwords corresponding with the original password, base are not present in the preset password mapping table The original password is encrypted in preset character;
It wherein, include the mapping relations of the original password and clear-text passwords in the preset password mapping table.
3. method according to claim 2, which is characterized in that the encrypted information of the original password is fed back to the use Family, comprising:
If there is target clear-text passwords corresponding with the original password in the preset password mapping table, in institute State target clear-text passwords described in the second screen feedback of mobile terminal;
If target clear-text passwords corresponding with the original password is not present in the preset password mapping table, The preset character of the second screen feedback of the mobile terminal, to prompt the user password input wrong;
Wherein, second screen is the display screen towards the user in the mobile terminal.
4. the method as described in claim 1, which is characterized in that obtain the original that user inputs in the first screen side of mobile terminal Beginning password, comprising:
If detecting the object run of the user, dummy keyboard is shown in first screen based on the object run;
Input auxiliary line corresponding with the dummy keyboard in first screen is shown in the second screen of the mobile terminal, Original password is inputted in the dummy keyboard in first screen with assist said user;
Obtain the original password that the user inputs in the dummy keyboard of first screen.
5. the method as described in any in claim 1 or 4, which is characterized in that preset password mapping table is based on, by institute Original password is stated to be encrypted, comprising:
Target shock levels corresponding with the original password are obtained from the preset password mapping table, it is described pre- If password mapping table in include shock levels and the original password mapping relations;
Based on the mapping relations with target shock levels and the original password described in the password mapping table, to described Original password is encrypted.
6. a kind of mobile terminal characterized by comprising
Acquiring unit, the original password inputted for obtaining user in the first screen side of mobile terminal, first screen are Deviate from the display screen of user's sight side in the mobile terminal;
Encryption unit encrypts the original password for being based on preset password mapping table;
Feedback unit, for the encrypted information of the original password to be fed back to the user.
7. mobile terminal as claimed in claim 6, which is characterized in that the encryption unit is used for:
If there is target clear-text passwords corresponding with the original password in the preset password mapping table, it is based on The mapping relations of target clear-text passwords and the original password described in the preset password mapping table, to the original password It is encrypted;
If target clear-text passwords corresponding with the original password, base are not present in the preset password mapping table The original password is encrypted in preset character;
It wherein, include the mapping relations of the original password and clear-text passwords in the preset password mapping table.
8. mobile terminal as claimed in claim 7, which is characterized in that the feedback unit is used for:
If there is clear-text passwords corresponding with the original password in the preset password mapping table, in the shifting The second screen feedback clear-text passwords corresponding with the original password of dynamic terminal;
If clear-text passwords corresponding with the original password is not present in the preset password mapping table, described The preset character of the second screen feedback of mobile terminal, to prompt the user password input wrong;
Wherein, second screen is the display screen towards the user in the mobile terminal.
9. mobile terminal as claimed in claim 6, which is characterized in that the acquiring unit is used for:
If detecting the object run of the user, dummy keyboard is shown in first screen based on the object run;
Input auxiliary line corresponding with the dummy keyboard in first screen is shown in the second screen of the mobile terminal, Original password is inputted in the dummy keyboard in first screen with assist said user;
Obtain the original password that the user inputs in the dummy keyboard of first screen.
10. the mobile terminal as described in any in claim 6 or 9, which is characterized in that the encryption unit is used for:
Target shock levels corresponding with the original password are obtained from the preset password mapping table, it is described pre- If password mapping table in include shock levels and the original password mapping relations;
Based on the mapping relations of target shock levels and the original password described in the password mapping table, to described original close Code is encrypted.
11. a kind of mobile terminal, comprising: memory, processor and be stored on the memory and can be on the processor The computer program of operation is realized as described in Claims 1 to 5 is any when the computer program is executed by the processor The step of cipher-code input method.
CN201811195514.1A 2018-10-15 2018-10-15 Password input method and mobile terminal thereof Active CN109446794B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811195514.1A CN109446794B (en) 2018-10-15 2018-10-15 Password input method and mobile terminal thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811195514.1A CN109446794B (en) 2018-10-15 2018-10-15 Password input method and mobile terminal thereof

Publications (2)

Publication Number Publication Date
CN109446794A true CN109446794A (en) 2019-03-08
CN109446794B CN109446794B (en) 2020-06-02

Family

ID=65545288

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811195514.1A Active CN109446794B (en) 2018-10-15 2018-10-15 Password input method and mobile terminal thereof

Country Status (1)

Country Link
CN (1) CN109446794B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110879896A (en) * 2019-11-13 2020-03-13 维沃移动通信有限公司 Encryption and decryption method for folding screen terminal and electronic equipment
CN113139174A (en) * 2021-04-02 2021-07-20 维沃移动通信有限公司 Identity verification method and device
CN118036046A (en) * 2024-04-08 2024-05-14 北京派网科技有限公司 Leakage protection method and system based on information security data

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN200947201Y (en) * 2006-04-07 2007-09-12 鲍道民 Dual-purpose cipher anti-peeping keyboard
JP4087074B2 (en) * 2001-02-05 2008-05-14 株式会社島津製作所 Data processing equipment for analytical instruments
CN103995667A (en) * 2014-05-14 2014-08-20 宇龙计算机通信科技(深圳)有限公司 Terminal and terminal screen unlocking method
CN204576659U (en) * 2015-05-06 2015-08-19 福建睿矽微电子科技有限公司 A kind of payment devices
CN105353838A (en) * 2015-09-28 2016-02-24 淄博环能海臣环保技术服务有限公司 Notebook computer with U touch control screen holding gesture input self-setting keyboard
CN105827774A (en) * 2016-05-10 2016-08-03 潘爱松 Mobile phone capable of preventing password from being peeped
CN106161474A (en) * 2016-09-05 2016-11-23 努比亚技术有限公司 A kind of password determines apparatus and method
CN106815534A (en) * 2017-01-17 2017-06-09 广东欧珀移动通信有限公司 A kind of method for protecting privacy of user, device and mobile terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4087074B2 (en) * 2001-02-05 2008-05-14 株式会社島津製作所 Data processing equipment for analytical instruments
CN200947201Y (en) * 2006-04-07 2007-09-12 鲍道民 Dual-purpose cipher anti-peeping keyboard
CN103995667A (en) * 2014-05-14 2014-08-20 宇龙计算机通信科技(深圳)有限公司 Terminal and terminal screen unlocking method
CN204576659U (en) * 2015-05-06 2015-08-19 福建睿矽微电子科技有限公司 A kind of payment devices
CN105353838A (en) * 2015-09-28 2016-02-24 淄博环能海臣环保技术服务有限公司 Notebook computer with U touch control screen holding gesture input self-setting keyboard
CN105827774A (en) * 2016-05-10 2016-08-03 潘爱松 Mobile phone capable of preventing password from being peeped
CN106161474A (en) * 2016-09-05 2016-11-23 努比亚技术有限公司 A kind of password determines apparatus and method
CN106815534A (en) * 2017-01-17 2017-06-09 广东欧珀移动通信有限公司 A kind of method for protecting privacy of user, device and mobile terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110879896A (en) * 2019-11-13 2020-03-13 维沃移动通信有限公司 Encryption and decryption method for folding screen terminal and electronic equipment
CN110879896B (en) * 2019-11-13 2022-06-03 维沃移动通信有限公司 Encryption and decryption method for folding screen terminal and electronic equipment
CN113139174A (en) * 2021-04-02 2021-07-20 维沃移动通信有限公司 Identity verification method and device
CN118036046A (en) * 2024-04-08 2024-05-14 北京派网科技有限公司 Leakage protection method and system based on information security data
CN118036046B (en) * 2024-04-08 2024-06-07 北京派网科技有限公司 Leakage protection method and system based on information security data

Also Published As

Publication number Publication date
CN109446794B (en) 2020-06-02

Similar Documents

Publication Publication Date Title
CN108491133A (en) A kind of application control method and terminal
CN108629171B (en) Unread message processing method and terminal
CN107808084A (en) A kind of touch operation method and mobile terminal
CN110287741A (en) A kind of screen content display method thereof and terminal
CN110457888A (en) A kind of verifying code imput method, device, electronic equipment and storage medium
CN108280337A (en) A kind of message protection method and mobile terminal
CN109981904A (en) A kind of method for controlling volume and terminal device
CN108376096A (en) A kind of message display method and mobile terminal
CN110149628A (en) A kind of information processing method and terminal device
CN109446794A (en) A kind of cipher-code input method and its mobile terminal
CN110035183A (en) Information sharing method and terminal
CN109756621A (en) A kind of two-dimensional code display method and terminal device
CN108710806A (en) A kind of terminal unlock method, mobile terminal
CN107707554A (en) A kind of login method and mobile terminal of application program account
CN108229139A (en) A kind of cipher-code input method and mobile terminal
CN110213438A (en) A kind of processing method and terminal device of application program
CN109740312A (en) A kind of application control method and terminal device
CN109218984A (en) A kind of method for tracing and mobile terminal
CN109068084A (en) Video calling picture display process, mobile terminal and computer readable storage medium
CN107704334A (en) A kind of SDK processing method and mobile terminal
CN107835297A (en) Information updating method and mobile terminal
CN109753776A (en) A kind of method, apparatus and mobile terminal of information processing
CN109547330A (en) A kind of information sharing method and device
CN109033898A (en) A kind of data inputting method and mobile terminal
CN110457943A (en) A kind of application permission setting method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant