CN110704829B - Method for checking encrypted interface - Google Patents

Method for checking encrypted interface Download PDF

Info

Publication number
CN110704829B
CN110704829B CN201910915523.1A CN201910915523A CN110704829B CN 110704829 B CN110704829 B CN 110704829B CN 201910915523 A CN201910915523 A CN 201910915523A CN 110704829 B CN110704829 B CN 110704829B
Authority
CN
China
Prior art keywords
interface
contact
contacts
path
visible
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910915523.1A
Other languages
Chinese (zh)
Other versions
CN110704829A (en
Inventor
李诗全
刘陈渝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Duixin Technology Co ltd
Original Assignee
Fujian Duixin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Duixin Technology Co ltd filed Critical Fujian Duixin Technology Co ltd
Priority to CN201910915523.1A priority Critical patent/CN110704829B/en
Publication of CN110704829A publication Critical patent/CN110704829A/en
Application granted granted Critical
Publication of CN110704829B publication Critical patent/CN110704829B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Abstract

The invention belongs to the technical field of electronic equipment application, and particularly relates to a method for viewing an encrypted interface. The method comprises the following steps: carrying out decryption verification when the sliding operation acting on the path contact is detected, and switching to a target encryption interface when the decryption verification is passed; the decryption verification means that the contact sequence passing the sliding operation is searched in a contact sequence-encryption interface mapping table, if the search is successful, the decryption verification is passed, and otherwise, the decryption verification fails; the target encryption interface refers to an encryption interface corresponding to the contact sequence passed by the sliding operation in the contact sequence-encryption interface mapping table. In the technical scheme, the encryption interface can be accessed only after being decrypted through sliding operation, so that the privacy of a user can be protected.

Description

Method for checking encrypted interface
Technical Field
The invention belongs to the technical field of electronic equipment application, and particularly relates to a method for viewing an encrypted interface.
Background
When a user uses an electronic device such as a mobile phone or a computer, switching from one application interface to another application interface usually requires exiting from a current application and returning to a system desktop, and selecting a destination application from the system desktop to enter a destination application program interface.
In order to facilitate switching between applications for a user, some electronic devices have a fast operation for fast switching between applications. The quick switching interface can be entered through quick operations such as sliding up the operation interface or double-clicking the control button. In the quick switching interface, the application programs which are run by the user in a previous period of time are provided for the user to select switching. Although fast application switching can be achieved, privacy is not sufficient.
With the continuous development of terminal technology and the continuous improvement of safety consciousness of people, the safety design of the terminal private space is continuously improved and perfected. Especially, after the terminal is stolen, the private space becomes an important cracking object. In addition, even if the terminal is not lost, after the private space is found by other people, the private space is easily opened by curiosity of other people or forced requirements, so that the problems of private information leakage and the like are caused.
Disclosure of Invention
The invention aims to provide a method for viewing an encryption interface, which is characterized by comprising the following steps:
carrying out decryption verification when the sliding operation acting on the path contact is detected, and switching to a target encryption interface when the decryption verification is passed;
the decryption verification means that the contact sequence passing the sliding operation is searched in a contact sequence-encryption interface mapping table, if the search is successful, the decryption verification is passed, and otherwise, the decryption verification fails;
the target encryption interface is an encryption interface corresponding to the contact sequence passed by the sliding operation in the contact sequence-encryption interface mapping table.
In the technical scheme, the encryption interface can be accessed only after being decrypted through sliding operation, so that the privacy of a user can be protected.
Preferably, the path contact point is multiple and arranged at the foremost end of the touch interface of the electronic device. The user can conveniently enter the encryption interface through the operation path contact at any time when using the electronic equipment.
Preferably, the path contacts include visible path contacts explicitly disposed on the touch interface and hidden path contacts implicitly disposed on the touch interface; the hidden path contact is triggered to be displayed by one or more visible path contacts. The hidden path contact points are invisible, so that the number and the distribution positions of the path contact points are not completely displayed in the touch interface, and the privacy is higher.
Preferably, the visible path contact is provided with a key retracting function and a key unfolding function; when detecting that a key retraction function of the visible path contact is selected, hiding other visible path contacts except the visible path contact in the touch interface; and when detecting that a one-key expansion function of the visible path contact points is selected, displaying all the visible path contact points on the touch interface.
Preferably, the visible path contact is provided with a messy code sorting function; and when the messy code sorting function of the visible path contact is detected to be selected, randomly exchanging the arrangement positions of the visible path contact in the touch interface.
Preferably, the path contact may be a fingerprint lock or a character mark or a pattern mark.
Preferably, the foremost end of the touch interface is also provided with an obstacle contact; the decryption verification further comprises verifying whether the sliding operation passes through the barrier contact, and if so, the decryption verification fails.
Preferably, the obstacle contacts include visible obstacle contacts arranged on the touch interface.
Preferably, the obstacle contacts include hidden obstacle contacts implicitly disposed at the touch interface.
Preferably, the encryption interface comprises a web interface, a resource manager interface and an application program interface.
The invention has the following beneficial effects:
(1) in the password unlocking or pattern unlocking in the prior art, other people can clearly see the numbers and the number of the numbers selected by the user or the drawn patterns and the tracks of the patterns on a screen interface, so that the password is easy to crack by other people, the password security is low, and the password is easy to leak. The invention decrypts to the encryption interface through the sliding operation of the path contact, thereby being beneficial to protecting the privacy of the encryption interface.
(2) The path contacts comprise visible path contacts and hidden path contacts, so that the number and the distribution positions of the whole path contacts cannot be completely displayed in the touch interface; the visible path contact can be retracted or disordered by one key, and the encryption interface is not easy to crack.
(4) The path contact is arranged at the forefront end of the touch interface, so that a user can decrypt and enter the encryption interface in any use state, and the use is more convenient.
Detailed Description
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. Unless otherwise defined, all terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that the conventional terms should be interpreted as having a meaning that is consistent with their meaning in the relevant art and this disclosure. The present disclosure is to be considered as an example of the invention and is not intended to limit the invention to the particular embodiments.
A method for viewing an encrypted interface, which can be a web interface, a resource manager interface, an application program interface, etc. The application program interface may be a start interface or a function interface of a system self-contained application program or a third-party application program, the web interface may be a browser interface positioned to a certain website, and the resource manager interface may be an interface positioned to a certain folder (for example, a folder containing document data such as a private document and a private album).
A plurality of path contacts are arranged at the foremost end of a touch interface of the electronic equipment and used for unlocking to a preset encryption interface to view and use. The path contacts are arranged at the forefront end of the touch interface, so that a user can conveniently enter the encryption interface through decryption operation switching at any time, and in order to prevent the arrangement of the path contacts from influencing other touch operations of the user through the touch screen, the path contacts are usually distributed at two sides or peripheral edge positions of the touch interface. The number of path contacts, the arrangement position, can be freely set by the user. Specifically, the path contact points are set by providing candidate items of the path contact points on a setting interface, acquiring the number of the selected path contact points according to the operation of a user, and arranging the positions of the path contact points in the touch interface by the user through a dragging operation.
The method for viewing the encryption interface of the embodiment comprises the following steps: and carrying out decryption verification when the sliding operation acting on the path contact is detected, and switching to the target encryption interface when the decryption verification is passed. The decryption verification means that the contact sequence passing through the sliding operation is searched in the contact sequence-encryption interface mapping table, if the search is successful, the decryption verification is passed, and otherwise, the decryption verification fails. The target encryption interface refers to an encryption interface corresponding to the contact sequence passed by the sliding operation in the contact sequence-encryption interface mapping table. Each path contact point corresponds to a path contact point ID, and the contact point sequence in this embodiment is a series of path contact point ID sequence combinations for indicating the path contact points that the sliding operation successively passes through. The contact sequence-encryption interface mapping table is a mapping relation between a contact sequence and an encryption interface, which is previously recorded by a user on a setting interface. One contact sequence can correspond to only one encryption interface, but one encryption interface can correspond to a plurality of contact sequences.
The path contacts in this embodiment include visible path contacts explicitly disposed on the touch interface and hidden path contacts implicitly disposed on the touch interface. The hidden path contact is usually invisible and can only be triggered to display by the visible path contact. The triggering display means that the corresponding hidden path contact is displayed by lighting when the contact slides through a certain visible path contact.
The visible path contact of the embodiment is provided with a key retraction function, a key expansion function and a messy code sorting function. When detecting that a key retraction function of the visible path contact is selected, hiding other visible path contacts except the visible path contact in the touch interface; when detecting that a one-key expansion function of the visible path contact is selected, displaying all the visible path contacts on the touch interface; and when the messy code sorting function of the visible path contact is detected to be selected, randomly exchanging the arrangement positions of the visible path contact in the touch interface. For example, when a long-press operation applied to the visible path contact is detected, a function selection menu of the visible path contact (including a one-key expansion option, a one-key contraction option and a messy code sorting option) is displayed for the user to select, and when the selection of the user is detected, the corresponding operation is executed. After the scrambling code operation is executed, because the contact sequence in the contact sequence-encryption interface mapping table is a path contact ID sequence combination, if the sliding operation is still performed according to the original contact distribution position, the decryption will fail. If the patterns or the marks of the path contacts are different, the user can carry out sliding operation according to the original path contact ID sequence by memorizing to realize decryption. If the patterns or the marks of the contacts of the paths are the same and cannot be distinguished from each other, the contacts need to be restored from the messy code sequencing and then perform sliding operation according to the original path to realize decryption. In this embodiment, the visible path contact may be a fingerprint lock or a character mark or a pattern mark. For example, one of the visible path contacts may be provided as a fingerprint lock, and the remaining visible path contacts may be provided as character marks or pattern marks. The visible path contact point with the fingerprint lock is fixed as the first path contact point of the sliding operation, and the subsequent sliding operation can be triggered for decryption verification only after the fingerprint verification is passed. The visible path contact with the fingerprint lock can also be used for carrying out messy code sequencing recovery, and the path contact can be recovered from the messy code sequencing only after fingerprint verification is passed. Alternatively, the recovery of the scrambled code sequence can be independently verified and recovered through face ID recognition or independent fingerprint lock recognition.
In another embodiment, the visible path contacts are automatically scrambled once the decryption path is incorrect more than a preset number of times (e.g., 3 times). And needs to be verified and restored through face ID recognition or fingerprint lock recognition or the like.
Preferably, the foremost end of the touch interface is further provided with an obstacle contact. The obstacle contact and the path contact are arranged at the foremost end of the touch interface together, the decryption verification further comprises verifying whether the sliding operation passes through the obstacle contact, and if so, the decryption verification fails. The obstacle contacts may also include visible obstacle contacts disposed on the touch interface and hidden obstacle contacts disposed implicitly on the touch interface. The number of the obstacle contacts, the arrangement position, can be freely set by the user. Specifically, the obstacle contacts are set by providing candidate items of the obstacle contacts on a setting interface, acquiring the number of the selected path contacts according to the operation of a user, and arranging the positions of the obstacle contacts in the touch interface by the user through a dragging operation.
In another embodiment, the obstacle contacts and the path contacts may be arranged together in the setup interface by: the total number and the distribution positions of the obstacle contacts and the path contacts are freely set by selecting the number and the arrangement positions of the contacts, whether the contacts are the obstacle contacts or the path contacts is set by selecting the type attributes of the contacts, and whether the contacts are arranged on the touch interface in an explicit mode or in an implicit mode is set by selecting the display attributes of the contacts.
In another embodiment, the preset designated function can be decrypted through the sliding operation acted on the path contact point, so that the shortcut operation is realized. The predetermined functions include, but are not limited to: screen shots, streaming screen shots, video, recording, navigation, and the like.
Although embodiments of the present invention have been described, various changes or modifications may be made by one of ordinary skill in the art within the scope of the appended claims.

Claims (8)

1. A method for viewing an encrypted interface, comprising:
carrying out decryption verification when the sliding operation acting on the path contact is detected, and switching to a target encryption interface when the decryption verification is passed;
the decryption verification means that the contact sequence passing the sliding operation is searched in a contact sequence-encryption interface mapping table, if the search is successful, the decryption verification is passed, and otherwise, the decryption verification fails;
the target encryption interface is an encryption interface corresponding to the contact sequence passed by the sliding operation in the contact sequence-encryption interface mapping table;
the path contacts are multiple and are arranged at the foremost end of the touch interface of the electronic equipment;
the path contacts comprise visible path contacts explicitly arranged on the touch interface and hidden path contacts implicitly arranged on the touch interface;
the hidden path contact is triggered to be displayed by one or more visible path contacts.
2. A method of viewing an encrypted interface according to claim 1, wherein:
the visible path contact is provided with a key retracting function and a key unfolding function;
when detecting that a key retraction function of the visible path contact is selected, hiding other visible path contacts except the visible path contact in the touch interface;
and when detecting that a one-key expansion function of the visible path contact points is selected, displaying all the visible path contact points on the touch interface.
3. A method of viewing an encrypted interface according to claim 1, wherein:
the visible path contact is provided with a messy code sorting function;
and when the messy code sorting function of the visible path contact is detected to be selected, randomly exchanging the arrangement positions of the visible path contact in the touch interface.
4. A method of viewing an encrypted interface according to claim 1, wherein:
the visible path contact is a fingerprint lock or a character mark or a pattern mark.
5. A method of viewing an encrypted interface according to claim 1, wherein:
the foremost end of the touch interface is also provided with an obstacle contact;
the decryption verification further comprises verifying whether the sliding operation passes through the barrier contact, and if so, the decryption verification fails.
6. A method of viewing an encrypted interface according to claim 5, wherein:
the obstacle contacts include visible obstacle contacts disposed on the touch interface.
7. A method of viewing an encrypted interface according to claim 5, wherein:
the barrier contacts include hidden barrier contacts that are implicitly disposed at the touch interface.
8. A method of viewing an encrypted interface according to claim 1, wherein:
the encryption interface comprises a webpage interface, a resource manager interface and an application program interface.
CN201910915523.1A 2019-09-26 2019-09-26 Method for checking encrypted interface Active CN110704829B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910915523.1A CN110704829B (en) 2019-09-26 2019-09-26 Method for checking encrypted interface

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910915523.1A CN110704829B (en) 2019-09-26 2019-09-26 Method for checking encrypted interface

Publications (2)

Publication Number Publication Date
CN110704829A CN110704829A (en) 2020-01-17
CN110704829B true CN110704829B (en) 2021-04-23

Family

ID=69198001

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910915523.1A Active CN110704829B (en) 2019-09-26 2019-09-26 Method for checking encrypted interface

Country Status (1)

Country Link
CN (1) CN110704829B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103019608A (en) * 2012-12-27 2013-04-03 北京百度网讯科技有限公司 Unlocking method of touch screen terminal and touch screen terminal
CN103473000A (en) * 2013-10-11 2013-12-25 王恩惠 Method and system for unlocking as well as quickly opening and applying touch screen of electronic equipment
CN107132977B (en) * 2017-04-17 2020-12-01 努比亚技术有限公司 Rapid operation method and device for sliding of touch screen edge
CN108108110A (en) * 2017-12-11 2018-06-01 维沃移动通信有限公司 A kind of screen control method, screen control device and mobile terminal

Also Published As

Publication number Publication date
CN110704829A (en) 2020-01-17

Similar Documents

Publication Publication Date Title
JP5345850B2 (en) Method and apparatus for securely entering password or PIN by scrolling mouse wheel
US8286226B2 (en) Password protection system
AU2014327031B2 (en) Secure passcode entry user interface
CN104463004B (en) A kind of method and apparatus of protection interface content
Khan et al. Evaluating attack and defense strategies for smartphone pin shoulder surfing
CN106127076B (en) A kind of inspection method and mobile terminal of photograph album photo
CN103324898B (en) Method for encrypting/decrypting display content in touch screen, and communication terminal
KR20130087010A (en) Method and device for secured entry of personal data
CN104732121A (en) Encryption setting method, decryption setting method and corresponding device of application program
CN103902867A (en) Information protection method and electronic device
Hu et al. The security analysis of graphical passwords
CN103200011A (en) Password authentication method and device
US20140043243A1 (en) System and method for enhancing device passcode security
CN103699830A (en) Operating system unlocking method and operating system unlocking device
CN103186346A (en) Pattern-based touch screen unlocking system and method
CN105468962A (en) User interface unlocking method and apparatus
CN106778223A (en) A kind of cryptographic check method and mobile terminal
CN106648583B (en) Information processing method and terminal
Shen et al. Random graphic user password authentication scheme in mobile devices
Ritter et al. Miba: Multitouch image-based authentication on smartphones
Kuribara et al. Vibrainput: Two-step pin entry system based on vibration and visual information
CN101655768A (en) Anti-peep password input method
CN106250757A (en) The control method of a kind of application program and mobile terminal
joo Fong et al. The coin passcode: A shoulder-surfing proof graphical password authentication model for mobile devices
CN106407761B (en) Unlocking method and unlocking device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant