CN110781488A - Password prompting method and terminal equipment - Google Patents

Password prompting method and terminal equipment Download PDF

Info

Publication number
CN110781488A
CN110781488A CN201910993928.7A CN201910993928A CN110781488A CN 110781488 A CN110781488 A CN 110781488A CN 201910993928 A CN201910993928 A CN 201910993928A CN 110781488 A CN110781488 A CN 110781488A
Authority
CN
China
Prior art keywords
password
information
user
decryption
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910993928.7A
Other languages
Chinese (zh)
Other versions
CN110781488B (en
Inventor
毕言涵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910993928.7A priority Critical patent/CN110781488B/en
Publication of CN110781488A publication Critical patent/CN110781488A/en
Application granted granted Critical
Publication of CN110781488B publication Critical patent/CN110781488B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The invention discloses a password prompting method and terminal equipment, wherein the method comprises the following steps: when detecting that the first user fails in password verification, displaying a password prompt image, wherein the password prompt image comprises a cipher text of password prompt information; determining whether the first user carries out decryption operation on the password prompt image, wherein the decryption operation is used for inputting decryption information; and if the received decryption information meets the decryption condition of the password prompt information ciphertext, displaying the password prompt information for the first user to input the password again. Therefore, the image is used as the carrier of the password prompt information, and the password prompt information is displayed after the user successfully decrypts the password, so that the user is inspired to remember the correct password, and the password can be safely and conveniently retrieved.

Description

Password prompting method and terminal equipment
Technical Field
The invention relates to the field of terminals, in particular to a password prompting method and terminal equipment.
Background
When a user inputs a payment password, a login password or an authentication password, the user may forget the previously set password and need to retrieve the password.
At present, the password is generally retrieved by means of mobile phone number verification or input of an answer to the secret protection question, but the password cannot be retrieved because a user may replace the mobile phone number, or the password is retrieved by other people because an answer to the secret protection question is known by other people.
Therefore, a more reliable password prompting method is needed.
Disclosure of Invention
The embodiment of the invention aims to provide a password prompting method and terminal equipment.
In a first aspect, a method for password prompting is provided, where the method includes:
when detecting that the first user fails in password verification, displaying a password prompt image, wherein the password prompt image comprises a ciphertext of password prompt information;
determining whether the first user carries out decryption operation on the password prompt image, wherein the decryption operation is used for inputting decryption information;
and if the received decryption information meets the decryption condition of the password prompt information ciphertext, displaying the password prompt information for the first user to input the password again.
In a second aspect, a method for password prompting is provided, the method comprising:
when detecting that the first user fails in password verification, displaying a prompt information carrier, wherein the prompt information carrier contains a cipher text of password prompt information and comprises voice and/or characters;
determining whether the first user carries out decryption operation on the prompt information carrier, wherein the decryption operation is used for inputting decryption information;
and if the received decryption information meets the decryption condition of the password prompt information ciphertext, displaying the password prompt information for the first user to input the password again.
In a third aspect, a terminal device is provided, which includes:
the first display module is used for displaying a password prompt image when detecting that a first user fails to pass password verification, wherein the password prompt image comprises a ciphertext of password prompt information;
the decryption module is used for determining whether the first user carries out decryption operation on the password prompt image, and the decryption operation is used for inputting decryption information;
and the second display module is used for displaying the password prompt information for the first user to input the password again if the received decryption information meets the decryption condition of the password prompt information ciphertext.
In a fourth aspect, a terminal device is provided, which includes:
the fourth display module is used for displaying a password prompt image when detecting that the first user fails in password verification, wherein the password prompt image comprises a ciphertext of password prompt information;
the second decryption module is used for determining whether the first user carries out decryption operation on the password prompt image, and the decryption operation is used for inputting decryption information;
and the fifth display module is used for displaying the password prompt information for the first user to input the password again if the received decryption information meets the decryption condition of the password prompt information ciphertext.
In a fifth aspect, a terminal device is provided, where the terminal device includes: a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the method according to the first aspect.
In a sixth aspect, a terminal device is provided, which includes: a processor, a memory and a computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the method according to the second aspect.
In a seventh aspect, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, realizes the steps of the method according to the first aspect.
In an eighth aspect, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, realizes the steps of the method according to the second aspect.
In the embodiment of the invention, on one hand, the image is used as a carrier of the password prompt information to suggest that the user remembers the correct password, so that the aim of conveniently retrieving the password is fulfilled; on the other hand, the password prompt information is converted into the ciphertext to be displayed, and the password prompt information is displayed after the user successfully decrypts the password, so that the purpose of safely retrieving the password is achieved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
fig. 1 is a flowchart illustrating a password prompting method according to an embodiment of the present invention;
FIG. 2a is a schematic diagram of a password hint image corresponding to a friend gathering scene according to an embodiment of the present invention;
FIG. 2b is a diagram illustrating password hint information corresponding to the password hint image shown in FIG. 2 a;
FIG. 2c is a schematic diagram of a password hint image corresponding to a family scenario provided by another embodiment of the present invention;
FIG. 2d is a diagram illustrating password hint information corresponding to the password hint image shown in FIG. 2 c;
fig. 2e is a schematic diagram of a password authentication image provided by an embodiment of the present invention.
Fig. 3a is a flowchart illustrating a password prompting method according to another embodiment of the present invention;
fig. 3b is a schematic structural diagram of a terminal device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal device according to another embodiment of the present invention;
fig. 5 is a schematic structural diagram of a terminal device according to yet another embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without any inventive step, are within the scope of the present invention.
Fig. 1 is a schematic flow chart of a password prompting method provided in an embodiment of the present invention, which can be executed by a mobile terminal, and referring to fig. 1, the method may specifically include the following steps:
step 102: and when detecting that the first user fails in password verification, displaying a password prompt image, wherein the password prompt image comprises a cipher text of the password prompt information.
All users (i.e., users who set passwords) of the terminal device can be marked as second users, and then the first user can be the second user or other users besides the second user; the password prompting image is a carrier of password prompting information, and can be a static image or a dynamic image; the password prompt information refers to information which is preset by the second user and has an association relation with the password; the cipher text of the password prompt message refers to a character obtained by encrypting the password prompt message based on a preset encryption mode, and the preset encryption mode is set by a second user.
The cipher text of the password prompt information can be called as a password prompt information cipher text and can be preset by a user or terminal equipment for setting a password, and the cipher text of the password prompt information can be referred to by a first user to input decryption information; the password verification is used for verifying whether the password input by the first user is legal or not, and the password verification comprises verification of a screen locking password, a payment password, a login password and the like.
Further, one implementation of step 102 may be:
step 1021: the method comprises the steps that terminal equipment obtains password information input by a first user and verifies the password information;
step 1022: and if the number of times of continuous verification failure exceeds the preset upper limit of times, triggering and displaying the password prompting image.
It should be noted that, assuming that the password authentication process is performed on the login password, and the preset number of times is limited to 5, referring to fig. 2a, step 1021 and step 1022 may be specifically exemplified as:
the terminal device detects that the first user inputs the wrong login password for 5 times continuously, and displays a password prompt image shown in fig. 2a, wherein the password prompt image contains a cipher text of password prompt information, and the cipher text is used for selecting two friends of you.
It should be understood that the password hint image presented at step 102 may be an image previously uploaded by the second user, and before step 102, the method further comprises: an image processing step, which may be implemented in a manner of:
step S1: determining a target image uploaded by a second user in the password setting process;
step S2: determining whether the second user performs setting operation on the target image, wherein the setting operation is used for inputting password prompt information and decryption conditions corresponding to the target image;
step S3: and if the second user performs setting operation on the target image, encrypting the password prompt information corresponding to the target image to obtain a password prompt image.
Further, the target image uploaded by the second user may include images corresponding to a plurality of scenes, where the plurality of scenes are used to represent the relationship between the second user and other users; the step S1 may specifically be exemplified by:
firstly, dividing a plurality of scenes based on the relationship between the second user and other users; for example:
dividing a family scene based on the relationship between the second user and other users; dividing a school scene based on the teacher-student relationship or the classmate relationship between the second user and other users; dividing a company scene based on the co-worker relationship between the second user and other users; and dividing a friend gathering scene based on the friend relationship between the second user and other users.
Second, one or more images are uploaded for each of the plurality of scenes during the setting of the password.
Wherein, the image corresponding to each scene may be different, for example: the image corresponding to the family scene is generally an image related to family members, and the image corresponding to the work scene is generally an image related to colleagues or companies.
Based on the above, by uploading the target image in different scenes and displaying the password prompt image corresponding to the second scene different from the first scene of the first user to the first user instead of displaying the password prompt image corresponding to the first scene of the first user, the first user can be prevented from carrying out decryption operation on the password prompt image corresponding to the first scene according to the enlightenment of the first scene of the first user when the first user is not the second user, so that the password prompt information is obtained, and the security of the password can be ensured more reliably.
Accordingly, one implementation of step 102 may be:
determining a first scene where the first user is located, and displaying a password prompt image corresponding to a second scene; wherein the second scene is any one of the plurality of scenes except the first scene; the plurality of scenes includes family, school, company, and friend gathering, etc. Specific examples can be:
example 1, a terminal device captures a real-time image by using a camera carried by the terminal device, the real-time image includes a location environment of a first user, the terminal device compares the real-time image with a target image uploaded by a second user, and determines that the location environment of the first user matches with an image corresponding to a company scene uploaded by the second user, and then determines that the first scene where the first user is located is a company, and randomly displays an image corresponding to any scene of family, school, and friend gathering scenes to the first user.
Example 2, the terminal device determines current location information of the terminal device by using a GPS technology, compares the current location information with location information of scenes uploaded by a second user, such as a family, a school, a company, and a friend gathering place, determines that the current location information matches the location information of the school where the terminal device is located, determines that a first scene where a first user is located is the school, and randomly displays an image corresponding to any scene of the scenes of the family, the company, and the friend gathering to the first user.
It should be noted that, referring to fig. 2a to 2d, the circular area in fig. 2b is orange, the circular area in fig. 2d is red, and steps S1 to S3 may specifically be exemplified as:
firstly, the terminal device determines a first target image uploaded by a second user in a password setting process and shown in fig. 2a, and determines first password prompt information 'orange represents a month of a birthday' corresponding to the first target image input by the second user, and a first decryption condition 'an area touched by the first user is matched with an orange circular area shown in fig. 2 b'; secondly, the terminal device determines a second target image uploaded by the second user as shown in fig. 2c, and determines that the second password hint information "red represents capital letters" corresponding to the second target image input by the second user, and the second decryption condition "the area touched by the first user matches with the red circular area shown in fig. 2 c"; and finally, the terminal equipment encrypts first password prompt information corresponding to the first target image and second password prompt information corresponding to the second target image respectively to obtain a first password prompt image and a second password prompt image.
Based on the password prompting image, the target image which is uploaded and set by the second user in advance is encrypted to obtain the password prompting image, so that the password prompting information corresponding to the password prompting image can be displayed when the decryption information input by the first user meets the decryption condition, and the security of the password can be further reliably ensured.
Step 104: determining whether the first user carries out decryption operation on the password prompt image, wherein the decryption operation is used for inputting decryption information; and the decryption information is used for decrypting the ciphertext of the password prompt information to obtain the plaintext of the password prompt information.
It will be appreciated that after the user enters the decryption information, the method further comprises: and a decryption information verification step, namely verifying whether the decryption information can meet the decryption condition of the ciphertext of the password prompt information, wherein the decryption condition is a condition which is corresponding to the preset encryption mode and is required to be met by decrypting the ciphertext of the password prompt information to obtain the plaintext.
The decryption information verification step may specifically be as follows:
example 1, assume that the decryption information includes: the first user inputs the target biometric information based on the ciphertext of the password hint information, and the decryption information verification step may specifically be:
and if the target biological characteristic information is matched with the biological characteristic information required by the decryption condition, determining that the target biological characteristic information meets the decryption condition.
The biometric information may be a physiological characteristic inherent to a human body used by the first user for personal authentication, and the biometric information includes a fingerprint, an iris, a face, and the like.
It should be noted that, assuming that the first scene is a company, the displayed password hint image is an image corresponding to a school, and the ciphertext of the password hint information is "please verify your fingerprint", step 104 and the decryption verification step may specifically be exemplified as:
the first user presses the fingerprint identification area with the index finger of the right hand, the terminal device determines a target fingerprint input by the first user, compares the target fingerprint with a fingerprint (the index finger fingerprint of the right hand uploaded by the second user in advance) required by a decryption condition, and if the target fingerprint is matched with the fingerprint required by the decryption condition, the target fingerprint is determined to meet the decryption condition.
Based on the method, whether the target biological characteristic information meets the decryption condition is determined by comparing the target biological characteristic information input by the first user with the biological characteristic information required by the decryption condition, so that whether the decryption information of the first user meets the decryption condition can be determined more conveniently.
Example 2, assume that the decryption information includes: the first user inputs the target text information based on the ciphertext of the password hint information, and the decryption information verification step may specifically be:
and if the target text information is matched with the text information required by the decryption condition, determining that the target text information meets the decryption condition.
It should be noted that, assuming that the first scene is a company, the displayed password hint image is an image corresponding to a school, and the ciphertext of the password hint information is "name of your senior high school executive owner", step 104 and the decryption information verification step may be specifically exemplified as:
the method comprises the steps that a first user inputs target character information 'wangxian' in a text input box of a password prompt image, the terminal equipment compares the 'wangxian' with character information (names of senior high school banjo masters and majors preset by a second user) required by a decryption condition, and if the target character information is matched with the character information required by the decryption condition, the target character information is determined to meet the decryption condition.
Based on the method, whether the target character information meets the decryption condition can be determined not only through the target biological characteristic information input by the first user, but also through comparing the target character information input by the first user with the character information required by the decryption condition, so that whether the decryption information of the first user meets the decryption condition can be determined more conveniently and more variously.
Example 3, assume that the decryption information includes: the first user may specifically perform the decryption information verification step in a target area touched by the ciphertext of the password hint information on the password hint image:
and if the target area is matched with the area required by the decryption condition, determining that the target area meets the decryption condition.
It should be noted that, referring to fig. 2c, assuming that the first scene is a company, the displayed password hint image is an image corresponding to a family, and the ciphertext of the password hint information is "please select a family location", step 104 and the decryption information verification step may specifically be exemplified as:
the first user touches a target area of the password prompt image: and the terminal equipment compares the first area with an area (an area preset by a second user) required by a decryption condition, and if the target area is matched with the area required by the decryption condition, the target area is determined to meet the decryption condition.
Based on the method, whether the target area meets the decryption condition can be determined by comparing the target area touched by the first user with the area required by the decryption condition, so that whether the decryption information of the first user meets the decryption condition can be determined more conveniently, more variously and more flexibly.
Step 106: and if the received decryption information meets the decryption condition of the password prompt information ciphertext, displaying the password prompt information for the first user to input the password again.
It should be noted that, when there is one password hint, step 106 may specifically be exemplified as:
the terminal device determines that the decryption information input by the first user meets the decryption condition of the ciphertext of the password prompt information, displays the password prompt information that the password is your birth year and month (lunar calendar), and the user re-inputs the password "199303" based on the password prompt information.
It should be noted that, when there are a plurality of password hint information, after "displaying the password hint information" in step 106, a password verification image displaying step is further included, and an implementation manner of the step may be:
displaying a password verification image to allow the first user to input a password again by combining a plurality of password prompt messages and the password verification image;
the password verification image comprises a plurality of image elements with sequence, and the sequence of the image elements represents the sequence of the passwords corresponding to the password prompt messages.
It should be noted that, referring to fig. 2a to fig. 2e, the password verification image displaying step may specifically be exemplified as:
the terminal device determines that the area touched by the first user in the first password prompt image shown in fig. 2a is matched with the orange circular area required by the decryption condition, prompts the first user to select right, and displays first password prompt information orange shown in fig. 2b to the first user to represent the month of the birthday; the terminal device determines that the area touched by the first user in the second password hint image shown in fig. 2c matches the red circular area required by the decryption condition, prompts the first user to "select correct", and displays to the first user the second password hint information "red stands for capitalization of the first name" shown in fig. 2 d; the terminal device presents the password prompting image shown in fig. 2e to the first user (the circular areas 1 and 4 are red, the circular areas 2 and 3 are orange), the first user determines that the image elements corresponding to the circular areas 1 to 4 are father, son, wife and mother respectively, because the circular areas 1 and 4 are red, the capital letters of the father and the mother need to be input (red represents capital letters), the circular areas 2 and 3 are orange, the birth months of the son and wife need to be input (orange represents the month of birthday), and therefore the first user can input the capital letters of the father, the son and the wife in turn, and the maternal capital letters are input as the re-input password.
Based on this, the password verification image is displayed, so that the user can input the password more conveniently and accurately by combining the password prompt information and the password verification image.
In addition, if the decryption information does not meet the decryption condition of the cipher prompt information ciphertext, the situation that malicious unlocking possibly occurs is determined, and an alarm step is executed; one implementation of the step of alarming may be:
and recording the biological characteristic information and the position information of the first user, and sending alarm information to a preset emergency contact. Referring to fig. 2a and 2c, the alarm step may specifically be as follows:
example 1, the decryption information is not decrypted successfully after being input for multiple times:
the terminal device performs a first decryption attempt: when the fact that the target area touched by the first user's two friends selected out of the ciphertext of the first password hint image shown in fig. 2a is not matched with the area required by the decryption condition is detected, it is determined that the first decryption fails; the terminal device performs a second decryption attempt: when it is detected that a target region touched by a first user based on a ciphertext 'please select a home position' of a second password prompt image shown in fig. 2c is not matched with a region required by a decryption condition, it is determined that decryption fails for the second time, and since the number of times of decryption has reached a preset upper limit of times of decryption, a group of confusion images preset by the second user is displayed to the first user, so that in the process of performing decryption operation on images in the group of confusion images by the first user, a face and an iris of the first user are recorded, position information of the first user is determined, the face, the iris and the position information are sent to a server, and prompt information is sent to an emergency contact preset by the second user: "strange user tries decryption and sends its related information to the server, please pay attention to protect your password security".
Example 2, inputting multiple decryption information at a time did not succeed in decryption:
the terminal device first detects that the target area touched by the first user 'selecting two friends' based on the ciphertext of the first password hint image shown in fig. 2a is not matched with the area required by the decryption condition, then detects that the target area touched by the first user 'please select the home position' based on the ciphertext of the second password hint image shown in fig. 2c is not matched with the area required by the decryption condition, determining that the decryption attempt fails, and presenting a group of confusion images preset by the second user to the first user, so as to record the face and the iris of the first user in the process of the first user decrypting the images in the confusion image group, and determining the position information of the first user, sending the face, the iris and the position information to a server, and sending prompt information to an emergency contact preset by a second user: "strange user tries decryption and sends its related information to the server, please pay attention to protect your password security".
Based on this, by transmitting the alarm information when the decryption information does not satisfy the decryption condition, the security of the password can be ensured more reliably.
Therefore, on one hand, in the embodiment, the image is used as a carrier of the password prompt information to suggest that the user remembers the correct password, so that the purpose of conveniently finding the password is achieved; on the other hand, the password prompt information is converted into the ciphertext to be displayed, and the password prompt information is displayed after the user successfully decrypts the password, so that the purpose of safely retrieving the password is achieved.
Fig. 3a is a flowchart illustrating a password prompting method according to another embodiment of the present invention, which may be executed by a mobile terminal, and referring to fig. 3a, the method may specifically include the following steps:
step 302 a: when detecting that the first user fails in password verification, displaying a prompt information carrier, wherein the prompt information carrier contains a cipher text of password prompt information and comprises voice and/or text;
step 304 a: determining whether the first user carries out decryption operation on the prompt information carrier, wherein the decryption operation is used for inputting decryption information;
step 306 a: and if the received decryption information meets the decryption condition of the password prompt information ciphertext, displaying the password prompt information for the first user to input the password again.
Specifically, the steps 302a to 306a may be exemplified by:
example 1, assuming that the prompt information carrier is voice, the specific examples of the steps 302a to 306a are as follows:
the method comprises the steps that terminal equipment obtains password information input by a first user and verifies the password information; the terminal equipment detects that the number of times of continuous verification failure exceeds a preset upper limit of times, triggers to play voice (the voice relates to 5 persons), and pops up a ciphertext 'your favorite actor' after the voice is played; when the terminal device detects that the actor name input by the first user is matched with the actor name required by the decryption condition, the displayed password prompt information' the password comprises the following components in sequence: capitalization of the first person's name, lowercase of the second person's name, year of birth of the third person, month of birth of the fourth person, and age of the fifth person "; the first user listens that the voices of 5 persons are the voices of the father, mother, sister, brother and daughter respectively, and then the initials of the father name, the initials of the mother's name, the birth year of the sister, the birth month of the brother and the age of the daughter are sequentially input to be used as the re-input password.
Example 2, assuming that the prompt information carrier is a text, the specific examples of the steps 302a to 306a are as follows:
the method comprises the steps that terminal equipment obtains password information input by a first user and verifies the password information; the terminal equipment detects that the frequency of continuous verification failure exceeds a preset upper frequency limit, triggers and displays a character 'aaabbc', and pops up a ciphertext 'your favorite literary work'; when the terminal device detects that the literary work input by the first user is matched with the literary work required by the decryption condition, displaying password prompt information 'a is the birth month of your daughter, b is the age of your mother and c is the birth month of your husband'; the first user inputs the birth month of the daughter (3 times), the age of the mother (2 times), and the birth month of the husband (1 time) in sequence as the re-input password.
Example 3, assuming that the prompt information carrier is voice and text, the specific examples of the steps 302a to 306a may be:
the method comprises the steps that terminal equipment obtains password information input by a first user and verifies the password information;
when the terminal device detects that the number of times of continuous verification failure exceeds a preset upper limit of times, firstly, triggering to play voice (the voice relates to the voice of 3 persons), and popping up a ciphertext 'your favorite actor' after the voice is played; when the terminal device detects that the actor name input by the first user is matched with the actor name required by the decryption condition, the terminal device displays the password prompt information, wherein the first component of the password is as follows: capitalization of the first person's name, the year of birth of the second person's name, the month of birth of the third person "; the first user hears 3 persons' voices as the father, sister, and brother, respectively.
Secondly, triggering and displaying the text 'bac' and popping up a ciphertext 'favorite literary work of you'; and when the terminal equipment detects that the literary work input by the first user is matched with the literary work required by the decryption condition, displaying the password prompt information' in a second component of the password: a is the birth month of your daughter, b is the age of your mother, c is the birth month of your husband ".
The first user sequentially inputs the initials of the father's name, the birth year of the sister, the birth month of the brother, the age of the mother, the birth month of the daughter and the birth month of the husband as the re-input password.
Therefore, on one hand, in the embodiment, the prompt information carrier containing the cipher text of the password prompt information is used to enlighten the user to remember the correct password, so that the aim of conveniently retrieving the password is fulfilled; on the other hand, the password prompt information is converted into the ciphertext to be displayed, and the password prompt information is displayed after the user successfully decrypts the password, so that the purpose of safely retrieving the password is achieved.
Fig. 3b is a schematic structural diagram of a terminal device according to an embodiment of the present invention, and referring to fig. 3b, the terminal device may specifically include: a first presentation module 302b, a decryption module 304b, and a second presentation module 306b, wherein:
the first display module 302b is configured to display a password prompt image when detecting that the first user fails to pass password verification, where the password prompt image includes a ciphertext of password prompt information;
a decryption module 304b, configured to determine whether the first user performs a decryption operation on the password hint image, where the decryption operation is used to input decryption information;
the second displaying module 306b is configured to display the password prompt message for the first user to re-input the password if the received decryption information meets the decryption condition of the password prompt message.
Optionally, the terminal device further includes:
the uploading module is used for determining a target image uploaded by a second user in the password setting process;
the setting module is used for determining whether the second user performs setting operation on the target image, wherein the setting operation is used for inputting password prompt information and decryption conditions corresponding to the target image;
and the encryption module is used for encrypting the password prompt information corresponding to the target image to obtain the password prompt image if the second user performs setting operation on the target image.
Optionally, the target image uploaded by the second user includes images corresponding to a plurality of scenes, and the plurality of scenes are used for representing the relationship between the second user and other users;
the first display module 302b includes:
the first display sub-module is used for determining a first scene where the first user is located and displaying a password prompt image corresponding to a second scene;
wherein the second scene is any one of the plurality of scenes except the first scene.
Optionally, the decryption information includes: the first user inputs target biological characteristic information based on the cipher text of the password prompt information, and the terminal device further comprises:
and the first matching module is used for determining that the target biological characteristic information meets the decryption condition if the target biological characteristic information is matched with the biological characteristic information required by the decryption condition.
Optionally, the decryption information includes: the first user inputs target text information based on the ciphertext of the password prompt message, and then the terminal device further includes:
and the second matching module is used for determining that the target text information meets the decryption condition if the target text information is matched with the text information required by the decryption condition.
Optionally, the decryption information includes: the first user touches a target area on the password hint image based on the ciphertext of the password hint information, and the terminal device further includes:
and the third matching module is used for determining that the target area meets the decryption condition if the target area is matched with the area required by the decryption condition.
Optionally, when the password prompt information is multiple, the terminal device further includes:
the third display module is used for displaying the password verification image so that the first user can input the password again by combining the plurality of password prompt messages and the password verification image;
the password verification image comprises a plurality of image elements with sequence, and the sequence of the image elements represents the sequence of the passwords corresponding to the password prompt messages.
Optionally, the terminal device further includes:
and the alarm module is used for recording the biological characteristic information and the position information of the first user and sending alarm information to a preset emergency contact if the decryption information does not meet the decryption condition of the password prompt information ciphertext.
Therefore, on one hand, in the embodiment, the image is used as a carrier of the password prompt information to suggest that the user remembers the correct password, so that the purpose of conveniently finding the password is achieved; on the other hand, the password prompt information is converted into the ciphertext to be displayed, and the password prompt information is displayed after the user successfully decrypts the password, so that the purpose of safely retrieving the password is achieved.
The device provided by the embodiment of the present invention can implement each process implemented by the device in the method embodiments of fig. 1 to fig. 2e, and is not described herein again to avoid repetition. Further, it should be noted that, in the respective components of the apparatus of the present invention, the components therein are logically divided according to the functions to be realized, but the present invention is not limited thereto, and the respective components may be newly divided or combined as necessary.
Fig. 4 is a schematic structural diagram of a terminal device according to an embodiment of the present invention, and referring to fig. 4, the terminal device may specifically include: a fourth presentation module 402, a second decryption module 404, and a fifth presentation module 406, wherein:
a fourth display module 402, configured to display a password hint image when detecting that the first user fails to pass password verification, where the password hint image includes a ciphertext of password hint information;
a second decryption module 404, configured to determine whether the first user performs a decryption operation on the password hint image, where the decryption operation is used to input decryption information;
a fifth displaying module 406, configured to display the password hint information for the first user to re-input the password if the received decryption information meets the decryption condition of the password hint information ciphertext.
Therefore, on one hand, in the embodiment, the image is used as a carrier of the password prompt information to suggest that the user remembers the correct password, so that the purpose of conveniently finding the password is achieved; on the other hand, the password prompt information is converted into the ciphertext to be displayed, and the password prompt information is displayed after the user successfully decrypts the password, so that the purpose of safely retrieving the password is achieved.
The device provided by the embodiment of the present invention can implement each process implemented by the device in the method embodiment of fig. 3a, and is not described herein again to avoid repetition. Further, it should be noted that, among the respective components of the apparatus of the present invention, the components thereof are logically divided according to the functions to be realized, but the present invention is not limited thereto, and the respective components may be newly divided or combined as necessary.
Figure 5 is a schematic diagram of a hardware configuration of a mobile terminal implementing various embodiments of the present invention,
the mobile terminal 800 includes, but is not limited to: a radio frequency unit 801, a network module 802, an audio output unit 803, an input unit 804, a sensor 805, a display unit 806, a user input unit 807, an interface unit 808, a memory 809, a processor 810, and a power supply 811. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 5 is not intended to be limiting of mobile terminals, and that a mobile terminal may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the mobile terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 810 is configured to, when detecting that the first user fails to pass password authentication, display a password hint image, where the password hint image includes a ciphertext of password hint information;
determining whether the first user carries out decryption operation on the password prompt image, wherein the decryption operation is used for inputting decryption information;
and if the received decryption information meets the decryption condition of the password prompt information ciphertext, displaying the password prompt information for the first user to input the password again. Alternatively, the first and second electrodes may be,
the processor 810 is further configured to, when it is detected that the first user fails to pass the password verification, display a prompt information carrier, where the prompt information carrier includes a ciphertext of the password prompt information, and the prompt information carrier includes a voice and/or a text;
determining whether the first user carries out decryption operation on the prompt information carrier, wherein the decryption operation is used for inputting decryption information;
and if the received decryption information meets the decryption condition of the ciphertext of the password prompt information, displaying the password prompt information for the first user to input the password again.
On one hand, the image is used as a carrier of password prompt information to inspire the user to remember the correct password, so that the aim of conveniently finding the password is fulfilled; on the other hand, the password prompt information is converted into the ciphertext to be displayed, and the password prompt information is displayed after the user successfully decrypts the password, so that the purpose of safely retrieving the password is achieved.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 801 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 810; in addition, the uplink data is transmitted to the base station. In general, radio frequency unit 801 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. Further, the radio frequency unit 801 can also communicate with a network and other devices through a wireless communication system.
The mobile terminal provides the user with wireless broadband internet access through the network module 802, such as helping the user send and receive e-mails, browse webpages, access streaming media, and the like.
The audio output unit 803 may convert audio data received by the radio frequency unit 801 or the network module 802 or stored in the memory 809 into an audio signal and output as sound. Also, the audio output unit 803 may also provide audio output related to a specific function performed by the mobile terminal 800 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 803 includes a speaker, a buzzer, a receiver, and the like.
The input unit 804 is used for receiving an audio or video signal. The input Unit 804 may include a Graphics Processing Unit (GPU) 8041 and a microphone 8042, and the Graphics processor 8041 processes image data of a still picture or video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 806. The image frames processed by the graphics processor 8041 may be stored in the memory 809 (or other storage medium) or transmitted via the radio frequency unit 801 or the network module 802. The microphone 8042 may receive sound and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 801 in case of a phone call mode.
The mobile terminal 800 also includes at least one sensor 805, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 8061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 8061 and/or the backlight when the mobile terminal 800 moves to the ear. As one type of motion sensor, an accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of a mobile terminal (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 805 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 806 is used to display information input by the user or information provided to the user. The Display unit 806 may include a Display panel 8061, and the Display panel 8061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 807 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 807 includes a touch panel 8071 and other input devices 8072. The touch panel 8071, also referred to as a touch screen, can collect touch operations by a user on or near the touch panel 8071 (e.g., operations by a user on or near the touch panel 8071 using any suitable object or accessory such as a finger, a stylus, etc.). The touch panel 8071 may include two portions of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 810, receives a command from the processor 810, and executes the command. In addition, the touch panel 8071 can be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 8071, the user input unit 807 can include other input devices 8072. Specifically, the other input devices 8072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a track ball, a mouse, and a joystick, which are not described herein again.
Further, the touch panel 8071 can be overlaid on the display panel 8061, and when the touch panel 8071 detects a touch operation on or near the touch panel 8071, the touch operation is transmitted to the processor 810 to determine the type of the touch event, and then the processor 810 provides a corresponding visual output on the display panel 8061 according to the type of the touch event. Although the touch panel 8071 and the display panel 8061 are shown in fig. 5 as two separate components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 8071 and the display panel 8061 may be integrated to implement the input and output functions of the mobile terminal, which is not limited herein.
The interface unit 808 is an interface through which an external device is connected to the mobile terminal 800. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 808 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 800 or may be used to transmit data between the mobile terminal 800 and external devices.
The memory 809 may be used to store software programs as well as various data. The memory 809 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 809 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 810 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 809 and calling data stored in the memory 809, thereby integrally monitoring the mobile terminal. Processor 810 may include one or more processing units; preferably, the processor 810 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 810.
The mobile terminal 800 may also include a power supply 811 (e.g., a battery) for powering the various components, and the power supply 811 may be logically coupled to the processor 810 via a power management system that may be configured to manage charging, discharging, and power consumption.
In addition, the mobile terminal 800 includes some functional modules that are not shown, and thus, are not described in detail herein.
Preferably, an embodiment of the present invention further provides a terminal device, which includes a processor, a memory, and a computer program stored in the memory and capable of running on the processor, where the computer program is executed by the processor to implement each process of the above password hint method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above-mentioned password hint method embodiment, and can achieve the same technical effect, and in order to avoid repetition, the computer program is not described here again. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the above embodiment method can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better embodiment. Based on such understanding, the technical solution of the present invention may be substantially or partially embodied in the form of a software product stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk), and including instructions for enabling a terminal (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. A password hint method, comprising:
when detecting that the first user fails in password verification, displaying a password prompt image, wherein the password prompt image comprises a cipher text of password prompt information;
determining whether the first user carries out decryption operation on the password prompt image, wherein the decryption operation is used for inputting decryption information;
and if the received decryption information meets the decryption condition of the password prompt information ciphertext, displaying the password prompt information for the first user to input the password again.
2. The method of claim 1, further comprising, prior to said presenting the password hint image:
determining a target image uploaded by a second user in the password setting process;
determining whether the second user performs setting operation on the target image, wherein the setting operation is used for inputting password prompt information and decryption conditions corresponding to the target image;
and if the second user performs setting operation on the target image, encrypting the password prompt information corresponding to the target image to obtain a password prompt image.
3. The method according to claim 2, wherein the target image uploaded by the second user comprises images corresponding to a plurality of scenes, and the scenes are used for representing the relationship between the second user and other users;
wherein, show password hint image includes:
determining a first scene where the first user is located, and displaying a password prompt image corresponding to a second scene;
wherein the second scene is any one of the plurality of scenes except the first scene.
4. The method of claim 1, wherein the decryption information comprises: the first user inputs target biometric information based on the ciphertext of the password hint information, and the method further comprises:
and if the target biological characteristic information is matched with the biological characteristic information required by the decryption condition, determining that the target biological characteristic information meets the decryption condition.
5. The method of claim 1, wherein the decryption information comprises: the first user inputs target text information based on the ciphertext of the password hint information, and the method further comprises:
and if the target text information is matched with the text information required by the decryption condition, determining that the target text information meets the decryption condition.
6. The method of claim 1, wherein the decryption information comprises: the first user clicks a target region on the password hint image based on the ciphertext of the password hint information, and the method further comprises:
and if the target area is matched with the area required by the decryption condition, determining that the target area meets the decryption condition.
7. The method according to claim 6, wherein when there are a plurality of password hint information, after said presenting the password hint information, further comprising:
displaying a password verification image to allow the first user to input a password again by combining a plurality of password prompt messages and the password verification image;
the password verification image comprises a plurality of image elements with sequences, and the sequence of the image elements represents the sequence of the passwords corresponding to the password prompt messages.
8. The method of claim 1, further comprising:
and if the decryption information does not meet the decryption condition of the password prompt information ciphertext, recording the biological characteristic information and the position information of the first user, and sending alarm information to a preset emergency contact.
9. A password hint method, comprising:
when detecting that the first user fails in password verification, displaying a prompt information carrier, wherein the prompt information carrier contains a cipher text of password prompt information and comprises voice and/or characters;
determining whether the first user carries out decryption operation on the prompt information carrier, wherein the decryption operation is used for inputting decryption information;
and if the received decryption information meets the decryption condition of the password prompt information ciphertext, displaying the password prompt information for the first user to input the password again.
10. A terminal device, comprising:
the first display module is used for displaying a password prompt image when detecting that a first user fails to pass password verification, wherein the password prompt image comprises a cipher text of password prompt information;
the decryption module is used for determining whether the first user carries out decryption operation on the password prompt image, and the decryption operation is used for inputting decryption information;
and the second display module is used for displaying the password prompt information for the first user to input the password again if the decryption information meets the decryption condition of the password prompt information ciphertext.
CN201910993928.7A 2019-10-18 2019-10-18 Password prompting method and terminal equipment Active CN110781488B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910993928.7A CN110781488B (en) 2019-10-18 2019-10-18 Password prompting method and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910993928.7A CN110781488B (en) 2019-10-18 2019-10-18 Password prompting method and terminal equipment

Publications (2)

Publication Number Publication Date
CN110781488A true CN110781488A (en) 2020-02-11
CN110781488B CN110781488B (en) 2021-05-28

Family

ID=69385974

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910993928.7A Active CN110781488B (en) 2019-10-18 2019-10-18 Password prompting method and terminal equipment

Country Status (1)

Country Link
CN (1) CN110781488B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113704814A (en) * 2021-07-26 2021-11-26 维沃移动通信(杭州)有限公司 Information management method and device
CN113867609A (en) * 2020-06-30 2021-12-31 阿里巴巴集团控股有限公司 Information prompting method and device and password setting method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104320256A (en) * 2014-10-20 2015-01-28 厦门美图移动科技有限公司 Method for achieving fingerprint universal password verification
CN106791060A (en) * 2016-12-12 2017-05-31 努比亚技术有限公司 Mobile terminal and its method of password authentication
US20170193217A1 (en) * 2014-09-22 2017-07-06 Alibaba Group Holding Limited Password protection question setting method and device
CN108551521A (en) * 2018-03-16 2018-09-18 维沃移动通信有限公司 A kind of log-on message reminding method and mobile terminal
CN109472122A (en) * 2018-12-29 2019-03-15 上海爱优威软件开发有限公司 A kind of multimedia messages reminding method and system
CN109831412A (en) * 2018-12-25 2019-05-31 孝感天创信息科技有限公司 Remind the login method of user password

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170193217A1 (en) * 2014-09-22 2017-07-06 Alibaba Group Holding Limited Password protection question setting method and device
CN104320256A (en) * 2014-10-20 2015-01-28 厦门美图移动科技有限公司 Method for achieving fingerprint universal password verification
CN106791060A (en) * 2016-12-12 2017-05-31 努比亚技术有限公司 Mobile terminal and its method of password authentication
CN108551521A (en) * 2018-03-16 2018-09-18 维沃移动通信有限公司 A kind of log-on message reminding method and mobile terminal
CN109831412A (en) * 2018-12-25 2019-05-31 孝感天创信息科技有限公司 Remind the login method of user password
CN109472122A (en) * 2018-12-29 2019-03-15 上海爱优威软件开发有限公司 A kind of multimedia messages reminding method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113867609A (en) * 2020-06-30 2021-12-31 阿里巴巴集团控股有限公司 Information prompting method and device and password setting method
CN113704814A (en) * 2021-07-26 2021-11-26 维沃移动通信(杭州)有限公司 Information management method and device

Also Published As

Publication number Publication date
CN110781488B (en) 2021-05-28

Similar Documents

Publication Publication Date Title
CN108038393B (en) Application privacy protection method and mobile terminal
CN108510022B (en) Two-dimensional code generation and verification method and server
CN109145552B (en) Information encryption method and terminal equipment
CN110188524B (en) Information encryption method, information decryption method and terminal
CN108629171B (en) Unread message processing method and terminal
CN110149628B (en) Information processing method and terminal equipment
CN108616448B (en) Information sharing path recommendation method and mobile terminal
CN108052819B (en) Face recognition method, mobile terminal and computer readable storage medium
CN110035183B (en) Information sharing method and terminal
CN108985034B (en) Unlocking method and terminal equipment
CN108491713B (en) Safety reminding method and electronic equipment
CN107861669A (en) The switching method and mobile terminal of a kind of custom system
CN110990849A (en) Encryption and decryption method for private data and terminal
CN108280337A (en) A kind of message protection method and mobile terminal
CN110781488B (en) Password prompting method and terminal equipment
CN106060098A (en) Processing method, processing device and processing system for verification codes
CN109918944B (en) Information protection method and device, mobile terminal and storage medium
CN110784394A (en) Prompting method and electronic equipment
CN107835297B (en) Information updating method, mobile terminal and computer readable storage medium
CN109740312A (en) A kind of application control method and terminal device
CN109446794B (en) Password input method and mobile terminal thereof
CN109753776B (en) Information processing method and device and mobile terminal
CN111310250A (en) Application sharing method and electronic equipment
WO2019206224A1 (en) Screen unlocking method and mobile terminal
CN110717163B (en) Interaction method and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant