CN111310157A - Password unlocking method, device, equipment and storage medium - Google Patents

Password unlocking method, device, equipment and storage medium Download PDF

Info

Publication number
CN111310157A
CN111310157A CN202010084696.6A CN202010084696A CN111310157A CN 111310157 A CN111310157 A CN 111310157A CN 202010084696 A CN202010084696 A CN 202010084696A CN 111310157 A CN111310157 A CN 111310157A
Authority
CN
China
Prior art keywords
unlocking
information
interference
password
interference information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010084696.6A
Other languages
Chinese (zh)
Inventor
赵仁辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Infinite Light Field Technology Co Ltd
Original Assignee
Beijing Infinite Light Field Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Infinite Light Field Technology Co Ltd filed Critical Beijing Infinite Light Field Technology Co Ltd
Priority to CN202010084696.6A priority Critical patent/CN111310157A/en
Publication of CN111310157A publication Critical patent/CN111310157A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Abstract

The disclosure provides a password unlocking method, a password unlocking device, equipment and a storage medium. The password unlocking method comprises the following steps: determining unlocking interference modes of the unlocking password, wherein the unlocking interference modes at least comprise one mode; displaying corresponding interference information according to the determined unlocking interference mode to prevent the password from being leaked; acquiring an operation gesture of a user in the interference information; and comparing whether the unlocking information determined by the operation gesture is consistent with preset unlocking information or not, and if so, successfully unlocking. The password leakage can be prevented in the process of unlocking the password by the mobile terminal, and the use experience of a user is improved.

Description

Password unlocking method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of computer software technologies, and in particular, to a password unlocking method, apparatus, device, and storage medium.
Background
Privacy protection generally includes access rights of the mobile terminal and access rights of the application. The access right of the mobile terminal can be realized through a screen locking and unlocking means, such as sliding unlocking, password unlocking and the like of the apple ios system. The privacy protection of the application is usually achieved by controlling the access rights of different users, for example, when some important information in the mobile terminal is accessed, it is necessary to determine whether the visitor has the right, and the best method for determining whether the visitor has the right is controlled by a password. A connection unlocking method such as a Sudoku connection lock is one of the popular unlocking methods at present, but the connection unlocking method also has certain defects: the connection track is easy to be peeped by others, which affects the safety of the connection track.
Disclosure of Invention
The present disclosure has been made to solve the above problems, and an object of the present disclosure is to provide a password unlocking method, device, apparatus, and storage medium that are simple and efficient and can prevent a password from being leaked during a process of unlocking the password by a terminal. This disclosure provides this summary in order to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
In order to solve the above technical problem, an embodiment of the present disclosure provides a password unlocking method, where a password is used to unlock a terminal, and the following technical scheme is adopted:
determining an unlocking interference mode for unlocking the password, wherein the unlocking interference mode at least comprises one mode;
displaying corresponding interference information according to the determined unlocking interference mode to prevent the password from being leaked;
acquiring an operation gesture in the interference information;
comparing whether the unlocking information determined by the operation gesture is consistent with preset unlocking information or not, and if so, successfully unlocking;
wherein the interference information at least comprises one of input interference information and output interference information.
In order to solve the above technical problem, an embodiment of the present disclosure further provides a password unlocking device, where the password is used to unlock a terminal, and the following technical scheme is adopted, where the password unlocking device includes:
the mode determination module is used for determining unlocking interference modes for unlocking the password, wherein the unlocking interference modes at least comprise one mode;
the interference information display module is used for displaying corresponding interference information according to the determined unlocking interference mode so as to prevent the password from being leaked;
the gesture acquisition module is used for acquiring the operation gesture in the interference information;
the comparison and judgment module is used for comparing whether the unlocking information determined by the operation gesture is consistent with preset unlocking information or not, and if so, the unlocking is successful;
wherein the interference information at least comprises one of input interference information and output interference information.
In order to solve the above technical problem, an embodiment of the present disclosure further provides a computer device, which adopts the following technical solutions:
comprising a memory having a computer program stored therein and a processor implementing the method as described above when executing the computer program.
In order to solve the above technical problem, an embodiment of the present disclosure further provides a computer-readable storage medium, which adopts the following technical solutions:
the computer-readable storage medium has stored thereon a computer program which, when executed by a processor, implements the method as described above.
According to the technical scheme disclosed by the disclosure, compared with the prior art, the password can be prevented from being leaked in the process of unlocking the password by the terminal, and the use experience of a user is improved.
Drawings
FIG. 1 is an exemplary system architecture diagram in which the present disclosure may be applied;
FIG. 2 is a flow diagram of one embodiment of a password unlocking method according to the present disclosure;
FIG. 3 is a schematic diagram of one embodiment of a password unlocking method according to the present disclosure;
FIG. 4 is a schematic view of one embodiment of a combination unlock device according to the present disclosure;
FIG. 5 is a schematic block diagram of one embodiment of a computer device according to the present disclosure.
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and features are not necessarily drawn to scale.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs; the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure; the terms "including" and "having," and any variations thereof, in the description and claims of this disclosure and the description of the above figures are intended to cover non-exclusive inclusions. The terms "first," "second," and the like in the description and claims of the present disclosure or in the above-described drawings are used for distinguishing between different objects and not for describing a particular order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the disclosure. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
In order to make the technical solutions of the present disclosure better understood by those skilled in the art, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.
[ System Structure ]
First, the structure of the system of one embodiment of the present disclosure is explained. As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, 104, a network 105, and a server 106. The network 105 serves as a medium for providing communication links between the terminal devices 101, 102, 103, 104 and the server 106.
In the present embodiment, an electronic device (for example, the terminal device 101, 102, 103, or 104 shown in fig. 1) on which the password unlocking method operates may perform transmission of various information through the network 105. Network 105 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few. It should be noted that the wireless connection means may include, but is not limited to, a 3G/4G/5G connection, a Wi-Fi connection, a bluetooth connection, a WiMAX connection, a Zigbee connection, a UWB connection, and other now known or later developed wireless connection means.
A user may use terminal devices 101, 102, 103, 104 to interact with a server 106 via a network 105 to receive or send messages or the like. Various client applications, such as a video live and play application, a web browser application, a shopping application, a search application, an instant messaging tool, a mailbox client, social platform software, etc., may be installed on the terminal device 101, 102, 103, or 104.
The terminal device 101, 102, 103 or 104 may be various electronic devices having a touch screen display and/or supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (moving picture experts group compressed standard audio layer 3), MP4 (moving picture experts group compressed standard audio layer 4) players, head mounted display devices, laptop portable computers, desktop computers, and the like.
The server 106 may be a server that provides various services, such as a background server that provides support for pages displayed on the terminal devices 101, 102, 103, or 104.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Here, the terminal device may implement the embodiment method of the present disclosure independently or by running an application in an android system in cooperation with other electronic terminal devices, or may run an application in other operating systems, such as an iOS system, a Windows system, a hongmeng system, and the like, to implement the embodiment method of the present disclosure.
[ password unlocking method ]
Referring to fig. 2, a flow diagram of one embodiment of a password unlocking method in accordance with the present disclosure is shown. The password unlocking method is used for unlocking the mobile terminal and comprises the following steps:
s21, determining an unlocking interference mode for unlocking the password, wherein the unlocking interference mode at least comprises one mode, and a user can select or switch the unlocking interference mode before unlocking the password, wherein the unlocking interference mode can default to the last unlocking interference mode in the non-switched state, and certainly can randomly switch the unlocking interference mode;
s22, displaying corresponding interference information according to the determined unlocking interference mode to prevent password leakage;
here, the interference information includes, for example, at least one of input interference information and output interference information.
Here, the input interference information includes, for example, at least one of unlock interface interference information and/or user input interference information.
Here, the unlocking interface interference information includes, for example, at least one of unlocking interface horizontal rotation angle information and unlocking interface mirror image turning information, where the unlocking interface horizontal rotation angle may be preset by a user or may be randomly set, where the unlocking interface horizontal rotation angle may be any angle between 0 degree and 360 degrees; the unlocking interface mirror image turning information can be preset by a user or can be randomly set, wherein the unlocking interface mirror image turning can be horizontal turning or vertical turning; here, it is needless to say that the combination of the unlocking interface horizontal rotation angle information and the unlocking interface mirror image flipping information may be set by the user in advance, or may be set randomly, and the unlocking interface horizontal rotation angle and the unlocking interface mirror image flipping manner may be any combination.
The user input interference information at least comprises one of user input horizontal rotation angle information and user input mirror image overturning information.
Here, the horizontal rotation angle input by the user may be preset by the user or may be randomly set, where the horizontal rotation angle may be any angle between 0 degree and 360 degrees; the mirror image turning information input by the user can be preset by the user or can be randomly set, wherein the mirror image turning input by the user can be horizontal turning or vertical turning; here, it is needless to say that the combination of the user input horizontal rotation angle information and the user input mirror image inversion information may be set by the user in advance, or may be set at random, and the user input horizontal rotation angle and the user input mirror image inversion method may be any combination.
Here, the outputting the disturbance information includes at least one of increasing the output display item, decreasing the output display item, and changing the output display item.
Here, the manner of adding the output display item includes, for example, a manner of clicking a number to unlock, a manner of clicking a certain number to select another number or numbers, and a manner of adding a display pattern when displaying a link pattern.
Here, the method of reducing the output of the display item includes, for example, a method of clicking a number to unlock the display item, a method of clicking a certain number not to display the selected number, and a method of reducing the content of the display pattern when displaying the connection pattern.
Here, the change output display item includes at least one of a display pattern of the change operation gesture, a transparency of the change display pattern, and a size of the change display pattern.
Here, the display pattern of the change operation gesture includes, for example, a mode of clicking a number to unlock, a mode of clicking a number to display that another number is selected, and a mode of displaying a link pattern to display contents of another pattern.
Here, the transparency of the display pattern may be changed, for example, to increase the transparency of the display pattern to be completely transparent, or may be changed to be completely opaque, and the transparency may be changed at any ratio; the transparency of the display pattern is improved to be completely transparent, for example, a specific picture is used as a reference position to complete unlocking.
Here, the disturbance information may be, of course, any one or a combination of a plurality of kinds of the above disturbance information, for example, the unlock interface horizontal rotation angle is 90 degrees and the display pattern transparency is improved, or the like.
S23, acquiring the operation gesture of the user in the interference information;
here, the operation gesture of the user may be a click, a long press, a slide, or the like, and the click may be, for example, a single click, a double click, or other number of multiple clicks; the long press is, for example, a press key for more than 0.5 second, but may be any other time; the sliding may be, for example, various sliding manners such as sliding to raise a hand or sliding to hover, and the like, without limitation.
S24, comparing whether the unlocking information determined by the operation gesture is consistent with the preset unlocking information or not, and if so, successfully unlocking; if not, the user is reminded to retry again or perform other processing.
Here, in one or more embodiments, preset unlocking information corresponding to the unlocking interference mode is further set.
Here, the preset unlocking information may be preset, or may be calculated based on a combination setting of the unlocking interference pattern.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
[ example method ]
Turning now to a method of one embodiment of the present disclosure, referring to fig. 3, a schematic diagram of one embodiment of a password unlocking method according to the present disclosure is shown, comprising the steps of:
step 1, preset unlocking information corresponding to the unlocking interference mode is set, and information capable of unlocking is preset, for example, in the embodiment, password information capable of unlocking is 4-8-9-6-5.
And 2, determining an unlocking interference mode of the unlocking password, for example, in the embodiment, the unlocking interference mode is an unlocking interface horizontal rotation mode.
Step 3, displaying corresponding interference information according to the determined unlocking interference mode to prevent the password from being leaked; for example, in the horizontal rotation mode of the unlocking interface in the embodiment, the interference information is that the unlocking interface horizontally rotates clockwise by 90 degrees.
Step 4, acquiring an operation gesture of the user in the interference information; for example, in this embodiment the swipe gesture of the user is captured starting with the number 4 and connecting lines 4-8-9-6-5.
And 5, comparing whether the unlocking information 4-8-9-6-5 determined by the operation gesture is consistent with the preset unlocking information 4-8-9-6-5 or not, and if so, successfully unlocking.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the computer program is executed. The storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a Read Only Memory (ROM), or a Random Access Memory (RAM).
[ password unlocking device ]
As shown in fig. 4, in order to implement the technical solution in the embodiment of the present disclosure, the present disclosure provides a password unlocking device, which may be specifically applied to various electronic terminal devices.
The password unlocking device described in this embodiment includes: the device comprises a mode determining module 401, an interference information displaying module 402, a gesture obtaining module 403, a comparison judging module 404 and an unlocking information setting module 405.
The mode determination module 401 is configured to determine an unlocking interference mode of the unlocking password, where the unlocking interference mode includes at least one of the unlocking interference modes; the user can select or switch the unlocking interference mode before unlocking the password, wherein the unlocking interference mode can default to the last used unlocking interference mode in the non-switched state, and certainly can randomly switch the unlocking interference mode;
the interference information display module 402 displays corresponding interference information according to the determined unlocking interference mode to prevent password leakage;
here, the interference information includes, for example, at least one of input interference information and output interference information.
Here, the input interference information includes, for example, at least one of unlock interface interference information and/or user input interference information.
Here, the unlocking interface interference information includes, for example, at least one of unlocking interface horizontal rotation angle information and unlocking interface mirror image turning information, where the unlocking interface horizontal rotation angle may be preset by a user or may be randomly set, where the unlocking interface horizontal rotation angle may be any angle between 0 degree and 360 degrees; the unlocking interface mirror image turning information can be preset by a user or can be randomly set, wherein the unlocking interface mirror image turning can be horizontal turning or vertical turning; here, it is needless to say that the combination of the unlocking interface horizontal rotation angle information and the unlocking interface mirror image flipping information may be set by the user in advance, or may be set randomly, and the unlocking interface horizontal rotation angle and the unlocking interface mirror image flipping manner may be any combination.
The user input interference information at least comprises one of user input horizontal rotation angle information and user input mirror image overturning information.
Here, the horizontal rotation angle input by the user may be preset by the user or may be randomly set, where the horizontal rotation angle may be any angle between 0 degree and 360 degrees; the mirror image turning information input by the user can be preset by the user or can be randomly set, wherein the mirror image turning input by the user can be horizontal turning or vertical turning; here, it is needless to say that the combination of the user input horizontal rotation angle information and the user input mirror image inversion information may be set by the user in advance, or may be set at random, and the user input horizontal rotation angle and the user input mirror image inversion method may be any combination.
Here, the outputting the disturbance information includes at least one of increasing the output display item, decreasing the output display item, and changing the output display item.
Here, the manner of adding the output display item includes, for example, a manner of clicking a number to unlock, a manner of clicking a certain number to select another number or numbers, and a manner of adding a display pattern when displaying a link pattern.
Here, the method of reducing the output of the display item includes, for example, a method of clicking a number to unlock the display item, a method of clicking a certain number not to display the selected number, and a method of reducing the content of the display pattern when displaying the connection pattern.
Here, the change output display item includes at least one of a display pattern of the change operation gesture, a transparency of the change display pattern, and a size of the change display pattern.
Here, the display pattern of the change operation gesture includes, for example, a mode of clicking a number to unlock, a mode of clicking a number to display that another number is selected, and a mode of displaying a link pattern to display contents of another pattern.
Here, the transparency of the display pattern may be changed, for example, to increase the transparency of the display pattern to be completely transparent, or may be changed to be completely opaque, and the transparency may be changed at any ratio; the transparency of the display pattern is improved to be completely transparent, for example, a specific picture is used as a reference position to complete unlocking.
Here, the disturbance information may be, of course, any one or a combination of a plurality of kinds of the above disturbance information, for example, the unlock interface horizontal rotation angle is 90 degrees and the display pattern transparency is improved, or the like.
A gesture obtaining module 403, configured to obtain an operation gesture of the user in the interference information;
here, the operation gesture of the user may be a click, a long press, a slide, or the like, and the click may be, for example, a single click, a double click, or other number of multiple clicks; the long press is, for example, a press key for more than 0.5 second, but may be any other time; the sliding may be, for example, various sliding manners such as sliding to raise a hand or sliding to hover, and the like, without limitation.
The comparison and judgment module 404 compares whether the unlocking information determined by the operation gesture is consistent with the preset unlocking information, and if so, the unlocking is successful; if not, the user is reminded to retry again or perform other processing.
The unlocking information setting module 405 sets preset unlocking information corresponding to the unlocking interference mode. Here, the preset unlocking information may be preset, or may be calculated based on a combination setting of the unlocking interference pattern.
It should be understood that although each block in the block diagrams of the figures may represent a module, a portion of which comprises one or more executable instructions for implementing the specified logical function(s), the blocks are not necessarily executed sequentially. Each module and functional unit in the device embodiments in the present disclosure may be integrated into one processing module, or each unit may exist alone physically, or two or more modules or functional units are integrated into one module. The integrated modules can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium. The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
[ password unlocking device ]
In order to solve the technical problem, an embodiment of the present disclosure further provides an electronic device. Referring now to fig. 5, a schematic diagram of an electronic device (e.g., the terminal device or the server in fig. 1) 500 suitable for implementing embodiments of the present disclosure is shown. The terminal device in the embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle terminal (e.g., a car navigation terminal), and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. The electronic device shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 5, electronic device 500 may include a processing means (e.g., central processing unit, graphics processor, etc.) 501 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage means 506 into a Random Access Memory (RAM) 503. In the RAM503, various programs and data necessary for the operation of the electronic apparatus 500 are also stored. The processing device 501, the ROM502, and the RAM503 are connected to each other through a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
Generally, the following devices may be connected to the I/O interface 505: input devices 506 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 507 including, for example, a Liquid Crystal Display (LCD), speakers, vibrators, and the like; storage devices 506 including, for example, magnetic tape, hard disk, etc.; and a communication device 509. The communication means 509 may allow the electronic device 500 to communicate with other devices wirelessly or by wire to exchange data. While fig. 5 illustrates an electronic device 500 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 509, or installed from the storage means 506, or installed from the ROM 502. The computer program performs the above-described functions defined in the methods of the embodiments of the present disclosure when executed by the processing device 501.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network protocol, such as HTTP (hypertext transfer protocol), and may interconnect with any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: acquiring at least two internet protocol addresses; sending a node evaluation request comprising the at least two internet protocol addresses to node evaluation equipment, wherein the node evaluation equipment selects the internet protocol addresses from the at least two internet protocol addresses and returns the internet protocol addresses; receiving an internet protocol address returned by the node evaluation equipment; wherein the obtained internet protocol address indicates an edge node in the content distribution network.
Alternatively, the computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: receiving a node evaluation request comprising at least two internet protocol addresses; selecting an internet protocol address from the at least two internet protocol addresses; returning the selected internet protocol address; wherein the received internet protocol address indicates an edge node in the content distribution network.
Computer program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including but not limited to an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of a unit does not in some cases constitute a limitation of the unit itself, for example, the first retrieving unit may also be described as a "unit for retrieving at least two internet protocol addresses".
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
According to one or more embodiments of the present disclosure, there is provided a password unlocking method, where a password is used to unlock a terminal, the method including:
determining an unlocking interference mode for unlocking the password, wherein the unlocking interference mode at least comprises one mode;
displaying corresponding interference information according to the determined unlocking interference mode to prevent the password from being leaked;
acquiring an operation gesture in the interference information;
comparing whether the unlocking information determined by the operation gesture is consistent with preset unlocking information or not, and if so, successfully unlocking;
wherein the interference information at least comprises one of input interference information and output interference information.
According to one or more embodiments of the present disclosure, there is provided a password unlocking method, characterized in that,
the input interference information at least comprises unlocking interface interference information and/or user input interference information.
According to one or more embodiments of the present disclosure, there is provided a password unlocking method, characterized in that,
the unlocking interface interference information at least comprises one of unlocking interface horizontal rotation angle information and unlocking interface mirror image turning information;
the user input interference information at least comprises one of user input horizontal rotation angle information and user input mirror image overturning information.
According to one or more embodiments of the present disclosure, there is provided a password unlocking method, characterized in that,
the output interference information includes at least one of an increase output display item, a decrease output display item, and a change output display item.
According to one or more embodiments of the present disclosure, there is provided a password unlocking method, characterized in that,
the changing output display item includes at least one of changing a display pattern of the operation gesture, changing a transparency of the display pattern, and changing a size of the display pattern.
According to one or more embodiments of the present disclosure, there is provided a password unlocking method, characterized in that,
and setting the preset unlocking information corresponding to the unlocking interference mode.
According to one or more embodiments of the present disclosure, there is provided a password unlocking apparatus, where a password is used to unlock a terminal, the password unlocking apparatus including:
the mode determination module is used for determining unlocking interference modes for unlocking the password, wherein the unlocking interference modes at least comprise one mode;
the interference information display module is used for displaying corresponding interference information according to the determined unlocking interference mode so as to prevent the password from being leaked;
the gesture acquisition module is used for acquiring the operation gesture in the interference information;
the comparison and judgment module is used for comparing whether the unlocking information determined by the operation gesture is consistent with preset unlocking information or not, and if so, the unlocking is successful;
wherein the interference information at least comprises one of input interference information and output interference information.
According to one or more embodiments of the present disclosure, there is provided a password unlocking device, characterized in that,
the unlocking method comprises the following steps of setting preset unlocking information corresponding to the unlocking interference mode, and further comprising an unlocking information setting module.
According to one or more embodiments of the present disclosure, there is provided a computer device comprising a memory having stored therein a computer program and a processor implementing the method according to any one of the above when the computer program is executed by the processor.
According to one or more embodiments of the present disclosure, a computer-readable storage medium is provided, characterized in that a computer program is stored thereon, which, when being executed by a processor, implements the method according to any one of the above.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (10)

1. A password unlocking method is used for unlocking a terminal, and is characterized by comprising the following steps:
determining an unlocking interference mode for unlocking the password, wherein the unlocking interference mode at least comprises one mode;
displaying corresponding interference information according to the determined unlocking interference mode to prevent the password from being leaked;
acquiring an operation gesture in the interference information;
comparing whether the unlocking information determined by the operation gesture is consistent with preset unlocking information or not, and if so, successfully unlocking;
wherein the interference information at least comprises one of input interference information and output interference information.
2. The password unlocking method as claimed in claim 1,
the input interference information at least comprises unlocking interface interference information and/or user input interference information.
3. The password unlocking method as claimed in claim 2,
the unlocking interface interference information at least comprises one of unlocking interface horizontal rotation angle information and unlocking interface mirror image turning information;
the user input interference information at least comprises one of user input horizontal rotation angle information and user input mirror image overturning information.
4. The password unlocking method as claimed in claim 1,
the output interference information includes at least one of an increase output display item, a decrease output display item, and a change output display item.
5. The password unlocking method according to claim 4,
the changing output display item includes at least one of changing a display pattern of the operation gesture, changing a transparency of the display pattern, and changing a size of the display pattern.
6. The password unlocking method according to claim 1, further comprising,
and setting the preset unlocking information corresponding to the unlocking interference mode.
7. The utility model provides a password unlocking device, the password is used for unblock terminal, its characterized in that includes:
the mode determination module is used for determining unlocking interference modes for unlocking the password, wherein the unlocking interference modes at least comprise one mode;
the interference information display module is used for displaying corresponding interference information according to the determined unlocking interference mode so as to prevent the password from being leaked;
the gesture acquisition module is used for acquiring the operation gesture in the interference information;
the comparison and judgment module is used for comparing whether the unlocking information determined by the operation gesture is consistent with preset unlocking information or not, and if so, the unlocking is successful;
wherein the interference information at least comprises one of input interference information and output interference information.
8. The password unlock device of claim 7 further comprising,
and the unlocking information setting module is used for setting the preset unlocking information corresponding to the unlocking interference mode.
9. A computer device comprising a memory having stored therein a computer program and a processor implementing the method of any of claims 1-6 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a computer program which, when being executed by a processor, carries out the method according to any one of claims 1-6.
CN202010084696.6A 2020-02-10 2020-02-10 Password unlocking method, device, equipment and storage medium Pending CN111310157A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010084696.6A CN111310157A (en) 2020-02-10 2020-02-10 Password unlocking method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010084696.6A CN111310157A (en) 2020-02-10 2020-02-10 Password unlocking method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111310157A true CN111310157A (en) 2020-06-19

Family

ID=71159900

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010084696.6A Pending CN111310157A (en) 2020-02-10 2020-02-10 Password unlocking method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111310157A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103365581A (en) * 2012-03-31 2013-10-23 百度在线网络技术(北京)有限公司 User equipment touch unlocking method and device based on unlocking password
CN105068733A (en) * 2015-08-17 2015-11-18 广东欧珀移动通信有限公司 Terminal unlocking method and apparatus
CN105426737A (en) * 2015-11-21 2016-03-23 广东欧珀移动通信有限公司 Unlocking method and apparatus for mobile terminal convenient to operate by single hand
WO2016062009A1 (en) * 2014-10-24 2016-04-28 中兴通讯股份有限公司 Unlocking method and device
CN107402736A (en) * 2017-07-21 2017-11-28 驭势(上海)汽车科技有限公司 A kind of method for information display and equipment
CN107563180A (en) * 2017-09-28 2018-01-09 平安科技(深圳)有限公司 A kind of graphics unlocking method, equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103365581A (en) * 2012-03-31 2013-10-23 百度在线网络技术(北京)有限公司 User equipment touch unlocking method and device based on unlocking password
WO2016062009A1 (en) * 2014-10-24 2016-04-28 中兴通讯股份有限公司 Unlocking method and device
CN105068733A (en) * 2015-08-17 2015-11-18 广东欧珀移动通信有限公司 Terminal unlocking method and apparatus
CN105426737A (en) * 2015-11-21 2016-03-23 广东欧珀移动通信有限公司 Unlocking method and apparatus for mobile terminal convenient to operate by single hand
CN107402736A (en) * 2017-07-21 2017-11-28 驭势(上海)汽车科技有限公司 A kind of method for information display and equipment
CN107563180A (en) * 2017-09-28 2018-01-09 平安科技(深圳)有限公司 A kind of graphics unlocking method, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN111399956B (en) Content display method and device applied to display equipment and electronic equipment
CN110658961B (en) Information display method and device and electronic equipment
EP3766016A1 (en) Machine learning system for reduced network bandwidth transmission of content
CN110633126B (en) Information display method and device and electronic equipment
CN110471594B (en) Page adjusting method, device, equipment and medium
CN111291244B (en) House source information display method, device, terminal and storage medium
JP7480344B2 (en) Information display method, device and electronic device
CN110795196A (en) Window display method, device, terminal and storage medium
WO2023125164A1 (en) Page display method and apparatus, and electronic device and storage medium
US20230421857A1 (en) Video-based information displaying method and apparatus, device and medium
CN110647286A (en) Screen element control method, device, equipment and storage medium
CN112256371A (en) Method and device for displaying information and electronic equipment
CN111447191A (en) Information interaction method and device and electronic equipment
US20240086053A1 (en) Display method and apparatus, electronic device, and storage medium
CN110456957B (en) Display interaction method, device, equipment and storage medium
CN112307393A (en) Information issuing method and device and electronic equipment
CN111310157A (en) Password unlocking method, device, equipment and storage medium
CN112241230B (en) Window display method and device of electronic equipment, terminal and storage medium
CN111290692B (en) Picture display method and device, electronic equipment and computer readable medium
CN110568976B (en) Method, device, equipment and storage medium for controlling application display
CN111274513B (en) Window display method, device, terminal and storage medium
CN110825993B (en) Picture display method and device and electronic equipment
CN112114735B (en) Method and device for managing tasks
CN110708425A (en) Message display method and device and electronic equipment
CN112533153A (en) Information transmission method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200619

RJ01 Rejection of invention patent application after publication