CN111797383A - Password verification method and device and electronic equipment - Google Patents

Password verification method and device and electronic equipment Download PDF

Info

Publication number
CN111797383A
CN111797383A CN202010527930.8A CN202010527930A CN111797383A CN 111797383 A CN111797383 A CN 111797383A CN 202010527930 A CN202010527930 A CN 202010527930A CN 111797383 A CN111797383 A CN 111797383A
Authority
CN
China
Prior art keywords
information
password
input
target bit
password information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010527930.8A
Other languages
Chinese (zh)
Inventor
赖阳明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202010527930.8A priority Critical patent/CN111797383A/en
Publication of CN111797383A publication Critical patent/CN111797383A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Abstract

The application discloses a password verification method, a password verification device and electronic equipment, and belongs to the technical field of communication. The method comprises the following steps: receiving first password information input by a user; identifying information corresponding to a first target bit from the first password information; updating information corresponding to a second target bit in the first password information to information corresponding to the first target bit to obtain second password information; and determining that the password verification is successful under the condition that the second password information is matched with the preset password information. According to the embodiment of the application, the safety of the password can be improved.

Description

Password verification method and device and electronic equipment
Technical Field
The application belongs to the technical field of communication, and particularly relates to a password verification method and device and electronic equipment.
Background
With the rapid development of electronic devices and mobile internet, people's lives have changed greatly, and more people use electronic devices. When the electronic equipment is used, passwords such as a locking password and a payment password are inevitably used. At present, when the password information input by the user is consistent with the preset true password information, the password authentication is passed.
The password verification method is characterized in that a plurality of users are available in public places, so that the password of a certain user can be peeped, and the password can be easily verified once being stolen based on the existing password verification method, so that the password is unsafe. Therefore, it is urgently needed to provide a password authentication method with higher security so as to improve the security of the password.
Disclosure of Invention
An object of the embodiments of the present application is to provide a password verification method, an apparatus, an electronic device, and a medium, so as to solve the problem of low security of a password.
In order to solve the technical problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides a password authentication method, including:
receiving first password information input by a user;
identifying information corresponding to a first target bit from the first password information;
updating information corresponding to a second target bit in the first password information to information corresponding to the first target bit to obtain second password information;
and determining that the password verification is successful under the condition that the second password information is matched with the preset password information.
In a second aspect, an embodiment of the present application provides a password authentication apparatus, including:
the password information receiving module is used for receiving first password information input by a user;
the identification module is used for identifying information corresponding to a first target bit from the first password information;
the password information processing module is used for updating information corresponding to a second target bit in the first password information into information corresponding to the first target bit to obtain second password information;
and the first verification module is used for determining that the password verification is successful under the condition that the second password information is matched with the preset password information.
In a third aspect, embodiments of the present application provide an electronic device, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, where the program or instructions, when executed by the processor, implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium on which a program or instructions are stored, which when executed by a processor, implement the steps of the method according to the first aspect.
In a fifth aspect, embodiments of the present application provide a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect.
In the embodiment of the application, the information corresponding to the second target bit in the first password information input by the user is updated to the information corresponding to the first target bit identified from the first password information, so as to obtain the second password information, and then the password verification is performed on the second password information. And determining that the password verification is successful under the condition that the second password information is matched with the preset password information. The password authentication method provided by the application authenticates the second password information obtained after the first password information is processed, but does not directly authenticate the first password information, namely, a user does not directly input real password information, the real password information can be hidden by the first password information input by the user, the password authentication method has high confidentiality, and the password security is improved.
Drawings
Fig. 1 is a schematic flowchart of a password authentication method provided in an embodiment of the present application;
FIG. 2 is a schematic diagram of a password entry interface provided in an embodiment of the present application;
FIG. 3 is a schematic view of a target site setup interface provided in a first embodiment of the present application;
FIG. 4 is a schematic view of a target site setup interface provided in a second embodiment of the present application;
FIG. 5 is a schematic view of a target site setup interface provided in a third embodiment of the present application;
FIG. 6 is a schematic view of a first setup interface provided in accordance with an embodiment of the present application;
FIG. 7 is a schematic view of a first setup interface provided in accordance with another embodiment of the present application;
FIG. 8 is a schematic view of a second setup interface provided by embodiments of the present application;
FIG. 9 is a schematic view of a third setup interface provided by embodiments of the present application;
FIG. 10 is a schematic view of a first setup interface provided in accordance with yet another embodiment of the present application;
fig. 11 is a schematic structural diagram of a password authentication apparatus according to an embodiment of the present invention;
FIG. 12 is a schematic structural diagram of an electronic device according to an embodiment of the invention;
fig. 13 is a second schematic structural diagram of an electronic device according to an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application are capable of operation in sequences other than those illustrated or described herein. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The password authentication method, apparatus, electronic device and medium provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
At present, in order to prevent the password from being peeped, a protective film can be pasted on the electronic equipment, so that the content on the screen can be seen clearly at a specific visual angle, keys can be added on the back of the mobile phone, specific characters are represented by the keys, the password is input by combining the front hard keyboard or the touch screen soft keyboard with the keys at the back, the interface can be seen clearly at the specific visual angle by designing hardware structures such as a shutter structure, or the shielding cover is used for shielding. However, these methods require hardware to be added or changed to realize a specific viewing angle to see the content on the screen, which results in increased cost and sometimes inconvenience in use.
In other embodiments, the visual angle of the password popup window can be reduced through brightness adjustment and contrast adjustment, but the current electronic device cannot recognize ambient light of all scenes, the screen brightness cannot be completely adaptive, a dazzling or too dark feeling can be brought to a user, and the use experience of the user is reduced.
Based on the foregoing technical problem, embodiments of the present application provide a password verification method, apparatus, electronic device, and medium, which can improve security of a password. The following detailed description is to be read with reference to specific embodiments and the drawings.
Fig. 1 is a schematic flowchart of a password authentication method according to an embodiment of the present application. As shown in fig. 1, the password authentication method includes steps 110 to 140. The execution subject of the password authentication method provided by the embodiment of the application can be a password authentication device.
Step 110, receiving first password information input by a user.
Step 120, identify information corresponding to the first target bit from the first password information.
Step 130, updating the information corresponding to the second target bit in the first password information to the information corresponding to the first target bit to obtain the second password information.
And 140, determining that the password verification is successful under the condition that the second password information is matched with the preset password information.
In the embodiment of the application, the information corresponding to the second target bit in the first password information input by the user is updated to the information corresponding to the first target bit identified from the first password information, so as to obtain the second password information, and then the password verification is performed on the second password information. And determining that the password verification is successful under the condition that the second password information is matched with the preset password information. The password authentication method provided by the application authenticates the second password information obtained after the first password information is processed, but does not directly authenticate the first password information, namely, a user does not directly input real password information, the real password information can be hidden by the first password information input by the user, the password authentication method has high confidentiality, and the password security is improved. .
In addition, the embodiment of the application does not have any hardware requirement on the electronic equipment, does not influence the visual experience of a user, is simple to operate and has high confidentiality.
The specific implementation of each of steps 110 to 140 is described below.
First, a specific implementation of step 110 will be described.
In some embodiments, the first password information input by the user may include multi-digit character information. In some embodiments, the user may enter the first password information via a virtual keyboard.
In other embodiments, the first password information input by the user may also be information obtained by recognizing a gesture input by the user.
In some embodiments, step 110 includes receiving an input operation of a user with respect to the password input region while the password input region is displayed, and determining first password information input by the user in response to the input operation. As an example, fig. 2 is a schematic diagram of a password input interface provided in an embodiment of the present application. A password input area 20 and first prompt information are displayed in the password input interface. Wherein, the first prompt message user prompts the user to input the password. For example, the first prompt message is "please input a password".
In some embodiments, the input operation for the password input region may include a click input, a slide input, or the like, input to the virtual keyboard or a preset gesture operation, or the like. For example, in other embodiments, if the information input by the user includes gesture information, the input operation to the password input area includes a preset gesture operation, and the first password information includes character information corresponding to the preset gesture operation. For example, if the preset gesture operation is an "OK" gesture drawn by the user, the first password information input by the user includes the character "OK".
The following describes specific implementation of step 120 and step 130.
In an embodiment of the present application, the first password information input by the user includes multi-bit information. For example, the first password information input by the user includes a multi-digit character.
In an embodiment of the present application, the first target bit and the second target bit are both preset positions. In some examples, to meet the personalized needs of the user, the first target position and the second target may both be preset by the user.
To facilitate the description of the password authentication method provided in the embodiment of the present application, first, a method for setting the first target bit and the second target bit in the embodiment of the present application is described below.
First, an arrangement of the first target bit and the second target bit will be described. In some embodiments of the present application, before step 110, the password authentication method provided in an embodiment of the present application further includes: receiving a first input of first information aiming at a first position in preset password information; determining the first position as a first target bit in response to a first input; receiving a second input of the first information aiming at a second position in the preset password information; in response to a second input, a second position is determined as a second target bit.
Fig. 3 is a schematic diagram of the arrangement of the first target bit and the second target bit according to an embodiment of the present application. As shown in FIG. 3, a target site setup interface is shown in FIG. 3. In the target bit setting interface in fig. 3, preset password information "123153" is displayed, and an input area where each bit of the preset password information is located is displayed. In other embodiments, the target position setting interface in fig. 3 may further display a prompt message prompting the user to set the first target position and the second target position.
As one example, the first input and the second input may each be a click input, a slide input, a drag input, or a press input, among others.
It should be noted that, in this setting, at least two bits of information required in the preset password information are the same.
As an example, the first information is "3" in the preset password information. The first position is the position of the first '3' in the preset password information. The second position is the position of the second 3 in the preset password information.
For example, the first input is a click input for a first "3" of the preset password information, and in response to the input, the first "3" of the preset password information is determined to be a first target bit at a first position in the preset password information, that is, the first target bit is a 3 rd bit.
For example, the second input is a click input for the second "3" of the preset password information, and in response to the input, the second position of the second "3" of the preset password information in the preset password information is taken as the second target bit, i.e., the second target bit is the 6 th bit.
In some embodiments of the present application, it is assumed that the first password information input by the user is "abcdef", and if the first target bit is the 3 rd bit and the second target bit is the 6 th bit, the information corresponding to the first target bit identified from the first password information is "c". The information corresponding to the second target bit in the first encryption information is "f", and the information corresponding to the second target bit in the first encryption information is updated to the information corresponding to the first target bit, so that the second encryption information "abcdec" can be obtained.
It should be noted that there may be a plurality of first target bits, and if there are a plurality of first target bits, each first target bit has a second target bit associated therewith. The association relationship between the first target bit and the second target bit may be preset.
As an example, after a user sets one first target bit and associated second target bit as described above, another first target bit and associated second target bit may be set as described above.
In step 120, information corresponding to each first target bit may be identified from the first cryptographic information. In step 130, the information corresponding to each second target bit in the first cipher information may be updated to the information corresponding to the first target bit associated with the second target bit.
For example, the preset password information "123123", the first input may also be a click input for the first "2" in the preset password information, and in response to the input, the first position of the first "2" in the preset password information is taken as the first target position, i.e., the first target position is the 2 nd position. For example, the second input is a click input for a second "2" of the preset password information, and in response to the input, a second position of the second "2" of the preset password information in the preset password information is taken as a second target bit, i.e., the second target bit is a 4 th bit, and the 2 nd bit is associated with the 4 th bit. In addition, the first information may also be "3", and then the first target bit is the 3 rd bit and the second target bit is the 6 th bit, i.e. the 3 rd bit is associated with the 6 th bit.
In some embodiments of the present application, it is assumed that the first password information input by the user is "abcdef", and if there are two first target bits, namely, 2 nd bit and 3 rd bit, respectively, the second target bit associated with the 2 nd bit is 4 th bit, and the second target bit associated with the 3 rd bit is 6 th bit, then the 2 first target bits identified from the first password information respectively correspond to information "b" and "c". The information corresponding to the 2 second target bits in the first cipher information is "d" and "f", and the information corresponding to each second target bit in the first cipher information is updated to the information corresponding to the first target bit associated with the second target bit, so that the second cipher information "abcbec" can be obtained.
Another way of setting the first target bit and the second target bit is described below. In some embodiments of the present application, before step 110, the password authentication method provided in an embodiment of the present application further includes: step A to step E. Step A, receiving a third input aiming at third information in preset password information; step B, responding to a third input, and determining a third position of third information in the preset password information; step C, receiving a fourth input to a first setting interface, wherein the first setting interface comprises a first control used for representing the pseudo password information and a second control used for representing third information; the pseudo password information comprises information except for third information in the preset password information; d, responding to a fourth input, and determining the arrangement sequence of the first control and the second control along a preset direction; and E, determining a first target bit and a second target bit based on the arrangement sequence, the third position and the information bit number in the third information.
As one example, the third input may be a click input, a slide input, a drag input, a press input, or the like.
Fig. 4 is a schematic diagram of a target site setting interface according to another embodiment of the present application. As shown in fig. 4, the target bit setting interface in fig. 4 includes preset password information "123456", and an input area where each bit of information in the preset password information is located. In some embodiments, the target bit setting interface further includes first prompt information, where the first prompt information is used to prompt a user to split preset password information, so as to set correct information corresponding to the first target bit, that is, third information, which may also be referred to as password modification information. As an embodiment, the first prompt message is "please drag any bits of the password into the right frame as password modification information".
As an example, the third information is "3" in the preset password information, and the third input is a drag input for "3" in the preset password information, and in response to the drag input, a third position of the third information in the preset password information is determined, that is, the third information is located at the 3 rd position in the preset password information. And setting the third information as password modification information, namely correct information corresponding to the first target bit.
In some embodiments, the password authentication method provided in the embodiments of the present application further includes: and responding to the third input, and displaying third information selected by the third input in the preset area. Referring to fig. 4, the right frame is the preset area.
Fig. 5 is a schematic diagram of a target bit setting interface according to still another embodiment of the present application. To prompt the user, referring to fig. 5, an input area where the third information in the preset password information selected by the third input is located may be displayed in the first color 50 to prompt the user that the third information is selected. In other embodiments, the preset area is displayed in a second color 51 in response to a third input.
Fig. 6 is a schematic diagram of a first setting interface according to an embodiment of the present disclosure. Referring to fig. 6, the first setup interface includes a first control for pseudo password information and a second control for characterizing third information (i.e., password modification information). The pseudo password information includes information other than the third information in the preset password information.
Referring to fig. 6, the first setting interface displays the first control 60 and the second control 61 in sequence along a preset direction (a direction indicated by a dotted arrow of fig. 6) by default. The first setting interface also displays prompt information for prompting the user to please arrange the order of the pseudo password information and the third information arbitrarily. As an example, the first input may include a drag input to the first control 60 and the second control 61, and the drag input drags the first control 60 to the right of the second control 61, and then the second control 61 and the first control 60 are arranged in sequence along a preset direction (a direction indicated by a dotted arrow in fig. 7), see fig. 7.
The arrangement sequence of the first control and the second control along the preset direction is used for representing the input sequence of the pseudo password information and the third information (namely password modification information). As an example, if the second control and the first control are arranged in sequence along the preset direction, the input order of the password modification information is 1 st bit, and the input order of the pseudo password information is 2 nd bit.
The first target position and the second target position can be determined based on the arrangement sequence of the first control and the second control along the preset direction, the third position of the third information in the preset password information and the number of bits of the third information.
As an example, if the third information is "3" in the preset password information, the input order of the third information is 1 st bit, and the input order of the pseudo password information is 2 nd bit, the first target bit is 1 st bit. Since the third information is the 3 rd bit at the third position of the preset password information, the second target bit is the last 1 bit of the third position, namely, the 4 th bit.
In the embodiment of the application, the user can set the first target position and the second target position according to the requirement of the user, and the personalized setting of the password verification mode is realized.
If the first target bit and the second target bit are set in the setting manner described in fig. 4 to 7, step 130 includes: and updating the information corresponding to the second target bit in the first password information into the information corresponding to the first target bit, and deleting the second target bit in the updated first password information to obtain second password information.
In some embodiments of the present application, it is assumed that the first password information input by the user is "abcdefg", and if the first target bit is the 1 st bit and the second target bit is the 4 th bit, the information corresponding to the first target bit identified from the first password information is "a". The information corresponding to the second target bit in the first password information is "d", the information corresponding to the second target bit in the first password information is updated to the information corresponding to the first target bit, the updated first password information "abcaefg" is obtained, the first target bit in the "abcaefg" is deleted, and the second password information "bcaefg" can be obtained.
In some embodiments, the number of information bits of the third information may be greater than or equal to 2. In the case where the number of information bits of the third information is greater than or equal to 2, for example, the third input may include a drag input to each of the third information, and in response to the drag input, a third position of each of the third information in the preset password information may be determined. That is, each bit of the third information has a respective associated third position.
In some embodiments, if the number of bits of the third information is greater than or equal to 2, in response to a third input, a fourth position of each bit of the third information displayed in the preset area in the third information may be determined. For example, the fourth position of each bit of information in the third information may be determined based on the dragging order for each bit of information.
Then, based on the arrangement order of the first control and the second control, the third position respectively associated with each bit of information in the third information, the number of information bits of the third information, and the fourth position of each bit of information in the third information, each first target bit and the second target bit associated with each first target bit can be determined.
As an example, if the third information includes "3" and "6" in the preset password information, and the input order of the third information is 1 st bit, and the input order of the pseudo password information is 2 nd bit, then the 2 first target bits are respectively the fourth positions of the two bits of information in the third information, i.e. 1 st bit and 2 nd bit.
Since the information bit number of the third information is 2, and the third positions respectively associated with "3" and "6" in the preset password information are respectively the 3 rd bit and the 6 th bit in the preset password information, the second target bit associated with the 1 st bit is the last M bits of the third position associated with the 1 st bit information in the third information, and the second target bit associated with the 2 nd bit is the last M bits of the third position associated with the 2 nd bit information in the third information. Wherein M is the information digit of the third information, and M is a positive integer.
If the fourth position of "3" in the third information is the 1 st bit, and the fourth position of "6" in the third information is the 2 nd bit, the second target bit associated with the 1 st bit is the 5 th bit, and the second target bit associated with the 2 nd bit is the 8 th bit.
In some embodiments of the present application, it is assumed that the first password information input by the user is "abcdefgh", and if there are two first target bits, namely, a 1 st bit and a 2 nd bit, respectively, a second target bit associated with the 1 st bit is a 5 th bit, and a second target bit associated with the 2 nd bit is an 8 th bit, information corresponding to the first target bit identified from the first password information is "a" and "b", respectively. The information corresponding to the second target bit in the first password information is "e" and "h", respectively, the information corresponding to each second target bit in the first password information is updated to the information corresponding to the first target bit associated with the second target bit, so that the updated first password information "abcdafgb" is obtained, and the first target bit in the "abcdafgb" is deleted, so that the second password information "cdafgb" can be obtained.
It should be noted that, in an embodiment of the present application, before receiving a first input for first information at a first position in preset password information or receiving a third input for third information in the preset password information, the password authentication method provided in the embodiment of the present application further includes: receiving a fifth input for the second settings interface; and responding to the fifth input, determining the information input by the fifth input as the preset password information, and displaying the preset password information.
In some embodiments, the fifth input may include a click input, a press input, or a slide input to the virtual keyboard. Wherein the fifth input is for inputting preset password information.
Fig. 8 is a schematic view of a setting interface of preset password information provided in an embodiment of the present application. As shown in fig. 8, the password setting interface includes a password input area and second prompt information. The second prompt message is used for prompting the user to set password information. As an example, the password information set by the user is "123456".
The implementation of step 140 is described below.
In an embodiment of the present application, if the first target bit and the second target bit are set as described in fig. 3, the step 140 of matching the second password information with the predetermined password information may include that the second password information is the same as the predetermined password information.
And if the second password information is matched with the preset password information, determining that the password verification is successful.
In some embodiments of the present application, in order to further improve the security of the password, the first password information further includes information corresponding to the third target bit, and on this basis, before the password authentication is determined to be successful, it is required to determine that not only the second password information matches the preset password information, but also the information corresponding to the third target bit meets the preset authentication condition.
In the embodiment of the present application, the information corresponding to the third target bit is dynamic verification information and is not fixed.
As an example, the information corresponding to the third target bit meeting the preset verification condition includes that the information corresponding to the third target bit matches a preset time characteristic of the current time.
As an example, the preset time characteristic may be the last digit of a day of the year, month, and day of the date. For example, if the current date is XXXX and ZZ of YY month, the last digit in ZZ is the predetermined time characteristic.
As another example, if the current date is XXXX, YY, ZZ, day, week D, then D is the predetermined time characteristic.
In still other examples, the current time is hh hours mm minutes ss seconds, then the last digit in mm is the preset time characteristic.
That is, the preset verification condition may include that the information corresponding to the third target bit matches the preset time profile.
In the embodiment of the application, a piece of verification is added by inputting the information corresponding to the third target bit, and the safety of the password is improved by multiple verifications.
Next, the setting manner of the preset verification condition will be described in detail.
In some embodiments of the present application, before step 110, the password authentication method provided in an embodiment of the present application further includes: receiving a sixth input for a third settings interface, the third settings interface including a plurality of verification conditions; and responding to the sixth input, and taking the verification condition selected by the sixth input as a preset verification condition.
As one example, the sixth input may be a different input such as a click input, a press input, a slide input, or a drag input.
Fig. 9 is a schematic diagram of a third setting interface provided in an embodiment of the present application. The third setting interface comprises a plurality of verification conditions. For example, the first verification condition is: verifying according to the last day of the year, month and day; the second verification condition is verification based on the last digit of the minute of time, hour, minute, second.
As an example, if the sixth input is a click input to the first verification condition, the first verification condition is taken as a preset verification condition.
In some embodiments, referring to fig. 9, a prompt message is displayed in the third setting interface to prompt the user to set a preset verification condition, for example, a message "please select one verification condition from the following verification conditions" is displayed.
The manner in which the third target bit is set is explained below.
Since the first target bit and the second target bit can have two different setting modes, the third target bit also has a different setting mode. And the first target bit, the second target bit and the third target bit are arranged in a manner correlated with each other.
First, the first way of setting the first, second, and third target bits is described.
The first arrangement of the first, second and third target bits is described below in conjunction with the first and second arrangement of the target bits described in connection with FIG. 3.
In some embodiments, after determining the second location as the second target location in response to the second input, the password authentication method provided by the embodiment of the present application further includes: the Q +1 th to Q + P th bits are set as third target bits, respectively. Wherein Q is the number of bits of the preset password information, and P is the preset number of bits, that is, the number of information bits of the dynamic verification information. Wherein P is determined based on a preset verification condition.
In other embodiments, the third target bit may also be set before the first target bit and the second target bit, which is not described herein again.
The second arrangement of the first, second and third target bits is described below in conjunction with the first and second arrangement of the target bits described in FIGS. 4-8.
The first setting interface further comprises a third control used for representing the dynamic verification information; the step D comprises the following steps: in response to a fourth input, determining the arrangement sequence of the first control, the second control and the third control along the preset direction; the step E comprises the following steps: and determining the first target bit, the second target bit and the third target bit based on the arrangement sequence, the third position, the number of information bits in the third information and the number of information bits of the dynamic verification information.
In some embodiments, there are 6 input modes due to the pseudo password information, the third information (i.e., password modification information), and the dynamic authentication information. Therefore, the user needs to set the input order of the pseudo password information, the input order of the password modification information, and the input order of the dynamic authentication information in advance.
As one example, the fourth input may be an input such as a drag input, a slide input, or a click input for a control in the first setting interface.
Fig. 10 is a schematic diagram of a first setup interface provided in an embodiment of the present application. Referring to fig. 10, the first setting interface displays the first control 100, the second control 101, and the third control 102 in sequence along a preset direction (a direction indicated by a dotted arrow of fig. 10) by default. The first setting interface also displays prompt information for prompting the user to 'please randomly arrange the order of the pseudo password information, the third information and the dynamic verification information'. As an example, the fourth input may include a drag input to the first control 100, the second control 101, and the third control 102, and the drag input drags the first control 100 to the right of the third control 102, and the second control 101, the third control 102, and the first control 100 are arranged in sequence along the preset direction.
The arrangement sequence of the first control, the second control and the third control along the preset direction is used for representing the input sequence of the pseudo password information, the password modification information and the dynamic verification information. As an example, if the second control, the third control, and the first control are arranged in sequence along the preset direction, it represents that the input order of the password modification information is bit 1, the input order of the dynamic verification information is bit 2, and the input order of the pseudo password information is bit 3.
As an example, if the third information is "3" in the preset password information "123456", the input order of the third information is 1 st bit, the input order of the dynamic verification information is 2 nd bit, and the input order of the pseudo password information is 3 rd bit, the first target bit is 1 st bit. If the information bit number of the dynamic verification information is P, since the third information is the 3 rd bit at the third position of the preset password information, the second target bit is the last P +1 bit of the third position, i.e., the 4+ P bit. P is a positive integer, and is determined based on a preset verification condition.
For the case that the information bit number of the third information is multiple, refer to the above description, and will not be described herein again.
In the password authentication method provided by the embodiment of the application, the execution main body may be a password authentication device, or a control module used for executing the loading password authentication method in the password authentication device. It should be noted that, in the embodiment of the present application, a password authentication method performed by a password authentication device is taken as an example, and the password authentication device provided in the embodiment of the present application is described.
Fig. 11 is a schematic structural diagram of a password authentication device according to an embodiment of the present application. As shown in fig. 11, the password authentication apparatus 1100 includes:
a password information receiving module 1110, configured to receive first password information input by a user;
an identifying module 1120, configured to identify information corresponding to the first target bit from the first password information;
the password information processing module 1130 is configured to update information corresponding to the second target bit in the first password information to information corresponding to the first target bit, so as to obtain second password information;
the first authentication module 1140 is configured to determine that the password authentication is successful if the second password information matches the preset password information.
In the embodiment of the application, the information corresponding to the second target bit in the first password information input by the user is updated to the information corresponding to the first target bit identified from the first password information, so as to obtain the second password information, and then the password verification is performed on the second password information. And determining that the password verification is successful under the condition that the second password information is matched with the preset password information. The password authentication method provided by the application authenticates the second password information obtained after the first password information is processed, but does not directly authenticate the first password information, namely, a user does not directly input real password information, the real password information can be hidden by the first password information input by the user, the password authentication method has high confidentiality, and the password security is improved.
In some embodiments of the present application, the cryptographic information processing module 1130 is configured to:
and updating the information corresponding to the second target bit in the first password information into the information corresponding to the first target bit, and deleting the first target bit in the updated first password information to obtain the second password information.
In some embodiments of the present application, the first cryptographic information further includes information corresponding to the third target bit; the password authentication apparatus 1100 further includes:
and the second verification module is used for determining that the information corresponding to the third target bit meets the preset verification condition.
In some embodiments of the present application, the password authentication apparatus 1100 further comprises:
the first input receiving module is used for receiving first input of first information aiming at a first position in the preset password information;
a first determination module to determine, in response to a first input, a first location as a first target bit;
the second input receiving module is used for receiving second input of the first information aiming at a second position in the preset password information;
a second determination module to determine the second location as a second target bit in response to a second input.
In some embodiments of the present application, the password authentication apparatus 1100 further comprises:
the third input receiving module is used for receiving third input aiming at third information in the preset password information;
the third determining module is used for responding to a third input and determining a third position of third information in the preset password information;
the fourth input receiving module is used for receiving fourth input of the first setting interface, and the first setting interface comprises a first control used for representing the pseudo password information and a second control used for representing the third information; the pseudo password information comprises information except for third information in the preset password information;
the fourth determining module is used for responding to a fourth input and determining the arrangement sequence of the first control and the second control along the preset direction;
and the fifth determining module is used for determining the first target bit and the second target bit based on the arrangement sequence, the third position and the information bit number in the third information.
The password verification device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in the device. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a kiosk, and the like, and the embodiments of the present application are not particularly limited.
The password verification device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The password verification device provided in the embodiment of the present application can implement each process implemented by the password verification device in the method embodiments of fig. 1 to fig. 10, and is not described here again to avoid repetition.
Optionally, an electronic device 1200 is further provided in this embodiment of the present application, and includes a processor 1201, a memory 1202, and a program or an instruction stored in the memory 1202 and executable on the processor 1201, where the program or the instruction is executed by the processor 1201 to implement each process of the above password authentication method embodiment, and can achieve the same technical effect, and details are not described here to avoid repetition.
It should be noted that the electronic devices in the embodiments of the present application include the mobile electronic devices and the non-mobile electronic devices described above.
Fig. 13 is a schematic hardware structure diagram of an electronic device implementing an embodiment of the present application.
The electronic device 1300 includes, but is not limited to: a radio frequency unit 1301, a network module 1302, an audio output unit 1303, an input unit 1304, a sensor 1305, a display unit 1306, a user input unit 1307, an interface unit 1308, a memory 1309, a processor 1310, and the like.
Those skilled in the art will appreciate that the electronic device 1300 may further comprise a power source (e.g., a battery) for supplying power to the various components, and the power source may be logically connected to the processor 1310 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system. The electronic device structure shown in fig. 13 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is omitted here.
A user input unit 1307 for receiving the first password information input by the user.
A processor 1310 configured to identify information corresponding to the first target bit from the first password information acquired by the user input unit 1307; updating information corresponding to a second target bit in the first password information into information corresponding to the first target bit to obtain second password information; and determining that the password verification is successful under the condition that the second password information is matched with the preset password information.
In the embodiment of the application, the information corresponding to the second target bit in the first password information input by the user is updated to the information corresponding to the first target bit identified from the first password information, so as to obtain the second password information, and then the password verification is performed on the second password information. And determining that the password verification is successful under the condition that the second password information is matched with the preset password information. The password authentication method provided by the application authenticates the second password information obtained after the first password information is processed, but does not directly authenticate the first password information, namely, a user does not directly input real password information, the real password information can be hidden by the first password information input by the user, the password authentication method has high confidentiality, and the password security is improved.
Optionally, the processor 1310 is further configured to update information corresponding to the second target bit in the first password information to information corresponding to the first target bit, and delete the updated first target bit in the first password information to obtain the second password information.
In the embodiment of the application, the security of the password can be improved by verifying the second password information obtained after the first password information is processed.
In some embodiments of the present application, the first cryptographic information further includes information corresponding to the third target bit;
optionally, the processor 1310 is further configured to determine that information corresponding to the third target bit meets a preset verification condition.
In the embodiment of the application, a piece of verification is added by inputting the information corresponding to the third target bit, and the safety of the password is improved by multiple verifications.
A user input unit 1307, further configured to receive a first input of first information for a first position in the preset password information;
processor 1310 is further configured to determine a first position as a first target bit in response to a first input received by user input unit 1307;
a user input unit 1307, further configured to receive a second input of the first information for a second position in the preset password information;
processor 1310 is further configured to determine the second position as the second target bit in response to a second input received by user input unit 1307.
In the embodiment of the application, the user can set the first target position and the second target position according to the requirement of the user, and the personalized setting of the password verification mode is realized.
A user input unit 1307, further configured to receive a third input for third information in the preset password information;
the processor 1310 is further configured to determine a third position of the third information in the preset password information in response to a third input received by the user input unit 1307;
the user input unit 1307 is further configured to receive a fourth input to the first setting interface, where the first setting interface includes a first control used for representing the pseudo password information and a second control used for representing the third information; the pseudo password information comprises information except for third information in the preset password information;
the processor 1310 is further configured to determine an arrangement order of the first control and the second control along the preset direction in response to a fourth input received by the user input unit 1307;
processor 1310 is further configured to determine a first target bit and a second target bit based on the permutation order, the third position, and the number of information bits in the third information.
In the embodiment of the application, the user can set the first target position and the second target position according to the requirement of the user, and the personalized setting of the password verification mode is realized.
It should be understood that in the embodiment of the present application, the input Unit 1304 may include a Graphics Processing Unit (GPU) 13041 and a microphone 13042, and the graphics processing Unit 13041 processes image data of still pictures or videos obtained by an image capturing apparatus (such as a camera) in a video capturing mode or an image capturing mode. The display unit 1306 may include a display panel 13061, and the display panel 13061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 1307 includes a touch panel 13071 and other input devices 13072. A touch panel 13071, also referred to as a touch screen. The touch panel 13071 may include two parts, a touch detection device and a touch controller. Other input devices 13072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. Memory 1309 may be used to store software programs as well as various data, including but not limited to application programs and operating systems. The processor 1310 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 1310.
The embodiments of the present application further provide a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the above password authentication method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction to implement each process of the above password authentication method embodiment, and can achieve the same technical effect, and is not described herein again to avoid repetition.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (11)

1. A method of password authentication, the method comprising:
receiving first password information input by a user;
identifying information corresponding to a first target bit from the first password information;
updating information corresponding to a second target bit in the first password information to information corresponding to the first target bit to obtain second password information;
and determining that the password verification is successful under the condition that the second password information is matched with the preset password information.
2. The method of claim 1, wherein updating the information corresponding to the second target bit in the first cipher information to the information corresponding to the first target bit to obtain second cipher information comprises:
and updating information corresponding to a second target bit in the first password information to information corresponding to the first target bit, and deleting the first target bit in the updated first password information to obtain second password information.
3. The method of claim 1, wherein the first cryptographic information further comprises information corresponding to a third target bit;
before the determining that the password authentication is successful, the method further comprises:
and determining that the information corresponding to the third target bit meets a preset verification condition.
4. The method of claim 1, wherein prior to receiving the first password information input by the user, the method further comprises:
receiving a first input of first information aiming at a first position in preset password information;
determining the first location as the first target location in response to the first input;
receiving a second input of the first information for a second position in the preset password information;
in response to the second input, determining the second position as the second target bit.
5. The method of claim 1, wherein prior to receiving the first password information input by the user, the method further comprises:
receiving a third input aiming at third information in the preset password information;
determining a third position of the third information in the preset password information in response to the third input;
receiving a fourth input to a first setting interface, wherein the first setting interface comprises a first control used for representing pseudo password information and a second control used for representing the third information; the pseudo password information comprises information except the third information in the preset password information;
responding to the fourth input, and determining the arrangement sequence of the first control and the second control along a preset direction;
determining the first target bit and the second target bit based on the arrangement order, the third position and the number of information bits in the third information.
6. A password authentication apparatus, comprising:
the password information receiving module is used for receiving first password information input by a user;
the identification module is used for identifying information corresponding to a first target bit from the first password information;
the password information processing module is used for updating information corresponding to a second target bit in the first password information into information corresponding to the first target bit to obtain second password information;
and the first verification module is used for determining that the password verification is successful under the condition that the second password information is matched with the preset password information.
7. The apparatus of claim 6, wherein the cryptographic information processing module is configured to:
and updating information corresponding to a second target bit in the first password information to information corresponding to the first target bit, and deleting the first target bit in the updated first password information to obtain second password information.
8. The apparatus of claim 6, wherein the first cryptographic information further comprises information corresponding to a third target bit; the device further comprises:
and the second verification module is used for determining that the information corresponding to the third target bit meets a preset verification condition.
9. The apparatus of claim 6, further comprising:
the first input receiving module is used for receiving first input of first information aiming at a first position in the preset password information;
a first determination module to determine the first location as the first target bit in response to the first input;
the second input receiving module is used for receiving second input of the first information aiming at a second position in the preset password information;
a second determination module to determine the second location as the second target bit in response to the second input.
10. The apparatus of claim 6, further comprising:
the third input receiving module is used for receiving third input aiming at third information in the preset password information;
a third determining module, configured to determine, in response to the third input, a third position of the third information in the preset password information;
the fourth input receiving module is used for receiving fourth input of a first setting interface, and the first setting interface comprises a first control used for representing pseudo password information and a second control used for representing the third information; the pseudo password information comprises information except the third information in the preset password information;
the fourth determining module is used for responding to the fourth input and determining the arrangement sequence of the first control and the second control along a preset direction;
a fifth determining module, configured to determine the first target bit and the second target bit based on the permutation order, the third position, and the number of information bits in the third information.
11. An electronic device comprising a processor, a memory, and a program or instructions stored on the memory and executable on the processor, the program or instructions when executed by the processor implementing the steps of the cryptographic authentication method of any one of claims 1-5.
CN202010527930.8A 2020-06-11 2020-06-11 Password verification method and device and electronic equipment Pending CN111797383A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010527930.8A CN111797383A (en) 2020-06-11 2020-06-11 Password verification method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010527930.8A CN111797383A (en) 2020-06-11 2020-06-11 Password verification method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN111797383A true CN111797383A (en) 2020-10-20

Family

ID=72804254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010527930.8A Pending CN111797383A (en) 2020-06-11 2020-06-11 Password verification method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN111797383A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024001521A1 (en) * 2022-06-30 2024-01-04 中兴通讯股份有限公司 Unlocking method, terminal device, and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024001521A1 (en) * 2022-06-30 2024-01-04 中兴通讯股份有限公司 Unlocking method, terminal device, and storage medium

Similar Documents

Publication Publication Date Title
US9716706B2 (en) Systems and methods for providing a covert password manager
CN112804445B (en) Display method and device and electronic equipment
CN108038393B (en) Application privacy protection method and mobile terminal
US10411901B2 (en) Multi-user strong authentication token
US9740835B2 (en) Systems and methods for creating and sharing protected content
CN110457963B (en) Display control method, display control device, mobile terminal and computer-readable storage medium
CN107506637A (en) Information displaying method and device, terminal and readable storage medium storing program for executing
CN111949192A (en) Password input prompting method and device and electronic equipment
CN113282364B (en) Display method, display device and electronic equipment
CN111797383A (en) Password verification method and device and electronic equipment
CN107066864B (en) Application icon display method and device
WO2022247865A1 (en) Display control method and apparatus, electronic device, and medium
CN106408304B (en) Account security management method and device
CN106709309B (en) User equipment and interaction method thereof
CN112163209B (en) Application management method and device and electronic equipment
CN110140127A (en) A kind of display methods, device and terminal
CN112765620A (en) Display control method, display control device, electronic device, and medium
CN112764700A (en) Image display processing method, device, electronic equipment and storage medium
WO2018232659A1 (en) Mobile terminal privacy processing method and mobile terminal
CN112699388B (en) Encryption method and device
CN113987576A (en) Reminding method, device and equipment for image acquisition and storage medium
WO2015117364A1 (en) Mobile terminal and password input method therefor
CN112929350A (en) Information processing method, information processing device, electronic equipment and storage medium
CN115080946A (en) Password input method and input device
CN111639323A (en) Privacy confidentiality method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination