CN115147113A - Password determination method and device, electronic equipment and storage medium - Google Patents

Password determination method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115147113A
CN115147113A CN202210744165.4A CN202210744165A CN115147113A CN 115147113 A CN115147113 A CN 115147113A CN 202210744165 A CN202210744165 A CN 202210744165A CN 115147113 A CN115147113 A CN 115147113A
Authority
CN
China
Prior art keywords
password
user
digital code
determining
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210744165.4A
Other languages
Chinese (zh)
Inventor
王再跃
叶振兴
张菁惠
胡海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LCFC Hefei Electronics Technology Co Ltd
Original Assignee
LCFC Hefei Electronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LCFC Hefei Electronics Technology Co Ltd filed Critical LCFC Hefei Electronics Technology Co Ltd
Priority to CN202210744165.4A priority Critical patent/CN115147113A/en
Publication of CN115147113A publication Critical patent/CN115147113A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/363Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The disclosure provides a password determination method, a password determination device, an electronic device and a storage medium, wherein the method comprises the following steps: acquiring a motion track of a tool for inputting a password by a user; determining a corresponding digital code based on the motion trajectory; a password is determined based on the digital code. Through the method and the device, the user password can be ensured not to be peeped, the password input by the user can be effectively identified, and the safety of user information is ensured.

Description

Password determination method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of privacy protection identity authentication, and in particular, to a password determination method and apparatus, an electronic device, and a storage medium.
Background
Along with the continuous development of technologies such as computers, internet and the like, the electronic transaction brings great convenience to life, paper money with various face values does not need to be prepared when the user leaves, the user only needs to carry a mobile phone, and the user can easily complete payment by scanning the two-dimensional code through the mobile phone. Accordingly, electronic trading has become a trend for the development of the era due to its many advantages, and is accepted and supported by more and more countries.
However, electronic transactions are greatly convenient for people to live, and have limitations, and the biggest problem for ordinary users is the security of electronic transactions, so that solving the potential safety hazard and maintaining the security of user information are always pursued targets.
Disclosure of Invention
The present disclosure provides a password determination method, device, electronic device and storage medium, so as to at least solve the above technical problems in the prior art.
According to a first aspect of the present disclosure, there is provided a password determination method, the method comprising: acquiring a motion track of a tool for inputting a password by a user; determining a corresponding digital code based on the motion trajectory; a password is determined based on the digital code.
In one embodiment, the method further comprises: and constructing at least one digital coding database corresponding to the user, wherein the digital coding database stores the motion track of the tool for each user to input the password.
In an embodiment, the obtaining a motion trajectory of a tool for inputting a password by a user includes: constructing a coordinate system based on the motion track; and determining at least one group of digital codes corresponding to the motion trail in the coordinate system.
In an embodiment, the determining the corresponding digital code based on the motion trajectory includes: determining the number of end points in the motion trajectory; and determining the input times corresponding to the motion trail based on the number of the end points.
In one embodiment, the determining the password based on the digital code comprises: matching the digital code with a digital code corresponding to a user in the digital code database to obtain a matching result; and determining the matching result as the password.
In one embodiment, the determining the password based on the digital code comprises: if the digital code is matched with the digital code corresponding to the user in the digital code database to obtain two or more matching results, determining the input times corresponding to the motion track; determining the password based on the number of inputs.
In an embodiment, the determining the password based on the number of inputs includes: and determining that the matching result which is consistent with the input times corresponding to the motion trail in the obtained matching results is the password.
In one embodiment, the determining the password based on the digital code comprises: if the digital code is matched with the digital code corresponding to the user in the digital code database, and a matching result is not obtained, acquiring a password corresponding to the motion track; and storing the digital code to a digital code database corresponding to the user.
According to a second aspect of the present disclosure, there is provided a password determination apparatus, the apparatus comprising: the acquisition module is used for acquiring the motion track of a tool for inputting the password by the user; a determining module for determining a corresponding digital code based on the motion trajectory; and for determining a password based on the digital code.
In one embodiment, the apparatus further comprises: the construction module is used for constructing at least one digital coding database corresponding to the user, and the motion trail of the tool for inputting the password by each user is stored in the digital coding database.
In one embodiment, the apparatus further comprises: the construction module is used for constructing a coordinate system based on the motion track; the determining module is further configured to determine at least one group of digital codes corresponding to the motion trajectory in the coordinate system.
In an embodiment, the determining module is further configured to determine the number of end points in the motion trajectory; and the input times corresponding to the motion trail are determined based on the number of the end points.
In an implementation manner, the determining module is further configured to match the digital code with a digital code corresponding to a user in the digital code database to obtain a matching result; and is further configured to determine the matching result as the password.
In an implementation manner, the determining module is further configured to determine the input times corresponding to the motion trajectory if the digital code is matched with the digital code corresponding to the user in the digital code database to obtain two or more matching results; and is further configured to determine the password based on the number of inputs.
In an implementation manner, the determining module is further configured to determine that a matching result that is consistent with the input times corresponding to the motion trajectory in the obtained matching results is the password.
In an implementation manner, the obtaining module is further configured to obtain a password corresponding to the motion trajectory if the digital code is matched with a digital code corresponding to a user in the digital code database and a matching result is not obtained; the device further comprises: and the storage module is used for storing the digital codes to a digital code database corresponding to the user.
According to a third aspect of the present disclosure, there is provided an electronic device comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the methods of the present disclosure.
According to a fourth aspect of the present disclosure, there is provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of the present disclosure.
The password determining method, the device, the electronic equipment and the storage medium change the traditional keystroke mode of the displacement of a finger match hand by defining a password determining mode, and input of the password is completed only by inching under the condition that a tool for inputting the password by a user is not displaced, so that the password can be ensured not to be peeped in the process of inputting the password by the user, the input password input by the user can also be effectively identified, the safety problem existing in the traditional password input process is avoided, and the safety of user information is maintained.
It should be understood that the statements in this section are not intended to identify key or critical features of the embodiments of the present disclosure, nor are they intended to limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The above and other objects, features and advantages of exemplary embodiments of the present disclosure will become readily apparent from the following detailed description read in conjunction with the accompanying drawings. Several embodiments of the present disclosure are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which:
in the drawings, the same or corresponding reference numerals indicate the same or corresponding parts.
Fig. 1 and 2 are schematic diagrams showing a password input interface in the related art;
FIG. 3 is a diagram showing a digital input interface in the related art;
FIG. 4 is a flow chart illustrating a password determination method according to an embodiment of the present disclosure;
FIG. 5 is another flow chart diagram illustrating a password determination method according to an embodiment of the disclosure;
FIG. 6 is a detailed alternative flow diagram of a password determination method according to an embodiment of the present disclosure;
FIG. 7 is a schematic diagram of a planar rectangular coordinate system constructed by a password determination method according to an embodiment of the disclosure;
FIG. 8 is a schematic diagram illustrating an input sequence of a password determination method according to an embodiment of the present disclosure;
FIG. 9 is a diagram illustrating an application of a password determination method in a practical scenario according to an embodiment of the present disclosure;
FIG. 10 is a schematic diagram illustrating another practical application scenario of a password determination method according to an embodiment of the disclosure;
FIG. 11 is a schematic diagram showing a configuration of a password determination apparatus according to an embodiment;
fig. 12 shows a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
Detailed Description
In order to make the objects, features and advantages of the present disclosure more apparent and understandable, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present disclosure, and it is apparent that the described embodiments are only a part of the embodiments of the present disclosure, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
Current electronic payments mainly include internet payments, mobile payments, and third party payments. In which there may be cross-business of electronic payments such as internet payments, mobile payments, and third party payments.
Fig. 1 and 2 are schematic diagrams illustrating a password input interface in the related art.
In the current electronic payment process, identity confirmation before payment is undoubtedly an important link for ensuring user information safety, although biometric authentication technologies such as face recognition or fingerprint recognition are applied with continuous development of scientific technology, the biometric authentication technology depends on biometric information, so that the uniqueness of the biometric information is the root of the biometric authentication technology, and once the biometric information is leaked, irreversible great loss is brought to a user. Therefore, whether from the wide range of applications or from the public acceptance, user identity confirmation by means of traditional password input is still the mainstream of the current society. Referring to fig. 1 and 2, password input interfaces for inputting a password by means of conventional password input on a mobile device and a cash dispenser, respectively, are shown.
It seems most convenient and secure to use traditional password entry as a means of pre-payment identity confirmation, but in practice there is still a risk of peeking. When the user is used as a payer and enters a payment password, the user may be peeped at the password by people behind or nearby, and unpredictable risks are generated once the user cannot timely perceive the password by himself. Particularly, when a password is input through a computer, a user usually sets some special characters, and the special characters need to be input by one hand during inputting, and the other hand presses the Shift key or the Ctrl key, so that the user cannot shield the password by hand in the process of inputting the password, and cannot implement other shielding measures, thereby having higher risk. Such a problem may exist in password input in mobile payment or in cash dispensers, that is, as long as various electronic payment methods such as mobile payment or third party payment are performed in a shopping mall, an office or other scenes with many people, there is a risk that the password input period is peeped as long as the identity is confirmed by the password input method. Therefore, a way to avoid the security problem of the keypad number password input is urgently needed.
Fig. 3 is a schematic diagram illustrating a digital input interface in the related art. The digital input interface shown in fig. 3 is generally in a form of combining an icon with a key, and is widely applied to cash dispensers and various electronic transactions, and in order to complete password input through the digital input interface, a user must use a finger to engage with a large displacement of a hand, so that a traditional password input is to make key selection by using the displacement of a fingertip engaging with the hand, but the present disclosure defines a password determination manner based on the defects of the existing password determination manner, and changes the traditional key stroke manner.
Fig. 4 shows a flowchart of a password determination method according to an embodiment of the present disclosure.
Referring to fig. 4, a processing flow of a password determination method according to an embodiment of the present disclosure at least includes the following steps:
and step S101, acquiring a motion track of a tool for inputting a password by a user.
In some embodiments, at least one digital coding database corresponding to the user can be constructed, and the motion trail of each tool for inputting the password by the user is stored in the digital coding database.
In some embodiments, the tool for inputting the password by the user may be a finger or a stylus, and the tool for inputting the password by the user is not limited herein. Correspondingly, if the tool for inputting the password by the user is a finger, the motion trail can be the handwriting of inputting the password by the finger of the user; if the tool for inputting the password by the user is a stylus pen, the motion trajectory may be handwriting of the password input by the user through the stylus pen, wherein the handwriting of the password input by the user through the finger may be different from the handwriting of the password input by the user through the stylus pen.
In some embodiments, the password entered by the user may be a number or a letter.
In some embodiments, the specific implementation process of obtaining the motion trajectory of the tool for inputting the password by the user at least includes:
step a, constructing a coordinate system based on a motion track;
and b, determining at least one group of digital codes corresponding to the motion track in the coordinate system.
In some embodiments, for step a, the constructed coordinate system may be a cartesian coordinate system, and the orientation of the coordinate system may also be defined based on numbers, and the construction manner of the coordinate system is not limited herein.
As an example, a plane rectangular coordinate system is constructed, wherein the positive y-axis direction is defined as North, and the North direction is assigned with the number 1, i.e. North =1; similarly, the y-axis negative direction is defined as the azimuth South, and the number 2 is assigned to the azimuth South, namely South =2; the positive x-axis direction is defined as the azimuth East, and the number 3 is assigned to the azimuth East, namely East =3; the x-axis negative direction is defined as the West direction, the West direction is assigned with the number 4, namely West =4, and the plane rectangular coordinate system is defined based on the number on the basis of constructing the plane rectangular coordinate system.
In some embodiments, different users have different writing habits, and different numbers or letters have different writing modes, so that different users input different numbers or letters and the same numbers or letters can generate different movement tracks, and the movement tracks can be acquired by a sensor in the electronic equipment. Such as: the method comprises the steps that a user inputs a number 1 on a touch screen through a fingertip, in the input process of the user, the contact area between the fingertip of the user and the touch screen and the pressing force change, wherein the change of the contact area is mainly reflected in the change of the position and the size of the area, in the process of inputting the number 1 of the user, the contact area between the fingertip of the user and the touch screen is gradually increased, the change of the position of the area is reflected in the fact that the contact area is increased towards one direction, the pressing force can be changed from light to heavy or from heavy to light, the changes are different from people, a sensor can acquire the changes, and therefore the motion track generated in the password input process of the user is acquired.
Among them, a technology in which a user inputs numbers or letters through a touch screen is a man-machine interaction technology widely used. The basic elements of the touch screen are sensors, and the touch screen is roughly classified into an infrared type, a resistive type, a surface acoustic wave type, and a capacitive type, according to the type of the sensor. During the process of inputting numbers or letters by a user, the sensor can acquire the change of the contact area between the tool for inputting the password by the user and the touch screen and the pressure degree. The touch screen is composed of a touch point detection component and a touch screen controller. The touch point detection component is arranged in front of the touch screen and used for detecting the position of a user touching the screen, the user can touch the screen through a fingertip, a corresponding touch signal can be generated at the moment, and the touch point detection component can send the touch signal of the user to the touch screen controller after receiving the touch signal of the user; the touch screen controller is mainly used for receiving a touch signal from the touch point detection part, determining a touch point coordinate corresponding to the touch signal, sending the touch point coordinate to a Central Processing Unit (CPU) of the password input device, and receiving and executing a command sent by the CPU of the password input device.
Step S102, determining corresponding digital codes based on the motion tracks.
In some embodiments, the same number or letter may have different movement traces when being input, and different movement traces may generate different number codes. Therefore, the digital codes corresponding to the motion tracks determined in the coordinate system can have multiple groups.
As an example, taking the number 0 as an example, in a planar rectangular coordinate system based on digital definition, the motion trajectory of the number 0 may be from North =1, via West =4, i.e. the digital code 14 is obtained; on the basis that the motion trajectory of the number 0 passes West =4, continue to pass South =2, i.e., obtain the digital code 42; on the basis that the motion trajectory of the number 0 passes through South =2, continuing to pass through East =3, namely obtaining a digital code 23; on the basis that the motion trajectory of the number 0 passes East =3, ending with North =1, the digital code 31 is obtained. Finally, the digital code corresponding to the motion track of the number 0 is obtained, namely 14- >42- >23- >31, wherein- > represents the sequence of the motion track of the number 0. If the motion trajectory of the number 0 starts from North =1 and ends at North =1 via East =3, south =2 and West =4, the finally obtained digital code becomes 13- >32- >24- >41.
In the embodiment of the disclosure, the coordinate system is constructed to reflect the change of the area and the direction generated during the contact period between the tool for inputting the password by the user and the touch screen, so that the password input by the user is digitized according to the coordinates.
In some embodiments, there may be cases where the same numerical code is determined based on different motion trajectories, and thus further recognition of the motion trajectories is also needed.
As an example, the numeric code determined by the coordinate system for both the number 9 and the number 4 may be 42- >30- >02.
In some embodiments, determining the specific implementation process of the corresponding digital code based on the motion trajectory may include at least:
step c, determining the number of the end points in the motion track;
and d, determining the input times corresponding to the motion track based on the number of the end points.
In some embodiments, the end point of the motion trajectory and the corresponding input times of the motion trajectory may reflect an input break point in the input process.
As an example, three strokes of the letter a are input according to a common handwriting, three end points can be obtained, three times of input are required, that is, three input break points are obtained when the input of the letter a is completed, and an input break point can also be understood as the number of strokes involved in the input process, that is, a point where a user lightly presses a touch screen through a tool for inputting a password, and the tool for inputting the password by the user is not limited here, and may be a finger or other tools.
The input breakpoint reflects the change of the area size of the tool for inputting the password by the user during the contact with the touch screen, if the user inputs the password through the fingertip, the change of the area size of the tool for inputting the password by the user during the contact between the fingertip and the touch screen is different from person to person, and if the user inputs the password through the stylus, the change of the area size of the tool for inputting the password by the user during the contact between the stylus and the touch screen is different according to the difference of the stylus. The number of times of introducing the input breakpoints, namely the number of strokes, can more accurately identify the password input by the user.
In the embodiment of the present disclosure, by further identifying the motion trajectory, under the condition that the motion trajectories are different and the digital codes are the same, the content input by the user can be identified more accurately, such as: although the numbers of the numbers 9 and 4 determined by the coordinate system can be 42- >30- >02, the number of the end points in the motion trail of the number 9 is 1, and the input times is also 1, that is, 1 input breakpoint is provided for completing the input of the number 9; and the number of the end points in the motion track of the number 4 is 2, and the input frequency is also 2, namely 2 input break points exist when the input of the number 4 is completed, so that the number 4 and the number 9 can be accurately identified through comparison.
Step S103, determining the password based on the digital code.
In some embodiments, determining a specific implementation of a password based on a digital code may include:
matching the digital code with a digital code corresponding to a user in a digital code database to obtain a matching result;
and determining the matching result as the password.
As an example, if the number code obtained by the user 1 inputting the letter a is 42- >32- >30, the number code is matched with the number code corresponding to the user 1 in the number code database, and a matching result is obtained as the letter a, that is, the letter a is the password input by the user 1.
In some embodiments, determining a specific implementation of a password based on a digital code may include:
if the digital code is matched with the digital code corresponding to the user in the digital code database to obtain two or more matching results, determining the input times corresponding to the motion track;
a password is determined based on the number of inputs.
As an example, if the number code obtained by the user 1 inputting the number 9 is 42- >30- >02, the number code is matched with the number code corresponding to the user 1 in the number code database to obtain two matching results, which are the number 4 and the number 9 respectively, it is necessary to determine the input times corresponding to the motion trajectory to obtain that the input times corresponding to the actual motion trajectory generated by the user inputting the number 9 is 1.
In some embodiments, determining the specific implementation of the password based on the number of inputs may include:
and determining that the matching result which is consistent with the input times corresponding to the motion trail in the obtained matching result is a password.
As an example, although the number 4 and the number 9 are both the matching result, the number of inputs corresponding to the motion trajectory of the input number 4 is 2, and the number of inputs corresponding to the motion trajectory of the input number 9 is 1, which coincides with the number of inputs corresponding to the actual motion trajectory generated by the user inputting the number 9, that is, the number 9 is the password input by the user.
In some embodiments, determining a specific implementation of a password based on a digital code may include:
if the digital code is matched with the digital code corresponding to the user in the digital code database, and a matching result is not obtained, acquiring a password corresponding to the motion track;
and storing the digital codes to a digital code database corresponding to the user.
As an example, if the user 1 inputs the letter a to obtain a numeric code 42- >32- >32, matches the numeric code with the numeric code corresponding to the user 1 in the numeric code database, and if the numeric code is different from the numeric code 42- >32- >30 corresponding to the motion trajectory of the letter a stored in the numeric code database, and therefore a matching result is not obtained, the password corresponding to the motion trajectory generated by the user 1 in the input process is obtained as the letter a, and the numeric code 42- >32- >32 is stored in the numeric code database corresponding to the user 1.
The method for acquiring the letter a may be that after the user 1 inputs the password, the current interface prompts the user 1 in a dialog box manner that the password is not recognized, and guides the user 1 to complete confirmation of the letter a, and the method for acquiring the letter a is not limited here, and correspondingly, the method for acquiring the password corresponding to the motion trajectory is not limited here.
Fig. 5 is a schematic flow chart illustrating a password determination method according to an embodiment of the present disclosure.
Referring to fig. 5, another processing flow of a password determination method according to an embodiment of the present disclosure includes at least the following steps:
step S201, constructing a digital coding database corresponding to at least one user.
The motion track of the tool for inputting the password by the user is stored in the digital coding database, and it should be understood that the number of the users of the device may be 1, or may be other fixed numerical values. The digital coding database established for the user based on the motion track generated in the process of inputting the password by the user can also be understood as a customized coding database.
As an example, the number of users of the device M is 3, which are the device owner h and the parent of the device owner h, respectively, and the motion trajectories of the password input tools of the h and h parents are stored in the digital coding database. It should be understood that the user is not limited herein, and may be the device owner, or may be a family or friend of the device owner.
In some embodiments, the tool for inputting the password by the user may be a finger or a stylus, and the tool for inputting the password by the user is not limited herein. Correspondingly, if the tool for inputting the password by the user is a finger, the motion trail can be the handwriting of inputting the password by the finger of the user; if the tool for inputting the password by the user is a stylus, the motion trajectory may be handwriting of the password input by the user through the stylus, where the handwriting of the password input by the finger of the user and the handwriting of the password input by the user through the stylus may be different.
In some embodiments, the password entered by the user may be a number or a letter.
In some embodiments, the most common motion trajectory in the process of inputting numbers and letters can be investigated and collated to obtain a basic motion trajectory, and then a basic digital coding database is constructed based on the basic motion trajectory, which can be regarded as an existing coding database.
In some embodiments, the mobile device may maintain security of user information during the electronic transaction by installing an Application (APP), such as: in the electronic transaction process, the third-party payment system can call the installed APP through the interface to realize password input, so that the safety of the electronic transaction is improved.
As an example, a user may install a Finger pass APP on a mobile device, where the Finger pass APP can prompt and guide the user to input numbers and letters when the Finger pass APP is installed, obtain a motion track generated by the user inputting the numbers and letters, construct a digital coding database corresponding to the user based on the obtained motion track, that is, a customized coding database, and customize (customize) the digital coding database through a unique motion track generated by the user during inputting the numbers and letters, thereby increasing the recognition degree of a Password input by the user. When a user purchases goods in an online shopping mall, a Finger pass APP can be called through a third-party payment system on a payment interface, and Password input required in electronic transaction is completed by micro-actions of fingertips.
It should be understood that a password determination method of the present disclosure may be considered a specific input method, and the input interface may provide a plurality of input methods for the user to select. Such as: the input interface of the mobile device can provide a Sudoku input method, a full-spelling input method and a special input method for the user to select.
And step S202, constructing a coordinate system based on the motion trail.
In some embodiments, the constructed coordinate system may be a cartesian coordinate system, and the orientation of the coordinate system may also be defined based on numbers, and the manner of construction of the coordinate system is not limited herein.
As an example, a plane rectangular coordinate system is constructed, wherein the positive y-axis direction is defined as North, and the North direction is assigned with the number 1, i.e. North =1; similarly, the y-axis negative direction is defined as the azimuth South, and the number 2 is assigned to the azimuth South, namely South =2; the positive x-axis direction is defined as the azimuth East, and the number 3 is assigned to the azimuth East, namely East =3; the x-axis negative direction is defined as the azimuth West, and the number 4 is assigned to the azimuth West, namely West =4, so that the plane rectangular coordinate system is defined based on the number on the basis of constructing the plane rectangular coordinate system.
Step S203, at least one group of digital codes corresponding to the motion trail are determined in the coordinate system.
In some embodiments, the motion profile may be acquired by a sensor within the electronic device. Such as: a user inputs a number 1 on the touch screen through a fingertip, in the input process of the user, the contact area between the fingertip of the user and the touch screen changes, the change of the contact area is mainly reflected in the change of an area direction and an area size, and the sensor can sense and record the changes, so that a motion track generated in the process of inputting a password by the user is obtained.
In some embodiments, the same number or letter may have different movement tracks when being input, and different movement tracks may generate different number codes, so that the number codes corresponding to the movement tracks determined in the coordinate system may have multiple groups.
As an example, taking the number 0 as an example, in a planar rectangular coordinate system based on digital definition, the motion trajectory of the number 0 may be from North =1, via West =4, i.e. the digital code 14 is obtained; on the basis that the motion track of the number 0 passes West =4, continue to pass South =2, namely obtain the digital code 42; on the basis that the motion track of the number 0 passes through South =2, the rest =3 is continued, that is, the digital code 23 is obtained; on the basis that the motion trajectory of the number 0 passes East =3, ending with North =1, the digital code 31 is obtained. Finally, the digital code corresponding to the motion track of the number 0 is obtained, namely 14- >42- >23- >31, wherein- > represents the sequence of the motion track of the number 0. If the motion trajectory of the number 0 starts from North =1 and ends at North =1 via East =3, south =2 and West =4, the finally obtained digital code becomes 13- >32- >24- >41.
In the embodiment of the disclosure, the coordinate system is constructed to reflect the change of the area and the direction generated during the contact period between the tool for inputting the password by the user and the touch screen, so that the password input by the user is digitized according to the coordinates.
Step S204, determining the number of the end points in the motion trail.
In some embodiments, there may be cases where the same numerical code is determined based on different motion trajectories, and thus further recognition of the motion trajectories is also needed.
As an example, the numeric code determined by the coordinate system for both the number 9 and the number 4 may be 42- >30- >02.
In step S205, the number of inputs corresponding to the motion trajectory is determined based on the number of end points.
In some embodiments, the end point of the motion trajectory and the corresponding input times of the motion trajectory may reflect an input break point in the input process.
As an example, three strokes of the letter a are input according to a common handwriting, three end points can be obtained, three times of input are required, that is, three input break points are obtained when the input of the letter a is completed, and the input break points and the input break point times can also be understood as strokes and stroke numbers involved in the input process, that is, the input break points are points at which a user lightly presses a touch screen through a password input tool, and the password input tool of the user is not limited here, and can be a finger or other tools.
The input breakpoint reflects the change of the area size when a tool for inputting the password by the user is in contact with the touch screen, and the number of times of introducing the input breakpoint, namely the stroke number, can accurately identify the password input by the user.
In the embodiment of the present disclosure, by further identifying the motion trajectory, under the condition that the motion trajectories are different and the digital codes are the same, the content input by the user can be identified more accurately, such as: although the numbers 9 and 4 can be 42- >30- >02 through the number codes determined by the coordinate system, the number of the end points in the motion track of the number 9 is 1, and the input times is also 1, namely 1 input breakpoint exists after the input of the number 9 is completed; and the number of the end points in the motion track of the number 4 is 2, and the input frequency is also 2, namely 2 input break points exist when the input of the number 4 is completed, so that the number 4 and the number 9 can be accurately identified through comparison.
In step S206, a password is determined based on the digital code.
In some embodiments, determining a specific implementation of a password based on a digital code may include:
matching the digital code with a digital code corresponding to a user in a digital code database to obtain a matching result;
and determining the matching result as a password.
As an example, if the number code obtained by inputting the letter A by the user 1 is 42- >32- >30, the number code is matched with the number code corresponding to the user 1 in the number code database, and a matching result is obtained as the letter A, that is, the letter A is the password input by the user 1.
In some embodiments, determining a specific implementation of a password based on a digital code may include:
if the digital code is matched with the digital code corresponding to the user in the digital code database to obtain two or more matching results, determining the input times corresponding to the motion track;
a password is determined based on the number of inputs.
As an example, if the number code obtained by the user 1 inputting the number 9 is 42- >30- >02, the number code is matched with the number code corresponding to the user 1 in the number code database to obtain two matching results, which are the number 4 and the number 9 respectively, it is necessary to determine the input times corresponding to the motion trajectory, and the input times corresponding to the motion trajectory of the input number 9 is obtained as 1.
In some embodiments, determining the specific implementation of the password based on the number of inputs may include:
and determining that the matching result which is consistent with the input times corresponding to the motion trail in the obtained matching result is a password.
As an example, although the number 4 and the number 9 are both the matching result, the number of inputs corresponding to the motion trajectory of the input number 4 is 2, and the number of inputs corresponding to the motion trajectory of the input number 9 is 1, which coincides with the number of inputs corresponding to the actual motion trajectory generated by the user inputting the number 9, that is, the number 9 is the password input by the user.
In some embodiments, determining a specific implementation of a password based on a digital code may include:
if the digital code is matched with the digital code corresponding to the user in the digital code database, and a matching result is not obtained, acquiring a password corresponding to the motion track;
and storing the digital codes to a digital code database corresponding to the user.
As an example, if the user 1 inputs the letter a to obtain the numeric code 42- >32- >32, matches the numeric code with the numeric code corresponding to the user 1 in the numeric code database, and is different from the numeric code 42- >32- >30 corresponding to the motion trajectory of the letter a stored in the numeric code database, and therefore a matching result is not obtained, the password corresponding to the motion trajectory generated by the user 1 in the input process is obtained as the letter a, and the numeric code 42- >32- >32 is stored in the numeric code database corresponding to the user 1.
The method for acquiring the letter a may be that after the user 1 inputs the password, the current interface prompts the user 1 in a dialog box manner that the password is not recognized, and guides the user 1 to complete confirmation of the letter a, and the method for acquiring the letter a is not limited here, and correspondingly, the method for acquiring the password corresponding to the motion trajectory is not limited here.
That is, considering that there are differences in writing modes, a self-enhancement (self-enhancement) system is designed in addition to the basic digital code database, a self-enhancement mechanism is established through a program, when a password input by a user cannot be identified, the password input by the user is directly obtained and stored, and the storage mode is not limited here, and the digital code corresponding to the password input by the user can be stored in the digital code database, or the password itself can be stored in the word stock database.
The word stock library can be a large electronic resource library which is built by a computer technology and has a certain scale, and the large electronic resource library collects the actually appeared writing forms which can represent specific words or word variants in actual use.
Fig. 6 is a detailed optional flowchart of a password determination method according to an embodiment of the present disclosure.
Referring to fig. 6, taking an example that a user inputs a password A4P through a fingertip, a detailed optional process of the password determination method according to the embodiment of the present disclosure is described, which at least includes the following steps:
step S301, digital coding databases corresponding to two users are constructed.
Specifically, the first digital coding database is an existing coding database, wherein the most common motion trail in the input process of numbers and letters is investigated and sorted to obtain a basic motion trail, and the basic digital coding database is constructed based on the basic motion trail; the second digital coding database is a digital coding database established for the user based on the motion track generated in the process of inputting the password by the user, and can also be understood as a customized coding database.
Alternatively, the number of users of the device may be 1, or may be some other fixed number. Such as: the number of users of the device M is 3, which are the device owner h and the parent of the device owner h, respectively, and the motion trajectories of the password input tool by the h parent and the h parent are stored in the digital coding database. It should be understood that the user may be the device owner, or may be a family or friend of the device owner.
Optionally, the user may install a Finger Password APP on the mobile device, the Finger Password APP may prompt and guide the user to input numbers and letters when installed, obtain a motion trajectory generated by the user inputting the numbers and letters, construct a digital coding database corresponding to the user based on the obtained motion trajectory, that is, a customized coding database, and customize the digital coding database through a unique motion trajectory generated by the user during inputting the numbers and letters, thereby increasing the recognition degree of the Password input by the user.
Optionally, the Finger Password APP and the third party payment system may interact through an interface call, such as: when a user purchases goods in an online shopping mall, a Finger Password APP can be called through a third-party payment system on a payment interface, and therefore Password input required in electronic transaction is completed through micro-actions of fingertips.
Step S302, a plane rectangular coordinate system is constructed.
Specifically, as shown in fig. 7, the positive y-axis direction is defined as North azimuth, and the number 1 is assigned to North azimuth, that is, north =1; similarly, the y-axis negative direction is defined as the azimuth South, and the number 2 is assigned to the azimuth South, namely South =2; the positive x-axis direction is defined as the azimuth East, and the number 3 is assigned to the azimuth East, namely East =3; the x-axis negative direction is defined as the West bearing, and a number of 4 is assigned to the West bearing, i.e., west =4.
Step S303, at least one group of digital codes corresponding to the motion trail are determined in the plane rectangular coordinate system.
Specifically, the motion trajectory is a motion trajectory of the user inputting the password A4P through a fingertip, and may also be understood as handwriting related to the user inputting the password A4P through the fingertip.
Alternatively, the handwriting involved in inputting the letter A has three strokes, and the input sequence is as shown in FIG. 8.
Step 1:We go to direction 4for X and 2for Y as we draw line1;
Step 2:We go to direction 3for X and 2for Y as we draw line2;
Step 3:We go to direction 3for X and 0for Y as we draw line3。
Namely: when the first stroke of the letter A is input, the position of an X-axis direction defined as 4 is obtained, and the position of a Y-axis direction defined as 2 is obtained; when inputting the second stroke of the letter A, acquiring the position of which the X-axis direction is defined as 3 and the position of which the Y-axis direction is defined as 2; when the third stroke of the letter a is input, the orientation in which the X-axis direction is defined as 3 and the orientation in which the Y-axis direction is defined as 0 are acquired.
User input of the letter a results in a numeric code 42- >32- >30, and corresponds to the X-axis and the Y-axis.
Here, when the third stroke of the letter a is input, since the third stroke of the letter a is input horizontally, no change in the Y-axis is generated, and thus the Y-axis direction is defined as the orientation of 0. On the contrary, if the third stroke of the letter a is not horizontal, i.e. the Y-axis is changed, the orientation of the Y-axis defined as 0 is not obtained, and according to the angle of deviation of the third stroke of the letter a, the orientation of the Y-axis defined as 1 or the orientation of the Y-axis defined as 2 is obtained. The following combinations may therefore be produced:
42->32->30
42->32->31
42->32->32
by the method, the data code of the password A4P input by the fingertip of the user can be quickly established.
Step S304, determining the number of the end points in the motion trail.
In step S305, the input number corresponding to the motion trajectory is determined based on the number of end points.
Specifically, as shown in fig. 8, three strokes are input according to a common handwriting, three end points can be obtained, three times of input are required, that is, three input break points are obtained when the input of the letter a is completed, and the input break points can also be understood as the number of strokes involved in the input process, that is, the points at which the user's fingertip lightly presses the touch screen; similarly, two strokes are provided for inputting the number 4 according to the common handwriting, two end points can be obtained, two times of input are required, and two input breakpoints are provided for completing the input of the number 4.
Step S306, the digital code of the first password is matched with the digital code corresponding to the user in the digital code database to obtain a matching result, namely the letter A.
In step S307, the letter a is determined as the first password input by the user.
Step S308, the digital code of the second bit password is matched with the digital code corresponding to the user in the digital code database, and two matching results, i.e. the number 4 and the number 9, are obtained.
Specifically, if the digital code obtained by inputting the number 9 by the user is 42- >30- >02, the digital code is matched with the digital code corresponding to the user in the digital code database to obtain two matching results, namely, the number 4 and the number 9, the input frequency corresponding to the motion trajectory needs to be determined, and the input frequency corresponding to the motion trajectory of the input number 4 is obtained as 2.
In step S309, it is determined that the number 4 is the second password input by the user.
Specifically, since the input number of times corresponding to the movement trace of the input number 9 is 1, the number 4 of times corresponding to the movement trace of 2 in the matching result is the password input by the user.
Step S310, the digital code of the third-bit password is matched with the digital code corresponding to the user in the digital code database, if the matching result is not obtained, the password corresponding to the motion track is obtained, namely the third-bit password input by the user is the letter P.
Specifically, in consideration of differences in writing modes, a self-enhancement system is designed in addition to a basic digital coding database, a self-enhancement mechanism is established through a program, and when a password input by a user cannot be identified, the password input by the user can be directly obtained and stored.
Optionally, the manner of acquiring the letter P may be that after the user inputs the password, the current interface prompts the user in a dialog box that the password is not recognized, and guides the user to complete the confirmation of the letter P, where the confirmation manner may be that a selection is made among possible results, such as: the possible outcomes are the letters P and D, which are selected by the user.
And step S311, storing the letter P in a word stock corresponding to the user.
The word stock library can be a large electronic resource library which is built by a computer technology and has a certain scale, and the large electronic resource library collects the actually appeared writing forms which can represent specific words or word variants in actual use.
Optionally, when the user inputs a password through a fingertip, the touch screen identifies the fingerprint of the user, and compares the fingerprint with a fingerprint stored locally in the terminal device, so as to determine the identity of the user.
In the embodiment of the present disclosure, the input method can be understood as a special input method, and with reference to fig. 9, a user can complete password input only by performing a micro motion by a fingertip in a non-displacement state, so that not only can the password of the user not be peeped, but also the password input by the user can be effectively identified, and the security of user information is ensured.
Fig. 10 is a schematic diagram illustrating an actual scenario application of a password determination method according to an embodiment of the present disclosure.
Different from the traditional password input interface which needs a plurality of digital keys, the password determination mode defined by the disclosure only needs to set one key, referring to fig. 10, when a user types a password, the user only needs to place the fingertip of one finger on only one key, and the password of the user can be determined by performing a micro-motion on the key through the fingertip, and it should be understood that the micro-motion is performed in a state without any displacement. Because the fingertip input is a micro-action without any displacement, better safety can be provided through the mode, the safety risk brought by peeping is prevented, and the safety of user information is ensured.
Fig. 11 is a schematic diagram showing a configuration of a password determination apparatus according to an embodiment.
Referring to fig. 11, an embodiment of a password determination apparatus, the password determination apparatus 40 includes: an obtaining module 401, configured to obtain a motion trajectory of a tool for a user to input a password; a determining module 402 for determining a corresponding digital code based on the motion trajectory; and also for determining a password based on the digital code.
In some embodiments, the password determination apparatus 40 further includes: and a constructing module 403, configured to construct at least one digital coding database corresponding to the user, where a motion trajectory of each tool for inputting the password by the user is stored in the digital coding database.
In some embodiments, the password determination apparatus 40 further includes: a construction module 403, configured to construct a coordinate system based on the motion trajectory; a determining module 402, further configured to determine at least one group of digital codes corresponding to the motion trajectory in the coordinate system.
In some embodiments, the determining module 402 is further configured to determine the number of end points in the motion trajectory; and the input times corresponding to the motion trail are determined based on the number of the end points.
In some embodiments, the determining module 402 is further configured to match the digital code with a digital code corresponding to a user in a digital code database to obtain a matching result; and is also used for determining the matching result as the password.
In some embodiments, the determining module 402 is further configured to determine the input times corresponding to the motion trajectory if the digital code is matched with the digital code corresponding to the user in the digital code database to obtain two or more matching results; and also for determining a password based on the number of inputs.
In some embodiments, the determining module 402 is further configured to determine that a matching result that is consistent with the input times corresponding to the motion trajectory in the obtained matching results is a password.
In some embodiments, the obtaining module 401 is further configured to obtain the digital code corresponding to the motion trajectory if the digital code is matched with the digital code corresponding to the user in the digital code database and a matching result is not obtained; the password determination apparatus 40 further includes: and a storage module 404, configured to store the digital code in a digital code database corresponding to the user.
According to an embodiment of the present disclosure, the present disclosure also provides an electronic device and a readable storage medium.
FIG. 12 shows a schematic block diagram of an example electronic device 500 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable electronic devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 12, the electronic device 500 includes a computing unit 501 that can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM) 502 or a computer program loaded from a storage unit 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data required for the operation of the electronic apparatus 500 can also be stored. The calculation unit 501, the ROM 502, and the RAM 503 are connected to each other by a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
A number of components in the electronic device 500 are connected to the I/O interface 505, including: an input unit 506 such as a keyboard, a mouse, or the like; an output unit 507 such as various types of displays, speakers, and the like; a storage unit 508, such as a magnetic disk, optical disk, or the like; and a communication unit 509 such as a network card, modem, wireless communication transceiver, etc. The communication unit 509 allows the electronic device 500 to exchange information/data with other electronic devices through a computer network such as the internet and/or various telecommunication networks.
The computing unit 501 may be a variety of general and/or special purpose processing components with processing and computing capabilities. Some examples of the computing unit 501 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The calculation unit 501 executes the respective methods and processes described above, such as the password determination method. For example, in some embodiments, the password determination method may be implemented as a computer software program tangibly embodied on a machine-readable medium, such as storage unit 508. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 500 via the ROM 502 and/or the communication unit 509. When the computer program is loaded into the RAM 503 and executed by the computing unit 501, one or more steps of the above described password determination method may be performed. Alternatively, in other embodiments, the computing unit 501 may be configured to perform the password determination method by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server with a combined blockchain.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel, sequentially, or in different orders, as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved, and the present disclosure is not limited herein.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present disclosure, "a plurality" means two or more unless specifically limited otherwise.
The above description is only for the specific embodiments of the present disclosure, but the scope of the present disclosure is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present disclosure, and all the changes or substitutions should be covered within the scope of the present disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (11)

1. A method of password determination, the method comprising:
acquiring a motion track of a tool for inputting a password by a user;
determining a corresponding digital code based on the motion trajectory;
a password is determined based on the digital code.
2. The method of claim 1, further comprising:
and constructing at least one digital coding database corresponding to the user, wherein the digital coding database stores the motion track of each tool for inputting the password by the user.
3. The method of claim 1, wherein obtaining the motion trajectory of the tool for inputting the password by the user comprises:
constructing a coordinate system based on the motion track;
and determining at least one group of digital codes corresponding to the motion trail in the coordinate system.
4. The method of claim 1, wherein determining the corresponding digital code based on the motion profile comprises:
determining the number of end points in the motion trajectory;
and determining the input times corresponding to the motion trail based on the number of the end points.
5. The method of claim 2, wherein determining the password based on the digital encoding comprises:
matching the digital code with a digital code corresponding to a user in the digital code database to obtain a matching result;
and determining the matching result as the password.
6. The method of claim 2, wherein determining the password based on the digital encoding comprises:
if the digital code is matched with the digital code corresponding to the user in the digital code database to obtain two or more matching results, determining the input times corresponding to the motion track;
determining the password based on the number of inputs.
7. The method of claim 6, wherein determining the password based on the number of inputs comprises:
and determining that the matching result which is consistent with the input times corresponding to the motion trail in the obtained matching results is the password.
8. The method of claim 2, wherein determining the password based on the digital encoding comprises:
if the digital code is matched with the digital code corresponding to the user in the digital code database, and a matching result is not obtained, acquiring a password corresponding to the motion track;
and storing the digital code to a digital code database corresponding to the user.
9. A password determination apparatus, characterized in that the apparatus comprises:
the acquisition module is used for acquiring the motion track of a tool for inputting the password by the user;
a determining module for determining a corresponding digital code based on the motion trajectory; and also for determining a password based on the digital code.
10. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the password determination method of any of claims 1-8.
11. A non-transitory computer readable storage medium storing computer instructions for causing a computer to perform the password determination method according to any one of claims 1 to 8.
CN202210744165.4A 2022-06-27 2022-06-27 Password determination method and device, electronic equipment and storage medium Pending CN115147113A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210744165.4A CN115147113A (en) 2022-06-27 2022-06-27 Password determination method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210744165.4A CN115147113A (en) 2022-06-27 2022-06-27 Password determination method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115147113A true CN115147113A (en) 2022-10-04

Family

ID=83409313

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210744165.4A Pending CN115147113A (en) 2022-06-27 2022-06-27 Password determination method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115147113A (en)

Similar Documents

Publication Publication Date Title
US11086404B2 (en) Gesture identification
US20220261083A1 (en) Gesture-based user interface
EP3497621B1 (en) Identifying one or more users based on typing pattern and/or behaviour
US8922489B2 (en) Text input using key and gesture information
CN105556528A (en) Authentication system
US9430144B1 (en) Unlocking electronic devices with touchscreen input gestures
CN102598012A (en) Password processing method and apparatus
KR100648161B1 (en) System and Method For Collaborative Handwriting Input
US20140105664A1 (en) Keyboard Modification to Increase Typing Speed by Gesturing Next Character
CN105207783A (en) Authentication method and device for user's confidence level
CN115147113A (en) Password determination method and device, electronic equipment and storage medium
WO2010070756A1 (en) Information processing device, authentication program, and authentication method
US11860998B2 (en) Emulator detection through user interactions
US20220091861A1 (en) Systems and methods for generating interfaces based on user proficiency
US20230056653A1 (en) Document analysis to identify document characteristics and appending the document characteristics to a record
CN114020391A (en) Information display method and device, electronic equipment and readable storage medium
CN105760726A (en) Method for determining application permission and terminal
JP6276890B1 (en) Signature verification system
US20240020372A1 (en) Systems and methods for performing non-contact authorization verification for access to a network
Suruthi et al. Efficient handwritten passwords to overcome spyware attacks
KR102232597B1 (en) Authentication method and system using relative position of cross points
TWM603561U (en) System for verifying electronic signature
CN116432155A (en) Identity verification method based on VR equipment
JP2019040230A (en) Online writer recognition method and online writer recognition program
CN116028911A (en) Symbol recognition method and device, intelligent door lock, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination