WO2017059696A1 - 一种触摸屏解锁方法及系统、存储介质 - Google Patents

一种触摸屏解锁方法及系统、存储介质 Download PDF

Info

Publication number
WO2017059696A1
WO2017059696A1 PCT/CN2016/086489 CN2016086489W WO2017059696A1 WO 2017059696 A1 WO2017059696 A1 WO 2017059696A1 CN 2016086489 W CN2016086489 W CN 2016086489W WO 2017059696 A1 WO2017059696 A1 WO 2017059696A1
Authority
WO
WIPO (PCT)
Prior art keywords
string
character
characters
unlocking
password
Prior art date
Application number
PCT/CN2016/086489
Other languages
English (en)
French (fr)
Inventor
任中杰
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017059696A1 publication Critical patent/WO2017059696A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Definitions

  • the present invention relates to a screen unlocking technology in a mobile terminal, and in particular, to a touch screen unlocking method and system, and a storage medium.
  • the password in this mode is set to a character string of a fixed number of characters.
  • unlocking directly input a string of a fixed number of characters. If the input string is the same as the pre-set string, it is unlocked; if not, then Do not unlock.
  • the password in this mode is set on the nine-square grid displayed on the touch screen, and the pattern formed by sliding any number of grids on the nine-square grid is sequentially displayed by sliding operation.
  • unlocking the same nine-square grid is displayed on the touch screen, and the user follows a certain number on the nine-square grid.
  • Draw a graphic in sequence if the order and pattern of the nine squares that pass through the drawing are exactly the same as the preset password pattern, then the solution Lock; if not the same, do not unlock.
  • the embodiments of the present invention are directed to a touch screen unlocking method and system, and a storage medium, which can protect against multiple attacks, ensure that the user unlocks the password, and ensures the security of the user's personal information, thereby effectively unlocking the security.
  • the effect is to enhance the use and experience of the mobile terminal.
  • the embodiment of the invention provides a touch screen unlocking method, and the method includes:
  • the specific character is any one of the characters randomly extracted from each of the character strings included in the preset password.
  • the method further includes: presetting an unlock password including a password sentence.
  • the method before the detecting the currently input track character string, the method further includes: randomly extracting any one character from each character string included in the password sentence as a specific character, and then dividing the selected character from the optional character. Randomly extracting more than one auxiliary character from the remaining characters except the specific character; generating an unlocking matrix by using the specific character and each of the randomly extracted auxiliary characters;
  • the optional characters include 26 English letters and 10 numbers in upper or lower case.
  • each character string included in the password sentence includes any letter and/or number.
  • the track string is a sequence of all characters passing through an arbitrary matrix when the unlocking operation is triggered.
  • the embodiment of the invention further provides a touch screen unlocking system, the system comprising:
  • a track string detecting module configured to detect a currently input track string
  • the unlock password verification module is configured to verify whether the currently input track string contains a specific character in sequence
  • a triggering module configured to trigger a signal for unlocking the screen when the unlock password verification module verifies that the determination order is included
  • the specific character is any one of the characters randomly extracted from each of the character strings included in the preset password.
  • the system further includes: an unlock password setting module configured to preset an unlock password including a password sentence.
  • the system further includes: an unlocking matrix generating module, configured to randomly extract any one character from each character string included in the cipher sentence before the trajectory string detecting module detects the currently input trajectory string As a specific character, one or more auxiliary characters are randomly extracted from the remaining characters except the specific character; and the unlocking matrix is generated by using the specific character and each of the randomly extracted auxiliary characters;
  • the optional characters include 26 English letters and 10 numbers in upper or lower case.
  • each character string included in the password sentence includes any letter and/or number.
  • the track string is a sequence of all characters passing through an arbitrary matrix when the unlocking operation is triggered.
  • the touch screen unlocking method and system and the storage medium provided by the embodiment of the present invention when the mobile terminal verifies that the currently input track string contains a specific character in sequence, triggering a signal for unlocking the screen, wherein the specific character is preset
  • the cipher is included in each string Don't randomly extract any character. In this way, not only can it protect against smudge attacks and shoulder-speech attacks, but also ensure that the user unlocks passwords without being leaked, thereby effectively protecting the security of the user's personal information, thereby achieving the effect of secure unlocking and greatly improving the user's experience with the mobile terminal. And perception.
  • FIG. 1 is a schematic diagram of an implementation process of a method for unlocking a touch screen according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of an unlock password setting interface according to an embodiment of the present invention.
  • FIG. 3 is a schematic flowchart of implementing an unlock password according to an embodiment of the present invention.
  • FIG. 4 is a schematic flowchart of an implementation process of generating an unlocking matrix according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram of an unlocking interface according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of a user sliding track according to an embodiment of the present invention.
  • FIG. 7 is a schematic flowchart of an implementation process for verifying an unlock track according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a touch screen unlocking system according to an embodiment of the present invention.
  • the mobile terminal may include, but is not limited to, a mobile device such as a smart phone, a tablet, a palmtop computer, or the like having a touch screen.
  • a mobile device such as a smart phone, a tablet, a palmtop computer, or the like having a touch screen.
  • the touch screen unlocking method of the embodiment of the present invention shown in FIG. 1 is applied to a mobile terminal.
  • the implementation process of the method includes the following steps:
  • Step 101 Detect a currently input track character string
  • the method also needs to preset an unlock password including a password sentence.
  • the user sets a password sentence as an unlock password in the setting interface, and the password sentence includes 3-5 strings; and each string includes any letter and/or number.
  • the method further randomly extracts any one character from each character string included in the cipher sentence as a specific character, and randomly extracts one or more of the remaining characters other than the specific character from the optional characters.
  • An auxiliary character; the unlocking matrix is generated by using the specific character and each of the randomly extracted auxiliary characters.
  • the optional characters include 26 English letters and 10 numbers in uppercase or lowercase.
  • the track string includes all characters that pass through an arbitrary matrix when the unlocking operation is triggered.
  • Step 102 Verify whether the currently input track string contains a specific character in sequence, if the order is included, proceed to step 103, otherwise, perform step 104;
  • the specific character is any one of the characters randomly selected from each of the character strings included in the preset password sentence; and the number of characters included in each of the character strings is greater than 1.
  • the sequence includes that the i specific characters included in the currently input track character are sequentially selected as the first character string, the second character string, and the i-th string in the order of arrangement.
  • Specific characters correspondingly, each character in the track character needs to be judged in order of verification, first verifying whether the first character in the currently input track string is included in the pre-set password sentence If the string is not present, continue to verify whether the second character in the currently input track string is in the first string included in the preset password. If yes, continue to verify the currently input track string. Whether the third character in the second string included in the pre-set password sentence, and so on.
  • Step 103 trigger a signal for unlocking the screen, and end the current processing flow
  • Step 104 Maintain the lock screen state.
  • the unlock password setting interface includes: selecting or inputting a string number included in a password sentence, a string input box, and an OK button and Cancel button.
  • the specific implementation process of setting an unlock password in the embodiment of the present invention includes the following steps:
  • Step 301 The user selects or inputs a number of strings included in the password sentence
  • N the number of strings included in the user's selection or input of the password sentence
  • the optional number of N is 3, 4, or 5.
  • Step 302 Display a corresponding character string input box according to the number of user selections or inputting a character string, and the user arbitrarily inputs N character strings included in the password sentence in sequence;
  • Step 303 determining whether the user clicks the "OK” button or the "Cancel” button, if the user clicks the "OK” button, then proceeds to step 304, otherwise proceeds to step 305;
  • Step 304 sequentially check whether each character string input box included in the password sentence is empty, if it is empty, return to step 301, otherwise proceed to step 306;
  • Step 305 Exit the unlock password setting interface, and end the processing flow
  • Step 306 sequentially check whether the number of characters of the character string in each character string input box is greater than M, if it is greater than M, then return to step 301, otherwise proceeds to step 307;
  • the maximum number of characters of each character string included in the cipher sentence set by the user may be limited to not exceed M, where M may be 12.
  • Step 307 determine whether all input strings are checked for completion, if all the checks are completed, proceed to step 308, otherwise return to step 304;
  • Step 308 The unlock password is successfully set, and the unlock password set by the user is saved.
  • the system in the mobile terminal randomly extracts any character from the string included in the set password sentence as a specific character, and then from the optional characters.
  • One or more auxiliary characters are randomly extracted from the remaining characters except the specific character; the unlocking matrix is generated by using the specific character and each of the randomly extracted auxiliary characters.
  • the optional characters include 26 English letters in uppercase or lowercase and 10 characters. digital.
  • the specific implementation process of generating an unlocking matrix in the embodiment of the present invention includes the following steps:
  • Step 401 Acquire an unlock password including a password sentence
  • Step 402 sequentially obtain each character string included in the password sentence
  • N the number of strings included in the user's selection or input of the password sentence
  • N the optional number of N is 3, 4, or 5;
  • Step 403 Randomly extract a character in the i-th string of the password sentence
  • Step 404 Determine whether i is less than N, if i is less than N, then proceeds to step 405, otherwise proceeds to step 406;
  • Step 405 i is incremented by 1, and returns to step 403;
  • Step 406 Organize all the extracted characters, and keep only one of the same characters, assuming that k different characters are finally sorted out;
  • the k different characters that are finally sorted out can ensure that the generated unlocking matrix contains at least one character in each string.
  • Step 407 randomly extract k1 characters as auxiliary characters from among the remaining 36-k characters;
  • the k1 auxiliary characters that are randomly selected are different, and are not the same as the k characters that are collated in step 406.
  • the characters in each character string included in the cipher sentence can be capitalized. Or lowercase 26 English letters and 10 numbers, a total of 36 characters.
  • Step 408 Randomly allocate all the extracted (k+k1) different characters into the matrix of A*B to form an unlocking matrix.
  • A represents the number of rows of the unlocking matrix A*B
  • B represents the number of columns of the unlocking matrix A*B
  • a and B are equal.
  • FIG. 5 is a schematic diagram of an unlocking interface according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of a user sliding track in an embodiment of the present invention.
  • the number of matrix cells in the generated unlocking matrix is smaller than the total number of optional characters, so that the characters displayed on each unlocking interface are not the same, thereby increasing the randomness of the track string.
  • the implementation process of verifying the unlock track in the embodiment of the present invention includes the following steps:
  • Step 701 Acquire a track string generated by the user sliding unlocking, and assume that the number of characters included in the password sentence is N, and the number of characters of the track string is C;
  • N is 3, 4 or 5.
  • Step 702 Determine whether C is greater than 3 * N, if C is greater than 3 * N, then proceeds to step 703, otherwise proceeds to step 704;
  • the number of strings included in the cipher sentence is N, in the matrix of 4*4, the number of characters required for the trajectory string to reach any two farthest characters is 4, assuming that N characters are farthest apart.
  • the track string only needs to contain 4 * (N-1) - (N - 2) characters to complete, and then increase the error value of 2 characters, therefore, the upper limit of the number of characters of the track string is set to 3 *N, if it exceeds 3*N, it is judged that the track string is too long.
  • the number of characters that limit the trajectory string is to reduce the probability of violent attacks.
  • Step 703 The track string verification fails, the unlock matrix is regenerated, and the lock screen state is maintained, and the process flow is ended.
  • Step 705 Determine whether the i-th character in the track string is in the k-th string included in the password sentence. If the i-th character in the track string is in the k-th string included in the password sentence, proceed to step 706. Otherwise, proceed to step 707;
  • Step 706 determining whether k is less than N, if k is less than N, then proceeds to step 708, otherwise proceeds to step 710;
  • Step 707 determining whether i is less than C, if i is less than C, then proceeds to step 709, otherwise returns to step 703;
  • Step 708 k is incremented by 1, and returns to step 707;
  • Step 709 i is incremented by 1, and returns to step 705;
  • Step 710 The track string includes any one of the characters randomly extracted from each of the character strings included in the preset password sentence, and the track string verification is successful, and the screen is unlocked.
  • the user can select or input the number of characters included in the password sentence in the unlock password setting interface to be 3, and input three strings in the string input box, respectively: tomorrow, never, waits.
  • a character is randomly selected in the three strings, assuming that the character randomly extracted in the first string tomorrow is t, and the character randomly extracted in the second string never Is e, the character randomly extracted in the third string waits is i.
  • the randomly selected 13 auxiliary characters are different, and are compared with the previous 3
  • the characters are also different.
  • the second character t in the trajectory string can be found in the first string tomorrow included in the cipher sentence; next, the trajectory string is judged Whether the three characters e are in the second string never included in the cipher sentence, it can be found that the third character e in the trajectory string is in the second string never included in the cipher; next, in the trajectory string Whether the fourth character q is in the third string waits included in the password sentence, it can be found that the fourth character q in the track string is not in the third string waits included in the password sentence. Trajectory Whether the fifth character i in the string is in the third string waits included in the password sentence, it can be found that the fifth character i in the track string is in the third string waits included in the password sentence.
  • the track string bteqi input when the user unlocks contains the character t in the first string tomorrow in the password sentence, the character e in the second string never, the third The character i in the string waits, the track string verification succeeds, and the screen is unlocked.
  • the embodiment of the invention further provides a computer readable storage medium, the storage medium comprising a set of instructions for performing the touch screen unlocking method described above.
  • the embodiment of the present invention further provides a touch screen unlocking system.
  • the system includes a track character string detecting module 82, an unlocking password verification module 83, and a triggering module 84.
  • the track string detection module 82 is configured to detect a currently input track character string
  • the unlock password verification module 83 is configured to verify whether the currently input track string contains a specific character in sequence
  • the triggering module 84 is configured to trigger a signal for unlocking the screen when the unlock password verification module 83 verifies that the determination order is included;
  • the specific character is any one of the characters randomly extracted from each of the character strings included in the preset password.
  • the system further includes an unlock password setting module 81 configured to preset an unlock password including a password sentence.
  • system further includes: an unlocking matrix generating module 85 configured to separately from each character string included in the cryptographic sentence before the trajectory string detecting module 82 detects the currently input trajectory string Randomly extracting any one character as a specific character, and randomly extracting one or more auxiliary characters from the remaining characters other than the specific character in the optional character; generating an unlocking matrix by using the specific character and each of the randomly extracted auxiliary characters;
  • the optional characters include 26 English letters and 10 numbers in upper or lower case.
  • Each string included in the cipher includes any letter and/or number; and the trajectory string is all characters that are sequentially slid through any matrix when the unlocking operation is triggered.
  • the unlock password setting module 81, the track character string detecting module 82, the unlock password verifying module 83, the triggering module 84, and the unlocking matrix generating module 85 may each be a central processing unit (CPU) located on the mobile terminal having the touch screen. , Central Processing Unit), Microprocessor Unit (MPU), Digital Signal Processor (DSP), or Field Programmable Gate Array (FPGA).
  • CPU central processing unit
  • MPU Microprocessor Unit
  • DSP Digital Signal Processor
  • FPGA Field Programmable Gate Array
  • the selection control of string characters in the current password sentence is 26 English letters and 10 digits in uppercase or lowercase, and can also increase the optional number of password sentence characters, such as: adding piny letters, adding symbols, etc. to increase the password space. .
  • the signal for unlocking the screen is triggered, wherein the specific character is respectively separated from each character string included in the preset password sentence. Any character randomly selected. In this way, not only can it protect against smudge attacks and shoulder-speech attacks, but also ensure that the user unlocks passwords without being leaked, thereby effectively protecting the security of the user's personal information, thereby achieving the effect of secure unlocking and greatly improving the user's experience with the mobile terminal. And perception.
  • the signal for triggering the unlocking screen is triggered, wherein the specific character is randomly selected from each character string included in the preset password sentence. Extract any character.

Abstract

一种触摸屏解锁方法,包括:检测当前输入的轨迹字符串(101);验证当前输入的轨迹字符串中顺序包含有特定字符时,触发解锁屏幕的信号(103);其中,该特定字符为从预先设置的密码句包括的每个字符串中分别随机抽取的任意一个字符。还同时公开了一种触摸屏解锁系统及存储介质。

Description

一种触摸屏解锁方法及系统、存储介质 技术领域
本发明涉及移动终端中屏幕解锁技术,尤其涉及一种触摸屏解锁方法及系统、存储介质。
背景技术
随着移动通信技术的快速发展,具有触摸屏的移动终端在日常生活中已经被越来越广泛地应用。目前,这些移动终端不仅应用于简单的通信,如:电话、短信等,而且更多的应用于移动互联网,这使得越来越多的个人信息被保存在移动终端中,因此,移动终端的安全问题变得越来越受到人们的关注。
如今大多数具有触摸屏的移动终端中都具有解锁密码的锁屏功能,用户在锁屏界面上可以通过点击、拖拽、滑动等方式输入预先设定的解锁密码,这样才能解锁屏幕。目前,比较常用的触摸屏解锁方式主要有以下两种:
1)直接输入预先设定的密码字符串来解锁;
该方式中的密码设置为固定字符个数的字符串,在解锁时,直接输入固定字符个数的字符串,若输入的字符串与预先设置的字符串相同,则解锁;若不相同,则不解锁。
2)在九宫格上滑动,重绘出预先设定的图案来解锁。
该方式中的密码设置为在触摸屏显示的九宫格上,通过滑动操作顺序滑过九宫格上的任意若干个格而形成的图形,在解锁时,触摸屏上显示相同的九宫格,用户在九宫格上按照一定的顺序绘制一个图形,若绘制图形所经过的九宫格的顺序和图形样式与预先设置的密码图案完全相同,则解 锁;若不相同,则不解锁。
然而,上述现有的触摸屏解锁方式安全性极低,通过简单的污迹攻击方式,很有可能被他人猜出密码,较容易被破解。更严重的是,这些触摸屏解锁方式基本不具备防肩窥能力,如果在密码输入过程中,不小心被他人偷窥或录像,则密码将会暴露无疑,毫无安全性可言;如此,用户个人信息就会受到严重威胁。另外,这些常用的触摸屏解锁方式的样式比较单一,无法给用户带来新的操作体验。
发明内容
有鉴于此,本发明实施例期望提供一种触摸屏解锁方法及系统、存储介质,能够防御多种攻击方式,保证用户解锁密码不被泄露,确保用户个人信息的安全,从而有效起到安全解锁的效果,进而提升对移动终端的使用和体验。
为达到上述目的,本发明实施例的技术方案是这样实现的:
本发明实施例提供一种触摸屏解锁方法,所述方法包括:
检测当前输入的轨迹字符串;
验证当前输入的轨迹字符串中顺序包含有特定字符时,触发解锁屏幕的信号;
其中,所述特定字符为从预先设置的密码句包括的每个字符串中分别随机抽取的任意一个字符。
上述方案中,所述方法还包括:预先设置包括密码句的解锁密码。
上述方案中,在所述检测当前输入的轨迹字符串之前,所述方法还包括:分别从密码句包括的每个字符串中随机抽取任意一个字符作为特定字符,再从可选字符中除所述特定字符以外的剩余字符中随机抽取一个以上辅助字符;利用所述特定字符与随机抽取的各个辅助字符生成解锁矩阵;
其中,所述可选字符包括大写或小写的26个英文字母和10个数字。
上述方案中,所述密码句包括的每个字符串包括任意字母和/或数字。
上述方案中,所述轨迹字符串为触发解锁操作时,顺序滑过任意矩阵格所经过的所有字符。
本发明实施例还提供一种触摸屏解锁系统,所述系统包括:
轨迹字符串检测模块,配置为检测当前输入的轨迹字符串;
解锁密码验证模块,配置为验证当前输入的轨迹字符串中是否顺序包含有特定字符;
触发模块,配置为在所述解锁密码验证模块验证确定顺序包含时,触发解锁屏幕的信号;
其中,所述特定字符为从预先设置的密码句包括的每个字符串中分别随机抽取的任意一个字符。
上述方案中,所述系统还包括:解锁密码设置模块,配置为预先设置包括密码句的解锁密码。
上述方案中,所述系统还包括:解锁矩阵生成模块,配置为在所述轨迹字符串检测模块检测当前输入的轨迹字符串之前,分别从密码句包括的每个字符串中随机抽取任意一个字符作为特定字符,再从可选字符中除所述特定字符以外的剩余字符中随机抽取一个以上辅助字符;利用所述特定字符与随机抽取的各个辅助字符生成解锁矩阵;
其中,所述可选字符包括大写或小写的26个英文字母和10个数字。
上述方案中,所述密码句包括的每个字符串包括任意字母和/或数字。
上述方案中,所述轨迹字符串为触发解锁操作时,顺序滑过任意矩阵格所经过的所有字符。
本发明实施例所提供的触摸屏解锁方法及系统、存储介质,由移动终端验证当前输入的轨迹字符串中顺序包含有特定字符时,触发解锁屏幕的信号,其中,所述特定字符为从预先设置的密码句包括的每个字符串中分 别随机抽取的任意一个字符。如此,不仅能够防御污迹攻击和肩窥攻击方式,而且能保证用户解锁密码不被泄露,从而有效保障了用户个人信息的安全,起到了安全解锁的效果,大大提高了用户对移动终端的体验和感知。
附图说明
图1为本发明实施例触摸屏解锁方法的实现流程示意图;
图2为本发明实施例解锁密码设置界面的示意图;
图3为本发明实施例设置解锁密码的实现流程示意图;
图4为本发明实施例生成解锁矩阵的实现流程示意图;
图5为本发明实施例解锁界面的示意图;
图6为本发明实施例用户滑动轨迹的示意图;
图7为本发明实施例验证解锁轨迹的实现流程示意图;
图8为本发明实施例触摸屏解锁系统的组成结构示意图。
具体实施方式
为了能够更加详尽地了解本发明实施例的特点与技术内容,下面结合附图对本发明实施例的实现进行详细阐述,所附附图仅供参考说明之用,并非用来限定本发明。
在本发明实施例中,所述移动终端可以包括但不限于:具有触摸屏的智能手机、平板、掌上电脑等移动设备。
图1所示的本发明实施例触摸屏解锁方法应用于移动终端中,如图1所示,该方法的实现流程包括以下步骤:
步骤101:检测当前输入的轨迹字符串;
这里,该方法还需要预先设置包括密码句的解锁密码。
其中,用户在设置界面设置密码句作为解锁密码,该密码句中包含3-5个字符串;且每个字符串包括任意字母和/或数字。
这里,在步骤101之前,该方法还分别从密码句包括的每个字符串中随机抽取任意一个字符作为特定字符,再从可选字符中除所述特定字符以外的剩余字符中随机抽取一个以上辅助字符;利用所述特定字符与随机抽取的各个辅助字符生成解锁矩阵。其中,所述可选字符包括大写或小写的26个英文字母和10个数字;所述轨迹字符串包括:触发解锁操作时,顺序滑过任意矩阵格所经过的所有字符。
步骤102:验证当前输入的轨迹字符串中是否顺序包含有特定字符,如果顺序包含,则执行步骤103,否则,执行步骤104;
其中,所述特定字符为从预先设置的密码句包括的每个字符串中分别随机抽取的任意一个字符;且所述每个字符串中包含的字符个数大于1。
这里,所述顺序包含是指当前输入的轨迹字符中包括的i个特定字符按排列的先后顺序依次为第1个字符串、第2个字符串……第i个字符串中随机抽取出的特定字符;相应的,在验证时需要按先后顺序对轨迹字符中的每个字符进行判断,先验证当前输入的轨迹字符串中的第一个字符是否在预先设置的密码句包括的第一个字符串中,若不在,则继续验证当前输入的轨迹字符串中的第二个字符是否在预先设置的密码句包括的第一个字符串中,若在,则继续验证当前输入的轨迹字符串中的第三个字符是否在预先设置的密码句包括的第二个字符串中,依次类推。
步骤103:触发解锁屏幕的信号,结束当前处理流程;
步骤104:保持锁屏状态。
下面对本发明提供的触摸屏解锁的实现方法的技术方案做进一步地详细介绍。
图2为本发明实施例中解锁密码设置界面的示意图,如图2所示,该解锁密码设置界面包括:需要选择或输入密码句包括的字符串个数、字符串输入框、以及确定按钮和取消按钮。
如图3所示,本发明实施例中设置解锁密码的具体实现流程包括以下步骤:
步骤301:用户选择或输入密码句包括的字符串个数;
这里,假设用户选择或输入密码句包括的字符串个数为N,N的可选个数为3、4或5。
步骤302:根据用户选择或输入字符串的个数显示对应的字符串输入框,用户按顺序任意输入密码句包括的N个字符串;
步骤303:判断用户点击了“确定”按钮还是“取消”按钮,如果用户点击了“确定”按钮,则进入步骤304,否则进入步骤305;
步骤304:依次检查密码句包括的每个字符串输入框是否为空,如果为空,则返回步骤301,否则进入步骤306;
步骤305:退出解锁密码设置界面,结束本次处理流程;
步骤306:依次检查每个字符串输入框中字符串的字符个数是否大于M,如果大于M,则返回步骤301,否则进入步骤307;
这里,为了减小随机攻击的概率和过多字符个数带来的记忆负担,可限定用户设置的密码句包括的每个字符串的最大字符个数不超过M,其中,M可为12。
步骤307:判断是否所有输入字符串都检查结束,如果全部检查结束,则进入步骤308,否则返回步骤304;
步骤308:解锁密码设置成功,保存用户设置的解锁密码。
这里,用户成功设置解锁密码后,根据用户的需要,所述移动终端中的系统会从设置的密码句包括的每个字符串中分别随机抽取任意一个字符作为特定字符,再从可选字符中除所述特定字符以外的剩余字符中随机抽取一个以上辅助字符;利用所述特定字符与随机抽取的各个辅助字符生成解锁矩阵。其中,所述可选字符包括大写或小写的26个英文字母和10个 数字。
如图4所示,本发明实施例中生成解锁矩阵的具体实现流程包括以下步骤:
步骤401:获取包括密码句的解锁密码;
步骤402:顺序获取密码句包括的每个字符串;
这里,假设用户选择或输入密码句包括的字符串个数为N,N的可选个数为3、4或5;假设用户从第1个字符串开始随机抽取字符,记i=1。
步骤403:在密码句的第i个字符串中随机抽取一个字符;
步骤404:判断i是否小于N,如果i小于N,则进入步骤405,否则进入步骤406;
步骤405:i自加1,返回步骤403;
步骤406:整理所有抽取的字符,将相同的字符只保留一个,假设最终整理出k个不同的字符;
这里,最终整理出的k个不同的字符,可以保证生成的解锁矩阵中包含每个字符串中至少一个字符。
步骤407:从其它剩余的36-k个字符中,再随机抽取k1个字符作为辅助字符;
这里,所述随机抽取的k1个辅助字符均不相同,且与步骤406整理出的k个字符也不相同,在本发明实施例中,密码句包括的每个字符串中的字符可从大写或小写的26个英文字母和10个数字,共36个字符中选取。
步骤408:将所有抽取到的(k+k1)个不同字符随机分配到A*B的矩阵中,形成解锁矩阵。
这里,在解锁矩阵A*B中,A表示解锁矩阵A*B的行数,B表示解锁矩阵A*B的列数;且A与B相等。
为方便描述,本发明实施例中以解锁矩阵A*B为4*4的矩阵为例进行 说明。
若用户触发解锁操作,首先显示解锁界面,解锁界面为一个4*4的矩阵格,将生成的4*4矩阵中的字符显示在解锁界面的矩阵格中;每个矩阵格中都包含有一个字符,且每个字符都不与其它字符重复。图5为本发明实施例中解锁界面的示意图。
用户可通过滑动操作滑过任意矩阵格,依次顺序记录用户滑过的矩阵格中对应的字符,以用户手指按下触摸屏作为开始,手指离开触摸屏作为结束,最终按照记录顺序,将所有记录字符组合为轨迹字符串。图6为本发明实施例中用户滑动轨迹的示意图。
这里,生成解锁矩阵中的矩阵格数要小于可选字符总数,这样会使每次解锁界面显示出的字符都不尽相同,进而增加轨迹字符串的随机性。
如图7所示,本发明实施例中验证解锁轨迹的实现流程包括以下步骤:
步骤701:获取用户滑动解锁生成的轨迹字符串,假设密码句包括的字符串个数为N,轨迹字符串字符数为C;
这里,N的可选个数为3、4或5。
步骤702:判断C是否大于3*N,如果C大于3*N,则进入步骤703,否则进入步骤704;
这里,当密码句包括的字符串个数为N时,在4*4的矩阵中,轨迹字符串到达任意两个距离最远字符所需的字符数为4,假设N个字符都相距最远,则轨迹字符串只需包含4*(N-1)-(N-2)个字符即可完成,再增加2个字符的误差值,因此,将轨迹字符串的字符个数上限设为3*N,超过3*N即判断轨迹字符串过长。这里,限制轨迹字符串的字符个数是为了减小暴力攻击的概率。
步骤703:轨迹字符串验证失败,重新生成解锁矩阵,保持锁屏状态,结束本次处理流程;
步骤704:顺序遍历轨迹字符串中的所有字符,假设变量i=1,k=1;
步骤705:判断轨迹字符串中第i个字符是否在密码句包括的第k个字符串中,如果轨迹字符串中第i个字符在密码句包括的第k个字符串中,则进入步骤706,否则进入步骤707;
步骤706:判断k是否小于N,如果k小于N,则进入步骤708,否则进入步骤710;
步骤707:判断i是否小于C,如果i小于C,则进入步骤709,否则返回步骤703;
步骤708:k自加1,返回步骤707;
步骤709:i自加1,返回步骤705;
步骤710:轨迹字符串中顺序包含有从预先设置的密码句包括的每个字符串中分别随机抽取的任意一个字符,则轨迹字符串验证成功,屏幕解锁。
下面以一个具体实施例对本发明如何实现屏幕解锁做进一步地详细说明。
在本发明实施例中,用户可以在解锁密码设置界面选择或输入密码句包括的字符串个数为3,在字符串输入框分别输入三个字符串,依次为:tomorrow、never、waits。当用户点击了“确定”按钮后,在三个字符串中分别随机抽取一个字符,假设在第1个字符串tomorrow中随机抽取的字符是t,在第2个字符串never中随机抽取的字符是e,在第3个字符串waits中随机抽取的字符是i。
此时,整理出在字符串中抽取的所有字符,字符个数为3;为填充解锁矩阵4*4的每个矩阵格,需要从其它剩余的33个字符中,再随机抽取13个不同的字符作为辅助字符,将所有抽取到的16个不同字符随机分配到4*4的矩阵中;最终形成的4*4矩阵可如图5所示。
这里,所述随机抽取的13个辅助字符均不相同,且与之前整理出的3 个字符也不相同。
解锁时,假设用户顺序滑动操作形成的轨迹字符串为bteqi,如图6中黑色粗线所示;此时,需要顺序遍历轨迹字符串中的所有字符,首先判断轨迹字符串中第1个字符b是否在密码句包括的第1个字符串tomorrow中,可以发现轨迹字符串中第1个字符b并不在密码句包括的第1个字符串tomorrow中;接下来,判断轨迹字符串中第2个字符t是否在密码句包括的第1个字符串tomorrow中,可以发现轨迹字符串中第2个字符t在密码句包括的第1个字符串tomorrow中;接下来,判断轨迹字符串中第3个字符e是否在密码句包括的第2个字符串never中,可以发现轨迹字符串中第3个字符e在密码句包括的第2个字符串never中;接下来,判断轨迹字符串中第4个字符q是否在密码句包括的第3个字符串waits中,可以发现轨迹字符串中第4个字符q并不在密码句包括的第3个字符串waits中,此时,就得判断轨迹字符串中第5个字符i是否在密码句包括的第3个字符串waits中,经判断可发现,轨迹字符串中第5个字符i在密码句包括的第3个字符串waits中。
经过上述检测和比对可以发现,用户解锁时输入的轨迹字符串bteqi中顺序包含有密码句中第一个字符串tomorrow中的字符t,第二个字符串never中的字符e,第三个字符串waits中的字符i,此时轨迹字符串验证成功,屏幕解锁。
本发明实施例还提出一种计算机可读存储介质,该存储介质包括一组指令,所述指令用于执行以上所述的触摸屏解锁方法。
为实现上述方法,本发明实施例还提供了一种触摸屏解锁系统,如图8所示,该系统包括轨迹字符串检测模块82、解锁密码验证模块83、触发模块84;其中,
轨迹字符串检测模块82,配置为检测当前输入的轨迹字符串;
解锁密码验证模块83,配置为验证当前输入的轨迹字符串中是否顺序包含有特定字符;
触发模块84,配置为在所述解锁密码验证模块83验证确定顺序包含时,触发解锁屏幕的信号;
其中,所述特定字符为从预先设置的密码句包括的每个字符串中分别随机抽取的任意一个字符。
在一实施例中,所述系统还包括:解锁密码设置模块81,配置为预先设置包括密码句的解锁密码。
在另一实施例中,所述系统还包括:解锁矩阵生成模块85,配置为在所述轨迹字符串检测模块82检测当前输入的轨迹字符串之前,分别从密码句包括的每个字符串中随机抽取任意一个字符作为特定字符,再从可选字符中除所述特定字符以外的剩余字符中随机抽取一个以上辅助字符;利用所述特定字符与随机抽取的各个辅助字符生成解锁矩阵;
其中,所述可选字符包括大写或小写的26个英文字母和10个数字。
其中,所述密码句包括的每个字符串包括任意字母和/或数字;所述轨迹字符串为触发解锁操作时,顺序滑过任意矩阵格所经过的所有字符。
在实际应用中,所述解锁密码设置模块81、轨迹字符串检测模块82、解锁密码验证模块83、触发模块84、解锁矩阵生成模块85均可由位于具有触摸屏的移动终端上的中央处理器(CPU,Central Processing Unit)、微处理器(MPU,Micro Processor Unit)、数字信号处理器(DSP,Digital Signal Processor)、或现场可编程门阵列(FPGA,Field Programmable Gate Array)等实现。
此外,当前密码句中字符串字符的选择控件为大写或小写的26个英文字母和10个数字,还可增加密码句字符的可选数量,比如:增加拼音字母、增加符号等来增加密码空间。
本发明实施例中由移动终端验证当前输入的轨迹字符串中顺序包含有特定字符时,触发解锁屏幕的信号,其中,所述特定字符为从预先设置的密码句包括的每个字符串中分别随机抽取的任意一个字符。如此,不仅能够防御污迹攻击和肩窥攻击方式,而且能保证用户解锁密码不被泄露,从而有效保障了用户个人信息的安全,起到了安全解锁的效果,大大提高了用户对移动终端的体验和感知。
以上所述,仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。
工业实用性
本发明实施例由移动终端验证当前输入的轨迹字符串中顺序包含有特定字符时,触发解锁屏幕的信号,其中,所述特定字符为从预先设置的密码句包括的每个字符串中分别随机抽取的任意一个字符。如此,不仅能够防御污迹攻击和肩窥攻击方式,而且能保证用户解锁密码不被泄露,从而有效保障了用户个人信息的安全,起到了安全解锁的效果,大大提高了用户对移动终端的体验和感知。

Claims (11)

  1. 一种触摸屏解锁方法,包括:
    检测当前输入的轨迹字符串;
    验证当前输入的轨迹字符串中顺序包含有特定字符时,触发解锁屏幕的信号;
    其中,所述特定字符为从预先设置的密码句包括的每个字符串中分别随机抽取的任意一个字符。
  2. 根据权利要求1所述的方法,其中,所述方法还包括:预先设置包括密码句的解锁密码。
  3. 根据权利要求1所述的方法,其中,在所述检测当前输入的轨迹字符串之前,所述方法还包括:分别从密码句包括的每个字符串中随机抽取任意一个字符作为特定字符,再从可选字符中除所述特定字符以外的剩余字符中随机抽取一个以上辅助字符;利用所述特定字符与随机抽取的各个辅助字符生成解锁矩阵;
    其中,所述可选字符包括大写或小写的26个英文字母和10个数字。
  4. 根据权利要求1、2或3所述的方法,其中,所述密码句包括的每个字符串包括任意字母和/或数字。
  5. 根据权利要求1、2或3所述的方法,其中,所述轨迹字符串为触发解锁操作时,顺序滑过任意矩阵格所经过的所有字符。
  6. 一种触摸屏解锁系统,包括:
    轨迹字符串检测模块,配置为检测当前输入的轨迹字符串;
    解锁密码验证模块,配置为验证当前输入的轨迹字符串中是否顺序包含有特定字符;
    触发模块,配置为在所述解锁密码验证模块验证确定顺序包含时,触 发解锁屏幕的信号;
    其中,所述特定字符为从预先设置的密码句包括的每个字符串中分别随机抽取的任意一个字符。
  7. 根据权利要求6所述的系统,其中,所述系统还包括:解锁密码设置模块,配置为预先设置包括密码句的解锁密码。
  8. 根据权利要求6所述的系统,其中,所述系统还包括:解锁矩阵生成模块,配置为在所述轨迹字符串检测模块检测当前输入的轨迹字符串之前,分别从密码句包括的每个字符串中随机抽取任意一个字符作为特定字符,再从可选字符中除所述特定字符以外的剩余字符中随机抽取一个以上辅助字符;利用所述特定字符与随机抽取的各个辅助字符生成解锁矩阵;
    其中,所述可选字符包括大写或小写的26个英文字母和10个数字。
  9. 根据权利要求6、7或8所述的系统,其中,所述密码句包括的每个字符串包括任意字母和/或数字。
  10. 根据权利要求6、7或8所述的系统,其中,所述轨迹字符串为触发解锁操作时,顺序滑过任意矩阵格所经过的所有字符。
  11. 一种计算机可读存储介质,该存储介质包括一组指令,所述指令用于执行权利要求1至5任一项所述的触摸屏解锁方法。
PCT/CN2016/086489 2015-10-09 2016-06-20 一种触摸屏解锁方法及系统、存储介质 WO2017059696A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510648633.8 2015-10-09
CN201510648633.8A CN106570386B (zh) 2015-10-09 2015-10-09 一种触摸屏解锁方法及系统

Publications (1)

Publication Number Publication Date
WO2017059696A1 true WO2017059696A1 (zh) 2017-04-13

Family

ID=58487273

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/086489 WO2017059696A1 (zh) 2015-10-09 2016-06-20 一种触摸屏解锁方法及系统、存储介质

Country Status (2)

Country Link
CN (1) CN106570386B (zh)
WO (1) WO2017059696A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111669382A (zh) * 2020-05-28 2020-09-15 北京瑞华赢科技发展有限公司 适用于情报板物联网路侧单元的加密方法及系统

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106973008B (zh) * 2017-05-26 2019-12-24 华云数据(厦门)网络有限公司 一种选择性撤回邮件的实现方法
CN107480515B (zh) * 2017-07-03 2021-06-25 台州市吉吉知识产权运营有限公司 智能终端的解密方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140137049A1 (en) * 2012-11-14 2014-05-15 Samsung Electronics Co., Ltd. Method and apparatus for unlocking mobile terminal
CN104008348A (zh) * 2014-04-17 2014-08-27 小米科技有限责任公司 应用程序控制方法、装置及终端
CN104063169A (zh) * 2014-04-09 2014-09-24 苏州天鸣信息科技有限公司 一种基于触摸屏的解锁方法
TWI462004B (zh) * 2012-08-03 2014-11-21 Qisda Corp 一種具觸控功能的電子裝置執行程式的方法
CN104598781A (zh) * 2014-11-17 2015-05-06 深圳市中兴移动通信有限公司 一种解锁方法、装置及终端

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7346769B2 (en) * 2003-10-23 2008-03-18 International Business Machines Corporation Method for selective encryption within documents
CN103365581B (zh) * 2012-03-31 2019-01-25 百度在线网络技术(北京)有限公司 一种基于解锁密码对用户设备进行触摸解锁的方法和设备
CN103051454A (zh) * 2012-12-19 2013-04-17 天地融科技股份有限公司 电子设备及其密码验证方法
CN103632075B (zh) * 2013-10-17 2016-03-30 东莞盛世科技电子实业有限公司 鉴权装置及鉴权方法
KR102178552B1 (ko) * 2013-12-09 2020-11-13 엘지전자 주식회사 전자 기기 구동 방법
CN104125055B (zh) * 2014-06-25 2017-11-14 小米科技有限责任公司 加密、解密方法及电子设备
CN104298905B (zh) * 2014-10-13 2015-08-19 桑永朋 一种基于两级转换的口令输入方法及系统
CN104317515A (zh) * 2014-10-22 2015-01-28 广州视源电子科技股份有限公司 移动终端的解锁方法、解锁装置和一种移动终端

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI462004B (zh) * 2012-08-03 2014-11-21 Qisda Corp 一種具觸控功能的電子裝置執行程式的方法
US20140137049A1 (en) * 2012-11-14 2014-05-15 Samsung Electronics Co., Ltd. Method and apparatus for unlocking mobile terminal
CN104063169A (zh) * 2014-04-09 2014-09-24 苏州天鸣信息科技有限公司 一种基于触摸屏的解锁方法
CN104008348A (zh) * 2014-04-17 2014-08-27 小米科技有限责任公司 应用程序控制方法、装置及终端
CN104598781A (zh) * 2014-11-17 2015-05-06 深圳市中兴移动通信有限公司 一种解锁方法、装置及终端

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111669382A (zh) * 2020-05-28 2020-09-15 北京瑞华赢科技发展有限公司 适用于情报板物联网路侧单元的加密方法及系统

Also Published As

Publication number Publication date
CN106570386A (zh) 2017-04-19
CN106570386B (zh) 2020-09-29

Similar Documents

Publication Publication Date Title
Kambourakis et al. Introducing touchstroke: keystroke‐based authentication system for smartphones
Serwadda et al. When kids' toys breach mobile phone security
Katsini et al. Security and usability in knowledge-based user authentication: A review
Yan et al. On limitations of designing usable leakage-resilient password systems: Attacks, principles and usability
CN103200011B (zh) 一种密码认证方法及装置
JP2017531234A (ja) パスワード検証装置及び方法
Renaud et al. Are graphical authentication mechanisms as strong as passwords?
US8117652B1 (en) Password input using mouse clicking
Jeanjaitrong et al. Feasibility study on authentication based keystroke dynamic over touch-screen devices
TWI599914B (zh) 密碼輸入系統與密碼輸入方法
WO2017059696A1 (zh) 一种触摸屏解锁方法及系统、存储介质
Subangan et al. Secure authentication mechanism for resistance to password attacks
Rajarajan et al. Shoulder surfing resistant virtual keyboard for internet banking
CN104112096B (zh) 多点触碰方法与装置
Yi et al. Touch logger resistant mobile authentication scheme using multimodal sensors
Golla et al. EmojiAuth: quantifying the security of emoji-based authentication
Zhou et al. A comparison of a touch-gesture-and a keystroke-based password method: toward shoulder-surfing resistant mobile user authentication
Haberfeld et al. Open code biometric tap pad for smartphones
Shin et al. Secure pattern-based authentication against shoulder surfing attack in smart devices
JP5705177B2 (ja) 入力情報認証装置、サーバ装置、入力情報認証システムおよび装置のプログラム
Janik et al. Sgfa: A two-factor smartphone authentication mechanism using touch behavioral biometrics
Kasat et al. Study and analysis of shoulder-surfing methods
Gao et al. Usability and security of the recall-based graphical password schemes
Gokhale et al. Graphical password authentication techniques: a review
LIM Multi-grid background Pass-Go

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16853004

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16853004

Country of ref document: EP

Kind code of ref document: A1