WO2017190561A1 - 通过虚拟键盘实现密码输入的方法、终端、服务器、系统和存储介质 - Google Patents

通过虚拟键盘实现密码输入的方法、终端、服务器、系统和存储介质 Download PDF

Info

Publication number
WO2017190561A1
WO2017190561A1 PCT/CN2017/077685 CN2017077685W WO2017190561A1 WO 2017190561 A1 WO2017190561 A1 WO 2017190561A1 CN 2017077685 W CN2017077685 W CN 2017077685W WO 2017190561 A1 WO2017190561 A1 WO 2017190561A1
Authority
WO
WIPO (PCT)
Prior art keywords
virtual keyboard
password
mapping
mapping table
user
Prior art date
Application number
PCT/CN2017/077685
Other languages
English (en)
French (fr)
Inventor
许海鹏
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2017190561A1 publication Critical patent/WO2017190561A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Definitions

  • the present application relates to the field of computer security technologies, and in particular, to a method, a terminal, a server, a system, and a storage medium for implementing password input through a virtual keyboard.
  • Trojan virus programs are a common type of network virus program. After the terminal is infected by the Trojan virus program, the Trojan virus program secretly monitors the applications running in the terminal, stealing the user's account, password, and various types of information. As a result, user information is leaked, causing losses to the user.
  • a method, terminal, server, system, and storage medium for implementing password input through a virtual keyboard are provided.
  • a method for implementing password input through a virtual keyboard including:
  • a method for implementing password input through a virtual keyboard including:
  • the received mapping value is parsed according to the mapping table to obtain a corresponding password.
  • a terminal comprising a processor and a memory, the memory storing computer executable instructions, the computer executable instructions being executed by the processor, such that the processor performs the following steps:
  • a server comprising a memory and a processor, the memory storing computer executable instructions, the computer executable instructions being executed by the processor, such that the processor performs the following steps:
  • the received mapping value is parsed according to the mapping table to obtain a corresponding password.
  • a system for implementing password input through a virtual keyboard comprising:
  • the terminal is configured to receive a password input request, generate a virtual keyboard acquisition request according to the password input request, and send the virtual keyboard acquisition request to the server;
  • a server configured to return a corresponding mapping table according to the virtual keyboard acquisition request
  • the terminal is further configured to generate a virtual keyboard according to the mapping table, display the virtual keyboard, obtain a password input by the user through the virtual keyboard, convert the password into a corresponding mapping value according to the mapping table, and The mapping value is sent to a server;
  • the server is further configured to parse the mapping value to obtain a corresponding password.
  • One or more non-volatile readable storage media storing computer-executable instructions, when executed by one or more processors, cause the one or more processors to perform the following steps:
  • FIG. 1 is an application scenario diagram of a password input method implemented by a virtual keyboard in an embodiment
  • FIG. 2 is a flow chart of a method for implementing a password input through a virtual keyboard in an embodiment
  • Figure 3 is a block diagram of a terminal in an embodiment
  • FIG. 4 is a flow chart of a method for implementing a password input through a virtual keyboard in still another embodiment
  • Figure 5 is a block diagram of a server in one embodiment
  • FIG. 6 is a block diagram of a password input device implemented by a virtual keyboard in one embodiment
  • FIG. 7 is a block diagram of a password input device implemented by a virtual keyboard in still another embodiment
  • FIG. 8 is a schematic structural diagram of a password input device implemented by a virtual keyboard in another embodiment
  • FIG. 9 is a schematic structural diagram of a password input device implemented by a virtual keyboard in still another embodiment.
  • Figure 10 is a block diagram of a password entry system implemented by a virtual keyboard in one embodiment.
  • the method for implementing password input through a virtual keyboard can be applied to the application scenario shown in FIG. 1 .
  • the terminal 102 is connected to the server 104 via a network.
  • the terminal 102 receives the password input request of the user, and generates a virtual keyboard acquisition request according to the password input request.
  • the terminal 102 sends a virtual keyboard acquisition request to the server 104.
  • the server 104 receives the virtual keyboard and returns a corresponding mapping table to the terminal 102 according to the virtual keyboard acquisition request.
  • the terminal 102 receives the mapping table, generates a virtual keyboard according to the mapping table, and displays the virtual keyboard.
  • the terminal 102 acquires the password input by the user through the virtual keyboard, converts the password into a corresponding mapping value according to the mapping table, and transmits the mapped value to the server 104.
  • the server 104 parses the mapping value according to the mapping table to obtain a corresponding password. In this process, the plaintext password and the encrypted password are not transmitted. Even if the mapped value is intercepted by the Trojan virus program or other network virus programs, the user's password will not be easily leaked. Therefore, the security of password protection can be effectively improved.
  • FIG. 2 a method for implementing password input through a virtual keyboard is provided. It should be understood that although the steps in the flowchart of FIG. 2 are sequentially displayed as indicated by the arrows, these steps are performed. It is not necessarily performed in the order indicated by the arrows. Except as explicitly stated herein, the execution of these steps is not strictly limited, and may be performed in other sequences. Moreover, at least some of the steps in FIG.
  • the method is applied to the terminal in FIG. 1 as an example, and specifically includes:
  • Terminals include desktop computers, personal laptops, tablets, smartphones, and personal digital assistants.
  • the terminal can access the server through the installed application or access the server through a browser. By accessing the server, multiple operations such as user login, transaction, and business processing can be realized.
  • the user can touch the password input box on the screen of the terminal, or click the password input box in the browser with the mouse, and the terminal receives the password input request of the user.
  • the terminal generates a virtual keyboard acquisition request according to the password input request, and sends a virtual keyboard acquisition request to the server.
  • the receiving server returns a mapping table according to the virtual keyboard acquisition request, generates a virtual keyboard according to the mapping table, and displays the virtual keyboard.
  • the server receives the virtual keyboard acquisition request, obtains a corresponding mapping table according to the virtual keyboard acquisition request, and returns the mapping table to the terminal.
  • the virtual keyboard includes a plurality of virtual keys.
  • the mapping table includes a virtual button and a mapping worthy correspondence.
  • the mapping table may be generated by the server according to a preset rule, or may be generated according to a user's custom mapping table.
  • the terminal receives the mapping table returned by the server, and obtains a correspondence between the virtual key and the mapping value according to the mapping table.
  • the terminal lays out the virtual keyboard and displays the virtual keyboard on the terminal screen.
  • the layout of the virtual keyboard may be a random layout. Specifically, the terminal randomly arranges the virtual keyboard according to a random algorithm.
  • the generating, by the server, the mapping table according to the preset rule comprises: establishing a mapping relationship between the virtual key and the preset character and/or the preset character string, and generating a mapping table according to the mapping relationship; or according to the virtual button and A mapping table is generated by the coordinate information of the virtual button in the terminal screen.
  • the server may also establish a mapping relationship between the virtual button and the preset graphic, and generate a mapping table according to the mapping relationship.
  • the mapped value may be one or more of a preset character, a preset character string, a preset graphic, and coordinate information in the mapping table.
  • the terminal can obtain the password input by the user through the virtual keyboard.
  • the plain text password is not displayed in the password input box, and the terminal hides the password entered by the user.
  • the terminal displays the password entered by the user as **** in the password input box, or when the terminal obtains the password input by the user through the virtual keyboard, the terminal does not display any characters in the password input box, or the terminal acquires the user.
  • the terminal When entering a password via the virtual keyboard, fill the password input box with a preset color. Since the plain text password is not displayed in the password input box, password leakage can be effectively prevented.
  • the traditional password transmission is that the terminal transmits the plaintext password directly to the server, or the terminal encrypts the plaintext password and transmits the encrypted password to the server. If it is intercepted by Trojan virus programs or other network virus programs, it will bring some losses to users.
  • the terminal in this embodiment converts the password input by the user through the virtual keyboard into a corresponding mapping value according to the mapping table, and transmits the mapped value to the server through the network.
  • the server receives the mapping value sent by the terminal, and parses the mapping value according to the mapping table to obtain a corresponding password.
  • the password input by the user is converted into a corresponding mapping value, and the mapped value is sent to the server. Therefore, it can effectively prevent interception by Trojan virus programs or other network virus programs. If the mapped value is intercepted by the Trojan virus program or other network virus program during the process of sending to the server, if the Trojan virus program or other network virus program fails to obtain the mapping table, the user's password cannot be obtained.
  • the virtual keyboard acquisition request is generated according to the password input request of the user, and the virtual keyboard acquisition request is sent to the server, thereby causing the server to return the mapping table according to the virtual keyboard acquisition request.
  • the password input by the user is obtained, the password is converted into a corresponding mapping value according to the mapping table, and the mapped value is sent to the server.
  • the server obtains the corresponding password by parsing the mapped value.
  • the password or the encrypted password is not directly transmitted, but the mapped value corresponding to the password is transmitted to the server, and the server obtains the password by parsing the mapped value.
  • the plaintext password and the encrypted password are not transmitted. Even if the mapped value is intercepted by the Trojan virus program or other network virus programs, the user's password will not be easily leaked. Therefore, the security of password protection can be effectively improved.
  • the method before receiving the password input request, the method further includes: receiving a custom mapping relationship input by the user, where the virtual mapping key includes a virtual key and a mapping value, and a correspondence between the virtual key and the mapping value;
  • the mapping relationship generates a corresponding custom mapping table; the user identifier and the custom mapping table are sent to the server for storage.
  • the user can customize the mapping table through the terminal.
  • the terminal displays the mapping table customization page, and the user can input the virtual button and the corresponding mapping value through the mapping table customization page, and the terminal receives the virtual button and corresponding input by the user.
  • the mapping value is established, a correspondence between the virtual key and the mapped value is established, and a custom mapping relationship between the virtual key and the corresponding mapping value is generated.
  • the terminal generates a custom mapping table according to a mapping relationship between multiple virtual keys and mapping values.
  • the terminal sends the user ID and custom mapping table to the server for storage.
  • the terminal When the terminal receives the password input request of the user, the terminal may generate a virtual keyboard acquisition request according to the password input request, and send the virtual keyboard acquisition request to the server.
  • the virtual keyboard acquisition request carries the user identifier.
  • the server obtains a custom mapping table based on the user ID and returns the custom mapping table to the terminal.
  • the virtual keyboard is generated according to the mapping table
  • displaying the virtual keyboard includes: generating a corresponding virtual keyboard according to the custom mapping table, and displaying the virtual keyboard; the method further includes: displaying a password selection control, a password selection control
  • the password input control and the mapping value input control are included; when the password input control is selected, the password input by the user through the virtual keyboard is obtained, the password is converted into a corresponding mapping value according to the mapping table, and the mapping value is sent to the server, including: receiving the user
  • the password input operation acquires the password input by the user through the virtual keyboard, converts the password into a corresponding mapping value according to the custom mapping table, and sends the mapped value to the server; when the mapping value input control is selected, receives the mapping value of the user. Enter the operation to get the mapped value entered by the user through the virtual keyboard and send the mapped value to the server.
  • the terminal After receiving the customized mapping table returned by the server, the terminal generates a corresponding virtual keyboard according to the customized mapping table, and displays the virtual keyboard.
  • a password selection control can also be displayed on the terminal.
  • the password selection controls include: a password input control and a mapped value input control. If the password input control is selected, the user will enter the password via the virtual keyboard. If the map value input control is selected, it means that the user will input the map value through the virtual keyboard.
  • the terminal receives the password input operation of the user, obtains the password input by the user through the virtual keyboard, converts the password into a corresponding mapping value according to the custom mapping table, and sends the mapped value to the server.
  • the server parses the mapped value according to the custom mapping table to obtain the corresponding password. Because different users can customize the mapping table according to their own preferences, it is convenient for users to customize the personalized mapping table.
  • the terminal When the mapping value input control is selected, the terminal receives the mapping value input operation of the user, acquires the mapping value input by the user through the virtual keyboard, and sends the mapping value to the server.
  • the server parses the mapped value according to the custom mapping table to obtain the corresponding password. Because the user inputs the mapped value through the virtual keyboard instead of the password itself, the password can be prevented from being sneaked at the time of input and leaked, further improving the security of the password protection. Since the user inputs the mapped value, the terminal is not required to perform the conversion, thereby improving the working efficiency of the terminal.
  • the user can modify the custom mapping table through the terminal.
  • the modified mapping table can be used to protect the password.
  • the user can also cancel the custom mapping table through the terminal.
  • the password generated by the server can be used to protect the password. Since the function of the user-defined mapping table is added to the terminal, it is convenient for the user to customize the personalized mapping table.
  • generating a virtual keyboard according to the mapping table, and displaying the virtual keyboard includes: generating a plurality of virtual keys according to the mapping table; enlarging the virtual keys; dividing the enlarged virtual keys into multiple pages for random layout; When the scroll bar corresponding to the virtual keyboard is scrolled, the enlarged virtual button on the previous page or the next page is displayed.
  • the terminal will enlarge the virtual button generated according to the mapping table.
  • the mapping table may be generated by the server according to a preset rule, or may be generated according to a user's custom mapping relationship table.
  • the use area of the virtual keyboard in the terminal screen can be kept unchanged, and the terminal divides the enlarged virtual key into multiple pages for random layout to obtain a paged virtual keyboard.
  • the terminal generates a scroll bar corresponding to the paged virtual keyboard. Users can select different virtual buttons by sliding the scroll bar on the terminal screen, or drag the scroll bar to select different virtual buttons. When the scroll bar is scrolled, the terminal can display the enlarged virtual button on the previous or next page.
  • the method before acquiring the password input by the user through the virtual keyboard, the method further includes: limiting the highlighting of the virtual keyboard.
  • the terminal in this embodiment randomly arranges the virtual keyboard after generating the virtual keyboard according to the mapping table, and limits the highlighting of the virtual keyboard. display. This further increases the security of the password input.
  • a terminal includes a processor coupled via a system bus, an internal memory, a non-volatile storage medium, a network interface, a display screen, and an input device.
  • An operating system and computer executable instructions are stored in the non-volatile storage medium of the terminal, and the computer-executable instructions are used to implement a method for implementing password input through a virtual keyboard provided by embodiments of the present application.
  • the processor of the terminal is used to provide computing and control capabilities to support the operation of the entire terminal.
  • the display screen of the terminal may be a liquid crystal display or an electronic ink display screen
  • the input device of the terminal may be a touch layer covered on the display screen, or a button, a trackball or a touchpad disposed on the outer casing of the terminal. It can also be an external keyboard, trackpad or mouse.
  • the terminal can be a desktop computer or a mobile terminal such as a mobile phone, a tablet or a personal digital assistant.
  • a method for implementing password input through a virtual keyboard is provided for application to the server in FIG. 1 as an example, including:
  • the server may be a standalone server or a cluster server.
  • the server receives a virtual keyboard acquisition request sent by the terminal.
  • the corresponding mapping table is obtained according to the virtual keyboard acquisition request, and the mapping table is returned to the terminal.
  • the virtual keyboard includes a plurality of virtual keys.
  • the mapping table includes a virtual button and a mapping worthy correspondence.
  • the mapping table may be generated by the server according to a preset rule, or may be generated according to a user's custom mapping table.
  • the server sends the mapping table to the terminal.
  • the terminal acquires a correspondence between the virtual key and the mapped value according to the mapping table.
  • the terminal lays out the virtual keyboard and displays the virtual keyboard on the terminal screen.
  • the layout of the virtual keyboard can be a random layout.
  • the terminal can obtain the password input by the user through the virtual keyboard.
  • the plain text password is not displayed in the password input box, and the terminal hides the password entered by the user.
  • the terminal displays the password entered by the user as **** in the password input box, or when the terminal obtains the password input by the user through the virtual keyboard, the terminal does not display any characters in the password input box, or the terminal acquires the user.
  • the terminal converts the password into a corresponding mapping value according to the mapping table, and sends the mapped value to the server.
  • the server parses the received mapping value according to the mapping table to obtain a corresponding password.
  • the corresponding mapping table is sent to the terminal according to the virtual keyboard acquisition request, so that the terminal generates a virtual keyboard according to the mapping table.
  • the password input by the user through the virtual keyboard is obtained by the terminal.
  • the password or the encrypted password is not directly transmitted, but the password is converted into a mapping value according to the mapping table, and the mapped value is transmitted.
  • the corresponding password is obtained by parsing the received mapping value according to the mapping table. In this process, the plaintext password and the encrypted password are not transmitted. Even if the mapped value is intercepted by the Trojan virus program or other network virus programs, the user's password will not be easily leaked. Therefore, the security of password protection can be effectively improved.
  • the method before receiving the virtual keyboard acquisition request sent by the terminal, the method further includes: receiving a custom mapping table uploaded by the terminal, where the custom mapping table is generated according to the user's custom mapping relationship; and the custom mapping table and the user are The identifier corresponds to the storage.
  • the mapping table in the server may be generated according to a preset mapping rule, or may be generated according to a user's custom mapping relationship table.
  • the terminal displays the mapping table customization page, and the user can input the virtual button and the corresponding mapping value through the mapping table customization page, and the terminal receives the virtual button and corresponding input by the user.
  • the mapping value is established, a correspondence between the virtual key and the mapped value is established, and a custom mapping relationship between the virtual key and the corresponding mapping value is generated.
  • the terminal generates a custom mapping table according to a mapping relationship between multiple virtual keys and mapping values.
  • the terminal sends the user ID and custom mapping table to the server.
  • the server receives the customized mapping table and the user identifier uploaded by the terminal, and stores the customized mapping table and the user identifier.
  • the terminal When the terminal receives the password input request of the user, the terminal may generate a virtual keyboard acquisition request according to the password input request, and send the virtual keyboard acquisition request to the server.
  • the virtual keyboard acquisition request carries the user identifier.
  • the server obtains a custom mapping table based on the user ID and returns the custom mapping table to the terminal.
  • the terminal After receiving the customized mapping table returned by the server, the terminal generates a corresponding virtual keyboard according to the customized mapping table, and displays the virtual keyboard.
  • a password selection control can also be displayed on the terminal.
  • the password selection controls include: a password input control and a mapped value input control. If the password input control is selected, the user will enter the password via the virtual keyboard. If the map value input control is selected, it means that the user will input the map value through the virtual keyboard.
  • the terminal receives the password input operation of the user, and the terminal acquires the password input by the user through the virtual keyboard, converts the password into a corresponding mapping value according to the custom mapping table, and sends the mapped value to the server.
  • the server parses the mapped value according to the custom mapping table to obtain the corresponding password. Because different users can customize the mapping table according to their own preferences, it is convenient for users to customize the personalized mapping table.
  • the terminal When receiving the mapping value input operation of the user, the terminal acquires the mapping value input by the user through the virtual keyboard, and sends the mapping value to the server.
  • the server parses the mapped value according to the custom mapping table to obtain the corresponding password. Because the user inputs the mapped value through the virtual keyboard instead of the password itself, the password can be prevented from being sneaked and leaked when input, which further improves the security of the password protection.
  • the server includes a processor coupled through a system bus, an internal memory, a non-volatile storage medium, and a network interface.
  • the non-volatile storage medium of the server stores an operating system and computer executable instructions, and the computer executable instructions are used to perform a method for implementing password input through a virtual keyboard provided by embodiments of the present application.
  • the server's processor is used to provide computing and control capabilities that support the operation of the entire server.
  • the server's network interface is used to connect to the terminal and communicate with the terminal.
  • the server can be a separate server or a clustered server.
  • a password input device is provided through a virtual keyboard, including: a first receiving module 602, a first sending module 604, a display module 606, and a converting module 608, where:
  • the first receiving module 602 is configured to receive a password input request.
  • the first sending module 604 is configured to generate a virtual keyboard acquisition request according to the password input request, and send a virtual keyboard acquisition request to the server.
  • the first receiving module 602 is further configured to receive a mapping table returned by the server according to the virtual keyboard acquisition request.
  • the display module 606 is configured to generate a virtual keyboard according to the mapping table, and display the virtual keyboard.
  • the conversion module 608 is configured to obtain a password input by the user through the virtual keyboard, and convert the password into a corresponding mapping value according to the mapping table.
  • the first sending module 604 is further configured to send the mapping value to the server, so that the server parses the mapping value to obtain a corresponding password.
  • the first receiving module 602 is further configured to receive a custom mapping relationship input by the user, where the virtual mapping key includes a virtual key and a mapping value, and a corresponding relationship between the virtual key and the mapping value;
  • the device further includes: a generating module 610, configured to generate a corresponding custom mapping table according to the customized mapping relationship;
  • the first sending module 604 is further configured to send the user identifier and the custom mapping table to the server for storage.
  • the display module 606 is further configured to generate a corresponding virtual keyboard according to the custom mapping table, display the virtual keyboard, and display a password selection control, where the password selection control includes a password input control and a mapping value input control;
  • the conversion module 608 is further configured to: when the password input control is selected, receive a password input operation of the user, obtain a password input by the user through the virtual keyboard, convert the password into a corresponding mapping value according to the custom mapping table, and the first sending module 604 further The first sending module 604 is further configured to: when the mapping value input control is selected, receive a mapping value input operation of the user, obtain a mapping value input by the user through the virtual keyboard, and send the mapping value to the server. .
  • the display module 606 is further configured to generate a plurality of virtual keys according to the mapping table; enlarge the virtual keys; divide the enlarged virtual keys into multiple pages for random layout; and when the scroll bar corresponding to the virtual keyboard is scrolled , display the enlarged virtual button on the previous or next page.
  • the presentation module 606 is also used to limit highlighting of the virtual keyboard.
  • a password input device is implemented by using a virtual keyboard, including: a second receiving module 802, a second sending module 804, and a parsing module 806, where:
  • the second receiving module 802 is configured to receive a virtual keyboard acquisition request sent by the terminal.
  • the second sending module 804 is configured to send a corresponding mapping table to the terminal according to the virtual keyboard obtaining request, so that the terminal generates a virtual keyboard according to the mapping table, obtains a password input by the user through the virtual keyboard, and converts the password into a mapping value according to the mapping table. And return the mapped value.
  • the parsing module 806 is configured to parse the received mapping value according to the mapping table to obtain a corresponding password.
  • the second receiving module 802 is further configured to receive a custom mapping table uploaded by the terminal, where the custom mapping table is generated according to the user's custom mapping relationship; as shown in FIG. 9, the device further includes a storage module 808. Used to store the custom mapping table corresponding to the user ID.
  • the above-mentioned modules in the password input device implemented by the virtual keyboard can be realized in whole or in part by software, hardware and a combination thereof.
  • the first receiving module 602 is configured to receive a password input request through an input device of the terminal.
  • the input device may be a touch layer covered on the display screen, an external keyboard, a touch pad or a mouse, and the like.
  • the above modules may be embedded in the hardware of the base station or may be stored in the memory of the base station in a software form, so that the processor can call the corresponding operations of the above modules.
  • a system for implementing password input through a virtual keyboard including: a terminal 1002 and a server 1004, wherein:
  • the terminal 1002 is configured to receive a password input request, generate a virtual keyboard acquisition request according to the password input request, and send a virtual keyboard acquisition request to the server.
  • the server 1004 is configured to return a corresponding mapping table according to the virtual keyboard acquisition request.
  • the terminal 1002 is further configured to generate a virtual keyboard according to the mapping table, display the virtual keyboard, obtain a password input by the user through the virtual keyboard, convert the password into a corresponding mapping value according to the mapping table, and send the mapping value to the server 1004.
  • the server 1004 is further configured to parse the mapped value to obtain a corresponding password.
  • the terminal 1002 is further configured to receive a custom mapping relationship that is input by the user, where the virtual mapping key includes a virtual key and a mapping value, and a corresponding relationship between the virtual key and the mapping value; and the corresponding mapping relationship is generated according to the customized mapping relationship.
  • the mapping table is customized; the user identification and the custom mapping table are sent to the server 1004 for storage.
  • the terminal 1002 is further configured to generate a corresponding virtual keyboard according to the custom mapping table, display the virtual keyboard, and display a password selection control, where the password selection control includes a password input control and a mapping value input control; when the password input control When selected, the terminal 1002 is further configured to receive a password input operation of the user, obtain a password input by the user through the virtual keyboard, convert the password into a corresponding mapping value according to the custom mapping table, and send the mapping value to the server; when the mapping value When the input control is selected, the terminal 1002 is further configured to receive a mapping value input operation of the user, obtain a mapping value input by the user through the virtual keyboard, and send the mapping value to the server 1004.
  • the terminal 1002 is further configured to generate a plurality of virtual keys according to the mapping table; enlarge the virtual keys; divide the enlarged virtual keys into multiple pages for random layout; and when the scroll bar corresponding to the virtual keyboard scrolls, Shows the enlarged virtual button on the previous or next page.
  • the server 1004 is further configured to receive a custom mapping table uploaded by the terminal 1002, where the custom mapping table is generated according to a custom mapping relationship of the user; and the custom mapping table is stored corresponding to the user identifier.
  • the storage medium may be a magnetic disk, an optical disk, or a read-only storage memory (Read-Only) Memory, ROM), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Input From Keyboards Or The Like (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

一种通过虚拟键盘实现密码输入的方法,包括:接收密码输入请求;根据所述密码输入请求生成虚拟键盘获取请求,并向服务器发送所述虚拟键盘获取请求;接收服务器根据所述虚拟键盘获取请求返回的映射表,根据所述映射表生成虚拟键盘,对所述虚拟键盘进行展示;及获取用户通过所述虚拟键盘输入的密码,根据映射表将所述密码转换为对应的映射值,并将所述映射值发送至服务器,以使得所述服务器对所述映射值进行解析,得到对应的密码。

Description

通过虚拟键盘实现密码输入的方法、终端、服务器、系统和存储介质
本申请要求于2016年05月06日提交中国专利局,申请号为201610300515.2,发明名称为“通过虚拟键盘实现密码输入的方法、装置和系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
【技术领域】
本申请涉及计算机安全技术领域,特别是涉及一种通过虚拟键盘实现密码输入的方法、终端、服务器、系统和存储介质。
【背景技术】
随着计算机和网络的普及,网络病毒程序也开始被广泛传播。终端一旦被网络病毒程序感染,会给用户带来安全隐患。木马病毒程序是网络病毒程序中常见的一种。终端被木马病毒程序感染后,木马病毒程序会秘密监视终端中运行的各应用程序,盗取用户的账号、密码以及各类信息。由此造成用户信息的泄露,给用户造成损失。
为了避免用户的账号和密码等被拦截,在用户需要输入密码时,页面中会弹出虚拟键盘。传统的方式,是对用户通过虚拟键盘输入的密码进行硬编码加密。但是如果硬编码的密文被网络病毒程序截获,很容易被反解出明文密码,存在一定的安全风险。如何有效提高密码保护的安全性成为目前需要解决的一个技术问题。
【发明内容】
根据本申请的各种实施例,提供一种通过虚拟键盘实现密码输入的方法、终端、服务器、系统和存储介质。
一种通过虚拟键盘实现密码输入的方法,包括:
接收密码输入请求;
根据所述密码输入请求生成虚拟键盘获取请求,并向服务器发送所述虚拟键盘获取请求;
接收服务器根据所述虚拟键盘获取请求返回的映射表,根据所述映射表生成虚拟键盘,对所述虚拟键盘进行展示;
获取用户通过所述虚拟键盘输入的密码,根据映射表将所述密码转换为对应的映射值,并将所述映射值发送至服务器,以使得所述服务器对所述映射值进行解析,得到对应的密码。
一种通过虚拟键盘实现密码输入的方法,包括:
接收终端发送的虚拟键盘获取请求;
根据所述虚拟键盘获取请求向所述终端发送对应的映射表,以使得所述终端根据所述映射表生成虚拟键盘,获取用户通过所述虚拟键盘输入的密码,将所述密码根据所述映射表转换为映射值,并返回所述映射值;
根据所述映射表对接收到的映射值进行解析,得到对应的密码。
一种终端,包括处理器及存储器,所述存储器中储存计算机可执行指令,所述计算机可执行指令被所述处理器执行时时,使得所述处理器执行以下步骤:
接收密码输入请求;
根据所述密码输入请求生成虚拟键盘获取请求,并向服务器发送所述虚拟键盘获取请求;
接收服务器根据所述虚拟键盘获取请求返回的映射表,根据所述映射表生成虚拟键盘,对所述虚拟键盘进行展示;
获取用户通过所述虚拟键盘输入的密码,根据映射表将所述密码转换为对应的映射值,并将所述映射值发送至服务器,以使得所述服务器对所述映射值进行解析,得到对应的密码。
一种服务器,包括存储器和处理器,所述存储器中储存有计算机可执行指令,所述计算机可执行指令被所述处理器执行时,使得所述处理器执行以下步骤:
接收终端发送的虚拟键盘获取请求;
根据所述虚拟键盘获取请求向所述终端发送对应的映射表,以使得所述终端根据所述映射表生成虚拟键盘,获取用户通过所述虚拟键盘输入的密码,将所述密码根据所述映射表转换为映射值,并返回所述映射值;
根据所述映射表对接收到的映射值进行解析,得到对应的密码。
一种通过虚拟键盘实现密码输入的系统,包括:
终端,用于接收密码输入请求,根据所述密码输入请求生成虚拟键盘获取请求,并向服务器发送所述虚拟键盘获取请求;
服务器,用于根据所述虚拟键盘获取请求返回对应的映射表;
所述终端还用于根据所述映射表生成虚拟键盘,对所述虚拟键盘进行展示;获取用户通过所述虚拟键盘输入的密码,根据映射表将所述密码转换为对应的映射值,并将所述映射值发送至服务器;
所述服务器还用于对所述映射值进行解析,得到对应的密码。
一个或多个存储有计算机可执行指令的非易失性可读存储介质,所述计算机可执行指令被一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:
接收密码输入请求;
根据所述密码输入请求生成虚拟键盘获取请求,并向服务器发送所述虚拟键盘获取请求;
接收服务器根据所述虚拟键盘获取请求返回的映射表,根据所述映射表生成虚拟键盘,对所述虚拟键盘进行展示;
获取用户通过所述虚拟键盘输入的密码,根据映射表将所述密码转换为对应的映射值,并将所述映射值发送至服务器,以使得所述服务器对所述映射值进行解析,得到对应的密码。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其它特征、目的和优点将从说明书、附图以及权利要求书变得明显。
【附图说明】
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实
施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面
描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,
在不付出创造性劳动的前提下,还可以根据这些附图获得其他实施例的附图。
图1为一个实施例中通过虚拟键盘实现密码输入方法的应用场景图;
图2为一个实施例中通过虚拟键盘实现密码输入方法的流程图;
图3为一个实施例中终端的框图;
图4为又一个实施例中通过虚拟键盘实现密码输入方法的流程图;
图5为一个实施例中服务器的框图;
图6为一个实施例中通过虚拟键盘实现密码输入装置的框图;
图7为又一个实施例中通过虚拟键盘实现密码输入装置的框图;
图8为另一个实施例中通过虚拟键盘实现密码输入装置的结构示意图;
图9为还一个实施例中通过虚拟键盘实现密码输入装置的结构示意图;及
图10为一个实施例中通过虚拟键盘实现密码输入系统的框图。
【具体实施方式】
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
本申请实施例中提供的通过虚拟键盘实现密码输入的方法可以应用于如图1所示的应用场景中。其中,终端102通过网络与服务器104连接。终端102接收用户的密码输入请求,根据密码输入请求生成虚拟键盘获取请求。终端102将虚拟键盘获取请求发送至服务器104。服务器104接收虚拟键盘,根据虚拟键盘获取请求向终端102返回对应的映射表。终端102接收映射表,根据映射表生成虚拟键盘,对虚拟键盘进行展示。终端102获取用户通过虚拟键盘输入的密码,根据映射表将密码转换为对应的映射值,并将映射值发送至服务器104。服务器104根据映射表对映射值进行解析,得到对应的密码。在这个过程中,没有出现明文密码也没有对加密密码进行传输,即使映射值被木马病毒程序或其他网络病毒程序截获,用户的密码也不会轻易泄露。因此,能够有效提高密码保护的安全性。
在一个实施例中,如图2所示,提供了一种通过虚拟键盘实现密码输入的方法,应该理解的是,虽然图2的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,其可以以其他的顺序执行。而且,图2中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,其执行顺序也不必然是依次进行,而是可以与其他步骤或者其他步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。以该方法应用于图1中的终端为例进行说明,具体包括:
202,接收密码输入请求。
204,根据密码输入请求生成虚拟键盘获取请求,并向服务器发送虚拟键盘获取请求。
终端包括台式电脑、个人笔记本电脑、平板电脑、智能手机和个人数字助理等。终端可以通过安装的应用程序访问服务器,也可以通过浏览器访问服务器。通过访问服务器,可以实现用户的登录、交易、业务办理等多项操作。当用户需要输入密码时,用户可以触模终端屏幕上的密码输入框,也可以利用鼠标点击浏览器中的密码输入框,终端由此接收到用户的密码输入请求。终端根据密码输入请求生成虚拟键盘获取请求,并将虚拟键盘获取请求发送至服务器。
206,接收服务器根据虚拟键盘获取请求返回的映射表,根据映射表生成虚拟键盘,对虚拟键盘进行展示。
服务器接收虚拟键盘获取请求,根据虚拟键盘获取请求来获取对应的映射表,并将映射表返回至终端。其中,虚拟键盘包括多个虚拟按键。映射表中包括虚拟按键与映射值得对应关系。映射表可以是服务器根据预设规则来成生的,也可以是根据用户的自定义映射关系表来生成的。
终端接收服务器返回的映射表,根据映射表获取虚拟按键与映射值的对应关系。终端对虚拟键盘进行布局,并在终端屏幕上显示虚拟键盘。虚拟键盘的布局可以是随机布局,具体的,终端根据随机算法对虚拟键盘进行随机布局。
在一个实施例中,服务器根据预设规则生成映射表包括:将虚拟按键与预设字符和/或预设字符串来建立对应的映射关系,根据映射关系来生成映射表;或者根据虚拟按键与虚拟按键在终端屏幕中的坐标信息来生成映射表。进一步的,服务器还可以将虚拟按键与预设图形建立对应的映射关系,根据映射关系来生成映射表。映射值可以是映射表中的预设字符、预设字符串、预设图形以及坐标信息中的一种或多种。
208,获取用户通过虚拟键盘输入的密码,根据映射表将密码转换为对应的映射值,并将映射值发送至服务器,以使得服务器对映射值进行解析,得到对应的密码。
用户触摸或点击虚拟按键时,终端可以获取到用户通过虚拟键盘输入的密码。当用户通过虚拟键盘输入密码时,密码输入框中不显示明文密码,终端将用户输入的密码进行隐藏。例如,终端将用户输入的密码在密码输入框中显示为****,或者终端在获取到用户通过虚拟键盘输入的密码时,在密码输入框中不显示任何字符,或者终端在获取到用户通过虚拟键盘输入的密码时,将密码输入框填充为预设颜色。由于密码输入框中不显示明文密码,因此能够有效防止密码泄露。
传统的密码传输是终端将明文密码直接传输至服务器,或者终端对明文密码进行加密,将加密后的密码传输至服务器。如果被木马病毒程序或其他网络病毒程序拦截,会给用户带来一定的损失。
在本实施例中的终端根据映射表将用户通过虚拟键盘输入的密码转换为对应的映射值,并且经映射值通过网络传输至服务器。服务器接收终端发送的映射值,根据映射表对映射值进行解析,得到对应的密码。由于用户通过虚拟键盘输入密码之后,并不是直接传输明文密码或者加密后的密码,而是将用户输入的密码转换为对应的映射值,将映射值发送至服务器。因此能够有效防止被木马病毒程序或其他网络病毒程序拦截。假使映射值在发送至服务器的过程中被木马病毒程序或其他网络病毒程序被截获,但是木马病毒程序或其他网络病毒程序如果未能获取到映射表,仍然不能获悉用户的密码。
本实施例中,通过根据用户的密码输入请求生成虚拟键盘获取请求,并将虚拟键盘获取请求发送至服务器,由此使得服务器根据虚拟键盘获取请求返回映射表。根据映射表生成虚拟键盘,并展示虚拟键盘。由此方便用户通过虚拟键盘输入密码。在获取到用户输入的密码时,根据映射表将密码转换为对应的映射值,并将映射值发送至服务器。服务器通过对映射值进行解析从而得到对应的密码。在用户输入密码后,并不是直接对密码或者加密后的密码进行传输,而是将密码对应的映射值传输至服务器,服务器通过对映射值进行解析来得到密码。在这个过程中,没有出现明文密码也没有对加密密码进行传输,即使映射值被木马病毒程序或其他网络病毒程序截获,用户的密码也不会轻易泄露。因此,能够有效提高密码保护的安全性。
在一个实施例中,在接收密码输入请求之前,还包括:接收用户输入的自定义映射关系,自定义映射关系中包括虚拟按键与映射值,以及虚拟按键与映射值的对应关系;根据自定义映射关系生成对应的自定义映射表;将用户标识和自定义映射表发送至服务器进行存储。
本实施例中,用户可以通过终端对映射表进行自定义。当用户通过终端来注册账户时,在用户输入密码前,终端展示映射表自定义页面,用户通过映射表自定义页面可以输入虚拟按键与对应的映射值,终端接收到用户输入的虚拟按键和对应的映射值后,建立虚拟按键与映射值的对应关系,生成虚拟按键与对应的映射值的自定义映射关系。终端根据多个虚拟按键与映射值的映射关系生成自定义映射表。终端将用户标识和自定义映射表发送至服务器进行存储。当终端接收到用户的密码输入请求时,终端可以根据密码输入请求生成虚拟键盘获取请求,并向服务器发送该虚拟键盘获取请求。该虚拟键盘获取请求中携带了用户标识。服务器根据用户标识获取自定义映射表,并将自定义映射表返回至终端。
在一个实施例中,根据映射表生成虚拟键盘,对虚拟键盘进行展示包括:根据自定义映射表生成对应的虚拟键盘,对虚拟键盘进行展示;该方法还包括:展示密码选择控件,密码选择控件包括密码输入控件和映射值输入控件;当密码输入控件被选中时,获取用户通过虚拟键盘输入的密码,根据映射表将密码转换为对应的映射值,并将映射值发送至服务器包括:接收用户的密码输入操作,获取用户通过虚拟键盘输入的密码,根据自定义映射表将密码转换为对应的映射值,并将映射值发送至服务器;当映射值输入控件被选中时,接收用户的映射值输入操作,获取用户通过虚拟键盘输入的映射值,将映射值发送至服务器。
终端接收到服务器返回的自定义映射表之后,根据自定义映射表生成对应的虚拟键盘,并且对虚拟键盘进行展示。终端上还可以展示密码选择控件。密码选择控件包括:密码输入控件和映射值输入控件。若密码输入控件被选中,则表示用户会通过虚拟键盘来输入密码。若映射值输入控件被选中,则表示用户会通过虚拟键盘来输入映射值。当密码输入控件被选中时,终端接收到用户的密码输入操作,获取用户通过虚拟键盘输入的密码,根据自定义映射表将密码转换为对应的映射值,并将映射值发送至服务器。服务器根据自定义映射表对映射值进行解析,得到对应的密码。由于不同的用户可以根据自己的喜好对映射表进行自定义,从而为用户自定义个性化的映射表提供了方便。
当映射值输入控件被选中时,终端接收到用户的映射值输入操作,获取用户通过虚拟键盘输入的映射值,将映射值发送至服务器。服务器根据自定义映射表对映射值进行解析,得到对应的密码。由于用户通过虚拟键盘输入的映射值,而不是密码本身,能够防止密码在输入时被偷窥而遭到泄露,进一步提高了密码保护的安全性。由于用户输入的是映射值,因此不需要终端再进行转换,从而也提高了终端的工作效率。
如果用户认为自己的密码被泄露或者用户想更换密码时,用户可以通过终端对自定义映射表进行修改。从而可以利用修改后的映射表来对密码进行保护。用户还可以通过终端取消自定义映射表。从而可以利用服务器上生成的映射表来对密码进行保护。由于终端上增设了用户自定义映射表的功能,从而为用户自定义个性化的映射表提供了方便。
在一个实施例中,根据映射表生成虚拟键盘,对虚拟键盘进行展示包括:根据映射表生成多个虚拟按键;将虚拟按键进行放大;将放大后的虚拟按键分为多页进行随机布局;当虚拟键盘对应的滚动条滚动时,展示上一页或下一页中放大后的虚拟按键。
由于虚拟键盘受到终端屏幕大小的限制,在终端屏幕中的使用区域有限,使得虚拟键盘中虚拟按键的布局的较为密集,查找虚拟按键较为困难,容易导致密码输入错误。为了克服这一问题,本实施例中,终端将根据映射表生成的虚拟按键进行放大。其中,映射表可以是服务器根据预设规则来成生的,也可以是根据用户的自定义映射关系表来生成的。虚拟键盘在终端屏幕中的使用区域可以保持不变,终端将放大后的虚拟按键分为多页进行随机布局,得到分页的虚拟键盘。同时,终端会生成分页的虚拟键盘对应的滚动条。用户可以通过触摸终端屏幕滑动滚动条来选择不同的虚拟按键,也可以通过鼠标拖动滚动条来选择不同的虚拟按键。当滚动条滚动时,终端可以展示上一页或下一页中放大后的虚拟按键。
在一个实施例中,在获取用户通过虚拟键盘中输入的密码之前,还包括:限制对虚拟键盘进行高亮显示。
为了避免用户在输入密码时被木马病毒或其他病毒程序截屏导致密码泄露,本实施例中的终端在根据映射表生成虚拟键盘后,对虚拟键盘进行随机布局,并且会限制对虚拟键盘进行高亮显示。由此进一步提高密码输入的安全性。
如图3所示,在一个实施例中,终端包括通过系统总线连接的处理器、内存储器、非易失性存储介质、网络接口、显示屏以及输入装置。该终端的非易失性存储介质中存储有操作系统和计算机可执行指令,该计算机可执行指令用于实现本申请各实施例提供的一种通过虚拟键盘实现密码输入的方法。该终端的处理器用于提供计算和控制能力,支撑整个终端的运行。该终端的显示屏可以是液晶显示屏或者电子墨水显示屏等,该终端的输入装置可以是显示屏上覆盖的触摸层,也可以是终端的外壳上设置的按键、轨迹球或触控板,也可以是外接的键盘、触控板或鼠标等。该终端可以是台式计算机,也可以是如手机、平板电脑或者个人数字助理等的移动终端。
在一个实施例中,如图4所示,提供了一种通过虚拟键盘实现密码输入的方法以应用于图1中的服务器为例进行说明,包括:
402,接收终端发送的虚拟键盘获取请求。
404,根据虚拟键盘获取请求向终端发送对应的映射表,以使得终端根据映射表生成虚拟键盘,获取用户通过虚拟键盘输入的密码,将密码根据映射表转换为映射值,并返回映射值。
406,根据映射表对接收到的映射值进行解析,得到对应的密码。
本实施例中,服务器可以是独立服务器,也可以是集群服务器。服务器接收终端发送的虚拟键盘获取请求。根据虚拟键盘获取请求来获取对应的映射表,并将映射表返回至终端。其中,虚拟键盘包括多个虚拟按键。映射表中包括虚拟按键与映射值得对应关系。映射表可以是服务器根据预设规则来成生的,也可以是根据用户的自定义映射关系表来生成的。服务器将映射表发送至终端。终端根据映射表获取虚拟按键与映射值的对应关系。终端对虚拟键盘进行布局,并在终端屏幕上显示虚拟键盘。虚拟键盘的布局可以是随机布局。
用户触摸或点击虚拟按键时,终端可以获取到用户通过虚拟键盘输入的密码。当用户通过虚拟键盘输入密码时,密码输入框中不显示明文密码,终端将用户输入的密码进行隐藏。例如,终端将用户输入的密码在密码输入框中显示为****,或者终端在获取到用户通过虚拟键盘输入的密码时,在密码输入框中不显示任何字符,或者终端在获取到用户通过虚拟键盘输入的密码时,将密码输入框填充为预设颜色。由于密码输入框中不显示明文密码,因此能够有效防止密码泄露。终端根据映射表将密码转换为对应的映射值,并将映射值发送至服务器。服务器根据映射表对接收到的映射值进行解析,得到对应的密码。
本实施例中,在接收到终端发送的虚拟键盘获取请求后,会根据虚拟键盘获取请求向终端发送对应的映射表,从而使得终端根据映射表生成虚拟键盘。通过终端获取用户通过虚拟键盘输入的密码,在用户输入密码后,并不是直接对密码或者加密后的密码进行传输,而是将密码根据映射表转换为映射值,对映射值进行传输。通过根据映射表对接收到的映射值进行解析,得到对应的密码。在这个过程中,没有出现明文密码也没有对加密密码进行传输,即使映射值被木马病毒程序或其他网络病毒程序截获,用户的密码也不会轻易泄露。因此,能够有效提高密码保护的安全性。
在一个实施例中,在接收终端发送的虚拟键盘获取请求之前,还包括:接收终端上传的自定义映射表,自定义映射表根据用户的自定义映射关系来生成;将自定义映射表与用户标识对应存储。
本实施例中,服务器中的映射表除了可以根据预设规则来生成之外,还可以是根据用户的自定义映射关系表来生成的。当用户通过终端来注册账户时,在用户输入密码前,终端展示映射表自定义页面,用户通过映射表自定义页面可以输入虚拟按键与对应的映射值,终端接收到用户输入的虚拟按键和对应的映射值后,建立虚拟按键与映射值的对应关系,生成虚拟按键与对应的映射值的自定义映射关系。终端根据多个虚拟按键与映射值的映射关系生成自定义映射表。终端将用户标识和自定义映射表发送至服务器。服务器接收终端上传的自定义映射表和用户标识,并且将自定义映射表与用户标识对应存储。
当终端接收到用户的密码输入请求时,终端可以根据密码输入请求生成虚拟键盘获取请求,并向服务器发送该虚拟键盘获取请求。该虚拟键盘获取请求中携带了用户标识。服务器根据用户标识获取自定义映射表,并将自定义映射表返回至终端。
终端接收到服务器返回的自定义映射表之后,根据自定义映射表生成对应的虚拟键盘,并且对虚拟键盘进行展示。终端上还可以展示密码选择控件。密码选择控件包括:密码输入控件和映射值输入控件。若密码输入控件被选中,则表示用户会通过虚拟键盘来输入密码。若映射值输入控件被选中,则表示用户会通过虚拟键盘来输入映射值。当密码输入控件被选中时,终端接收到用户的密码输入操作,终端获取用户通过虚拟键盘输入的密码,根据自定义映射表将密码转换为对应的映射值,并将映射值发送至服务器。服务器根据自定义映射表对映射值进行解析,得到对应的密码。由于不同的用户可以根据自己的喜好对映射表进行自定义,从而为用户自定义个性化的映射表提供了方便。
当接收到用户的映射值输入操作时,终端获取用户通过虚拟键盘输入的映射值,将映射值发送至服务器。服务器根据自定义映射表对映射值进行解析,得到对应的密码。由于用户通过虚拟键盘输入的映射值,而不是密码本身,能够防止密码在输入时被偷窥泄露,进一步提高了密码保护的安全性。
如图5所示,在一个实施例中,服务器包括通过系统总线连接的处理器、内存储器、非易失性存储介质和网络接口。其中,该服务器的非易失性存储介质中存储有操作系统和计算机可执行指令,该计算机可执行指令用于执行本申请各实施例提供的一种通过虚拟键盘实现密码输入的方法。该服务器的处理器用于提供计算和控制能力,支撑整个服务器的运行。该服务器的网络接口用于连接终端,与终端进行通信。该服务器可以单独的服务器,也可以是集群服务器。
在一个实施例中,如图6所示,提供了一种通过虚拟键盘实现密码输入装置,包括:第一接收模块602、第一发送模块604、展示模块606和转换模块608,其中:
第一接收模块602,用于接收密码输入请求。
第一发送模块604,用于根据密码输入请求生成虚拟键盘获取请求,并向服务器发送虚拟键盘获取请求。
第一接收模块602还用于接收服务器根据虚拟键盘获取请求返回的映射表。
展示模块606,用于根据映射表生成虚拟键盘,对虚拟键盘进行展示。
转换模块608,用于获取用户通过虚拟键盘输入的密码,根据映射表将密码转换为对应的映射值。
第一发送模块604还用于将映射值发送至服务器,以使得服务器对映射值进行解析,得到对应的密码。
在一个实施例中,第一接收模块602还用于接收用户输入的自定义映射关系,自定义映射关系中包括虚拟按键与映射值,以及虚拟按键与映射值的对应关系;如图7所示,该装置还包括:生成模块610,用于根据自定义映射关系生成对应的自定义映射表;第一发送模块604还用于将用户标识和自定义映射表发送至服务器进行存储。
在一个实施例中,展示模块606还用于根据自定义映射表生成对应的虚拟键盘,对虚拟键盘进行展示,并且展示密码选择控件,所述密码选择控件包括密码输入控件和映射值输入控件;转换模块608还用于当密码输入控件被选中时,接收用户的密码输入操作,获取用户通过虚拟键盘输入的密码,根据自定义映射表将密码转换为对应的映射值,第一发送模块604还用于将映射值发送至服务器;第一发送模块604还用于当映射值输入控件被选中时,接收用户的映射值输入操作,获取用户通过虚拟键盘输入的映射值,将映射值发送至服务器。
在一个实施例中,展示模块606还用于根据映射表生成多个虚拟按键;将虚拟按键进行放大;将放大后的虚拟按键分为多页进行随机布局;当虚拟键盘对应的滚动条滚动时,展示上一页或下一页中放大后的虚拟按键。
在一个实施例中,展示模块606还用于限制对虚拟键盘进行高亮显示。
在一个实施例中,如图8所示,提供了一种通过虚拟键盘实现密码输入装置,包括:第二接收模块802、第二发送模块804和解析模块806,其中:
第二接收模块802,用于接收终端发送的虚拟键盘获取请求。
第二发送模块804,用于根据虚拟键盘获取请求向终端发送对应的映射表,以使得终端根据映射表生成虚拟键盘,获取用户通过虚拟键盘输入的密码,将密码根据映射表转换为映射值,并返回映射值。
解析模块806,用于根据映射表对接收到的映射值进行解析,得到对应的密码。
在一个实施例中,第二接收模块802还用于接收终端上传的自定义映射表,自定义映射表根据用户的自定义映射关系来生成;如图9所示,该装置还包括存储模块808,用于将自定义映射表与用户标识对应存储。
上述通过虚拟键盘实现密码输入装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。例如,在硬件实现上,上述第一接收模块602用于通过终端的输入装置接收密码输入请求。其中,输入装置可以是显示屏上覆盖的触摸层、外接的键盘、触控板或鼠标等等。上述各模块可以硬件形式内嵌于或独立于基站的处理器中,也可以以软件形式存储于基站的存储器中,以便于处理器调用执行以上各个模块对应的操作。
在一个实施例中,如图10所示,提供了一种通过虚拟键盘实现密码输入的系统,包括:终端1002和服务器1004,其中:
终端1002,用于接收密码输入请求,根据密码输入请求生成虚拟键盘获取请求,并向服务器发送虚拟键盘获取请求。
服务器1004,用于根据虚拟键盘获取请求返回对应的映射表。
终端1002还用于根据映射表生成虚拟键盘,对虚拟键盘进行展示;获取用户通过虚拟键盘输入的密码,根据映射表将密码转换为对应的映射值,并将映射值发送至服务器1004。
服务器1004还用于对映射值进行解析,得到对应的密码。
在一个实施例中,终端1002还用于接收用户输入的自定义映射关系,自定义映射关系中包括虚拟按键与映射值,以及虚拟按键与映射值的对应关系;根据自定义映射关系生成对应的自定义映射表;将用户标识和自定义映射表发送至服务器1004进行存储。
在一个实施例中,终端1002还用于根据自定义映射表生成对应的虚拟键盘,对虚拟键盘进行展示以及展示密码选择控件,密码选择控件包括密码输入控件和映射值输入控件;当密码输入控件被选中时,终端1002还用于接收用户的密码输入操作,获取用户通过虚拟键盘输入的密码,根据自定义映射表将密码转换为对应的映射值,并将映射值发送至服务器;当映射值输入控件被选中时,终端1002还用于接收用户的映射值输入操作,获取用户通过虚拟键盘输入的映射值,将映射值发送至服务器1004。
在一个实施例中,终端1002还用于根据映射表生成多个虚拟按键;将虚拟按键进行放大;将放大后的虚拟按键分为多页进行随机布局;当虚拟键盘对应的滚动条滚动时,展示上一页或下一页中放大后的虚拟按键。
在一个实施例中,服务器1004还用于接收终端1002上传的自定义映射表,自定义映射表根据用户的自定义映射关系来生成;将自定义映射表与用户标识对应存储。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一非易失性计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)等。
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上实施例仅表达了本发明的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干变形和改进,这些都属于本发明的保护范围。因此,本发明专利的保护范围应以所附权利要求为准。

Claims (20)

  1. 一种通过虚拟键盘实现密码输入的方法,包括:
    接收密码输入请求;
    根据所述密码输入请求生成虚拟键盘获取请求,并向服务器发送所述虚拟键盘获取请求;
    接收服务器根据所述虚拟键盘获取请求返回的映射表,根据所述映射表生成虚拟键盘,对所述虚拟键盘进行展示;及
    获取用户通过所述虚拟键盘输入的密码,根据映射表将所述密码转换为对应的映射值,并将所述映射值发送至服务器,以使得所述服务器对所述映射值进行解析,得到对应的密码。
  2. 根据权利要求1所述的方法,其特征在于,在所述接收密码输入请求之前,所述方法还包括:
    接收用户输入的自定义映射关系,所述自定义映射关系中包括虚拟按键与映射值,以及虚拟按键与映射值的对应关系;
    根据所述自定义映射关系生成对应的自定义映射表;及
    将用户标识和所述自定义映射表发送至服务器进行存储。
  3. 根据权利要求2所述的方法,其特征在于,所述根据所述映射表生成虚拟键盘,对所述虚拟键盘进行展示包括:
    根据所述自定义映射表生成对应的虚拟键盘,对所述虚拟键盘进行展示;
    所述方法还包括:
    展示密码选择控件,所述密码选择控件包括密码输入控件和映射值输入控件;
    当密码输入控件被选中时,所述获取用户通过所述虚拟键盘输入的密码,根据映射表将所述密码转换为对应的映射值,并将所述映射值发送至服务器包括:接收用户的密码输入操作,获取用户通过所述虚拟键盘输入的密码,根据自定义映射表将所述密码转换为对应的映射值,并将所述映射值发送至服务器;及
    当映射值输入控件被选中时,接收用户的映射值输入操作,获取用户通过所述虚拟键盘输入的映射值,将所述映射值发送至服务器。
  4. 根据权利要求1所述的方法,其特征在于,所述根据所述映射表生成虚拟键盘,对所述虚拟键盘进行展示包括:
    根据所述映射表生成多个虚拟按键;
    将所述虚拟按键进行放大;
    将放大后的虚拟按键分为多页进行随机布局;及
    当所述虚拟键盘对应的滚动条滚动时,展示上一页或下一页中放大后的虚拟按键。
  5. 根据权利要求1所述的方法,其特征在于,在所述获取用户通过所述虚拟键盘中输入的密码之前,所述方法还包括:
    限制对所述虚拟键盘进行高亮显示。
  6. 一种通过虚拟键盘实现密码输入的方法,包括:
    接收终端发送的虚拟键盘获取请求;
    根据所述虚拟键盘获取请求向所述终端发送对应的映射表,以使得所述终端根据所述映射表生成虚拟键盘,获取用户通过所述虚拟键盘输入的密码,将所述密码根据所述映射表转换为映射值,并返回所述映射值;及
    根据所述映射表对接收到的映射值进行解析,得到对应的密码。
  7. 根据权利要求6所述的方法,其特征在于,在所述接收终端发送的虚拟键盘获取请求之前,所述方法还包括:
    接收终端上传的自定义映射表,所述自定义映射表根据用户的自定义映射关系来生成;及
    将所述自定义映射表与用户标识对应存储。
  8. 一种终端,包括处理器及存储器,所述存储器中储存有计算机可执行指令,所述计算机可执行指令被所述处理器执行时,使得所述处理器执行以下步骤:
    接收密码输入请求;
    根据所述密码输入请求生成虚拟键盘获取请求,并向服务器发送所述虚拟键盘获取请求;
    接收服务器根据所述虚拟键盘获取请求返回的映射表,根据所述映射表生成虚拟键盘,对所述虚拟键盘进行展示;及
    获取用户通过所述虚拟键盘输入的密码,根据映射表将所述密码转换为对应的映射值,并将所述映射值发送至服务器,以使得所述服务器对所述映射值进行解析,得到对应的密码。
  9. 根据权利要求8所述的终端,其特征在于,在所述接收密码输入请求之前,还使得所述处理器执行以下步骤:
    接收用户输入的自定义映射关系,所述自定义映射关系中包括虚拟按键与映射值,以及虚拟按键与映射值的对应关系;
    根据所述自定义映射关系生成对应的自定义映射表;及
    将用户标识和所述自定义映射表发送至所述服务器进行存储。
  10. 根据权利要求9所述的终端,其特征在于,所述根据所述映射表生成虚拟键盘,对所述虚拟键盘进行展示包括:根据所述自定义映射表生成对应的虚拟键盘,对所述虚拟键盘进行展示;
    所述终端还使得所述处理器执行以下步骤:
    展示密码选择控件,所述密码选择控件包括密码输入控件和映射值输入控件;
    当密码输入控件被选中时,所述获取用户通过所述虚拟键盘输入的密码,根据映射表将所述密码转换为对应的映射值,并将所述映射值发送至服务器包括:接收用户的密码输入操作,获取用户通过所述虚拟键盘输入的密码,根据自定义映射表将所述密码转换为对应的映射值,并将所述映射值发送至服务器;及
    当映射值输入控件被选中时,接收用户的映射值输入操作,获取用户通过所述虚拟键盘输入的映射值,将所述映射值发送至服务器。
  11. 根据权利要求8所述的终端,其特征在于,所述根据所述映射表生成虚拟键盘,对所述虚拟键盘进行展示包括:
    根据所述映射表生成多个虚拟按键;
    将所述虚拟按键进行放大;
    将放大后的虚拟按键分为多页进行随机布局;及
    当所述虚拟键盘对应的滚动条滚动时,展示上一页或下一页中放大后的虚拟按键。
  12. 根据权利要求8-10中任一项所述的终端,其特征在于,在所述获取用户通过所述虚拟键盘中输入的密码之前,还使得所述处理器执行以下步骤:
    限制对所述虚拟键盘进行高亮显示。
  13. 一种服务器,包括存储器和处理器,所述存储器中储存有计算机可执行指令,所述计算机可执行指令被所述处理器执行时时,使得所述处理器执行以下步骤:
    接收终端发送的虚拟键盘获取请求;
    根据所述虚拟键盘获取请求向所述终端发送对应的映射表,以使得所述终端根据所述映射表生成虚拟键盘,获取用户通过所述虚拟键盘输入的密码,将所述密码根据所述映射表转换为映射值,并返回所述映射值;及
    根据所述映射表对接收到的映射值进行解析,得到对应的密码。
  14. 根据权利要求13所述的服务器,其特征在于,在所述接收终端发送的虚拟键盘获取请求之前,还使得所述处理器执行以下步骤:
    接收所述终端上传的自定义映射表,所述自定义映射表根据用户的自定义映射关系来生成;及
    将所述自定义映射表与用户标识对应存储。
  15. 一种通过虚拟键盘实现密码输入的系统,其特征在于,所述系统包括:
    终端,用于接收密码输入请求,根据所述密码输入请求生成虚拟键盘获取请求,并向服务器发送所述虚拟键盘获取请求;
    服务器,用于根据所述虚拟键盘获取请求返回对应的映射表;
    所述终端还用于根据所述映射表生成虚拟键盘,对所述虚拟键盘进行展示;获取用户通过所述虚拟键盘输入的密码,根据映射表将所述密码转换为对应的映射值,并将所述映射值发送至服务器;及
    所述服务器还用于对所述映射值进行解析,得到对应的密码。
  16. 根据权利要求15所述的系统,其特征在于,所述终端还用于接收用户输入的自定义映射关系,所述自定义映射关系中包括虚拟按键与映射值,以及虚拟按键与映射值的对应关系;根据所述自定义映射关系生成对应的自定义映射表;将用户标识和所述自定义映射表发送至服务器进行存储。
  17. 根据权利要求16所述的系统,其特征在于,所述终端还用于根据所述自定义映射表生成对应的虚拟键盘,对所述虚拟键盘进行展示以及展示密码选择控件,所述密码选择控件包括密码输入控件和映射值输入控件;当密码输入控件被选中时,所述终端还用于接收用户的密码输入操作,获取用户通过所述虚拟键盘输入的密码,根据自定义映射表将所述密码转换为对应的映射值,并将所述映射值发送至所述服务器;当映射值输入控件被选中时,所述终端还用于接收用户的映射值输入操作,获取用户通过所述虚拟键盘输入的映射值,将所述映射值发送至所述服务器。
  18. 根据权利要求15所述的系统,其特征在于,所述终端还用于根据所述映射表生成多个虚拟按键;将所述虚拟按键进行放大;将放大后的虚拟按键分为多页进行随机布局;当所述虚拟键盘对应的滚动条滚动时,展示上一页或下一页中放大后的虚拟按键。
  19. 根据权利要求15所述的系统,其特征在于,所述服务器还用于接收所述终端上传的自定义映射表,所述自定义映射表根据用户的自定义映射关系来生成;将所述自定义映射表与用户标识对应存储。
  20. 一个或多个存储有计算机可执行指令的非易失性可读存储介质,所述计算机可执行指令被一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:
    接收密码输入请求;
    根据所述密码输入请求生成虚拟键盘获取请求,并向服务器发送所述虚拟键盘获取请求;
    接收服务器根据所述虚拟键盘获取请求返回的映射表,根据所述映射表生成虚拟键盘,对所述虚拟键盘进行展示;及
    获取用户通过所述虚拟键盘输入的密码,根据映射表将所述密码转换为对应的映射值,并将所述映射值发送至服务器,以使得所述服务器对所述映射值进行解析,得到对应的密码。
PCT/CN2017/077685 2016-05-06 2017-03-22 通过虚拟键盘实现密码输入的方法、终端、服务器、系统和存储介质 WO2017190561A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610300515.2A CN106022017B (zh) 2016-05-06 2016-05-06 通过虚拟键盘实现密码输入的方法、装置和系统
CN201610300515.2 2016-05-06

Publications (1)

Publication Number Publication Date
WO2017190561A1 true WO2017190561A1 (zh) 2017-11-09

Family

ID=57098798

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/077685 WO2017190561A1 (zh) 2016-05-06 2017-03-22 通过虚拟键盘实现密码输入的方法、终端、服务器、系统和存储介质

Country Status (2)

Country Link
CN (1) CN106022017B (zh)
WO (1) WO2017190561A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112035827A (zh) * 2020-11-03 2020-12-04 腾讯科技(深圳)有限公司 密码数据处理方法、装置、设备以及可读存储介质
US11036845B2 (en) 2015-05-27 2021-06-15 Licentia Group Limited Authentication methods and systems
US11048783B2 (en) 2012-07-20 2021-06-29 Licentia Group Limited Authentication method and system
CN113190804A (zh) * 2021-05-26 2021-07-30 四川坤翔科技有限公司 一种数据处理方法、装置、安全系统及电子设备

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022017B (zh) * 2016-05-06 2019-07-02 平安科技(深圳)有限公司 通过虚拟键盘实现密码输入的方法、装置和系统
CN106503507A (zh) * 2016-10-31 2017-03-15 维沃移动通信有限公司 一种密码显示的方法和移动终端
CN107657187A (zh) * 2017-09-29 2018-02-02 百富计算机技术(深圳)有限公司 一种应用于Android系统的键盘输入方法和系统
CN107894871A (zh) * 2017-12-06 2018-04-10 张玉斌 一种通过虚拟键盘实现快速打开应用的方法和装置
CN108763972A (zh) * 2018-05-18 2018-11-06 北京智游网安科技有限公司 一种基于网页的自绘随机键盘系统
CN109862015B (zh) * 2019-02-18 2021-11-19 北京奇艺世纪科技有限公司 一种信息传输方法及装置
CN110598486B (zh) * 2019-08-30 2022-02-15 北京奇艺世纪科技有限公司 虚拟键盘加密方法、装置及可读存储介质
CN112947770A (zh) * 2021-04-02 2021-06-11 广西玉柴机器股份有限公司 一种密码的输入方法
CN113806825B (zh) * 2021-09-23 2023-07-04 北京天融信网络安全技术有限公司 一种校验方法、装置、存储介质和电子设备
CN116895112B (zh) * 2023-08-08 2024-02-06 刘强 一种从键盘上分离动态键位信息的密码输入方法及系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064602A (zh) * 2006-04-24 2007-10-31 北京易诚世纪科技有限公司 一种密码输入方法及系统
CN102622156A (zh) * 2011-01-26 2012-08-01 腾讯科技(深圳)有限公司 获取虚拟键盘的方法、装置和系统
CN102867159A (zh) * 2011-07-05 2013-01-09 腾讯科技(深圳)有限公司 通过软键盘实现密码输入的方法、系统、客户端及服务器
CN103368728A (zh) * 2013-07-18 2013-10-23 百度在线网络技术(北京)有限公司 安全登录方法、系统和装置
CN103902056A (zh) * 2012-12-28 2014-07-02 华为技术有限公司 虚拟键盘输入方法、设备及系统
CN106022017A (zh) * 2016-05-06 2016-10-12 平安科技(深圳)有限公司 通过虚拟键盘实现密码输入的方法、装置和系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102117393A (zh) * 2011-01-04 2011-07-06 惠州Tcl移动通信有限公司 移动终端密码输入方法及移动终端
CN103942506A (zh) * 2014-04-11 2014-07-23 芜湖航飞科技股份有限公司 一种密码加密输入装置及方法
CN104808943A (zh) * 2015-04-29 2015-07-29 努比亚技术有限公司 虚拟键盘的输入实现方法、装置及便携终端

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064602A (zh) * 2006-04-24 2007-10-31 北京易诚世纪科技有限公司 一种密码输入方法及系统
CN102622156A (zh) * 2011-01-26 2012-08-01 腾讯科技(深圳)有限公司 获取虚拟键盘的方法、装置和系统
CN102867159A (zh) * 2011-07-05 2013-01-09 腾讯科技(深圳)有限公司 通过软键盘实现密码输入的方法、系统、客户端及服务器
CN103902056A (zh) * 2012-12-28 2014-07-02 华为技术有限公司 虚拟键盘输入方法、设备及系统
CN103368728A (zh) * 2013-07-18 2013-10-23 百度在线网络技术(北京)有限公司 安全登录方法、系统和装置
CN106022017A (zh) * 2016-05-06 2016-10-12 平安科技(深圳)有限公司 通过虚拟键盘实现密码输入的方法、装置和系统

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11048783B2 (en) 2012-07-20 2021-06-29 Licentia Group Limited Authentication method and system
US11048784B2 (en) 2012-07-20 2021-06-29 Licentia Group Limited Authentication method and system
US11194892B2 (en) 2012-07-20 2021-12-07 Licentia Group Limited Authentication method and system
US11036845B2 (en) 2015-05-27 2021-06-15 Licentia Group Limited Authentication methods and systems
US11048790B2 (en) 2015-05-27 2021-06-29 Licentia Group Limited Authentication methods and systems
CN112035827A (zh) * 2020-11-03 2020-12-04 腾讯科技(深圳)有限公司 密码数据处理方法、装置、设备以及可读存储介质
CN113190804A (zh) * 2021-05-26 2021-07-30 四川坤翔科技有限公司 一种数据处理方法、装置、安全系统及电子设备
CN113190804B (zh) * 2021-05-26 2024-04-12 四川坤翔科技有限公司 一种数据处理方法、装置、安全系统及电子设备

Also Published As

Publication number Publication date
CN106022017B (zh) 2019-07-02
CN106022017A (zh) 2016-10-12

Similar Documents

Publication Publication Date Title
WO2017190561A1 (zh) 通过虚拟键盘实现密码输入的方法、终端、服务器、系统和存储介质
WO2015182964A1 (en) Electronic device with foldable display and method of operating the same
WO2018149082A1 (zh) 合同生成方法、装置、服务器和存储介质
WO2015099295A1 (ko) 사용자 단말 장치, 통신 시스템 및 그 제어 방법
WO2017142293A1 (en) Electronic device and method of application data display therefor
WO2019174090A1 (zh) 截屏文件分享的控制方法、装置、设备和计算机存储介质
WO2019024230A1 (zh) 信息加密解密方法、装置、计算机设备和存储介质
WO2020155758A1 (zh) 数据加密传输控制方法、装置、计算机设备及存储介质
WO2016021965A1 (en) Electronic device and method of controlling display thereof
WO2017071329A1 (zh) 密码管理方法、密码管理系统及终端设备
WO2017122980A1 (en) Electronic device and method for authenticating identification information thereof
WO2015101332A1 (zh) 密码分级管理方法和系统
WO2017105072A1 (ko) 생체 정보 기반 인증 장치 그리고 이의 동작 방법
WO2018035929A1 (zh) 一种验证码的处理方法及装置
WO2020164280A1 (zh) 数据传输加密方法、装置及存储介质、服务器
WO2014200163A1 (ko) 광학 문자 인식을 이용하는 정보 암호화 시스템 및 정보 암호화 방법
WO2015111926A1 (en) Electronic device and user interface display method for the same
WO2020253120A1 (zh) 网页注册方法、系统、设备和计算机存储介质
WO2018000884A1 (zh) 数据展示方法和装置、终端和存储介质
WO2017181786A1 (zh) 数据分析处理的方法、装置、计算机设备及存储介质
WO2017173838A1 (zh) 基于验证的消息显示方法及通信终端
WO2018026164A1 (en) Method of processing touch events and electronic device adapted thereto
WO2021027134A1 (zh) 数据存储方法、装置、设备和计算机存储介质
WO2018076879A1 (zh) 数据备份方法、装置、存储介质及终端
WO2018076880A1 (zh) 数据备份方法、装置、存储介质及终端

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17792388

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 12/03/2019)

122 Ep: pct application non-entry in european phase

Ref document number: 17792388

Country of ref document: EP

Kind code of ref document: A1