CN103365581A - User equipment touch unlocking method and device based on unlocking password - Google Patents

User equipment touch unlocking method and device based on unlocking password Download PDF

Info

Publication number
CN103365581A
CN103365581A CN2012100937250A CN201210093725A CN103365581A CN 103365581 A CN103365581 A CN 103365581A CN 2012100937250 A CN2012100937250 A CN 2012100937250A CN 201210093725 A CN201210093725 A CN 201210093725A CN 103365581 A CN103365581 A CN 103365581A
Authority
CN
China
Prior art keywords
unlocking pin
subscriber equipment
password
user
character string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012100937250A
Other languages
Chinese (zh)
Other versions
CN103365581B (en
Inventor
程云峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201210093725.0A priority Critical patent/CN103365581B/en
Publication of CN103365581A publication Critical patent/CN103365581A/en
Application granted granted Critical
Publication of CN103365581B publication Critical patent/CN103365581B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The invention aims to provide a user equipment touch unlocking method based on an unlocking password. The method includes: by user equipment, acquiring touch unlocking password set by a user; breaking up the unlocking password into password character strings; providing a plurality of character string segments which include the password character strings and interference character strings on the user equipment according to an unlocking trigger operation of the user; acquiring the user's touch operations for selecting the character string segments through a touch input device of the user equipment so as to acquire the preferable character string segments; detecting whether the preferable character string segments are matched with the unlocking password or not; if so, unlocking the user equipment. Compared with the prior art, by the method supporting longer unlocking passwords, safety of the user equipment is increased, defects of direct password inputting are overcome, unlocking efficiency is increased, and usage experience of the user is increased.

Description

A kind of method and apparatus that subscriber equipment is touched release based on unlocking pin
Technical field
The present invention relates to computer realm, relate in particular to a kind of technology that subscriber equipment is touched release based on unlocking pin.
Background technology
Along with the development of touching technique, and the interactive features directly perceived, easy that has of touching technique, it is mutual that the multiple subscriber equipment that comprises mobile phone, panel computer begins to support to touch, even jumped on some subscriber equipmenies and be the human-computer interaction technology of first-selection.
Similar to the subscriber equipment of other types, support to touch the consideration that also there are the aspects such as privacy, security in mutual subscriber equipment, therefore, support to touch that mutual subscriber equipment often adopts specifically, comparatively complicated touch operation, the formula of the drawing a circle touch operation of for example being scheduled to, but not the release of simply sliding realizes the release of subscriber equipment.Yet, owing to having certain identification error and response lag for comparatively complicated touch operation, people begin to attempt utilizing the mode of touching device input unlocking pin, and the unlocking pin that for example utilizes the dummy keyboard input on the touch-screen to set carries out the release of subscriber equipment.Yet, even such mode, also Shortcomings, if for example unlocking pin is too short, there is security risk low, that easily guessed, if unlocking pin is long, because the relatively disagreeableness input mode of dummy keyboard, may cause input error, reduce release efficient, and affect user's experience.
Summary of the invention
The purpose of this invention is to provide a kind of method and apparatus that subscriber equipment is touched release based on unlocking pin.
According to an aspect of the present invention, provide a kind of method for subscriber equipment being touched release based on unlocking pin, wherein, the method may further comprise the steps:
X obtains the set unlocking pin that is used for its subscriber equipment is touched release of user;
Y is decomposed into one or more password strings with described unlocking pin;
Wherein, the method also comprises:
A provides a plurality of character string fragments according to described user's release trigger action at described subscriber equipment, and wherein, described a plurality of character string fragments comprise described one or more password string and one or more interference character string;
B obtains the touch operation that described user selects described a plurality of character string fragments by the touch input device of described subscriber equipment, to obtain one or more preferred characters string fragments;
Whether c detects described one or more preferred characters string fragment and is complementary with described unlocking pin;
D carries out unlocking operation to described subscriber equipment when described one or more preferred characters string fragments and described unlocking pin are complementary.
According to a further aspect in the invention, also provide a kind of subscriber equipment for touch release based on unlocking pin, wherein, this equipment comprises:
The password deriving means is used for obtaining the set unlocking pin that is used for its subscriber equipment is touched release of user;
The password decomposer is used for described unlocking pin is decomposed into one or more password strings;
Wherein, this equipment also comprises:
Generator is used for the release trigger action according to described user, provides a plurality of character string fragments at described subscriber equipment, and wherein, described a plurality of character string fragments comprise described one or more password string and one or more interference character string;
The operation deriving means is used for obtaining the touch operation that described user selects described a plurality of character string fragments by the touch input device of described subscriber equipment, to obtain one or more preferred characters string fragments;
Whether the matching detection device is complementary with described unlocking pin for detection of described one or more preferred characters string fragments;
Tripper is used for when described one or more preferred characters string fragments and described unlocking pin are complementary, to described subscriber equipment execution unlocking operation.
Compared with prior art, the present invention is by resolving into unlocking pin some password fragments, and with disturbing character string to touch selection for the user, realized the touch release, not only support long unlocking pin, improved the security of subscriber equipment, also overcome the deficiency of direct input unlocking pin, improved release efficient and promoted user's experience.And the present invention can also carry out the decomposition of unlocking pin according to password relevant informations such as the length of unlocking pin, complexities, has further improved the security of subscriber equipment; Under predetermined renewal trigger condition, again decompose unlocking pin, limit other people malice and cracked trial, thereby further improved the security of subscriber equipment.
Description of drawings
By reading the detailed description that non-limiting example is done of doing with reference to the following drawings, it is more obvious that other features, objects and advantages of the present invention will become:
Fig. 1 illustrates the equipment schematic diagram that is used for based on unlocking pin subscriber equipment being touched release according to one aspect of the invention;
Fig. 2 illustrates the method flow diagram that is used for based on unlocking pin subscriber equipment being touched according to a further aspect of the present invention release.
Same or analogous Reference numeral represents same or analogous parts in the accompanying drawing.
Embodiment
Below in conjunction with accompanying drawing the present invention is described in further detail.
Fig. 1 illustrates the equipment schematic diagram that is used for based on unlocking pin subscriber equipment being touched release according to one aspect of the invention; Wherein, subscriber equipment 1 comprises password deriving means 101, password decomposer 102, generator 103, operation deriving means 104, matching detection device 105 and tripper 106.Particularly, password deriving means 101 obtains the set unlocking pin that is used for its subscriber equipment is touched release of user; Password decomposer 102 is decomposed into one or more password strings with described unlocking pin; Generator 103 provides a plurality of character string fragments according to described user's release trigger action at described subscriber equipment, and wherein, described a plurality of character string fragments comprise described one or more password string and one or more interference character string; Operation deriving means 104 obtains the touch operation that described user selects described a plurality of character string fragments by the touch input device of described subscriber equipment, to obtain one or more preferred characters string fragments; Whether matching detection device 105 detects described one or more preferred characters string fragments and is complementary with described unlocking pin; When described one or more preferred characters string fragments and described unlocking pin were complementary, 106 pairs of described subscriber equipmenies of tripper were carried out unlocking operations.
At this, subscriber equipment 1 is a kind of any electronic product that can carry out by touch input device man-machine interaction, such as smart mobile phone, PDA, portable game machine, palm PC PPC or panel computer etc.; Wherein, touch input device include but not limited to following at least each: 1) touch-screen (Touch Screen) comprises capacitive touch screen; 2) touch pad by the movement of finger on touch pad (Touch Pad), can easily be finished the movement of mouse; 3) Trackpad, by one can the finger sensing running orbit pressure sensitivity plate and two buttons form, two buttons are equivalent to the right and left key of standard mouse.Those skilled in the art will be understood that above-mentioned subscriber equipment 1 and touch input device are only for giving an example; other subscriber equipmenies existing or that may occur from now on or touch input device are as applicable to the present invention; also should be included in the protection domain of the present invention, and be contained in this at this with way of reference.
Particularly, password deriving means 101 obtains the set unlocking pin that is used for its subscriber equipment is touched release of user.For example, the man-machine interaction mode that the user provides by subscriber equipment is such as touch input device or keyboard etc., in the input frame of the unlocking pin of the touch release that subscriber equipment provides, input several character strings, such as the character string that is consisted of by letter, numeral, symbol, Chinese or other literal; The application programming interfaces that password deriving means 101 provides by subscriber equipment (API) read this several character strings from this input frame, with as the set unlocking pin that is used for its subscriber equipment is touched release of user.Preferably, subscriber equipment also provides another input frame that repeats to input unlocking pin, and the character string that the user inputs in these two input frames is carried out the consistance check and correction; When the consistance check and correction is passed through, password deriving means 101 just sets this character string as the user unlocking pin.
Then, password decomposer 102 is decomposed into one or more password strings with described unlocking pin.Particularly, the unlocking pin that password decomposer 102 provides according to password deriving means 101, the mode by character string is decomposed is decomposed into one or more password strings with this unlocking pin.For example, suppose that the unlocking pin that password deriving means 101 obtains is " daytime uses up near the mountain the Yellow River and enters ocean current "; Password decomposer 102 is decomposed into this unlocking pin " daytime complies with ", " mountain is yellow to the greatest extent ", " the Yellow River enters " and four password strings such as " ocean currents ".
Preferably, password decomposer 102 decomposes according to predetermined password and arranges, and described unlocking pin is decomposed into one or more password strings, wherein, described predetermined password decompose arrange comprise following at least each:
The amount threshold of the password string that-described unlocking pin is included;
The character quantity threshold value of-described password string;
-described user is about the preference setting of cipher safety and/or operation ease.
For example, suppose that the unlocking pin that password deriving means 101 obtains is " daytime uses up near the mountain the Yellow River and enters ocean current "; Password decomposer 102 is according to the amount threshold of the predetermined password string that decomposes, for example each unlocking pin is decomposed into 3-4 password string, this unlocking pin is decomposed into " daytime complies with ", " mountain is yellow to the greatest extent ", " river enters " and four password strings such as " ocean currents ".
And for example, suppose that the unlocking pin that password deriving means 101 obtains is " daytime uses up near the mountain the Yellow River and enters ocean current "; Password decomposer 102 is according to the character quantity threshold value of each predetermined password string, for example the character quantity threshold value of each password string is 2-3 character, this unlocking pin is decomposed into " daytime complies with ", " mountain is yellow to the greatest extent ", " river enters " and four password strings such as " ocean currents ", wherein, the number of characters of each password string is 2 or 3.
For another example, suppose that the unlocking pin that password deriving means 101 obtains is " daytime uses up near the mountain the Yellow River and enters ocean current "; Password decomposer 102 is according to the preference setting of this predetermined user about cipher safety and/or operation ease, user preference cipher safety for example, this unlocking pin is decomposed into " daytime complies with ", " mountain is yellow to the greatest extent ", " river enters " and four password strings such as " ocean currents ", to improve the difficulty of other people decryption; Perhaps the user preference operation ease is decomposed into this unlocking pin " daytime is yellow to the greatest extent near the mountain " and " river enters ocean current " two password strings, touches the convenience of release to improve the user.Those skilled in the art will be understood that password decomposer 102 can also consider this user about the preference setting of cipher safety and operation ease, is decomposed into the suitable password string of quantity with this unlocking pin, for example 2-3 password string.
Those skilled in the art will be understood that password decomposer 102 can also consider above-mentioned password and decompose the combination in any that arranges, and this unlocking pin is decomposed into one or more password strings.
Those skilled in the art will be understood that above-mentioned password decomposes setting only for giving an example, and other passwords decomposition existing or that may occur from now on arrange as applicable to the present invention, also should be included in the protection domain of the present invention, and be contained in this with way of reference.
Preferably, password decomposer 102 is according to the password relevant information of described unlocking pin, described unlocking pin is decomposed into one or more password strings, and wherein, described password relevant information comprises the complexity information of length information and/or the described unlocking pin of described unlocking pin.For example, suppose that the unlocking pin that password deriving means 101 obtains is " 1a2bb3ccc4dddd "; Password decomposer 102 is according to the password relevant information of this unlocking pin, the length information of this unlocking pin for example, namely this unlocking pin comprises 14 characters, this unlocking pin is decomposed into " 1a2b ", " b3cc ", " c4dd " and four password strings such as " dd ", so that each password string comprises character as much as possible, for example comprise at most 4 characters.And for example, suppose that the unlocking pin that password deriving means 101 obtains is " 1a%2bb﹠amp; 3ccc4*dddd "; Password decomposer 102 is according to the password relevant information of this unlocking pin, the complexity information of this unlocking pin for example, and namely this unlocking pin comprises numeral, letter and symbol, and this unlocking pin is decomposed into " 1a%2 ", " bb﹠amp; 3 ", " ccc4* " and four password strings such as " dddd " so that each password string comprises various characters as much as possible, such as numeral, letter or symbol.
Those skilled in the art will be understood that password decomposer 102 can also consider the combination in any of above-mentioned password relevant information, is decomposed into one or more password strings with this unlocking pin.
Those skilled in the art will be understood that above-mentioned password relevant information only for giving an example, and other password relevant informations existing or that may occur from now on also should be included in the protection domain of the present invention as applicable to the present invention, and are contained in this with way of reference.
Subsequently, generator 103 provides a plurality of character string fragments according to described user's release trigger action at described subscriber equipment, and wherein, described a plurality of character string fragments comprise described one or more password string and one or more interference character string.Particularly, when subscriber equipment is in the lock state down, the user touches or presses release button or other similar case or the icon of subscriber equipment; Generator 103 is according to this user's release trigger action, provide a plurality of character string fragments at described subscriber equipment, such as on the screen of this subscriber equipment by static, beat or the mode such as flicker shows a plurality of character string fragments, wherein, described a plurality of character string fragment comprises the password string that password decomposer 102 provides, and one or more interference character string.
At this, disturb character string when the user attempts touching release at every turn, to be generated at random by subscriber equipment, for example will be behind the unlocking pin random rearrangement decompose the character string fragment of gained, or from character list, repeatedly randomly draw several character combinations and character string fragment; Or generate and store in advance in subscriber equipment, and, preferably, only after user's release success, just generate at random, touch release for the user next time.Those skilled in the art will be understood that, disturb character string by only after user's release success, just upgrading these, can effectively stop other people to guess this unlocking pin by the character string fragment of repeatedly attempting and relatively provide, thereby, the security of subscriber equipment can be provided further.
Then, operation deriving means 104 obtains the touch operation that described user selects described a plurality of character string fragments by the touch input device of described subscriber equipment, to obtain one or more preferred characters string fragments.Particularly, operation deriving means 104 is by such as touching technique or utilize the application programming interfaces (API) about system's input that subscriber equipment provides, obtain the touch operation of a plurality of character string fragments that the user provides generator 103, for example touch deletion or touch and select, determine one or more preferred characters string fragments that this is user-selected.
Preferably, the touch operation of described operation deriving means comprise following at least each:
-described user carries out the touch operation that preferred formula is selected by the touch input device of described subscriber equipment to described character string fragment;
-described user carries out the touch operation that the eliminating formula is selected by the touch input device of described subscriber equipment to described character string fragment.
For example, the user carries out the touch operation that the preferred formula of similar " √ " or " ↑ " is selected to certain character string fragment, operation deriving means 104 with the corresponding character string fragment of this touch operation as a preferred characters string fragment.For another example, the user carries out the touch operation of the deletion formula selection of similar " x " or " ↓ " to certain character string fragment, and operation deriving means 104 is considered as not preferred character string fragment with the corresponding character string fragment of this touch operation.For another example, after the user carries out touch operation to certain character string fragment, subscriber equipment shows the menu of similar " choosing " or " deletion " around this character string fragment, the user selects this menu again, such as " choosing " or " deletion ", operation deriving means 104 is according to the selection of user to this menu, with the corresponding character string fragment of this touch operation as a preferred characters string fragment or be considered as not preferred character string fragment.Those skilled in the art will be understood that the above-mentioned touch operation that described a plurality of character string fragments are selected is only for giving an example; other existing or touch operation that described a plurality of character string fragments are selected that may occur from now on are as applicable to the present invention; also should be included in the protection domain of the present invention, and be contained in this with way of reference.Those skilled in the art will be understood that by the touch operation that preferred formula is selected and/or the deletion formula is selected to character string fragment, operation deriving means 104 will be determined one or more preferred characters string fragments from these a plurality of character string fragments.
Then, whether the described one or more preferred characters string fragments of matching detection device 105 detections are complementary with described unlocking pin.Particularly, one or more preferred characters string fragments that matching detection device 105 obtains according to operation deriving means 104, whether detect itself and this unlocking pin is complementary, for example, detect the combining characters string consisted of by described one or more preferred characters string fragments whether identical with this unlocking pin.
Preferably, when satisfying the detection trigger condition, whether matching detection device 105 detects described one or more preferred characters string fragments and is complementary with described unlocking pin; Wherein, described detection trigger condition comprise following at least each:
-described user triggers the operation of submitting the input password to;
-described user carries out touch operation that described a plurality of character string fragments are selected by described touch input device;
The stand-by time of-described user's last touch operation surpasses predetermined operating interval time threshold.
For example, when the user triggered the operation of submitting the input password to, matching detection device 105 detected whether user-selected one or more preferred characters string fragments are complementary with described unlocking pin before this operation.For another example, when touch operation that the user is undertaken described a plurality of character string fragments are selected by described touch input device, when for example the user carries out the touch operation of selecting to character string fragment at every turn, whether matching detection device 105 detects whether user-selected one or more preferred characters string fragments are complementary with described unlocking pin before this touch operation, be complementary with described unlocking pin thereby detect in real time described one or more preferred characters string fragment.And for example, when the stand-by time of user's last touch operation surpasses predetermined operating interval time threshold, subscriber equipment judges that accordingly this user has finished the touch operation that all are selected character string fragment, and matching detection device 105 detects whether user-selected one or more preferred characters string fragments are complementary with described unlocking pin before this touch operation.Those skilled in the art will be understood that above-mentioned detection trigger condition only for giving an example, and other detection trigger conditions existing or that may occur from now on also should be included in the protection domain of the present invention as applicable to the present invention, and are contained in this with way of reference.
Preferably, whether described matching detection device 105 detects described one or more preferred characters string fragment and is complementary with described unlocking pin according to predetermined matched rule; Wherein, described predetermined matched rule comprise following at least each:
-when at least one is identical with described unlocking pin in the one or more combining characters strings that are made of described one or more preferred characters string fragments, determine that described one or more preferred characters string fragment and described unlocking pin are complementary;
-when at least one surpasses predetermined identical substring length threshold with the maximal phase of described unlocking pin with the length of character substring in by described one or more combining characters strings, determine that described one or more preferred characters string fragment and described unlocking pin are complementary;
-when the quantity of the preferred characters string fragment that is contained in described unlocking pin in described one or more preferred characters string fragments surpasses predetermined number of matches threshold value, determine that described one or more preferred characters string fragment and described unlocking pin are complementary.
For example, when at least one was identical with described unlocking pin in the one or more combining characters strings that are made of described one or more preferred characters string fragments, matching detection device 105 determined that described one or more preferred characters string fragments and described unlocking pin are complementary.Suppose that the unlocking pin that password deriving means 101 obtains is " 1a%2bb﹠amp; 3ccc4*dddd "; Password decomposer 102 is decomposed into " 1a%2 ", " bb﹠amp with this unlocking pin; 3 ", four password strings such as " ccc4* " and " dddd "; The preferred characters string fragment that operation deriving means 104 obtains comprises " 1a%2 ", " bb﹠amp; 3 ", " ccc4* " and " dddd "; Matching detection device 105 comprises " 1a%2bb﹠amp according to the combining characters string that these preferred characters string fragments consist of; 3ccc4*dddd ", this combining characters string is identical with this unlocking pin, determines that described one or more preferred characters string fragment and described unlocking pin are complementary.Those skilled in the art will be understood that, by this matched rule, even the user does not strictly press the select progressively preferred characters string fragment of password string, perhaps in the situation that support multiple point touching, the preferred characters string fragment that operation deriving means 104 obtains is not observed the order of password string, matching detection device 105 also can be finished this matching detection, thereby has improved user's operation ease and user's experience.
For another example, when at least one surpassed predetermined identical substring length threshold with the maximal phase of described unlocking pin with the length of character substring in by described one or more combining characters strings, matching detection device 105 determined that described one or more preferred characters string fragments and described unlocking pin are complementary.Suppose that the unlocking pin that password deriving means 101 obtains is " 1a%2bb﹠amp; 3ccc4*dddd "; Password decomposer 102 is decomposed into " 1a%2 ", " bb﹠amp with this unlocking pin; 3 ", four password strings such as " ccc4* " and " dddd "; The preferred characters string fragment that operation deriving means 104 obtains comprises " 1a%2 ", " bb﹠amp; 3 " and " ccc4* "; Matching detection device 105 comprises " 1a%2bb﹠amp according to the combining characters string that these preferred characters string fragments consist of; 3ccc4* ", the same character substring " 1a%2bb﹠amp of the maximal phase of this combining characters string and this unlocking pin; 3ccc4* " length be 13, surpass predetermined identical substring length threshold 10, determine that described one or more preferred characters string fragment and described unlocking pin are complementary.
And for example, when the quantity of the preferred characters string fragment that is contained in described unlocking pin in described one or more preferred characters string fragments surpassed predetermined number of matches threshold value, matching detection device 105 determined that described one or more preferred characters string fragments and described unlocking pin are complementary.Suppose that the unlocking pin that password deriving means 101 obtains is " 1a%2bb﹠amp; 3ccc4*dddd "; Password decomposer 102 is decomposed into " 1a%2 ", " bb﹠amp with this unlocking pin; 3 ", four password strings such as " ccc4* " and " dddd "; The preferred characters string fragment that operation deriving means 104 obtains comprises " 1a%2 ", " bb﹠amp; 3 ", " ccc4* " and " ddde "; Matching detection device 105 is 3 according to the quantity that is contained in the preferred characters string fragment of described unlocking pin in these preferred characters string fragments, surpass predetermined number of matches threshold value 2, determine that described one or more preferred characters string fragment and described unlocking pin are complementary.
Those skilled in the art will be understood that matching detection device 105 can also consider the combination in any of above-mentioned predetermined matched rule, detects described one or more preferred characters string fragment and whether is complementary with described unlocking pin.
Those skilled in the art will be understood that above-mentioned predetermined matched rule only for for example, and other existing or predetermined matched rules that may occur from now on also should be included in the protection domain of the present invention, and be contained in this with way of reference as applicable to the present invention.
Then, when described one or more preferred characters string fragments and described unlocking pin were complementary, 106 pairs of described subscriber equipmenies of tripper were carried out unlocking operations.Particularly, the matching detection result that tripper 106 provides according to matching detection device 105, when described one or more preferred characters string fragments and described unlocking pin are complementary, described subscriber equipment is carried out unlocking operation, for example call and carry out the unlocking program of subscriber equipment, so that subscriber equipment enters released state, use operation for the user.
Preferably, this equipment also comprises and disturbs the updating device (not shown), and when described one or more preferred characters string fragments and described unlocking pin were complementary, the interference updating device upgraded described one or more interference character string.For example, decompose after disturbing updating device with the unlocking pin random rearrangement and obtain new interference character, or from character list, repeatedly randomly draw several character combinations and obtain new interference character string; And be stored in subscriber equipment, touch release for the user next time.Those skilled in the art will be understood that, disturb character string by only after user's release success, upgrading these, can effectively stop other people to guess this unlocking pin by the character string fragment of repeatedly attempting and relatively provide, thereby, the security of subscriber equipment can be provided further.
Preferably, be constant work between each device of subscriber equipment 1.Particularly, password deriving means 101 continues to obtain the set unlocking pin that is used for its subscriber equipment is touched release of user; Password decomposer 102 continues described unlocking pin is decomposed into one or more password strings; The release trigger action that generator 103 continues according to described user provides a plurality of character string fragments at described subscriber equipment, and wherein, described a plurality of character string fragments comprise described one or more password string and one or more interference character string; Operation deriving means 104 continues to obtain the touch operation that described user selects described a plurality of character string fragments by the touch input device of described subscriber equipment, to obtain one or more preferred characters string fragments; Whether matching detection device 105 continues to detect described one or more preferred characters string fragments and is complementary with described unlocking pin; When described one or more preferred characters string fragments and described unlocking pin were complementary, tripper 106 continued described subscriber equipment is carried out unlocking operation.At this, it will be understood by those skilled in the art that " continuing " refers to that matching detection, the execution unlocking operation with touch selection, preferred characters string fragment and the unlocking pin of the providing of decomposition, character string fragment, preferred characters string fragment of obtaining of unlocking pin constantly is provided respectively each device of subscriber equipment 1, until this subscriber equipment 1 stops to obtain of unlocking pin or release trigger action in a long time.
Preferably, subscriber equipment 1 also comprises decomposition updating device (not shown), and this decomposition updating device detects whether satisfy the renewal trigger condition of again decomposing described unlocking pin; When satisfying described renewal trigger condition, carry out the operation of described password decomposer.Particularly, decompose updating device and detect whether satisfy the renewal trigger condition of again decomposing described unlocking pin, for example whether the user has upgraded unlocking pin; When satisfying described renewal trigger condition, carry out the operation of described password decomposer, for example the unlocking pin after upgrading is carried out password and decompose, to obtain corresponding with it one or more password strings.
More preferably, described renewal trigger condition comprise following at least each:
-described user upgrades described unlocking pin;
-described user upgrades the preference setting about cipher safety and/or operation ease;
-the continuous frequency of failure of the unlocking operation of described subscriber equipment is surpassed predetermined release failure frequency threshold value.
For example, when the user upgrades its unlocking pin, decompose updating device the unlocking pin after upgrading is carried out the password decomposition, to obtain corresponding with it one or more password strings.
For another example, when the user upgrades preference about cipher safety and/or operation ease and arranges, decompose updating device according to the preference setting about cipher safety and/or operation ease after upgrading, this unlocking pin is carried out password decompose, to obtain corresponding with it one or more password strings.
And for example, when the continuous frequency of failure to the unlocking operation of described subscriber equipment surpasses predetermined release failure frequency threshold value, decompose updating device and this unlocking pin is carried out password decompose, to obtain corresponding with it one or more password strings.Those skilled in the art will be understood that, after continuous several times release failure, decomposition by the unlocking pin that upgrades in time can stop other people to guess this unlocking pin by the character string fragment of repeatedly attempting and relatively provide effectively, thereby, the security of subscriber equipment can be provided further.
Those skilled in the art will be understood that and decompose the combination in any that updating device can also consider above-mentioned renewal trigger condition, this unlocking pin is decomposed into one or more password strings.
Those skilled in the art will be understood that above-mentioned renewal trigger condition only for giving an example, and other renewal trigger conditions existing or that may occur from now on also should be included in the protection domain of the present invention as applicable to the present invention, and are contained in this with way of reference.
In a preferred embodiment (with reference to Fig. 1), password deriving means 101 obtain the set unlocking pin that is used for its subscriber equipment is touched release and performance objective application of user; Password decomposer 102 is decomposed into one or more password strings with described unlocking pin; Generator 103 provides a plurality of character string fragments according to described user's release trigger action at described subscriber equipment, and wherein, described a plurality of character string fragments comprise described one or more password string and one or more interference character string; Operation deriving means 104 obtains the touch operation that described user selects described a plurality of character string fragments by the touch input device of described subscriber equipment, to obtain one or more preferred characters string fragments; Whether matching detection device 105 detects described one or more preferred characters string fragments and is complementary with described unlocking pin; When described one or more preferred characters string fragments and described unlocking pin were complementary, 106 pairs of described subscriber equipmenies of tripper were carried out unlocking operations and are also carried out described intended application.Wherein, password decomposer 102, generator 103, operation deriving means 104 and matching detection device 105 are identical or basic identical with corresponding intrument in the previous embodiment respectively, therefore for simplicity, repeat no more, and only by reference mode is contained in this.
Particularly, password deriving means 101 obtains the set unlocking pin that is used for its subscriber equipment is touched release and performance objective application of user.For example, the man-machine interaction mode that the user provides by subscriber equipment, such as touch input device or keyboard etc., in the input frame of the unlocking pin that touch release that subscriber equipment provides and performance objective are used, input several character strings, such as the character string that is consisted of by letter, numeral, symbol, Chinese or other literal; The application programming interfaces that password deriving means 101 provides by subscriber equipment (API) read this several character strings from this input frame, as set being used for of user its subscriber equipment is touched the unlocking pin that release and performance objective are used.And for example, the man-machine interaction mode that the user provides by subscriber equipment, such as touch input device or keyboard etc., in the Password Input frame of the unlocking pin of the touch release that subscriber equipment provides, input several character strings, such as the character string that is consisted of by letter, numeral, symbol, Chinese or other literal, and by select target use corresponding check box or in using input frame the identification information of input intended application, to bind the corresponding intended application of this unlocking pin; The application programming interfaces that password deriving means 101 provides by subscriber equipment (API), read selected check box or the identification information in this application input frame, to determine corresponding intended application, and from this Password Input frame, read this several character strings, as set being used for of user its subscriber equipment is touched release and carries out the unlocking pin of this intended application.
At last, when described one or more preferred characters string fragments and described unlocking pin were complementary, 106 pairs of described subscriber equipmenies of tripper were carried out unlocking operations and are also carried out described intended application.Particularly, the matching detection result that tripper 106 provides according to matching detection device 105, when described one or more preferred characters string fragments and described unlocking pin are complementary, described subscriber equipment is carried out unlocking operation, for example call and carry out the unlocking program of subscriber equipment, so that subscriber equipment enters released state, and call and carry out described intended application, directly enter this target for the user and use operation.
Those skilled in the art will be understood that, the present embodiment is by combining intended application with unlocking pin, so that directly carry out this intended application after the subscriber equipment release, improved further user's operation ease and operating efficiency, thereby promoted further user's experience.
Fig. 2 illustrates the method flow diagram that is used for based on unlocking pin subscriber equipment being touched according to a further aspect of the present invention release.Particularly, in step S201, subscriber equipment 1 obtains the set unlocking pin that is used for its subscriber equipment is touched release of user; In step S202, subscriber equipment 1 is decomposed into one or more password strings with described unlocking pin; In step S203, subscriber equipment 1 provides a plurality of character string fragments according to described user's release trigger action at described subscriber equipment, and wherein, described a plurality of character string fragments comprise described one or more password string and one or more interference character string; In step S204, subscriber equipment 1 obtains the touch operation that described user selects described a plurality of character string fragments by the touch input device of described subscriber equipment, to obtain one or more preferred characters string fragments; In step S205, whether subscriber equipment 1 detects described one or more preferred characters string fragments and is complementary with described unlocking pin; When described one or more preferred characters string fragments and described unlocking pin were complementary, in step S206,1 pair of described subscriber equipment of subscriber equipment was carried out unlocking operation.
At this, subscriber equipment 1 is a kind of any electronic product that can carry out by touch input device man-machine interaction, such as smart mobile phone, PDA, portable game machine, palm PC PPC or panel computer etc.; Wherein, touch input device include but not limited to following at least each: 1) touch-screen (Touch Screen) comprises capacitive touch screen; 2) touch pad by the movement of finger on touch pad (Touch Pad), can easily be finished the movement of mouse; 3) Trackpad, by one can the finger sensing running orbit pressure sensitivity plate and two buttons form, two buttons are equivalent to the right and left key of standard mouse.Those skilled in the art will be understood that above-mentioned subscriber equipment 1 and touch input device are only for giving an example; other subscriber equipmenies existing or that may occur from now on or touch input device are as applicable to the present invention; also should be included in the protection domain of the present invention, and be contained in this at this with way of reference.
Particularly, in step S201, subscriber equipment 1 obtains the set unlocking pin that is used for its subscriber equipment is touched release of user.For example, the man-machine interaction mode that the user provides by subscriber equipment is such as touch input device or keyboard etc., in the input frame of the unlocking pin of the touch release that subscriber equipment provides, input several character strings, such as the character string that is consisted of by letter, numeral, symbol, Chinese or other literal; In step S201, the application programming interfaces that subscriber equipment 1 provides by subscriber equipment (API) read this several character strings from this input frame, with as the set unlocking pin that is used for its subscriber equipment is touched release of user.Preferably, subscriber equipment also provides another input frame that repeats to input unlocking pin, and the character string that the user inputs in these two input frames is carried out the consistance check and correction; When the consistance check and correction is passed through, in step S201, subscriber equipment 1 just sets this character string as the user unlocking pin.
Then, in step S202, subscriber equipment 1 is decomposed into one or more password strings with described unlocking pin.Particularly, in step S202, subscriber equipment 1 is according to the unlocking pin that provides in step S201, and the mode by character string is decomposed is decomposed into one or more password strings with this unlocking pin.For example, suppose in step S201, the unlocking pin that subscriber equipment 1 obtains is " daytime uses up near the mountain the Yellow River and enters ocean current "; In step S202, subscriber equipment 1 is decomposed into this unlocking pin " daytime complies with ", " mountain is yellow to the greatest extent ", " the Yellow River enters " and four password strings such as " ocean currents ".
Preferably, in step S202, subscriber equipment 1 decomposes according to predetermined password and arranges, and described unlocking pin is decomposed into one or more password strings, wherein, described predetermined password decompose arrange comprise following at least each:
The amount threshold of the password string that-described unlocking pin is included;
The character quantity threshold value of-described password string;
-described user is about the preference setting of cipher safety and/or operation ease.
For example, suppose in step S201, the unlocking pin that subscriber equipment 1 obtains is " daytime uses up near the mountain the Yellow River and enters ocean current "; In step S202, subscriber equipment 1 is according to the amount threshold of the predetermined password string that decomposes, for example each unlocking pin is decomposed into 3-4 password string, this unlocking pin is decomposed into " daytime complies with ", " mountain is yellow to the greatest extent ", " river enters " and four password strings such as " ocean currents ".
And for example, suppose in step S201, the unlocking pin that subscriber equipment 1 obtains is " daytime uses up near the mountain the Yellow River and enters ocean current "; In step S202, subscriber equipment 1 is according to the character quantity threshold value of each predetermined password string, for example the character quantity threshold value of each password string is 2-3 character, this unlocking pin is decomposed into " daytime complies with ", " mountain is yellow to the greatest extent ", " river enters " and four password strings such as " ocean currents ", wherein, the number of characters of each password string is 2 or 3.
For another example, suppose in step S201, the unlocking pin that subscriber equipment 1 obtains is " daytime uses up near the mountain the Yellow River and enters ocean current "; In step S202, subscriber equipment 1 is according to the preference setting of this predetermined user about cipher safety and/or operation ease, user preference cipher safety for example, this unlocking pin is decomposed into " daytime complies with ", " mountain is yellow to the greatest extent ", " river enters " and four password strings such as " ocean currents ", to improve the difficulty of other people decryption; Perhaps the user preference operation ease is decomposed into this unlocking pin " daytime is yellow to the greatest extent near the mountain " and " river enters ocean current " two password strings, touches the convenience of release to improve the user.Those skilled in the art will be understood that, in step S202, subscriber equipment 1 can also consider this user about the preference setting of cipher safety and operation ease, and this unlocking pin is decomposed into the suitable password string of quantity, for example 2-3 password string.
Those skilled in the art will be understood that in step S202, and subscriber equipment 1 can also consider above-mentioned password and decompose the combination in any that arranges, and this unlocking pin is decomposed into one or more password strings.
Those skilled in the art will be understood that above-mentioned password decomposes setting only for giving an example, and other passwords decomposition existing or that may occur from now on arrange as applicable to the present invention, also should be included in the protection domain of the present invention, and be contained in this with way of reference.
Preferably, in step S202, subscriber equipment 1 is decomposed into one or more password strings according to the password relevant information of described unlocking pin with described unlocking pin, wherein, described password relevant information comprises the complexity information of length information and/or the described unlocking pin of described unlocking pin.For example, suppose in step S201, the unlocking pin that subscriber equipment 1 obtains is " 1a2bb3ccc4dddd "; In step S202, subscriber equipment 1 is according to the password relevant information of this unlocking pin, the length information of this unlocking pin for example, namely this unlocking pin comprises 14 characters, this unlocking pin is decomposed into " 1a2b ", " b3cc ", " c4dd " and four password strings such as " dd ", so that each password string comprises character as much as possible, for example comprise at most 4 characters.And for example, suppose that in step S201, the unlocking pin that subscriber equipment 1 obtains is " 1a%2bb﹠amp; 3ccc4*dddd "; In step S202, subscriber equipment 1 is according to the password relevant information of this unlocking pin, the complexity information of this unlocking pin for example, and namely this unlocking pin comprises numeral, letter and symbol, and this unlocking pin is decomposed into " 1a%2 ", " bb﹠amp; 3 ", " ccc4* " and four password strings such as " dddd " so that each password string comprises various characters as much as possible, such as numeral, letter or symbol.
Those skilled in the art will be understood that in step S202, subscriber equipment 1 can also consider the combination in any of above-mentioned password relevant information, and this unlocking pin is decomposed into one or more password strings.
Those skilled in the art will be understood that above-mentioned password relevant information only for giving an example, and other password relevant informations existing or that may occur from now on also should be included in the protection domain of the present invention as applicable to the present invention, and are contained in this with way of reference.
Subsequently, in step S203, subscriber equipment 1 provides a plurality of character string fragments according to described user's release trigger action at described subscriber equipment, wherein, described a plurality of character string fragment comprises described one or more password string and one or more interference character string.Particularly, when subscriber equipment is in the lock state down, the user touches or presses release button or other similar case or the icon of subscriber equipment; In step S203, subscriber equipment 1 is according to this user's release trigger action, provide a plurality of character string fragments at described subscriber equipment, such as on the screen of this subscriber equipment by static, beat or the mode such as flicker shows a plurality of character string fragments, wherein, the password string that provides among the step S202 is provided described a plurality of character string fragment, and one or more interference character string.
At this, disturb character string when the user attempts touching release at every turn, to be generated at random by subscriber equipment, for example will be behind the unlocking pin random rearrangement decompose the character string fragment of gained, or from character list, repeatedly randomly draw several character combinations and character string fragment; Or generate and store in advance in subscriber equipment, and, preferably, only after user's release success, just generate at random, touch release for the user next time.Those skilled in the art will be understood that, disturb character string by only after user's release success, just upgrading these, can effectively stop other people to guess this unlocking pin by the character string fragment of repeatedly attempting and relatively provide, thereby, the security of subscriber equipment can be provided further.
Then, in step S204, subscriber equipment 1 obtains the touch operation that described user selects described a plurality of character string fragments by the touch input device of described subscriber equipment, to obtain one or more preferred characters string fragments.Particularly, in step S204, subscriber equipment 1 is by such as touching technique or utilize the application programming interfaces (API) about system's input that subscriber equipment provides, obtain the touch operation of a plurality of character string fragments that user to user equipment 1 provides in step S203, for example touch deletion or touch and select, determine one or more preferred characters string fragments that this is user-selected.
Preferably, in step S204, the touch operation of subscriber equipment 1 comprise following at least each:
-described user carries out the touch operation that preferred formula is selected by the touch input device of described subscriber equipment to described character string fragment;
-described user carries out the touch operation that the eliminating formula is selected by the touch input device of described subscriber equipment to described character string fragment.
For example, the user carries out the touch operation that the preferred formula of similar " √ " or " ↑ " is selected to certain character string fragment, in step S204, subscriber equipment 1 with the corresponding character string fragment of this touch operation as a preferred characters string fragment.For another example, the user carries out the touch operation of the deletion formula selection of similar " x " or " ↓ " to certain character string fragment, and in step S204, subscriber equipment 1 is considered as not preferred character string fragment with the corresponding character string fragment of this touch operation.For another example, after the user carries out touch operation to certain character string fragment, subscriber equipment shows the menu of similar " choosing " or " deletion " around this character string fragment, the user selects this menu again, such as " choosing " or " deletion ", in step S204, subscriber equipment 1 is according to the selection of user to this menu, with the corresponding character string fragment of this touch operation as a preferred characters string fragment or be considered as not preferred character string fragment.Those skilled in the art will be understood that the above-mentioned touch operation that described a plurality of character string fragments are selected is only for giving an example; other existing or touch operation that described a plurality of character string fragments are selected that may occur from now on are as applicable to the present invention; also should be included in the protection domain of the present invention, and be contained in this with way of reference.Those skilled in the art will be understood that in step S204, subscriber equipment 1 will be determined one or more preferred characters string fragments from these a plurality of character string fragments by the touch operation that preferred formula is selected and/or the deletion formula is selected to character string fragment.
Then, in step S205, whether subscriber equipment 1 detects described one or more preferred characters string fragments and is complementary with described unlocking pin.Particularly, in step S205, subscriber equipment 1 is according to one or more preferred characters string fragments of obtaining in step S204, whether detect itself and this unlocking pin is complementary, for example, detect the combining characters string consisted of by described one or more preferred characters string fragments whether identical with this unlocking pin.
Preferably, when satisfying the detection trigger condition, in step S205, whether subscriber equipment 1 detects described one or more preferred characters string fragments and is complementary with described unlocking pin; Wherein, described detection trigger condition comprise following at least each:
-described user triggers the operation of submitting the input password to;
-described user carries out touch operation that described a plurality of character string fragments are selected by described touch input device;
The stand-by time of-described user's last touch operation surpasses predetermined operating interval time threshold.
For example, when the user triggered the operation of submitting the input password to, in step S205, subscriber equipment 1 detected whether user-selected one or more preferred characters string fragments are complementary with described unlocking pin before this operation.For another example, when touch operation that the user is undertaken described a plurality of character string fragments are selected by described touch input device, when for example the user carries out the touch operation of selecting to character string fragment at every turn, in step S205, whether subscriber equipment 1 detects whether user-selected one or more preferred characters string fragments are complementary with described unlocking pin before this touch operation, be complementary with described unlocking pin thereby detect in real time described one or more preferred characters string fragment.And for example, when the stand-by time of user's last touch operation surpasses predetermined operating interval time threshold, subscriber equipment judges that accordingly this user has finished the touch operation that all are selected character string fragment, in step S205, subscriber equipment 1 detects whether user-selected one or more preferred characters string fragments are complementary with described unlocking pin before this touch operation.Those skilled in the art will be understood that above-mentioned detection trigger condition only for giving an example, and other detection trigger conditions existing or that may occur from now on also should be included in the protection domain of the present invention as applicable to the present invention, and are contained in this with way of reference.
Preferably, in step S205, whether subscriber equipment 1 detects described one or more preferred characters string fragment and is complementary with described unlocking pin according to predetermined matched rule; Wherein, described predetermined matched rule comprise following at least each:
-when at least one is identical with described unlocking pin in the one or more combining characters strings that are made of described one or more preferred characters string fragments, determine that described one or more preferred characters string fragment and described unlocking pin are complementary;
-when at least one surpasses predetermined identical substring length threshold with the maximal phase of described unlocking pin with the length of character substring in by described one or more combining characters strings, determine that described one or more preferred characters string fragment and described unlocking pin are complementary;
-when the quantity of the preferred characters string fragment that is contained in described unlocking pin in described one or more preferred characters string fragments surpasses predetermined number of matches threshold value, determine that described one or more preferred characters string fragment and described unlocking pin are complementary.
For example, when at least one is identical with described unlocking pin in the one or more combining characters strings that are made of described one or more preferred characters string fragments, in step S205, subscriber equipment 1 determines that described one or more preferred characters string fragments and described unlocking pin are complementary.Suppose that in step S201, the unlocking pin that subscriber equipment 1 obtains is " 1a%2bb﹠amp; 3ccc4*dddd "; In step S202, subscriber equipment 1 is decomposed into " 1a%2 ", " bb﹠amp with this unlocking pin; 3 ", four password strings such as " ccc4* " and " dddd "; In step S204, the preferred characters string fragment that subscriber equipment 1 obtains comprises " 1a%2 ", " bb﹠amp; 3 ", " ccc4* " and " dddd "; In step S205, subscriber equipment 1 comprises " 1a%2bb﹠amp according to the combining characters string that these preferred characters string fragments consist of; 3ccc4*dddd ", this combining characters string is identical with this unlocking pin, determines that described one or more preferred characters string fragment and described unlocking pin are complementary.Those skilled in the art will be understood that, by this matched rule, even the user does not strictly press the select progressively preferred characters string fragment of password string, perhaps in the situation that support multiple point touching, in step S204, the preferred characters string fragment that subscriber equipment 1 obtains is not observed the order of password string, in step S205, subscriber equipment 1 also can be finished this matching detection, thereby has improved user's operation ease and user's experience.
For another example, when at least one surpasses predetermined identical substring length threshold with the maximal phase of described unlocking pin with the length of character substring in by described one or more combining characters strings, in step S205, subscriber equipment 1 determines that described one or more preferred characters string fragments and described unlocking pin are complementary.Suppose that in step S201, the unlocking pin that subscriber equipment 1 obtains is " 1a%2bb﹠amp; 3ccc4*dddd "; In step S202, subscriber equipment 1 is decomposed into " 1a%2 ", " bb﹠amp with this unlocking pin; 3 ", four password strings such as " ccc4* " and " dddd "; In step S204, the preferred characters string fragment that subscriber equipment 1 obtains comprises " 1a%2 ", " bb﹠amp; 3 " and " ccc4* "; In step S205, subscriber equipment 1 comprises " 1a%2bb﹠amp according to the combining characters string that these preferred characters string fragments consist of; 3ccc4* ", the same character substring " 1a%2bb﹠amp of the maximal phase of this combining characters string and this unlocking pin; 3ccc4* " length be 13, surpass predetermined identical substring length threshold 10, determine that described one or more preferred characters string fragment and described unlocking pin are complementary.
And for example, when the quantity of the preferred characters string fragment that is contained in described unlocking pin in described one or more preferred characters string fragments surpasses predetermined number of matches threshold value, in step S205, subscriber equipment 1 determines that described one or more preferred characters string fragments and described unlocking pin are complementary.Suppose that in step S201, the unlocking pin that subscriber equipment 1 obtains is " 1a%2bb﹠amp; 3ccc4*dddd "; In step S202, subscriber equipment 1 is decomposed into " 1a%2 ", " bb﹠amp with this unlocking pin; 3 ", four password strings such as " ccc4* " and " dddd "; In step S204, the preferred characters string fragment that subscriber equipment 1 obtains comprises " 1a%2 ", " bb﹠amp; 3 ", " ccc4* " and " ddde "; In step S205, subscriber equipment 1 is 3 according to the quantity that is contained in the preferred characters string fragment of described unlocking pin in these preferred characters string fragments, surpass predetermined number of matches threshold value 2, determine that described one or more preferred characters string fragment and described unlocking pin are complementary.
Those skilled in the art will be understood that in step S205, and whether subscriber equipment 1 can also consider the combination in any of above-mentioned predetermined matched rule, detect described one or more preferred characters string fragment and be complementary with described unlocking pin.
Those skilled in the art will be understood that above-mentioned predetermined matched rule only for for example, and other existing or predetermined matched rules that may occur from now on also should be included in the protection domain of the present invention, and be contained in this with way of reference as applicable to the present invention.
Then, when described one or more preferred characters string fragments and described unlocking pin were complementary, in step S206,1 pair of described subscriber equipment of subscriber equipment was carried out unlocking operation.Particularly, in step S206, subscriber equipment 1 is according to the matching detection result who provides in step S205, when described one or more preferred characters string fragments and described unlocking pin are complementary, described subscriber equipment is carried out unlocking operation, for example call and carry out the unlocking program of subscriber equipment, so that subscriber equipment enters released state, use operation for the user.
Preferably, the method also comprises step S207 (not shown), and when described one or more preferred characters string fragments and described unlocking pin were complementary, in step S207, subscriber equipment 1 upgraded described one or more interference character strings.For example, in step S207, subscriber equipment 1 decompose to obtain new interference character after with the unlocking pin random rearrangement, or repeatedly randomly draws several character combinations obtain new interference character string from character list; And be stored in subscriber equipment, touch release for the user next time.Those skilled in the art will be understood that, disturb character string by only after user's release success, upgrading these, can effectively stop other people to guess this unlocking pin by the character string fragment of repeatedly attempting and relatively provide, thereby, the security of subscriber equipment can be provided further.
Preferably, between each step of subscriber equipment 1 be constant work.Particularly, in step S201, subscriber equipment 1 continues to obtain the set unlocking pin that is used for its subscriber equipment is touched release of user; In step S202, subscriber equipment 1 continues described unlocking pin is decomposed into one or more password strings; In step S203, the release trigger action that subscriber equipment 1 continues according to described user, provide a plurality of character string fragments at described subscriber equipment, wherein, described a plurality of character string fragments comprise described one or more password string and one or more interference character string; In step S204, subscriber equipment 1 continues to obtain the touch operation that described user selects described a plurality of character string fragments by the touch input device of described subscriber equipment, to obtain one or more preferred characters string fragments; In step S205, whether subscriber equipment 1 continues to detect described one or more preferred characters string fragments and is complementary with described unlocking pin; When described one or more preferred characters string fragments and described unlocking pin were complementary, in step S206, subscriber equipment 1 continued described subscriber equipment is carried out unlocking operation.At this, it will be understood by those skilled in the art that " continuing " refers to that each step of subscriber equipment 1 constantly is provided respectively by obtaining with the matching detection of touch selection, preferred characters string fragment and the unlocking pin of the providing of decomposition, character string fragment, preferred characters string fragment, carrying out unlocking operation, until this subscriber equipment 1 stops to obtain of unlocking pin or release trigger action in a long time of unlocking pin.
Preferably, the method also comprises step S208 (not shown), and in step S208, subscriber equipment 1 detects whether satisfy the renewal trigger condition of again decomposing described unlocking pin; When satisfying described renewal trigger condition, carry out the operation of described subscriber equipment 1 in step S202.Particularly, in step S208, subscriber equipment 1 detects whether satisfy the renewal trigger condition of again decomposing described unlocking pin, and for example whether the user has upgraded unlocking pin; When satisfying described renewal trigger condition, carry out the operation of described subscriber equipment 1 in step S202, for example the unlocking pin after upgrading is carried out password and decompose, to obtain corresponding with it one or more password strings.
More preferably, described renewal trigger condition comprise following at least each:
-described user upgrades described unlocking pin;
-described user upgrades the preference setting about cipher safety and/or operation ease;
-the continuous frequency of failure of the unlocking operation of described subscriber equipment is surpassed predetermined release failure frequency threshold value.
For example, when the user upgraded its unlocking pin, in step S208, the unlocking pin after 1 pair of renewal of subscriber equipment was carried out password and is decomposed, to obtain corresponding with it one or more password strings.
For another example, when the user upgrades preference about cipher safety and/or operation ease and arranges, in step S208, subscriber equipment 1 is according to the preference setting about cipher safety and/or operation ease after upgrading, this unlocking pin is carried out password decompose, to obtain corresponding with it one or more password strings.
And for example, when the continuous frequency of failure to the unlocking operation of described subscriber equipment surpasses predetermined release failure frequency threshold value, in step S208,1 pair of this unlocking pin of subscriber equipment is carried out password and is decomposed, to obtain corresponding with it one or more password strings.Those skilled in the art will be understood that, after continuous several times release failure, decomposition by the unlocking pin that upgrades in time can stop other people to guess this unlocking pin by the character string fragment of repeatedly attempting and relatively provide effectively, thereby, the security of subscriber equipment can be provided further.
Those skilled in the art will be understood that in step S208, subscriber equipment 1 can also consider the combination in any of above-mentioned renewal trigger condition, and this unlocking pin is decomposed into one or more password strings.
Those skilled in the art will be understood that above-mentioned renewal trigger condition only for giving an example, and other renewal trigger conditions existing or that may occur from now on also should be included in the protection domain of the present invention as applicable to the present invention, and are contained in this with way of reference.
In a preferred embodiment (with reference to Fig. 1), in step S201, subscriber equipment 1 obtains the set unlocking pin that is used for its subscriber equipment is touched release and performance objective application of user; In step S202, subscriber equipment 1 is decomposed into one or more password strings with described unlocking pin; In step S203, subscriber equipment 1 provides a plurality of character string fragments according to described user's release trigger action at described subscriber equipment, and wherein, described a plurality of character string fragments comprise described one or more password string and one or more interference character string; In step S204, subscriber equipment 1 obtains the touch operation that described user selects described a plurality of character string fragments by the touch input device of described subscriber equipment, to obtain one or more preferred characters string fragments; In step S205, whether subscriber equipment 1 detects described one or more preferred characters string fragments and is complementary with described unlocking pin; When described one or more preferred characters string fragments and described unlocking pin were complementary, in step S206,1 pair of described subscriber equipment of subscriber equipment was carried out unlocking operation and is also carried out described intended application.Wherein, step S202, S203, S204 and S205 are identical or basic identical with corresponding step in the previous embodiment respectively, therefore for simplicity, repeat no more, and only by reference mode is contained in this.
Particularly, in step S201, subscriber equipment 1 obtains the set unlocking pin that is used for its subscriber equipment is touched release and performance objective application of user.For example, the man-machine interaction mode that the user provides by subscriber equipment, such as touch input device or keyboard etc., in the input frame of the unlocking pin that touch release that subscriber equipment provides and performance objective are used, input several character strings, such as the character string that is consisted of by letter, numeral, symbol, Chinese or other literal; In step S201, the application programming interfaces that subscriber equipment 1 provides by subscriber equipment (API), from this input frame, read this several character strings, as set being used for of user its subscriber equipment is touched the unlocking pin that release and performance objective are used.And for example, the man-machine interaction mode that the user provides by subscriber equipment, such as touch input device or keyboard etc., in the Password Input frame of the unlocking pin of the touch release that subscriber equipment provides, input several character strings, such as the character string that is consisted of by letter, numeral, symbol, Chinese or other literal, and by select target use corresponding check box or in using input frame the identification information of input intended application, to bind the corresponding intended application of this unlocking pin; In step S201, the application programming interfaces that subscriber equipment 1 provides by subscriber equipment (API), read selected check box or the identification information in this application input frame, to determine corresponding intended application, and from this Password Input frame, read this several character strings, as set being used for of user its subscriber equipment is touched release and carries out the unlocking pin of this intended application.
At last, when described one or more preferred characters string fragments and described unlocking pin were complementary, in step S206,1 pair of described subscriber equipment of subscriber equipment was carried out unlocking operation and is also carried out described intended application.Particularly, in step S206, subscriber equipment 1 is according to the matching detection result who provides in step S205, when described one or more preferred characters string fragments and described unlocking pin are complementary, described subscriber equipment is carried out unlocking operation, for example call and carry out the unlocking program of subscriber equipment, so that subscriber equipment enters released state, and call and carry out described intended application, directly enter this target for the user and use operation.
Those skilled in the art will be understood that, the present embodiment is by combining intended application with unlocking pin, so that directly carry out this intended application after the subscriber equipment release, improved further user's operation ease and operating efficiency, thereby promoted further user's experience.
It should be noted that the present invention can be implemented in the assembly of software and/or software and hardware, for example, can adopt special IC (ASIC), general purpose computing machine or any other similar hardware device to realize.In one embodiment, software program of the present invention can carry out to realize step mentioned above or function by processor.Similarly, software program of the present invention (comprising relevant data structure) can be stored in the computer readable recording medium storing program for performing, for example, and RAM storer, magnetic or CD-ROM driver or flexible plastic disc and similar devices.In addition, steps more of the present invention or function can adopt hardware to realize, for example, thereby as cooperate the circuit of carrying out each step or function with processor.
In addition, a part of the present invention can be applied to computer program, and for example computer program instructions when it is carried out by computing machine, by the operation of this computing machine, can call or provide the method according to this invention and/or technical scheme.And call the programmed instruction of method of the present invention, may be stored in fixing or movably in the recording medium, and/or be transmitted by the data stream in broadcasting or other signal bearing medias, and/or be stored in the working storage according to the computer equipment of described programmed instruction operation.At this, comprise according to one embodiment of present invention a device, this device comprises for the storer of storage computer program instructions and is used for the processor of execution of program instructions, wherein, when this computer program instructions is carried out by this processor, trigger this device operation based on aforementioned method according to a plurality of embodiment of the present invention and/or technical scheme.
To those skilled in the art, obviously the invention is not restricted to the details of above-mentioned example embodiment, and in the situation that do not deviate from spirit of the present invention or essential characteristic, can realize the present invention with other concrete form.Therefore, no matter from which point, all should regard embodiment as exemplary, and be nonrestrictive, scope of the present invention is limited by claims rather than above-mentioned explanation, therefore is intended to be included in the present invention dropping on the implication that is equal to important document of claim and all changes in the scope.Any Reference numeral in the claim should be considered as limit related claim.In addition, obviously other unit or step do not got rid of in " comprising " word, and odd number is not got rid of plural number.A plurality of unit of stating in the device claim or device also can be realized by software or hardware by a unit or device.The first, the second word such as grade is used for representing title, and does not represent any specific order.

Claims (20)

1. method that is used for based on unlocking pin subscriber equipment being touched release, wherein, the method may further comprise the steps:
X obtains the set unlocking pin that is used for its subscriber equipment is touched release of user;
Y is decomposed into one or more password strings with described unlocking pin;
Wherein, the method also comprises:
A provides a plurality of character string fragments according to described user's release trigger action at described subscriber equipment, and wherein, described a plurality of character string fragments comprise described one or more password string and one or more interference character string;
B obtains the touch operation that described user selects described a plurality of character string fragments by the touch input device of described subscriber equipment, to obtain one or more preferred characters string fragments;
Whether c detects described one or more preferred characters string fragment and is complementary with described unlocking pin;
D carries out unlocking operation to described subscriber equipment when described one or more preferred characters string fragments and described unlocking pin are complementary.
2. method according to claim 1, wherein, described step c comprises:
-when satisfying the detection trigger condition, detect described one or more preferred characters string fragment and whether be complementary with described unlocking pin;
Wherein, described detection trigger condition comprise following at least each:
-described user triggers the operation of submitting the input password to;
-described user carries out touch operation that described a plurality of character string fragments are selected by described touch input device;
The stand-by time of-described user's last touch operation surpasses predetermined operating interval time threshold.
3. method according to claim 1 and 2, wherein, described step c comprises:
-according to predetermined matched rule, detect described one or more preferred characters string fragment and whether be complementary with described unlocking pin;
Wherein, described predetermined matched rule comprise following at least each:
-when at least one is identical with described unlocking pin in the one or more combining characters strings that are made of described one or more preferred characters string fragments, determine that described one or more preferred characters string fragment and described unlocking pin are complementary;
-when at least one surpasses predetermined identical substring length threshold with the maximal phase of described unlocking pin with the length of character substring in by described one or more combining characters strings, determine that described one or more preferred characters string fragment and described unlocking pin are complementary;
-when the quantity of the preferred characters string fragment that is contained in described unlocking pin in described one or more preferred characters string fragments surpasses predetermined number of matches threshold value, determine that described one or more preferred characters string fragment and described unlocking pin are complementary.
4. each described method in 3 according to claim 1, wherein, described step y comprises:
-decompose setting according to predetermined password, described unlocking pin is decomposed into one or more password strings;
Wherein, described predetermined password decompose arrange comprise following at least each:
The amount threshold of the password string that-described unlocking pin is included;
The character quantity threshold value of-described password string;
-described user is about the preference setting of cipher safety and/or operation ease.
5. each described method in 4 according to claim 1, wherein, described step y comprises:
-according to the password relevant information of described unlocking pin, described unlocking pin is decomposed into one or more password strings;
Wherein, described password relevant information comprise following at least each:
The length information of-described unlocking pin;
The complexity information of-described unlocking pin.
6. each described method in 5 according to claim 1, wherein, the method also comprises:
-detect and whether satisfy the renewal trigger condition of again decomposing described unlocking pin;
-when satisfying described renewal trigger condition, carry out the operation of described step y.
7. method according to claim 6, wherein, described renewal trigger condition comprise following at least each:
-described user upgrades described unlocking pin;
-described user upgrades the preference setting about cipher safety and/or operation ease;
-the continuous frequency of failure of the unlocking operation of described subscriber equipment is surpassed predetermined release failure frequency threshold value.
8. each described method in 7 according to claim 1, wherein, described step x comprises:
-obtain set being used for of user its subscriber equipment is touched the unlocking pin that release and performance objective are used;
Wherein, described steps d comprises:
-when described one or more preferred characters string fragments and described unlocking pin are complementary, described subscriber equipment is carried out unlocking operation and carried out described intended application.
9. each described method in 8 according to claim 1, wherein, the method also comprises:
-when described one or more preferred characters string fragments and described unlocking pin are complementary, upgrade described one or more interference character string.
10. each described method in 9 according to claim 1, wherein, the touch operation among the described step b comprise following at least each:
-described user carries out the touch operation that preferred formula is selected by the touch input device of described subscriber equipment to described character string fragment;
-described user carries out the touch operation that the eliminating formula is selected by the touch input device of described subscriber equipment to described character string fragment.
11. a subscriber equipment that is used for touching based on unlocking pin release, wherein, this equipment comprises:
The password deriving means is used for obtaining the set unlocking pin that is used for its subscriber equipment is touched release of user;
The password decomposer is used for described unlocking pin is decomposed into one or more password strings;
Wherein, this equipment also comprises:
Generator is used for the release trigger action according to described user, provides a plurality of character string fragments at described subscriber equipment, and wherein, described a plurality of character string fragments comprise described one or more password string and one or more interference character string;
The operation deriving means is used for obtaining the touch operation that described user selects described a plurality of character string fragments by the touch input device of described subscriber equipment, to obtain one or more preferred characters string fragments;
Whether the matching detection device is complementary with described unlocking pin for detection of described one or more preferred characters string fragments;
Tripper is used for when described one or more preferred characters string fragments and described unlocking pin are complementary, to described subscriber equipment execution unlocking operation.
12. subscriber equipment according to claim 11, wherein, described matching detection device is used for:
-when satisfying the detection trigger condition, detect described one or more preferred characters string fragment and whether be complementary with described unlocking pin;
Wherein, described detection trigger condition comprise following at least each:
-described user triggers the operation of submitting the input password to;
-described user carries out touch operation that described a plurality of character string fragments are selected by described touch input device;
The stand-by time of-described user's last touch operation surpasses predetermined operating interval time threshold.
13. according to claim 11 or 12 described subscriber equipmenies, wherein, described matching detection device is used for:
-according to predetermined matched rule, detect described one or more preferred characters string fragment and whether be complementary with described unlocking pin;
Wherein, described predetermined matched rule comprise following at least each:
-when at least one is identical with described unlocking pin in the one or more combining characters strings that are made of described one or more preferred characters string fragments, determine that described one or more preferred characters string fragment and described unlocking pin are complementary;
-when at least one surpasses predetermined identical substring length threshold with the maximal phase of described unlocking pin with the length of character substring in by described one or more combining characters strings, determine that described one or more preferred characters string fragment and described unlocking pin are complementary;
-when the quantity of the preferred characters string fragment that is contained in described unlocking pin in described one or more preferred characters string fragments surpasses predetermined number of matches threshold value, determine that described one or more preferred characters string fragment and described unlocking pin are complementary.
14. each described subscriber equipment in 13 according to claim 11, wherein, described password decomposer is used for:
-decompose setting according to predetermined password, described unlocking pin is decomposed into one or more password strings;
Wherein, described predetermined password decompose arrange comprise following at least each:
The amount threshold of the password string that-described unlocking pin is included;
The character quantity threshold value of-described password string;
-described user is about the preference setting of cipher safety and/or operation ease.
15. each described subscriber equipment in 14 according to claim 11, wherein, described password decomposer is used for:
-according to the password relevant information of described unlocking pin, described unlocking pin is decomposed into one or more password strings;
Wherein, described password relevant information comprise following at least each:
The length information of-described unlocking pin;
The complexity information of-described unlocking pin.
16. each described subscriber equipment in 15 according to claim 11, wherein, this equipment also comprises the decomposition updating device, is used for:
-detect and whether satisfy the renewal trigger condition of again decomposing described unlocking pin;
-when satisfying described renewal trigger condition, carry out the operation of described password decomposer.
17. subscriber equipment according to claim 16, wherein, described renewal trigger condition comprise following at least each:
-described user upgrades described unlocking pin;
-described user upgrades the preference setting about cipher safety and/or operation ease;
-the continuous frequency of failure of the unlocking operation of described subscriber equipment is surpassed predetermined release failure frequency threshold value.
18. each described subscriber equipment in 17 according to claim 11, wherein, described password deriving means is used for:
-obtain set being used for of user its subscriber equipment is touched the unlocking pin that release and performance objective are used;
Wherein, described tripper is used for:
-when described one or more preferred characters string fragments and described unlocking pin are complementary, described subscriber equipment is carried out unlocking operation and carried out described intended application.
19. each described subscriber equipment in 18 according to claim 11, wherein, this equipment also comprises the interference updating device, is used for:
-when described one or more preferred characters string fragments and described unlocking pin are complementary, upgrade described one or more interference character string.
20. each described subscriber equipment in 19 according to claim 11, wherein, the touch operation of described operation deriving means comprise following at least each:
-described user carries out the touch operation that preferred formula is selected by the touch input device of described subscriber equipment to described character string fragment;
-described user carries out the touch operation that the eliminating formula is selected by the touch input device of described subscriber equipment to described character string fragment.
CN201210093725.0A 2012-03-31 2012-03-31 A kind of method and apparatus that user equipment is carried out touching unlock based on unlocking pin Active CN103365581B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210093725.0A CN103365581B (en) 2012-03-31 2012-03-31 A kind of method and apparatus that user equipment is carried out touching unlock based on unlocking pin

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210093725.0A CN103365581B (en) 2012-03-31 2012-03-31 A kind of method and apparatus that user equipment is carried out touching unlock based on unlocking pin

Publications (2)

Publication Number Publication Date
CN103365581A true CN103365581A (en) 2013-10-23
CN103365581B CN103365581B (en) 2019-01-25

Family

ID=49367055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210093725.0A Active CN103365581B (en) 2012-03-31 2012-03-31 A kind of method and apparatus that user equipment is carried out touching unlock based on unlocking pin

Country Status (1)

Country Link
CN (1) CN103365581B (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103678989A (en) * 2013-11-25 2014-03-26 西安电子科技大学 Screen-traceless intelligent terminal safety unlocking method and device
CN104063169A (en) * 2014-04-09 2014-09-24 苏州天鸣信息科技有限公司 Unlocking method based on touch screen
CN105068733A (en) * 2015-08-17 2015-11-18 广东欧珀移动通信有限公司 Terminal unlocking method and apparatus
CN105095732A (en) * 2015-07-23 2015-11-25 百度在线网络技术(北京)有限公司 Unlocking method and device of mobile terminal
CN105608350A (en) * 2015-12-16 2016-05-25 小米科技有限责任公司 Screen input keyboard generation method and apparatus
CN105631258A (en) * 2014-12-01 2016-06-01 中兴通讯股份有限公司 Unlocking method and apparatus as well as user terminal
CN105631267A (en) * 2015-12-26 2016-06-01 深圳市金立通信设备有限公司 Password check method and terminal
CN105760792A (en) * 2014-12-19 2016-07-13 阿里巴巴集团控股有限公司 Method and device for improving password input safety
CN106027804A (en) * 2016-07-19 2016-10-12 努比亚技术有限公司 Unlocking method and unlocking apparatus of mobile terminal
CN106570386A (en) * 2015-10-09 2017-04-19 中兴通讯股份有限公司 Touch screen unlocking method and system
CN106792040A (en) * 2016-12-08 2017-05-31 广东九联科技股份有限公司 A kind of method for carrying out touching unblock to user equipment based on unlocking pin
CN107292205A (en) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 A kind of input method and device, electronic equipment
CN107392008A (en) * 2017-07-18 2017-11-24 深圳天珑无线科技有限公司 Cipher management method, Password Management equipment and computer-readable recording medium
CN107423644A (en) * 2017-04-18 2017-12-01 浙江传媒学院 A kind of anti-peeping touch feedback password input system and method
CN107423589A (en) * 2016-05-24 2017-12-01 阿里巴巴集团控股有限公司 A kind of cipher-code input method and device
CN107480515A (en) * 2017-07-03 2017-12-15 上海斐讯数据通信技术有限公司 The decryption method and system of intelligent terminal
CN107871075A (en) * 2016-09-28 2018-04-03 京瓷办公信息***株式会社 Cipher authentication device
CN109543371A (en) * 2018-08-09 2019-03-29 湖州申脉科技有限公司 A kind of privacy management system of smart machine and social software
CN111310157A (en) * 2020-02-10 2020-06-19 北京无限光场科技有限公司 Password unlocking method, device, equipment and storage medium
CN111524257A (en) * 2019-10-08 2020-08-11 南京未来产业大数据研究院有限公司 Dummy bit cipher algorithm containing escape character

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1159037A (en) * 1995-05-10 1997-09-10 卡西欧计算机公司 Image processor
CN1438643A (en) * 2002-02-14 2003-08-27 松下电器产业株式会社 Information distribution system
US20070157123A1 (en) * 2005-12-22 2007-07-05 Yohei Ikawa Character string processing method, apparatus, and program
CN101313509A (en) * 2005-11-23 2008-11-26 皇家飞利浦电子股份有限公司 Multi-lane high-speed encryption and decryption
CN101604366A (en) * 2009-07-13 2009-12-16 中山爱科数字科技有限公司 A kind of password separate dynamic verification method and system
CN101699386A (en) * 2009-10-29 2010-04-28 宇龙计算机通信科技(深圳)有限公司 Unlocking method and system of handheld terminal and handheld terminal
CN102081488A (en) * 2009-11-30 2011-06-01 比亚迪股份有限公司 Safe lock input interface device and safe lock unlocking method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1159037A (en) * 1995-05-10 1997-09-10 卡西欧计算机公司 Image processor
CN1438643A (en) * 2002-02-14 2003-08-27 松下电器产业株式会社 Information distribution system
CN101313509A (en) * 2005-11-23 2008-11-26 皇家飞利浦电子股份有限公司 Multi-lane high-speed encryption and decryption
US20070157123A1 (en) * 2005-12-22 2007-07-05 Yohei Ikawa Character string processing method, apparatus, and program
CN101604366A (en) * 2009-07-13 2009-12-16 中山爱科数字科技有限公司 A kind of password separate dynamic verification method and system
CN101699386A (en) * 2009-10-29 2010-04-28 宇龙计算机通信科技(深圳)有限公司 Unlocking method and system of handheld terminal and handheld terminal
CN102081488A (en) * 2009-11-30 2011-06-01 比亚迪股份有限公司 Safe lock input interface device and safe lock unlocking method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
温春 等: "中文领域本体学习中术语的自动抽取", 《计算机应用研究》 *
程艳芬: "基于Java的字符串分解器的研究与实现", 《交通与计算机》 *

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103678989B (en) * 2013-11-25 2017-04-05 西安电子科技大学 A kind of safe unlocking method and device of the seamless intelligent terminal of screen
CN103678989A (en) * 2013-11-25 2014-03-26 西安电子科技大学 Screen-traceless intelligent terminal safety unlocking method and device
CN104063169A (en) * 2014-04-09 2014-09-24 苏州天鸣信息科技有限公司 Unlocking method based on touch screen
CN104063169B (en) * 2014-04-09 2017-05-24 Ut斯达康(深圳)技术有限公司 Unlocking method based on touch screen
CN105631258A (en) * 2014-12-01 2016-06-01 中兴通讯股份有限公司 Unlocking method and apparatus as well as user terminal
WO2016086530A1 (en) * 2014-12-01 2016-06-09 中兴通讯股份有限公司 Unlocking method, device, user terminal and computer storage medium
CN105760792A (en) * 2014-12-19 2016-07-13 阿里巴巴集团控股有限公司 Method and device for improving password input safety
CN105095732A (en) * 2015-07-23 2015-11-25 百度在线网络技术(北京)有限公司 Unlocking method and device of mobile terminal
CN105068733B (en) * 2015-08-17 2019-04-02 Oppo广东移动通信有限公司 A kind of method and device of terminal unlocking
CN105068733A (en) * 2015-08-17 2015-11-18 广东欧珀移动通信有限公司 Terminal unlocking method and apparatus
CN106570386A (en) * 2015-10-09 2017-04-19 中兴通讯股份有限公司 Touch screen unlocking method and system
CN105608350A (en) * 2015-12-16 2016-05-25 小米科技有限责任公司 Screen input keyboard generation method and apparatus
CN105608350B (en) * 2015-12-16 2018-09-04 小米科技有限责任公司 Screen inputs keyboard generation method and device
CN105631267A (en) * 2015-12-26 2016-06-01 深圳市金立通信设备有限公司 Password check method and terminal
CN107292205A (en) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 A kind of input method and device, electronic equipment
CN107423589A (en) * 2016-05-24 2017-12-01 阿里巴巴集团控股有限公司 A kind of cipher-code input method and device
CN106027804B (en) * 2016-07-19 2020-11-27 泾县谷声信息科技有限公司 Unlocking method and unlocking device of mobile terminal
CN106027804A (en) * 2016-07-19 2016-10-12 努比亚技术有限公司 Unlocking method and unlocking apparatus of mobile terminal
CN107871075A (en) * 2016-09-28 2018-04-03 京瓷办公信息***株式会社 Cipher authentication device
CN107871075B (en) * 2016-09-28 2021-04-09 京瓷办公信息***株式会社 Password authentication device
CN106792040A (en) * 2016-12-08 2017-05-31 广东九联科技股份有限公司 A kind of method for carrying out touching unblock to user equipment based on unlocking pin
CN107423644A (en) * 2017-04-18 2017-12-01 浙江传媒学院 A kind of anti-peeping touch feedback password input system and method
CN107423644B (en) * 2017-04-18 2020-07-24 浙江传媒学院 Peep-proof touch feedback password input system and method
CN107480515A (en) * 2017-07-03 2017-12-15 上海斐讯数据通信技术有限公司 The decryption method and system of intelligent terminal
CN107480515B (en) * 2017-07-03 2021-06-25 台州市吉吉知识产权运营有限公司 Decryption method and system of intelligent terminal
CN107392008A (en) * 2017-07-18 2017-11-24 深圳天珑无线科技有限公司 Cipher management method, Password Management equipment and computer-readable recording medium
WO2020029678A1 (en) * 2018-08-09 2020-02-13 湖州申脉科技有限公司 Privacy management system for intelligent device and social software
CN109543371B (en) * 2018-08-09 2020-09-08 湖州申脉科技有限公司 Privacy management method and system for intelligent equipment and social software
CN109543371A (en) * 2018-08-09 2019-03-29 湖州申脉科技有限公司 A kind of privacy management system of smart machine and social software
CN111524257A (en) * 2019-10-08 2020-08-11 南京未来产业大数据研究院有限公司 Dummy bit cipher algorithm containing escape character
CN111310157A (en) * 2020-02-10 2020-06-19 北京无限光场科技有限公司 Password unlocking method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN103365581B (en) 2019-01-25

Similar Documents

Publication Publication Date Title
CN103365581A (en) User equipment touch unlocking method and device based on unlocking password
US9817964B2 (en) Methods and apparatus to facilitate secure screen input
KR102299261B1 (en) Method of controlling lock state of applications and electronic device supporting the same
Diao et al. No pardon for the interruption: New inference attacks on android through interrupt timing analysis
CN104335561B (en) The communication that bio-identification is initiated
CN103038726A (en) Method and device for secured entry of personal data
KR20130142692A (en) License verification method, apparatus and computer readable medium thereof
CN102902484A (en) Unlocking method of touch screen terminal
US20130139226A1 (en) Secure Authorization
CN104536995B (en) The method and system of searching for based on terminal interface touch control operation
CN103795868A (en) Mobile terminal screen unlocking method and device and mobile terminal
CN105843525A (en) Information displaying method based on mobile terminal and mobile terminal
CN102637117A (en) Unlocking method of touch screen terminal, and touch screen terminal
US20150007306A1 (en) Electronic device and unlocking method
CN102915199A (en) Method for executing program of electronic device with touch control function
CN107688428B (en) Display interface control method and server
CN103760979A (en) Information processing method and electronic equipment
CN112286378A (en) Electronic equipment control method and electronic equipment
CN102880408B (en) Scene unlocking method for terminal equipment and terminal equipment
CN104077065A (en) Method for displaying virtual keyboard by touch screen terminal and touch screen terminal
CN102866850A (en) Apparatus and method for inputting character on touch screen
CN106407761A (en) An unlocking method and unlocking device
KR101435487B1 (en) User device, method of using hidden page of the same and computer-readable recording medium
CN104571847B (en) operation method of electronic device
CN105138220B (en) A kind of pattern unlocking method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant