CN105447358A - Password setting method and apparatus - Google Patents
Password setting method and apparatus Download PDFInfo
- Publication number
- CN105447358A CN105447358A CN201510884212.5A CN201510884212A CN105447358A CN 105447358 A CN105447358 A CN 105447358A CN 201510884212 A CN201510884212 A CN 201510884212A CN 105447358 A CN105447358 A CN 105447358A
- Authority
- CN
- China
- Prior art keywords
- information
- enciphered message
- decryption
- duration
- touch operation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention relates to a password setting method and apparatus, and belongs to the field of information security. The method comprises: receiving a password setting instruction of sensitive operation; according to at least one detected touch operation, obtaining encrypted information, wherein the encrypted information includes operation information of the at least one touch operation, and the operation information comprises at least one of operation duration and operation force; and correspondingly storing the sensitive operation and the encrypted information, and taking the encrypted information as a password of the sensitive operation. According to the password setting method and apparatus, a user can finish a password setting process and a subsequent decryption process for the sensitive operation only by triggering the touch operation according to the encrypted information, so that the operation is simple, convenient and fast; and the action range of the touch operation is very small, so that the touch operation is difficultly seen by other users and the password security is improved.
Description
Technical field
The disclosure is directed to information security field, specifically about a kind of method and the device that arrange password.
Background technology
Along with the development of intelligent terminal technology and universal, in terminal, executable operation gets more and more, and some operation wherein may relate to the information security issue of user, then in order to ensure security, can be encrypted some sensitive operation.
Usual user is when arranging the password of sensitive operation, and can input a character string, this character string can comprise numeral, letter, underscore etc., and the character string that user can input by terminal is as the password of sensitive operation.In subsequent process, when user wishes to perform sensitive operation, can input same character string, terminal can allow to perform this sensitive operation after determining that the character string of input is correct.
Summary of the invention
In order to solve Problems existing in correlation technique, present disclose provides a kind of method and device that password is set.Described technical scheme is as follows:
According to the first aspect of disclosure embodiment, provide a kind of method arranging password, described method comprises:
Receive and instruction is arranged to the password of sensitive operation;
According at least one touch operation detected, obtain enciphered message, described enciphered message comprises the operation information of at least one touch operation described, and described operation information comprises at least one item in operation duration and operating force;
Sensitive operation described in corresponding stored and described enciphered message, using the password of described enciphered message as described sensitive operation.
In another embodiment, at least one touch operation that described basis detects, obtains enciphered message, comprising:
Whenever touch operation being detected, obtain the operation information of the touch operation that current detection arrives;
When multiple touch operation being detected, according to detection sequencing, the operation information of described multiple touch operation being sorted, obtains described enciphered message.
In another embodiment, described method also comprises:
Receive the instruction performing described sensitive operation;
According at least one the deciphering touch operation detected, obtain decryption information, described decryption information comprises the operation information of at least one deciphering touch operation described;
Judge whether described decryption information mates with described enciphered message;
When described decryption information mates with described enciphered message, perform described sensitive operation.
In another embodiment, describedly judge whether described decryption information mates with described enciphered message, comprising:
Obtain the first sequencing information of at least one decryption oprerations duration that described decryption information comprises and at least one decryption oprerations duration described;
Obtain the second sequencing information of at least one operation duration that described enciphered message comprises and at least one operation duration described;
Judge at least one decryption oprerations duration described with described at least one whether operate duration identical, and judge that whether described first sequencing information identical with described second sequencing information;
If at least one decryption oprerations duration described with described at least one to operate duration identical, and described first sequencing information is identical with described second sequencing information, then determine whether described decryption information mates with described enciphered message.
In another embodiment, describedly judge whether described decryption information mates with described enciphered message, comprising:
Obtain the 3rd sequencing information of at least one decryption oprerations dynamics that described decryption information comprises and at least one decryption oprerations dynamics described;
4th sequencing information of at least one operating force that acquisition enciphered message comprises and at least one operating force described;
Judge that whether at least one decryption oprerations dynamics described is identical with at least one operating force described, and judge that whether described 3rd sequencing information is identical with described 4th sequencing information;
If at least one decryption oprerations dynamics described is identical with at least one operating force described, and described 3rd sequencing information is identical with described 4th sequencing information, then determine whether described decryption information mates with described enciphered message.
In another embodiment, described method also comprises:
By at least one item in the touch display screen curtain of configuration and pressure transducer, detect at least one touch operation described.
According to the second aspect of disclosure embodiment, provide a kind of device arranging password, described device comprises:
Receiver module, arranges instruction for receiving to the password of sensitive operation;
First acquisition module, for according at least one touch operation detected, obtains enciphered message, and described enciphered message comprises the operation information of at least one touch operation described, and described operation information comprises at least one item in operation duration and operating force;
Memory module, for sensitive operation described in corresponding stored and described enciphered message, using the password of described enciphered message as described sensitive operation.
In another embodiment, described first acquisition module, also for whenever touch operation being detected, obtains the operation information of the touch operation that current detection arrives; When multiple touch operation being detected, according to detection sequencing, the operation information of described multiple touch operation being sorted, obtains described enciphered message.
In another embodiment, described device also comprises:
Described receiver module, also for receiving the instruction performing described sensitive operation;
Second acquisition module, for according at least one the deciphering touch operation detected, obtain decryption information, described decryption information comprises the operation information of at least one deciphering touch operation described;
Judge module, for judging whether described decryption information mates with described enciphered message;
Execution module, for when described decryption information mates with described enciphered message, performs described sensitive operation.
In another embodiment, described judge module is also for obtaining first sequencing information of at least one decryption oprerations duration that described decryption information comprises and at least one decryption oprerations duration described; Obtain the second sequencing information of at least one operation duration that described enciphered message comprises and at least one operation duration described; Judge at least one decryption oprerations duration described with described at least one whether operate duration identical, and judge that whether described first sequencing information identical with described second sequencing information; If at least one decryption oprerations duration described with described at least one to operate duration identical, and described first sequencing information is identical with described second sequencing information, then determine whether described decryption information mates with described enciphered message.
In another embodiment, described judge module is also for obtaining the 3rd sequencing information of at least one decryption oprerations dynamics that described decryption information comprises and at least one decryption oprerations dynamics described; 4th sequencing information of at least one operating force that acquisition enciphered message comprises and at least one operating force described; Judge that whether at least one decryption oprerations dynamics described is identical with at least one operating force described, and judge that whether described 3rd sequencing information is identical with described 4th sequencing information; If at least one decryption oprerations dynamics described is identical with at least one operating force described, and described 3rd sequencing information is identical with described 4th sequencing information, then determine whether described decryption information mates with described enciphered message.
In another embodiment, described device also comprises:
Detection module, at least one item in the touch display screen curtain by configuring and pressure transducer, detects at least one touch operation described.
According to the third aspect of disclosure embodiment, provide a kind of device arranging password, described device comprises:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
Receive and instruction is arranged to the password of sensitive operation;
According at least one touch operation detected, obtain enciphered message, described enciphered message comprises the operation information of at least one touch operation described, and described operation information comprises at least one item in operation duration and operating force;
Sensitive operation described in corresponding stored and described enciphered message, using the password of described enciphered message as described sensitive operation.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect:
The method that the present embodiment provides and device, by obtaining enciphered message according at least one in the operation duration of at least one touch operation detected and operating force, using enciphered message as being used for the password performing sensitive operation, user only need operate the cipher setting procedures and follow-up decrypting process that can complete sensitive operation according to this enciphered message triggers touch, simple and efficient to handle, and the movement range of touch operation is very little, is not easily seen by other users, improve cipher safety.
Should be understood that, it is only exemplary that above general description and details hereinafter describe, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing to be herein merged in instructions and to form the part of this instructions, shows and meets embodiment of the present disclosure, and is used from instructions one and explains principle of the present disclosure.
Fig. 1 is a kind of process flow diagram arranging the method for password according to an exemplary embodiment;
Fig. 2 is a kind of process flow diagram arranging the method for password according to an exemplary embodiment;
Fig. 3 A is a kind of block diagram arranging the device of password according to an exemplary embodiment;
Fig. 3 B is a kind of block diagram arranging the device of password according to an exemplary embodiment;
Fig. 3 C is a kind of block diagram arranging the device of password according to an exemplary embodiment;
Fig. 4 is a kind of block diagram arranging the device of password according to an exemplary embodiment.
Embodiment
For making object of the present disclosure, technical scheme and advantage clearly understand, below in conjunction with embodiment and accompanying drawing, the disclosure is described in further details.At this, exemplary embodiment of the present disclosure and illustrating for explaining the disclosure, but not as to restriction of the present disclosure.
Disclosure embodiment provides a kind of method and the device that arrange password, is described in detail to the disclosure below in conjunction with accompanying drawing.
Fig. 1 is a kind of process flow diagram arranging the method for password according to an exemplary embodiment, and as shown in Figure 1, this method arranging password, in terminal, comprises the following steps:
In a step 101, receive instruction is arranged to the password of sensitive operation.
In a step 102, according at least one touch operation detected, obtain enciphered message, this enciphered message comprises the operation information of this at least one touch operation, and this operation information comprises at least one item in operation duration and operating force.
In step 103, this sensitive operation of corresponding stored and this enciphered message, using this enciphered message as being used for the password performing this sensitive operation.
The method that the present embodiment provides, by obtaining enciphered message according at least one in the operation duration of at least one touch operation detected and operating force, using enciphered message as being used for the password performing sensitive operation, user only need operate the cipher setting procedures and follow-up decrypting process that can complete sensitive operation according to this enciphered message triggers touch, simple and efficient to handle, and the movement range of touch operation is very little, is not easily seen by other users, improve cipher safety.
In another embodiment, at least one touch operation that this basis detects, obtains enciphered message, comprising:
Whenever touch operation being detected, obtain the operation information of the touch operation that current detection arrives;
When multiple touch operation being detected, according to detection sequencing, the operation information of the plurality of touch operation being sorted, obtains this enciphered message.
In another embodiment, the method also comprises:
Receive the instruction performing this sensitive operation;
According at least one the deciphering touch operation detected, obtain decryption information, this decryption information comprises the operation information of this at least one deciphering touch operation;
Judge whether this decryption information mates with this enciphered message;
When this decryption information mates with this enciphered message, perform this sensitive operation.
In another embodiment, this judges whether this decryption information mates with this enciphered message, comprising:
Obtain the first sequencing information of at least one decryption oprerations duration that this decryption information comprises and this at least one decryption oprerations duration;
Obtain the second sequencing information of at least one operation duration that this enciphered message comprises and this at least one operation duration;
Whether at least one operation duration is identical with this to judge this at least one decryption oprerations duration, and judges that whether this first sequencing information is identical with this second sequencing information;
If this at least one decryption oprerations duration is with this, at least one operation duration is identical, and this first sequencing information is identical with this second sequencing information, then determine whether this decryption information mates with this enciphered message.
In another embodiment, this judges whether this decryption information mates with this enciphered message, comprising:
Obtain the 3rd sequencing information of at least one decryption oprerations dynamics that this decryption information comprises and this at least one decryption oprerations dynamics;
4th sequencing information of at least one operating force that acquisition enciphered message comprises and this at least one operating force;
Judge that whether this at least one at least one operating force of decryption oprerations dynamics and this is identical, and judge that whether the 3rd sequencing information is identical with the 4th sequencing information;
If this at least one at least one operating force of decryption oprerations dynamics and this is identical, and the 3rd sequencing information is identical with the 4th sequencing information, then determine whether this decryption information mates with this enciphered message.
In another embodiment, the method also comprises:
By configuration touch display screen curtain and pressure transducer at least one item, detect this at least one touch operation.
Above-mentioned all alternatives, can adopt and combine arbitrarily formation embodiment of the present disclosure, this is no longer going to repeat them.
Fig. 2 is a kind of process flow diagram arranging the method for password according to an exemplary embodiment, and as shown in Figure 2, this method arranging password, in terminal, comprises the following steps:
In step 201, terminal receives and arranges instruction to the password of sensitive operation, according at least one touch operation detected, obtains enciphered message.
Wherein, this terminal can be the equipment such as computing machine, mobile phone, intelligent television, and this terminal can also for being configured with the touch screen terminal of touch display screen curtain or being configured with the terminal etc. of pressure transducer, the touch operation of user can be detected by the touch display screen curtain of configuration, or detected the touch operation of user by pressure transducer, the present embodiment does not limit this terminal.This sensitive operation refers to the operation relating to information security, and can comprise unlocking operation, start the operation, register, delivery operation etc. of application, can be determined according to demand for security by user, the present embodiment does not limit this.
In order to prevent other users from performing sensitive operation to this terminal, the user of terminal can arrange password for sensitive operation, but the password arranged is all simple character string usually, and be easy to be seen by other users when inputting, security is very poor.
In the present embodiment, consider that the movement range of touch operation is little, not easily seen by other users, this terminal can arrange the password of sensitive operation according to the touch operation of user, to improve security.When user wishes the password arranging sensitive operation, trigger and instruction is arranged to the password of sensitive operation, when terminal receives and arranges instruction to the password of sensitive operation, detect at least one touch operation of user, enciphered message is obtained, so that using the password of this enciphered message as sensitive operation according to this at least one touch operation.
Wherein, this terminal can show the password setting options of often kind of sensitive operation, user can click the password setting options of arbitrary sensitive operation, trigger and instruction is arranged to the password of this sensitive operation, or adopt other operations to trigger and arrange instruction to the password of this sensitive operation, the present embodiment does not limit the triggering mode that this password arranges instruction.
In addition, this at least one touch operation can comprise contact action or touch the operation etc. of other positions in this terminal except touch display screen curtain, this at least one touch operation can also comprise clicking operation, length by multiple action types such as operations, and the present embodiment does not all limit this.
This enciphered message comprises the operation information of this at least one touch operation, and this terminal by least one item in the touch display screen curtain of configuration and pressure transducer, can detect this at least one touch operation, obtain the operation information of each touch operation.Such as, when user triggers this touch operation, terminal can pass through touch display screen curtain or pressure transducer, obtain the duration that touch operation continues, be the operation duration of touch operation, or terminal can by the pressure transducer of configuration, detect dynamics used when user triggers this touch operation, be the operating force of touch operation.
Whenever a touch operation being detected, this terminal can obtain the operation information of the touch operation that current detection arrives, then when this terminal has detected multiple touch operation, according to detection sequencing, the operation information of the plurality of touch operation is sorted, namely the sequencing performing touch operation according to user sorts, and obtains this enciphered message.
The operation information of touch operation can comprise at least one item in operation duration and operating force, then the process obtaining this enciphered message can comprise the following steps any one in 2011 to 2013:
2011, whenever touch operation being detected, this terminal obtains the operation duration of the touch operation that current detection arrives, when multiple touch operation being detected, according to detection sequencing, the operation duration of the plurality of touch operation is sorted, obtains this enciphered message.
Such as, when user triggers three clicking operation, and the operation duration of first clicking operation be 1s, the operation duration of second clicking operation is 2s, the operation duration of the 3rd clicking operation is 3s, then the enciphered message that terminal gets can be as shown in table 1 below.
Table 1
1s | 2s | 3s |
Considering and obtain enciphered message according to the exact operations duration of touch operation, causing user will could successful decryption to perform touch operation in strict accordance with operating duration accurately when being decrypted, too high to the requirement of user.Then in order to reduce the requirement to user, the degree of accuracy of operation duration can also be reduced, the operation duration of touch operation is divided into multiple granularity, determine multiple operation duration, whenever touch operation being detected, terminal can obtain current detection to the operation duration of touch operation belong to any operation duration, when multiple touch operation being detected, according to detection sequencing, the operation duration of the plurality of touch operation is sorted, obtains this enciphered message.
Such as, based on the citing of table 1, operation duration is divided into " length ", " short " two kinds, operation duration be less than 3s then belong to operation duration shorter, operation duration be not less than 3s then belong to operation duration longer, then the enciphered message that terminal gets can be as shown in table 2 below.
Table 2
Short | Short | Long |
In addition, operation duration is known intuitively for the ease of user, when user's triggers touch operates, terminal can add up the operation duration of this touch operation, and showing this operation duration, user can check this operation duration, and decision will continue to trigger this touch operation, still lift finger, stop this touch operation.Certainly, during subsequent user deciphering, terminal also can show the operation duration of deciphering touch operation, does not repeat them here.
2012, whenever touch operation being detected, this terminal obtains the operating force of the touch operation that current detection arrives, when multiple touch operation being detected, according to detection sequencing, the operating force of the plurality of touch operation is sorted, obtains this enciphered message.
Considering and obtain enciphered message according to the exact operations dynamics of touch operation, causing user will could successful decryption to perform touch operation in strict accordance with operating force accurately when being decrypted, too high to the requirement of user.Then in order to reduce the requirement to user, the degree of accuracy of operating force can also be reduced, the operating force of touch operation is divided into multiple granularity, obtain multiple operating force, whenever touch operation being detected, terminal can obtain current detection to the operating force of touch operation belong to any operating force, when multiple touch operation being detected, according to detection sequencing, the operating force of the plurality of touch operation is sorted, obtains this enciphered message.
Such as, based on the citing of table 1, operating force is divided into " gently ", " weight " two kinds, user first triggers the lighter touch operation of a dynamics, then triggers the heavier touch operation of two dynamics, then the enciphered message that terminal gets can be as shown in table 3 below.
Table 3
Gently | Heavy | Heavy |
In addition, user can by repeatedly pressing the operation of pointing and lifting finger, trigger multiple touch operations of different operating dynamics, then this terminal can detect multiple touch operations of different operating dynamics, or user also can by once pressing the operation triggers touch operation of finger, in the process of this touch operation, repeatedly change operating force afterwards, then this terminal also can detect multiple touch operations of different operating dynamics.
Consider that user can lift finger between multiple touch operations of different operating dynamics, also can not lift finger, the process be operated between operation that user presses finger again that user after a touch operation being detected can be lifted finger by this terminal is the touch operation of " sky " as a kind of operating force.
Such as, operating force is divided into " gently ", " weight ", " sky " three scopes, user triggers the lighter touch operation of a dynamics, triggers again the heavier touch operation of a dynamics after lifting finger, then the enciphered message that terminal gets can be as shown in table 4 below.And if user triggers the lighter touch operation of a dynamics, increase pressing dynamics when not lifting finger, then the enciphered message that this terminal gets can be as shown in table 5 below.
Table 4
Gently | Empty | Heavy |
Table 5
Gently | Heavy |
2013, whenever touch operation being detected, this terminal obtains operation duration and the operating force of the touch operation that current detection arrives, when multiple touch operation being detected, according to detection sequencing, the operation duration of the plurality of touch operation and operating force are sorted, obtains this enciphered message.
Based on the citing of above-mentioned table 2 and table 3, user first triggers a touch operation that duration is shorter, dynamics is lighter, trigger a touch operation that duration is shorter, dynamics is heavier again, the touch operation that rear triggering duration is longer, dynamics is heavier, then the enciphered message that terminal gets can be as shown in table 6 below.
Table 6
Operation duration | Short | Short | Long |
Operating force | Gently | Heavy | Heavy |
If this terminal is according to the password of the operation duration of touch operation and operating force determination sensitive operation, then the touch operation of same operation duration different operating dynamics can regard different touch operations as, the touch operation of same operating force different operating duration also can regard different touch operations as, refinement has been carried out to touch operation, then using these different touch operations as the password of different sensitive operation, the diversity of password can be improved.
In step 202., this sensitive operation of terminal corresponding stored and this enciphered message, using the password of this enciphered message as this sensitive operation.
In order to the follow-up password to user's input is verified, this this sensitive operation of terminal corresponding stored and this enciphered message, using the password of this enciphered message as this sensitive operation.
For the multiple sensitive operation in terminal, this terminal can also set up cipher table, will often kind of sensitive operation and enciphered message corresponding stored in cipher table, when terminal receives the instruction performing arbitrary sensitive operation, the password of this sensitive operation can be obtained by inquiring about this cipher table.
In step 203, when terminal receives the instruction performing this sensitive operation, according at least one the deciphering touch operation detected, obtain decryption information.
When user triggers the instruction operation for performing this sensitive operation, terminal receives the instruction performing this sensitive operation, and now terminal can not directly perform this sensitive operation, but requires that user inputs the password of sensitive operation.Then user triggers at least one deciphering touch operation, this terminal can detect this at least one deciphering touch operation, and the operation information of at least one deciphering touch operation according to this, obtain decryption information, this decryption information comprises the operation information of this at least one deciphering touch operation.
Obtain the process obtaining enciphered message in the process of decryption information and above-mentioned steps 201 in step 203 similar, do not repeat them here.
In step 204, terminal obtains the enciphered message with this sensitive operation corresponding stored, judges whether this decryption information mates with this enciphered message.
Wherein, this step 204 can comprise the following steps any one in 2041 to 2043:
2041, obtain the first sequencing information of at least one decryption oprerations duration that this decryption information comprises and this at least one decryption oprerations duration, obtain the second sequencing information of at least one operation duration that this enciphered message comprises and this at least one operation duration, whether at least one operation duration is identical with this to judge this at least one decryption oprerations duration, and judge that whether this first sequencing information is identical with this second sequencing information, if this at least one decryption oprerations duration is with this, at least one operation duration is identical, and this first sequencing information is identical with this second sequencing information, then determine whether this decryption information mates with this enciphered message.
This decryption information comprises the sequencing information of at least one operation duration and this at least one operation duration, at least one then being comprised by this decryption information operates duration as decryption oprerations duration, using the sequencing information of this at least one decryption oprerations duration as the first sequencing information.This enciphered message comprises the sequencing information of at least one operation duration and at least one operation duration, then the sequencing information of at least one the operation duration this enciphered message comprised is as the second sequencing information.
If this decryption information is all identical with the operation duration in this enciphered message, and the sequence of operation duration is also identical, then determine that this decryption information mates with this enciphered message.And if this decryption information is different from the arbitrary operation duration in this enciphered message, or the sequence of operation duration is different, then determine that this decryption information does not mate with this enciphered message.
In practical application, this terminal can according to sequencing, first judge first decryption oprerations duration with first whether operate duration identical, if different, then determine that this decryption information does not mate with this enciphered message, if identical, then continue to judge second decryption oprerations duration with second whether operate duration identical, by that analogy, until when determine last decryption oprerations duration and last operate duration identical time, determine that this decryption information mates with this enciphered message.
2042, obtain the 3rd sequencing information of at least one decryption oprerations dynamics that this decryption information comprises and this at least one decryption oprerations dynamics, 4th sequencing information of at least one operating force that acquisition enciphered message comprises and this at least one operating force, judge that whether this at least one at least one operating force of decryption oprerations dynamics and this is identical, and judge that whether the 3rd sequencing information is identical with the 4th sequencing information, if this at least one at least one operating force of decryption oprerations dynamics and this is identical, and the 3rd sequencing information is identical with the 4th sequencing information, then determine whether this decryption information mates with this enciphered message.
2043, the first sequencing information of at least one decryption oprerations duration that this decryption information comprises and this at least one decryption oprerations duration is obtained, and the 3rd sequencing information of at least one decryption oprerations dynamics of comprising of decryption information and this at least one decryption oprerations dynamics, and obtain the second sequencing information of at least one operation duration that this enciphered message comprises and this at least one operation duration, and the 4th sequencing information of at least one operating force of comprising of enciphered message and this at least one operating force.
Whether at least one operation duration is identical with this to judge this at least one decryption oprerations duration, and judge that whether this first sequencing information is identical with this second sequencing information, judge that whether this at least one at least one operating force of decryption oprerations dynamics and this is identical, and judge that whether the 3rd sequencing information is identical with the 4th sequencing information, if this at least one decryption oprerations duration is with this, at least one operation duration is identical, this first sequencing information is identical with this second sequencing information, this at least one at least one operating force of decryption oprerations dynamics and this is identical, and the 3rd sequencing information is identical with the 4th sequencing information, then determine whether this decryption information mates with this enciphered message.
Process and the above-mentioned steps 2041 of above-mentioned steps 2042 and 2043 are similar, do not repeat them here.
In step 205, when terminal determines that this decryption information mates with this enciphered message, perform this sensitive operation.
If this decryption information mates with this enciphered message, represent that the password of user's input is correct, then terminal can perform this sensitive operation.And if this decryption information does not mate with this enciphered message, represent the code error of user's input, terminal can not perform sensitive operation, and now terminal can show code error information, and prompting user inputs password again.
With arrange compared with the password such as letter, numeral, the sequence of the operation information formation such as operating force, operation duration of touch operation user triggered in the present embodiment is as password, so user is when arranging password or being decrypted, only need trigger corresponding touch operation, and without the need to inputting password, simple and efficient to handle.And due to the movement range of touch operation very little, even if some user wants the action spying on this user also cannot know password accurately, improve cipher safety.
The method that the present embodiment provides, by obtaining enciphered message according at least one in the operation duration of at least one touch operation detected and operating force, using enciphered message as being used for the password performing sensitive operation, user only need operate the cipher setting procedures and follow-up decrypting process that can complete sensitive operation according to this enciphered message triggers touch, simple and efficient to handle, and the movement range of touch operation is very little, is not easily seen by other users, improve cipher safety.
Fig. 3 A is a kind of block diagram arranging the device of password according to an exemplary embodiment.See Fig. 3 A, this device comprises receiver module 301, the first acquisition module 302 and memory module 303.
Receiver module 301, arranges instruction for receiving to the password of sensitive operation;
First acquisition module 302, at least one touch operation that basis detects, obtain enciphered message, this enciphered message comprises the operation information of this at least one touch operation, and this operation information comprises at least one item in operation duration and operating force;
Memory module 303, for this sensitive operation of corresponding stored and this enciphered message, using the password of this enciphered message as this sensitive operation.
The device that the present embodiment provides, by obtaining enciphered message according at least one in the operation duration of at least one touch operation detected and operating force, using enciphered message as being used for the password performing sensitive operation, user only need operate the cipher setting procedures and follow-up decrypting process that can complete sensitive operation according to this enciphered message triggers touch, simple and efficient to handle, and the movement range of touch operation is very little, is not easily seen by other users, improve cipher safety.
In another embodiment, this first acquisition module 302, also for whenever touch operation being detected, obtains the operation information of the touch operation that current detection arrives; When multiple touch operation being detected, according to detection sequencing, the operation information of the plurality of touch operation being sorted, obtains this enciphered message.
See Fig. 3 B, in another embodiment, this device also comprises:
This receiver module 301, also for receiving the instruction performing this sensitive operation;
Second acquisition module 304, for deciphering touch operation according at least one detecting, obtains decryption information, and this decryption information comprises the operation information of this at least one deciphering touch operation;
Judge module 305, for judging whether this decryption information mates with this enciphered message;
Execution module 306, for when this decryption information mates with this enciphered message, performs this sensitive operation.
In another embodiment, this judge module 305 is also for obtaining first sequencing information of at least one decryption oprerations duration that this decryption information comprises and this at least one decryption oprerations duration; Obtain the second sequencing information of at least one operation duration that this enciphered message comprises and this at least one operation duration; Whether at least one operation duration is identical with this to judge this at least one decryption oprerations duration, and judges that whether this first sequencing information is identical with this second sequencing information; If this at least one decryption oprerations duration is with this, at least one operation duration is identical, and this first sequencing information is identical with this second sequencing information, then determine whether this decryption information mates with this enciphered message.
In another embodiment, this judge module 306 is also for obtaining the 3rd sequencing information of at least one decryption oprerations dynamics that this decryption information comprises and this at least one decryption oprerations dynamics; 4th sequencing information of at least one operating force that acquisition enciphered message comprises and this at least one operating force; Judge that whether this at least one at least one operating force of decryption oprerations dynamics and this is identical, and judge that whether the 3rd sequencing information is identical with the 4th sequencing information; If this at least one at least one operating force of decryption oprerations dynamics and this is identical, and the 3rd sequencing information is identical with the 4th sequencing information, then determine whether this decryption information mates with this enciphered message.
See Fig. 3 C, in another embodiment, it is characterized in that, this device also comprises:
Detection module 307, at least one item in the touch display screen curtain by configuring and pressure transducer, detects this at least one touch operation.
Above-mentioned all alternatives, can adopt and combine arbitrarily formation embodiment of the present disclosure, this is no longer going to repeat them.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations has been described in detail in about the embodiment of the method, will not elaborate explanation herein.
It should be noted that: the device of what above-described embodiment provided arranged password arrange password time, only be illustrated with the division of above-mentioned each functional module, in practical application, can distribute as required and by above-mentioned functions and be completed by different functional modules, inner structure by terminal is divided into different functional modules, to complete all or part of function described above.In addition, the device of what above-described embodiment provided arranged password belongs to same design with the embodiment of the method arranging password, and its specific implementation process refers to embodiment of the method, repeats no more here.
Fig. 4 is a kind of block diagram arranging the device 400 of password according to an exemplary embodiment.Such as, device 400 can be mobile phone, computing machine, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Fig. 4, device 400 can comprise following one or more assembly: processing components 402, storer 404, power supply module 406, multimedia groupware 408, audio-frequency assembly 410, the interface 412 of I/O (I/O), sensor module 414, and communications component 416.
The integrated operation of the usual control device 400 of processing components 402, such as with display, call, data communication, camera operation and record operate the operation be associated.Processing components 402 can comprise one or more processor 420 to perform instruction, to complete all or part of step of above-mentioned method.In addition, processing components 402 can comprise one or more module, and what be convenient between processing components 402 and other assemblies is mutual.Such as, processing components 402 can comprise multi-media module, mutual with what facilitate between multimedia groupware 408 and processing components 402.
Storer 404 is configured to store various types of data to be supported in the operation of device 400.The example of these data comprises for any application program of operation on device 400 or the instruction of method, contact data, telephone book data, message, picture, video etc.Storer 404 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), ROM (read-only memory) (ROM), magnetic store, flash memory, disk or CD.
The various assemblies that power supply module 406 is device 400 provide electric power.Power supply module 406 can comprise power-supply management system, one or more power supply, and other and the assembly generating, manage and distribute electric power for device 400 and be associated.
Multimedia groupware 408 is included in the screen providing an output interface between described device 400 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises one or more touch sensor with the gesture on sensing touch, slip and touch panel.Described touch sensor can the border of not only sensing touch or sliding action, but also detects the duration relevant to described touch or slide and pressure.In certain embodiments, multimedia groupware 408 comprises a front-facing camera and/or post-positioned pick-up head.When device 400 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 410 is configured to export and/or input audio signal.Such as, audio-frequency assembly 410 comprises a microphone (MIC), and when device 400 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The sound signal received can be stored in storer 404 further or be sent via communications component 416.In certain embodiments, audio-frequency assembly 410 also comprises a loudspeaker, for output audio signal.
I/O interface 412 is for providing interface between processing components 402 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor module 414 comprises one or more sensor, for providing the state estimation of various aspects for device 400.Such as, sensor module 414 can detect the opening/closing state of device 400, the relative positioning of assembly, such as described assembly is display and the keypad of device 400, the position of all right pick-up unit 400 of sensor module 414 or device 400 1 assemblies changes, the presence or absence that user contacts with device 400, the temperature variation of device 400 orientation or acceleration/deceleration and device 400.Sensor module 414 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor module 414 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor module 414 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 416 is configured to the communication being convenient to wired or wireless mode between device 400 and other equipment.Device 400 can access the wireless network based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communications component 416 receives from the broadcast singal of external broadcasting management system or broadcast related information via broadcast channel.In one exemplary embodiment, described communications component 416 also comprises near-field communication (NFC) module, to promote junction service.Such as, can based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 400 can be realized, for performing the above-mentioned method arranging password by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD) (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium comprising instruction, such as, comprise the storer 404 of instruction, above-mentioned instruction can perform said method by the processor 420 of device 400.Such as, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc.
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is performed by the processor of mobile terminal, makes mobile terminal can perform the above-mentioned method arranging password.
Those skilled in the art, at consideration instructions and after putting into practice invention disclosed herein, will easily expect other embodiment of the present disclosure.The application is intended to contain any modification of the present disclosure, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present disclosure and comprised the undocumented common practise in the art of the disclosure or conventional techniques means.Instructions and embodiment are only regarded as exemplary, and true scope of the present disclosure and spirit are pointed out by claim below.
Should be understood that, the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendment and change not departing from its scope.The scope of the present disclosure is only limited by appended claim.
Claims (13)
1. arrange a method for password, it is characterized in that, described method comprises:
Receive and instruction is arranged to the password of sensitive operation;
According at least one touch operation detected, obtain enciphered message, described enciphered message comprises the operation information of at least one touch operation described, and described operation information comprises at least one item in operation duration and operating force;
Sensitive operation described in corresponding stored and described enciphered message, using the password of described enciphered message as described sensitive operation.
2. method according to claim 1, is characterized in that, at least one touch operation that described basis detects, obtains enciphered message, comprising:
Whenever touch operation being detected, obtain the operation information of the touch operation that current detection arrives;
When multiple touch operation being detected, according to detection sequencing, the operation information of described multiple touch operation being sorted, obtains described enciphered message.
3. method according to claim 1, is characterized in that, described method also comprises:
Receive the instruction performing described sensitive operation;
According at least one the deciphering touch operation detected, obtain decryption information, described decryption information comprises the operation information of at least one deciphering touch operation described;
Judge whether described decryption information mates with described enciphered message;
When described decryption information mates with described enciphered message, perform described sensitive operation.
4. method according to claim 3, is characterized in that, describedly judges whether described decryption information mates with described enciphered message, comprising:
Obtain the first sequencing information of at least one decryption oprerations duration that described decryption information comprises and at least one decryption oprerations duration described;
Obtain the second sequencing information of at least one operation duration that described enciphered message comprises and at least one operation duration described;
Judge at least one decryption oprerations duration described with described at least one whether operate duration identical, and judge that whether described first sequencing information identical with described second sequencing information;
If at least one decryption oprerations duration described with described at least one to operate duration identical, and described first sequencing information is identical with described second sequencing information, then determine whether described decryption information mates with described enciphered message.
5. method according to claim 3, is characterized in that, describedly judges whether described decryption information mates with described enciphered message, comprising:
Obtain the 3rd sequencing information of at least one decryption oprerations dynamics that described decryption information comprises and at least one decryption oprerations dynamics described;
4th sequencing information of at least one operating force that acquisition enciphered message comprises and at least one operating force described;
Judge that whether at least one decryption oprerations dynamics described is identical with at least one operating force described, and judge that whether described 3rd sequencing information is identical with described 4th sequencing information;
If at least one decryption oprerations dynamics described is identical with at least one operating force described, and described 3rd sequencing information is identical with described 4th sequencing information, then determine whether described decryption information mates with described enciphered message.
6. the method according to any one of claim 1-5, is characterized in that, described method also comprises:
By at least one item in the touch display screen curtain of configuration and pressure transducer, detect at least one touch operation described.
7. arrange a device for password, it is characterized in that, described device comprises:
Receiver module, arranges instruction for receiving to the password of sensitive operation;
First acquisition module, for according at least one touch operation detected, obtains enciphered message, and described enciphered message comprises the operation information of at least one touch operation described, and described operation information comprises at least one item in operation duration and operating force;
Memory module, for sensitive operation described in corresponding stored and described enciphered message, using the password of described enciphered message as described sensitive operation.
8. device according to claim 7, is characterized in that, described first acquisition module, also for whenever touch operation being detected, obtains the operation information of the touch operation that current detection arrives; When multiple touch operation being detected, according to detection sequencing, the operation information of described multiple touch operation being sorted, obtains described enciphered message.
9. device according to claim 7, is characterized in that, described device also comprises:
Described receiver module, also for receiving the instruction performing described sensitive operation;
Second acquisition module, for according at least one the deciphering touch operation detected, obtain decryption information, described decryption information comprises the operation information of at least one deciphering touch operation described;
Judge module, for judging whether described decryption information mates with described enciphered message;
Execution module, for when described decryption information mates with described enciphered message, performs described sensitive operation.
10. device according to claim 9, is characterized in that, described judge module is also for obtaining first sequencing information of at least one decryption oprerations duration that described decryption information comprises and at least one decryption oprerations duration described; Obtain the second sequencing information of at least one operation duration that described enciphered message comprises and at least one operation duration described; Judge at least one decryption oprerations duration described with described at least one whether operate duration identical, and judge that whether described first sequencing information identical with described second sequencing information; If at least one decryption oprerations duration described with described at least one to operate duration identical, and described first sequencing information is identical with described second sequencing information, then determine whether described decryption information mates with described enciphered message.
11. devices according to claim 9, is characterized in that, described judge module is also for obtaining the 3rd sequencing information of at least one decryption oprerations dynamics that described decryption information comprises and at least one decryption oprerations dynamics described; 4th sequencing information of at least one operating force that acquisition enciphered message comprises and at least one operating force described; Judge that whether at least one decryption oprerations dynamics described is identical with at least one operating force described, and judge that whether described 3rd sequencing information is identical with described 4th sequencing information; If at least one decryption oprerations dynamics described is identical with at least one operating force described, and described 3rd sequencing information is identical with described 4th sequencing information, then determine whether described decryption information mates with described enciphered message.
12. devices according to any one of claim 7-11, it is characterized in that, described device also comprises:
Detection module, at least one item in the touch display screen curtain by configuring and pressure transducer, detects at least one touch operation described.
13. 1 kinds of devices arranging password, is characterized in that, comprising:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
Receive and instruction is arranged to the password of sensitive operation;
According at least one touch operation detected, obtain enciphered message, described enciphered message comprises the operation information of at least one touch operation described, and described operation information comprises at least one item in operation duration and operating force;
Sensitive operation described in corresponding stored and described enciphered message, using the password of described enciphered message as described sensitive operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510884212.5A CN105447358A (en) | 2015-12-04 | 2015-12-04 | Password setting method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510884212.5A CN105447358A (en) | 2015-12-04 | 2015-12-04 | Password setting method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105447358A true CN105447358A (en) | 2016-03-30 |
Family
ID=55557527
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510884212.5A Pending CN105447358A (en) | 2015-12-04 | 2015-12-04 | Password setting method and apparatus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105447358A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107450834A (en) * | 2017-07-26 | 2017-12-08 | 珠海市魅族科技有限公司 | A kind of method, apparatus of data deciphering, computer installation and computer-readable storage medium |
CN111460405A (en) * | 2020-03-17 | 2020-07-28 | 福建升腾资讯有限公司 | Method, device, equipment and medium for enabling equipment outside cabinet to enter background setting |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102203794A (en) * | 2011-06-01 | 2011-09-28 | 华为终端有限公司 | A terminal authentication method and a device thereof |
CN103279714A (en) * | 2013-06-19 | 2013-09-04 | 深圳市中兴移动通信有限公司 | Mobile terminal as well as data encryption and decryption method |
US20140002388A1 (en) * | 2012-06-29 | 2014-01-02 | Apple Inc. | Biometric Initiated Communication |
CN104318138A (en) * | 2014-09-30 | 2015-01-28 | 杭州同盾科技有限公司 | Method and device for verifying identity of user |
CN105069347A (en) * | 2015-08-27 | 2015-11-18 | 广东欧珀移动通信有限公司 | Unlocking method and terminal |
-
2015
- 2015-12-04 CN CN201510884212.5A patent/CN105447358A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102203794A (en) * | 2011-06-01 | 2011-09-28 | 华为终端有限公司 | A terminal authentication method and a device thereof |
US20140002388A1 (en) * | 2012-06-29 | 2014-01-02 | Apple Inc. | Biometric Initiated Communication |
CN103279714A (en) * | 2013-06-19 | 2013-09-04 | 深圳市中兴移动通信有限公司 | Mobile terminal as well as data encryption and decryption method |
CN104318138A (en) * | 2014-09-30 | 2015-01-28 | 杭州同盾科技有限公司 | Method and device for verifying identity of user |
CN105069347A (en) * | 2015-08-27 | 2015-11-18 | 广东欧珀移动通信有限公司 | Unlocking method and terminal |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107450834A (en) * | 2017-07-26 | 2017-12-08 | 珠海市魅族科技有限公司 | A kind of method, apparatus of data deciphering, computer installation and computer-readable storage medium |
CN111460405A (en) * | 2020-03-17 | 2020-07-28 | 福建升腾资讯有限公司 | Method, device, equipment and medium for enabling equipment outside cabinet to enter background setting |
CN111460405B (en) * | 2020-03-17 | 2023-06-30 | 福建升腾资讯有限公司 | Method, device, equipment and medium for enabling external equipment of cabinet to enter background setting |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104991789B (en) | Application program open method and device | |
CN104503689A (en) | Method and device for displaying application interface | |
CN104866750A (en) | Method and device for starting application | |
CN105224195A (en) | Terminal operation method and device | |
CN105159559A (en) | Mobile terminal control method and mobile terminal | |
CN105160239A (en) | Application program access restriction method and apparatus | |
CN104794382A (en) | Application starting method and device | |
CN103914634A (en) | Image encryption method, image encryption device and electronic device | |
CN104537365A (en) | Touch key and fingerprint identification implementation method and device and terminal equipment | |
CN106097494A (en) | The method for unlocking of smart lock and device | |
CN104732201A (en) | Touch key press and fingerprint identification implementation device and method, and terminal device | |
CN104238912A (en) | Application control method and application control device | |
CN104571709B (en) | The processing method of mobile terminal and virtual key | |
CN105487805A (en) | Object operating method and device | |
CN105094318A (en) | Mode switching method and apparatus | |
CN104331228A (en) | Screen locking method and device | |
CN104461282A (en) | Key processing method, key processing device and key processing equipment | |
CN105160216A (en) | Unlocking method and apparatus and terminal | |
CN105407070A (en) | Logging-in authorization method and device | |
CN104965645A (en) | Unlocking method and apparatus | |
CN104391712A (en) | Shutdown method and device | |
CN104298902B (en) | A kind of display methods of application program, device and equipment | |
CN108022349A (en) | Information input method, equipment, smart lock and storage medium | |
CN104899501A (en) | Dialog list display method and device and terminal | |
CN105893854B (en) | Encryption and decryption method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160330 |
|
RJ01 | Rejection of invention patent application after publication |