CN105447358A - Password setting method and apparatus - Google Patents

Password setting method and apparatus Download PDF

Info

Publication number
CN105447358A
CN105447358A CN201510884212.5A CN201510884212A CN105447358A CN 105447358 A CN105447358 A CN 105447358A CN 201510884212 A CN201510884212 A CN 201510884212A CN 105447358 A CN105447358 A CN 105447358A
Authority
CN
China
Prior art keywords
information
enciphered message
decryption
duration
touch operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510884212.5A
Other languages
Chinese (zh)
Inventor
江波
韩春杰
任明月
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510884212.5A priority Critical patent/CN105447358A/en
Publication of CN105447358A publication Critical patent/CN105447358A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention relates to a password setting method and apparatus, and belongs to the field of information security. The method comprises: receiving a password setting instruction of sensitive operation; according to at least one detected touch operation, obtaining encrypted information, wherein the encrypted information includes operation information of the at least one touch operation, and the operation information comprises at least one of operation duration and operation force; and correspondingly storing the sensitive operation and the encrypted information, and taking the encrypted information as a password of the sensitive operation. According to the password setting method and apparatus, a user can finish a password setting process and a subsequent decryption process for the sensitive operation only by triggering the touch operation according to the encrypted information, so that the operation is simple, convenient and fast; and the action range of the touch operation is very small, so that the touch operation is difficultly seen by other users and the password security is improved.

Description

Method and the device of password are set
Technical field
The disclosure is directed to information security field, specifically about a kind of method and the device that arrange password.
Background technology
Along with the development of intelligent terminal technology and universal, in terminal, executable operation gets more and more, and some operation wherein may relate to the information security issue of user, then in order to ensure security, can be encrypted some sensitive operation.
Usual user is when arranging the password of sensitive operation, and can input a character string, this character string can comprise numeral, letter, underscore etc., and the character string that user can input by terminal is as the password of sensitive operation.In subsequent process, when user wishes to perform sensitive operation, can input same character string, terminal can allow to perform this sensitive operation after determining that the character string of input is correct.
Summary of the invention
In order to solve Problems existing in correlation technique, present disclose provides a kind of method and device that password is set.Described technical scheme is as follows:
According to the first aspect of disclosure embodiment, provide a kind of method arranging password, described method comprises:
Receive and instruction is arranged to the password of sensitive operation;
According at least one touch operation detected, obtain enciphered message, described enciphered message comprises the operation information of at least one touch operation described, and described operation information comprises at least one item in operation duration and operating force;
Sensitive operation described in corresponding stored and described enciphered message, using the password of described enciphered message as described sensitive operation.
In another embodiment, at least one touch operation that described basis detects, obtains enciphered message, comprising:
Whenever touch operation being detected, obtain the operation information of the touch operation that current detection arrives;
When multiple touch operation being detected, according to detection sequencing, the operation information of described multiple touch operation being sorted, obtains described enciphered message.
In another embodiment, described method also comprises:
Receive the instruction performing described sensitive operation;
According at least one the deciphering touch operation detected, obtain decryption information, described decryption information comprises the operation information of at least one deciphering touch operation described;
Judge whether described decryption information mates with described enciphered message;
When described decryption information mates with described enciphered message, perform described sensitive operation.
In another embodiment, describedly judge whether described decryption information mates with described enciphered message, comprising:
Obtain the first sequencing information of at least one decryption oprerations duration that described decryption information comprises and at least one decryption oprerations duration described;
Obtain the second sequencing information of at least one operation duration that described enciphered message comprises and at least one operation duration described;
Judge at least one decryption oprerations duration described with described at least one whether operate duration identical, and judge that whether described first sequencing information identical with described second sequencing information;
If at least one decryption oprerations duration described with described at least one to operate duration identical, and described first sequencing information is identical with described second sequencing information, then determine whether described decryption information mates with described enciphered message.
In another embodiment, describedly judge whether described decryption information mates with described enciphered message, comprising:
Obtain the 3rd sequencing information of at least one decryption oprerations dynamics that described decryption information comprises and at least one decryption oprerations dynamics described;
4th sequencing information of at least one operating force that acquisition enciphered message comprises and at least one operating force described;
Judge that whether at least one decryption oprerations dynamics described is identical with at least one operating force described, and judge that whether described 3rd sequencing information is identical with described 4th sequencing information;
If at least one decryption oprerations dynamics described is identical with at least one operating force described, and described 3rd sequencing information is identical with described 4th sequencing information, then determine whether described decryption information mates with described enciphered message.
In another embodiment, described method also comprises:
By at least one item in the touch display screen curtain of configuration and pressure transducer, detect at least one touch operation described.
According to the second aspect of disclosure embodiment, provide a kind of device arranging password, described device comprises:
Receiver module, arranges instruction for receiving to the password of sensitive operation;
First acquisition module, for according at least one touch operation detected, obtains enciphered message, and described enciphered message comprises the operation information of at least one touch operation described, and described operation information comprises at least one item in operation duration and operating force;
Memory module, for sensitive operation described in corresponding stored and described enciphered message, using the password of described enciphered message as described sensitive operation.
In another embodiment, described first acquisition module, also for whenever touch operation being detected, obtains the operation information of the touch operation that current detection arrives; When multiple touch operation being detected, according to detection sequencing, the operation information of described multiple touch operation being sorted, obtains described enciphered message.
In another embodiment, described device also comprises:
Described receiver module, also for receiving the instruction performing described sensitive operation;
Second acquisition module, for according at least one the deciphering touch operation detected, obtain decryption information, described decryption information comprises the operation information of at least one deciphering touch operation described;
Judge module, for judging whether described decryption information mates with described enciphered message;
Execution module, for when described decryption information mates with described enciphered message, performs described sensitive operation.
In another embodiment, described judge module is also for obtaining first sequencing information of at least one decryption oprerations duration that described decryption information comprises and at least one decryption oprerations duration described; Obtain the second sequencing information of at least one operation duration that described enciphered message comprises and at least one operation duration described; Judge at least one decryption oprerations duration described with described at least one whether operate duration identical, and judge that whether described first sequencing information identical with described second sequencing information; If at least one decryption oprerations duration described with described at least one to operate duration identical, and described first sequencing information is identical with described second sequencing information, then determine whether described decryption information mates with described enciphered message.
In another embodiment, described judge module is also for obtaining the 3rd sequencing information of at least one decryption oprerations dynamics that described decryption information comprises and at least one decryption oprerations dynamics described; 4th sequencing information of at least one operating force that acquisition enciphered message comprises and at least one operating force described; Judge that whether at least one decryption oprerations dynamics described is identical with at least one operating force described, and judge that whether described 3rd sequencing information is identical with described 4th sequencing information; If at least one decryption oprerations dynamics described is identical with at least one operating force described, and described 3rd sequencing information is identical with described 4th sequencing information, then determine whether described decryption information mates with described enciphered message.
In another embodiment, described device also comprises:
Detection module, at least one item in the touch display screen curtain by configuring and pressure transducer, detects at least one touch operation described.
According to the third aspect of disclosure embodiment, provide a kind of device arranging password, described device comprises:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
Receive and instruction is arranged to the password of sensitive operation;
According at least one touch operation detected, obtain enciphered message, described enciphered message comprises the operation information of at least one touch operation described, and described operation information comprises at least one item in operation duration and operating force;
Sensitive operation described in corresponding stored and described enciphered message, using the password of described enciphered message as described sensitive operation.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect:
The method that the present embodiment provides and device, by obtaining enciphered message according at least one in the operation duration of at least one touch operation detected and operating force, using enciphered message as being used for the password performing sensitive operation, user only need operate the cipher setting procedures and follow-up decrypting process that can complete sensitive operation according to this enciphered message triggers touch, simple and efficient to handle, and the movement range of touch operation is very little, is not easily seen by other users, improve cipher safety.
Should be understood that, it is only exemplary that above general description and details hereinafter describe, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing to be herein merged in instructions and to form the part of this instructions, shows and meets embodiment of the present disclosure, and is used from instructions one and explains principle of the present disclosure.
Fig. 1 is a kind of process flow diagram arranging the method for password according to an exemplary embodiment;
Fig. 2 is a kind of process flow diagram arranging the method for password according to an exemplary embodiment;
Fig. 3 A is a kind of block diagram arranging the device of password according to an exemplary embodiment;
Fig. 3 B is a kind of block diagram arranging the device of password according to an exemplary embodiment;
Fig. 3 C is a kind of block diagram arranging the device of password according to an exemplary embodiment;
Fig. 4 is a kind of block diagram arranging the device of password according to an exemplary embodiment.
Embodiment
For making object of the present disclosure, technical scheme and advantage clearly understand, below in conjunction with embodiment and accompanying drawing, the disclosure is described in further details.At this, exemplary embodiment of the present disclosure and illustrating for explaining the disclosure, but not as to restriction of the present disclosure.
Disclosure embodiment provides a kind of method and the device that arrange password, is described in detail to the disclosure below in conjunction with accompanying drawing.
Fig. 1 is a kind of process flow diagram arranging the method for password according to an exemplary embodiment, and as shown in Figure 1, this method arranging password, in terminal, comprises the following steps:
In a step 101, receive instruction is arranged to the password of sensitive operation.
In a step 102, according at least one touch operation detected, obtain enciphered message, this enciphered message comprises the operation information of this at least one touch operation, and this operation information comprises at least one item in operation duration and operating force.
In step 103, this sensitive operation of corresponding stored and this enciphered message, using this enciphered message as being used for the password performing this sensitive operation.
The method that the present embodiment provides, by obtaining enciphered message according at least one in the operation duration of at least one touch operation detected and operating force, using enciphered message as being used for the password performing sensitive operation, user only need operate the cipher setting procedures and follow-up decrypting process that can complete sensitive operation according to this enciphered message triggers touch, simple and efficient to handle, and the movement range of touch operation is very little, is not easily seen by other users, improve cipher safety.
In another embodiment, at least one touch operation that this basis detects, obtains enciphered message, comprising:
Whenever touch operation being detected, obtain the operation information of the touch operation that current detection arrives;
When multiple touch operation being detected, according to detection sequencing, the operation information of the plurality of touch operation being sorted, obtains this enciphered message.
In another embodiment, the method also comprises:
Receive the instruction performing this sensitive operation;
According at least one the deciphering touch operation detected, obtain decryption information, this decryption information comprises the operation information of this at least one deciphering touch operation;
Judge whether this decryption information mates with this enciphered message;
When this decryption information mates with this enciphered message, perform this sensitive operation.
In another embodiment, this judges whether this decryption information mates with this enciphered message, comprising:
Obtain the first sequencing information of at least one decryption oprerations duration that this decryption information comprises and this at least one decryption oprerations duration;
Obtain the second sequencing information of at least one operation duration that this enciphered message comprises and this at least one operation duration;
Whether at least one operation duration is identical with this to judge this at least one decryption oprerations duration, and judges that whether this first sequencing information is identical with this second sequencing information;
If this at least one decryption oprerations duration is with this, at least one operation duration is identical, and this first sequencing information is identical with this second sequencing information, then determine whether this decryption information mates with this enciphered message.
In another embodiment, this judges whether this decryption information mates with this enciphered message, comprising:
Obtain the 3rd sequencing information of at least one decryption oprerations dynamics that this decryption information comprises and this at least one decryption oprerations dynamics;
4th sequencing information of at least one operating force that acquisition enciphered message comprises and this at least one operating force;
Judge that whether this at least one at least one operating force of decryption oprerations dynamics and this is identical, and judge that whether the 3rd sequencing information is identical with the 4th sequencing information;
If this at least one at least one operating force of decryption oprerations dynamics and this is identical, and the 3rd sequencing information is identical with the 4th sequencing information, then determine whether this decryption information mates with this enciphered message.
In another embodiment, the method also comprises:
By configuration touch display screen curtain and pressure transducer at least one item, detect this at least one touch operation.
Above-mentioned all alternatives, can adopt and combine arbitrarily formation embodiment of the present disclosure, this is no longer going to repeat them.
Fig. 2 is a kind of process flow diagram arranging the method for password according to an exemplary embodiment, and as shown in Figure 2, this method arranging password, in terminal, comprises the following steps:
In step 201, terminal receives and arranges instruction to the password of sensitive operation, according at least one touch operation detected, obtains enciphered message.
Wherein, this terminal can be the equipment such as computing machine, mobile phone, intelligent television, and this terminal can also for being configured with the touch screen terminal of touch display screen curtain or being configured with the terminal etc. of pressure transducer, the touch operation of user can be detected by the touch display screen curtain of configuration, or detected the touch operation of user by pressure transducer, the present embodiment does not limit this terminal.This sensitive operation refers to the operation relating to information security, and can comprise unlocking operation, start the operation, register, delivery operation etc. of application, can be determined according to demand for security by user, the present embodiment does not limit this.
In order to prevent other users from performing sensitive operation to this terminal, the user of terminal can arrange password for sensitive operation, but the password arranged is all simple character string usually, and be easy to be seen by other users when inputting, security is very poor.
In the present embodiment, consider that the movement range of touch operation is little, not easily seen by other users, this terminal can arrange the password of sensitive operation according to the touch operation of user, to improve security.When user wishes the password arranging sensitive operation, trigger and instruction is arranged to the password of sensitive operation, when terminal receives and arranges instruction to the password of sensitive operation, detect at least one touch operation of user, enciphered message is obtained, so that using the password of this enciphered message as sensitive operation according to this at least one touch operation.
Wherein, this terminal can show the password setting options of often kind of sensitive operation, user can click the password setting options of arbitrary sensitive operation, trigger and instruction is arranged to the password of this sensitive operation, or adopt other operations to trigger and arrange instruction to the password of this sensitive operation, the present embodiment does not limit the triggering mode that this password arranges instruction.
In addition, this at least one touch operation can comprise contact action or touch the operation etc. of other positions in this terminal except touch display screen curtain, this at least one touch operation can also comprise clicking operation, length by multiple action types such as operations, and the present embodiment does not all limit this.
This enciphered message comprises the operation information of this at least one touch operation, and this terminal by least one item in the touch display screen curtain of configuration and pressure transducer, can detect this at least one touch operation, obtain the operation information of each touch operation.Such as, when user triggers this touch operation, terminal can pass through touch display screen curtain or pressure transducer, obtain the duration that touch operation continues, be the operation duration of touch operation, or terminal can by the pressure transducer of configuration, detect dynamics used when user triggers this touch operation, be the operating force of touch operation.
Whenever a touch operation being detected, this terminal can obtain the operation information of the touch operation that current detection arrives, then when this terminal has detected multiple touch operation, according to detection sequencing, the operation information of the plurality of touch operation is sorted, namely the sequencing performing touch operation according to user sorts, and obtains this enciphered message.
The operation information of touch operation can comprise at least one item in operation duration and operating force, then the process obtaining this enciphered message can comprise the following steps any one in 2011 to 2013:
2011, whenever touch operation being detected, this terminal obtains the operation duration of the touch operation that current detection arrives, when multiple touch operation being detected, according to detection sequencing, the operation duration of the plurality of touch operation is sorted, obtains this enciphered message.
Such as, when user triggers three clicking operation, and the operation duration of first clicking operation be 1s, the operation duration of second clicking operation is 2s, the operation duration of the 3rd clicking operation is 3s, then the enciphered message that terminal gets can be as shown in table 1 below.
Table 1
1s 2s 3s
Considering and obtain enciphered message according to the exact operations duration of touch operation, causing user will could successful decryption to perform touch operation in strict accordance with operating duration accurately when being decrypted, too high to the requirement of user.Then in order to reduce the requirement to user, the degree of accuracy of operation duration can also be reduced, the operation duration of touch operation is divided into multiple granularity, determine multiple operation duration, whenever touch operation being detected, terminal can obtain current detection to the operation duration of touch operation belong to any operation duration, when multiple touch operation being detected, according to detection sequencing, the operation duration of the plurality of touch operation is sorted, obtains this enciphered message.
Such as, based on the citing of table 1, operation duration is divided into " length ", " short " two kinds, operation duration be less than 3s then belong to operation duration shorter, operation duration be not less than 3s then belong to operation duration longer, then the enciphered message that terminal gets can be as shown in table 2 below.
Table 2
Short Short Long
In addition, operation duration is known intuitively for the ease of user, when user's triggers touch operates, terminal can add up the operation duration of this touch operation, and showing this operation duration, user can check this operation duration, and decision will continue to trigger this touch operation, still lift finger, stop this touch operation.Certainly, during subsequent user deciphering, terminal also can show the operation duration of deciphering touch operation, does not repeat them here.
2012, whenever touch operation being detected, this terminal obtains the operating force of the touch operation that current detection arrives, when multiple touch operation being detected, according to detection sequencing, the operating force of the plurality of touch operation is sorted, obtains this enciphered message.
Considering and obtain enciphered message according to the exact operations dynamics of touch operation, causing user will could successful decryption to perform touch operation in strict accordance with operating force accurately when being decrypted, too high to the requirement of user.Then in order to reduce the requirement to user, the degree of accuracy of operating force can also be reduced, the operating force of touch operation is divided into multiple granularity, obtain multiple operating force, whenever touch operation being detected, terminal can obtain current detection to the operating force of touch operation belong to any operating force, when multiple touch operation being detected, according to detection sequencing, the operating force of the plurality of touch operation is sorted, obtains this enciphered message.
Such as, based on the citing of table 1, operating force is divided into " gently ", " weight " two kinds, user first triggers the lighter touch operation of a dynamics, then triggers the heavier touch operation of two dynamics, then the enciphered message that terminal gets can be as shown in table 3 below.
Table 3
Gently Heavy Heavy
In addition, user can by repeatedly pressing the operation of pointing and lifting finger, trigger multiple touch operations of different operating dynamics, then this terminal can detect multiple touch operations of different operating dynamics, or user also can by once pressing the operation triggers touch operation of finger, in the process of this touch operation, repeatedly change operating force afterwards, then this terminal also can detect multiple touch operations of different operating dynamics.
Consider that user can lift finger between multiple touch operations of different operating dynamics, also can not lift finger, the process be operated between operation that user presses finger again that user after a touch operation being detected can be lifted finger by this terminal is the touch operation of " sky " as a kind of operating force.
Such as, operating force is divided into " gently ", " weight ", " sky " three scopes, user triggers the lighter touch operation of a dynamics, triggers again the heavier touch operation of a dynamics after lifting finger, then the enciphered message that terminal gets can be as shown in table 4 below.And if user triggers the lighter touch operation of a dynamics, increase pressing dynamics when not lifting finger, then the enciphered message that this terminal gets can be as shown in table 5 below.
Table 4
Gently Empty Heavy
Table 5
Gently Heavy
2013, whenever touch operation being detected, this terminal obtains operation duration and the operating force of the touch operation that current detection arrives, when multiple touch operation being detected, according to detection sequencing, the operation duration of the plurality of touch operation and operating force are sorted, obtains this enciphered message.
Based on the citing of above-mentioned table 2 and table 3, user first triggers a touch operation that duration is shorter, dynamics is lighter, trigger a touch operation that duration is shorter, dynamics is heavier again, the touch operation that rear triggering duration is longer, dynamics is heavier, then the enciphered message that terminal gets can be as shown in table 6 below.
Table 6
Operation duration Short Short Long
Operating force Gently Heavy Heavy
If this terminal is according to the password of the operation duration of touch operation and operating force determination sensitive operation, then the touch operation of same operation duration different operating dynamics can regard different touch operations as, the touch operation of same operating force different operating duration also can regard different touch operations as, refinement has been carried out to touch operation, then using these different touch operations as the password of different sensitive operation, the diversity of password can be improved.
In step 202., this sensitive operation of terminal corresponding stored and this enciphered message, using the password of this enciphered message as this sensitive operation.
In order to the follow-up password to user's input is verified, this this sensitive operation of terminal corresponding stored and this enciphered message, using the password of this enciphered message as this sensitive operation.
For the multiple sensitive operation in terminal, this terminal can also set up cipher table, will often kind of sensitive operation and enciphered message corresponding stored in cipher table, when terminal receives the instruction performing arbitrary sensitive operation, the password of this sensitive operation can be obtained by inquiring about this cipher table.
In step 203, when terminal receives the instruction performing this sensitive operation, according at least one the deciphering touch operation detected, obtain decryption information.
When user triggers the instruction operation for performing this sensitive operation, terminal receives the instruction performing this sensitive operation, and now terminal can not directly perform this sensitive operation, but requires that user inputs the password of sensitive operation.Then user triggers at least one deciphering touch operation, this terminal can detect this at least one deciphering touch operation, and the operation information of at least one deciphering touch operation according to this, obtain decryption information, this decryption information comprises the operation information of this at least one deciphering touch operation.
Obtain the process obtaining enciphered message in the process of decryption information and above-mentioned steps 201 in step 203 similar, do not repeat them here.
In step 204, terminal obtains the enciphered message with this sensitive operation corresponding stored, judges whether this decryption information mates with this enciphered message.
Wherein, this step 204 can comprise the following steps any one in 2041 to 2043:
2041, obtain the first sequencing information of at least one decryption oprerations duration that this decryption information comprises and this at least one decryption oprerations duration, obtain the second sequencing information of at least one operation duration that this enciphered message comprises and this at least one operation duration, whether at least one operation duration is identical with this to judge this at least one decryption oprerations duration, and judge that whether this first sequencing information is identical with this second sequencing information, if this at least one decryption oprerations duration is with this, at least one operation duration is identical, and this first sequencing information is identical with this second sequencing information, then determine whether this decryption information mates with this enciphered message.
This decryption information comprises the sequencing information of at least one operation duration and this at least one operation duration, at least one then being comprised by this decryption information operates duration as decryption oprerations duration, using the sequencing information of this at least one decryption oprerations duration as the first sequencing information.This enciphered message comprises the sequencing information of at least one operation duration and at least one operation duration, then the sequencing information of at least one the operation duration this enciphered message comprised is as the second sequencing information.
If this decryption information is all identical with the operation duration in this enciphered message, and the sequence of operation duration is also identical, then determine that this decryption information mates with this enciphered message.And if this decryption information is different from the arbitrary operation duration in this enciphered message, or the sequence of operation duration is different, then determine that this decryption information does not mate with this enciphered message.
In practical application, this terminal can according to sequencing, first judge first decryption oprerations duration with first whether operate duration identical, if different, then determine that this decryption information does not mate with this enciphered message, if identical, then continue to judge second decryption oprerations duration with second whether operate duration identical, by that analogy, until when determine last decryption oprerations duration and last operate duration identical time, determine that this decryption information mates with this enciphered message.
2042, obtain the 3rd sequencing information of at least one decryption oprerations dynamics that this decryption information comprises and this at least one decryption oprerations dynamics, 4th sequencing information of at least one operating force that acquisition enciphered message comprises and this at least one operating force, judge that whether this at least one at least one operating force of decryption oprerations dynamics and this is identical, and judge that whether the 3rd sequencing information is identical with the 4th sequencing information, if this at least one at least one operating force of decryption oprerations dynamics and this is identical, and the 3rd sequencing information is identical with the 4th sequencing information, then determine whether this decryption information mates with this enciphered message.
2043, the first sequencing information of at least one decryption oprerations duration that this decryption information comprises and this at least one decryption oprerations duration is obtained, and the 3rd sequencing information of at least one decryption oprerations dynamics of comprising of decryption information and this at least one decryption oprerations dynamics, and obtain the second sequencing information of at least one operation duration that this enciphered message comprises and this at least one operation duration, and the 4th sequencing information of at least one operating force of comprising of enciphered message and this at least one operating force.
Whether at least one operation duration is identical with this to judge this at least one decryption oprerations duration, and judge that whether this first sequencing information is identical with this second sequencing information, judge that whether this at least one at least one operating force of decryption oprerations dynamics and this is identical, and judge that whether the 3rd sequencing information is identical with the 4th sequencing information, if this at least one decryption oprerations duration is with this, at least one operation duration is identical, this first sequencing information is identical with this second sequencing information, this at least one at least one operating force of decryption oprerations dynamics and this is identical, and the 3rd sequencing information is identical with the 4th sequencing information, then determine whether this decryption information mates with this enciphered message.
Process and the above-mentioned steps 2041 of above-mentioned steps 2042 and 2043 are similar, do not repeat them here.
In step 205, when terminal determines that this decryption information mates with this enciphered message, perform this sensitive operation.
If this decryption information mates with this enciphered message, represent that the password of user's input is correct, then terminal can perform this sensitive operation.And if this decryption information does not mate with this enciphered message, represent the code error of user's input, terminal can not perform sensitive operation, and now terminal can show code error information, and prompting user inputs password again.
With arrange compared with the password such as letter, numeral, the sequence of the operation information formation such as operating force, operation duration of touch operation user triggered in the present embodiment is as password, so user is when arranging password or being decrypted, only need trigger corresponding touch operation, and without the need to inputting password, simple and efficient to handle.And due to the movement range of touch operation very little, even if some user wants the action spying on this user also cannot know password accurately, improve cipher safety.
The method that the present embodiment provides, by obtaining enciphered message according at least one in the operation duration of at least one touch operation detected and operating force, using enciphered message as being used for the password performing sensitive operation, user only need operate the cipher setting procedures and follow-up decrypting process that can complete sensitive operation according to this enciphered message triggers touch, simple and efficient to handle, and the movement range of touch operation is very little, is not easily seen by other users, improve cipher safety.
Fig. 3 A is a kind of block diagram arranging the device of password according to an exemplary embodiment.See Fig. 3 A, this device comprises receiver module 301, the first acquisition module 302 and memory module 303.
Receiver module 301, arranges instruction for receiving to the password of sensitive operation;
First acquisition module 302, at least one touch operation that basis detects, obtain enciphered message, this enciphered message comprises the operation information of this at least one touch operation, and this operation information comprises at least one item in operation duration and operating force;
Memory module 303, for this sensitive operation of corresponding stored and this enciphered message, using the password of this enciphered message as this sensitive operation.
The device that the present embodiment provides, by obtaining enciphered message according at least one in the operation duration of at least one touch operation detected and operating force, using enciphered message as being used for the password performing sensitive operation, user only need operate the cipher setting procedures and follow-up decrypting process that can complete sensitive operation according to this enciphered message triggers touch, simple and efficient to handle, and the movement range of touch operation is very little, is not easily seen by other users, improve cipher safety.
In another embodiment, this first acquisition module 302, also for whenever touch operation being detected, obtains the operation information of the touch operation that current detection arrives; When multiple touch operation being detected, according to detection sequencing, the operation information of the plurality of touch operation being sorted, obtains this enciphered message.
See Fig. 3 B, in another embodiment, this device also comprises:
This receiver module 301, also for receiving the instruction performing this sensitive operation;
Second acquisition module 304, for deciphering touch operation according at least one detecting, obtains decryption information, and this decryption information comprises the operation information of this at least one deciphering touch operation;
Judge module 305, for judging whether this decryption information mates with this enciphered message;
Execution module 306, for when this decryption information mates with this enciphered message, performs this sensitive operation.
In another embodiment, this judge module 305 is also for obtaining first sequencing information of at least one decryption oprerations duration that this decryption information comprises and this at least one decryption oprerations duration; Obtain the second sequencing information of at least one operation duration that this enciphered message comprises and this at least one operation duration; Whether at least one operation duration is identical with this to judge this at least one decryption oprerations duration, and judges that whether this first sequencing information is identical with this second sequencing information; If this at least one decryption oprerations duration is with this, at least one operation duration is identical, and this first sequencing information is identical with this second sequencing information, then determine whether this decryption information mates with this enciphered message.
In another embodiment, this judge module 306 is also for obtaining the 3rd sequencing information of at least one decryption oprerations dynamics that this decryption information comprises and this at least one decryption oprerations dynamics; 4th sequencing information of at least one operating force that acquisition enciphered message comprises and this at least one operating force; Judge that whether this at least one at least one operating force of decryption oprerations dynamics and this is identical, and judge that whether the 3rd sequencing information is identical with the 4th sequencing information; If this at least one at least one operating force of decryption oprerations dynamics and this is identical, and the 3rd sequencing information is identical with the 4th sequencing information, then determine whether this decryption information mates with this enciphered message.
See Fig. 3 C, in another embodiment, it is characterized in that, this device also comprises:
Detection module 307, at least one item in the touch display screen curtain by configuring and pressure transducer, detects this at least one touch operation.
Above-mentioned all alternatives, can adopt and combine arbitrarily formation embodiment of the present disclosure, this is no longer going to repeat them.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations has been described in detail in about the embodiment of the method, will not elaborate explanation herein.
It should be noted that: the device of what above-described embodiment provided arranged password arrange password time, only be illustrated with the division of above-mentioned each functional module, in practical application, can distribute as required and by above-mentioned functions and be completed by different functional modules, inner structure by terminal is divided into different functional modules, to complete all or part of function described above.In addition, the device of what above-described embodiment provided arranged password belongs to same design with the embodiment of the method arranging password, and its specific implementation process refers to embodiment of the method, repeats no more here.
Fig. 4 is a kind of block diagram arranging the device 400 of password according to an exemplary embodiment.Such as, device 400 can be mobile phone, computing machine, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Fig. 4, device 400 can comprise following one or more assembly: processing components 402, storer 404, power supply module 406, multimedia groupware 408, audio-frequency assembly 410, the interface 412 of I/O (I/O), sensor module 414, and communications component 416.
The integrated operation of the usual control device 400 of processing components 402, such as with display, call, data communication, camera operation and record operate the operation be associated.Processing components 402 can comprise one or more processor 420 to perform instruction, to complete all or part of step of above-mentioned method.In addition, processing components 402 can comprise one or more module, and what be convenient between processing components 402 and other assemblies is mutual.Such as, processing components 402 can comprise multi-media module, mutual with what facilitate between multimedia groupware 408 and processing components 402.
Storer 404 is configured to store various types of data to be supported in the operation of device 400.The example of these data comprises for any application program of operation on device 400 or the instruction of method, contact data, telephone book data, message, picture, video etc.Storer 404 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), ROM (read-only memory) (ROM), magnetic store, flash memory, disk or CD.
The various assemblies that power supply module 406 is device 400 provide electric power.Power supply module 406 can comprise power-supply management system, one or more power supply, and other and the assembly generating, manage and distribute electric power for device 400 and be associated.
Multimedia groupware 408 is included in the screen providing an output interface between described device 400 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises one or more touch sensor with the gesture on sensing touch, slip and touch panel.Described touch sensor can the border of not only sensing touch or sliding action, but also detects the duration relevant to described touch or slide and pressure.In certain embodiments, multimedia groupware 408 comprises a front-facing camera and/or post-positioned pick-up head.When device 400 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 410 is configured to export and/or input audio signal.Such as, audio-frequency assembly 410 comprises a microphone (MIC), and when device 400 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The sound signal received can be stored in storer 404 further or be sent via communications component 416.In certain embodiments, audio-frequency assembly 410 also comprises a loudspeaker, for output audio signal.
I/O interface 412 is for providing interface between processing components 402 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor module 414 comprises one or more sensor, for providing the state estimation of various aspects for device 400.Such as, sensor module 414 can detect the opening/closing state of device 400, the relative positioning of assembly, such as described assembly is display and the keypad of device 400, the position of all right pick-up unit 400 of sensor module 414 or device 400 1 assemblies changes, the presence or absence that user contacts with device 400, the temperature variation of device 400 orientation or acceleration/deceleration and device 400.Sensor module 414 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor module 414 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor module 414 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 416 is configured to the communication being convenient to wired or wireless mode between device 400 and other equipment.Device 400 can access the wireless network based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communications component 416 receives from the broadcast singal of external broadcasting management system or broadcast related information via broadcast channel.In one exemplary embodiment, described communications component 416 also comprises near-field communication (NFC) module, to promote junction service.Such as, can based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 400 can be realized, for performing the above-mentioned method arranging password by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD) (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium comprising instruction, such as, comprise the storer 404 of instruction, above-mentioned instruction can perform said method by the processor 420 of device 400.Such as, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc.
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is performed by the processor of mobile terminal, makes mobile terminal can perform the above-mentioned method arranging password.
Those skilled in the art, at consideration instructions and after putting into practice invention disclosed herein, will easily expect other embodiment of the present disclosure.The application is intended to contain any modification of the present disclosure, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present disclosure and comprised the undocumented common practise in the art of the disclosure or conventional techniques means.Instructions and embodiment are only regarded as exemplary, and true scope of the present disclosure and spirit are pointed out by claim below.
Should be understood that, the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendment and change not departing from its scope.The scope of the present disclosure is only limited by appended claim.

Claims (13)

1. arrange a method for password, it is characterized in that, described method comprises:
Receive and instruction is arranged to the password of sensitive operation;
According at least one touch operation detected, obtain enciphered message, described enciphered message comprises the operation information of at least one touch operation described, and described operation information comprises at least one item in operation duration and operating force;
Sensitive operation described in corresponding stored and described enciphered message, using the password of described enciphered message as described sensitive operation.
2. method according to claim 1, is characterized in that, at least one touch operation that described basis detects, obtains enciphered message, comprising:
Whenever touch operation being detected, obtain the operation information of the touch operation that current detection arrives;
When multiple touch operation being detected, according to detection sequencing, the operation information of described multiple touch operation being sorted, obtains described enciphered message.
3. method according to claim 1, is characterized in that, described method also comprises:
Receive the instruction performing described sensitive operation;
According at least one the deciphering touch operation detected, obtain decryption information, described decryption information comprises the operation information of at least one deciphering touch operation described;
Judge whether described decryption information mates with described enciphered message;
When described decryption information mates with described enciphered message, perform described sensitive operation.
4. method according to claim 3, is characterized in that, describedly judges whether described decryption information mates with described enciphered message, comprising:
Obtain the first sequencing information of at least one decryption oprerations duration that described decryption information comprises and at least one decryption oprerations duration described;
Obtain the second sequencing information of at least one operation duration that described enciphered message comprises and at least one operation duration described;
Judge at least one decryption oprerations duration described with described at least one whether operate duration identical, and judge that whether described first sequencing information identical with described second sequencing information;
If at least one decryption oprerations duration described with described at least one to operate duration identical, and described first sequencing information is identical with described second sequencing information, then determine whether described decryption information mates with described enciphered message.
5. method according to claim 3, is characterized in that, describedly judges whether described decryption information mates with described enciphered message, comprising:
Obtain the 3rd sequencing information of at least one decryption oprerations dynamics that described decryption information comprises and at least one decryption oprerations dynamics described;
4th sequencing information of at least one operating force that acquisition enciphered message comprises and at least one operating force described;
Judge that whether at least one decryption oprerations dynamics described is identical with at least one operating force described, and judge that whether described 3rd sequencing information is identical with described 4th sequencing information;
If at least one decryption oprerations dynamics described is identical with at least one operating force described, and described 3rd sequencing information is identical with described 4th sequencing information, then determine whether described decryption information mates with described enciphered message.
6. the method according to any one of claim 1-5, is characterized in that, described method also comprises:
By at least one item in the touch display screen curtain of configuration and pressure transducer, detect at least one touch operation described.
7. arrange a device for password, it is characterized in that, described device comprises:
Receiver module, arranges instruction for receiving to the password of sensitive operation;
First acquisition module, for according at least one touch operation detected, obtains enciphered message, and described enciphered message comprises the operation information of at least one touch operation described, and described operation information comprises at least one item in operation duration and operating force;
Memory module, for sensitive operation described in corresponding stored and described enciphered message, using the password of described enciphered message as described sensitive operation.
8. device according to claim 7, is characterized in that, described first acquisition module, also for whenever touch operation being detected, obtains the operation information of the touch operation that current detection arrives; When multiple touch operation being detected, according to detection sequencing, the operation information of described multiple touch operation being sorted, obtains described enciphered message.
9. device according to claim 7, is characterized in that, described device also comprises:
Described receiver module, also for receiving the instruction performing described sensitive operation;
Second acquisition module, for according at least one the deciphering touch operation detected, obtain decryption information, described decryption information comprises the operation information of at least one deciphering touch operation described;
Judge module, for judging whether described decryption information mates with described enciphered message;
Execution module, for when described decryption information mates with described enciphered message, performs described sensitive operation.
10. device according to claim 9, is characterized in that, described judge module is also for obtaining first sequencing information of at least one decryption oprerations duration that described decryption information comprises and at least one decryption oprerations duration described; Obtain the second sequencing information of at least one operation duration that described enciphered message comprises and at least one operation duration described; Judge at least one decryption oprerations duration described with described at least one whether operate duration identical, and judge that whether described first sequencing information identical with described second sequencing information; If at least one decryption oprerations duration described with described at least one to operate duration identical, and described first sequencing information is identical with described second sequencing information, then determine whether described decryption information mates with described enciphered message.
11. devices according to claim 9, is characterized in that, described judge module is also for obtaining the 3rd sequencing information of at least one decryption oprerations dynamics that described decryption information comprises and at least one decryption oprerations dynamics described; 4th sequencing information of at least one operating force that acquisition enciphered message comprises and at least one operating force described; Judge that whether at least one decryption oprerations dynamics described is identical with at least one operating force described, and judge that whether described 3rd sequencing information is identical with described 4th sequencing information; If at least one decryption oprerations dynamics described is identical with at least one operating force described, and described 3rd sequencing information is identical with described 4th sequencing information, then determine whether described decryption information mates with described enciphered message.
12. devices according to any one of claim 7-11, it is characterized in that, described device also comprises:
Detection module, at least one item in the touch display screen curtain by configuring and pressure transducer, detects at least one touch operation described.
13. 1 kinds of devices arranging password, is characterized in that, comprising:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
Receive and instruction is arranged to the password of sensitive operation;
According at least one touch operation detected, obtain enciphered message, described enciphered message comprises the operation information of at least one touch operation described, and described operation information comprises at least one item in operation duration and operating force;
Sensitive operation described in corresponding stored and described enciphered message, using the password of described enciphered message as described sensitive operation.
CN201510884212.5A 2015-12-04 2015-12-04 Password setting method and apparatus Pending CN105447358A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510884212.5A CN105447358A (en) 2015-12-04 2015-12-04 Password setting method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510884212.5A CN105447358A (en) 2015-12-04 2015-12-04 Password setting method and apparatus

Publications (1)

Publication Number Publication Date
CN105447358A true CN105447358A (en) 2016-03-30

Family

ID=55557527

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510884212.5A Pending CN105447358A (en) 2015-12-04 2015-12-04 Password setting method and apparatus

Country Status (1)

Country Link
CN (1) CN105447358A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107450834A (en) * 2017-07-26 2017-12-08 珠海市魅族科技有限公司 A kind of method, apparatus of data deciphering, computer installation and computer-readable storage medium
CN111460405A (en) * 2020-03-17 2020-07-28 福建升腾资讯有限公司 Method, device, equipment and medium for enabling equipment outside cabinet to enter background setting

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102203794A (en) * 2011-06-01 2011-09-28 华为终端有限公司 A terminal authentication method and a device thereof
CN103279714A (en) * 2013-06-19 2013-09-04 深圳市中兴移动通信有限公司 Mobile terminal as well as data encryption and decryption method
US20140002388A1 (en) * 2012-06-29 2014-01-02 Apple Inc. Biometric Initiated Communication
CN104318138A (en) * 2014-09-30 2015-01-28 杭州同盾科技有限公司 Method and device for verifying identity of user
CN105069347A (en) * 2015-08-27 2015-11-18 广东欧珀移动通信有限公司 Unlocking method and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102203794A (en) * 2011-06-01 2011-09-28 华为终端有限公司 A terminal authentication method and a device thereof
US20140002388A1 (en) * 2012-06-29 2014-01-02 Apple Inc. Biometric Initiated Communication
CN103279714A (en) * 2013-06-19 2013-09-04 深圳市中兴移动通信有限公司 Mobile terminal as well as data encryption and decryption method
CN104318138A (en) * 2014-09-30 2015-01-28 杭州同盾科技有限公司 Method and device for verifying identity of user
CN105069347A (en) * 2015-08-27 2015-11-18 广东欧珀移动通信有限公司 Unlocking method and terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107450834A (en) * 2017-07-26 2017-12-08 珠海市魅族科技有限公司 A kind of method, apparatus of data deciphering, computer installation and computer-readable storage medium
CN111460405A (en) * 2020-03-17 2020-07-28 福建升腾资讯有限公司 Method, device, equipment and medium for enabling equipment outside cabinet to enter background setting
CN111460405B (en) * 2020-03-17 2023-06-30 福建升腾资讯有限公司 Method, device, equipment and medium for enabling external equipment of cabinet to enter background setting

Similar Documents

Publication Publication Date Title
CN104991789B (en) Application program open method and device
CN104503689A (en) Method and device for displaying application interface
CN104866750A (en) Method and device for starting application
CN105224195A (en) Terminal operation method and device
CN105159559A (en) Mobile terminal control method and mobile terminal
CN105160239A (en) Application program access restriction method and apparatus
CN104794382A (en) Application starting method and device
CN103914634A (en) Image encryption method, image encryption device and electronic device
CN104537365A (en) Touch key and fingerprint identification implementation method and device and terminal equipment
CN106097494A (en) The method for unlocking of smart lock and device
CN104732201A (en) Touch key press and fingerprint identification implementation device and method, and terminal device
CN104238912A (en) Application control method and application control device
CN104571709B (en) The processing method of mobile terminal and virtual key
CN105487805A (en) Object operating method and device
CN105094318A (en) Mode switching method and apparatus
CN104331228A (en) Screen locking method and device
CN104461282A (en) Key processing method, key processing device and key processing equipment
CN105160216A (en) Unlocking method and apparatus and terminal
CN105407070A (en) Logging-in authorization method and device
CN104965645A (en) Unlocking method and apparatus
CN104391712A (en) Shutdown method and device
CN104298902B (en) A kind of display methods of application program, device and equipment
CN108022349A (en) Information input method, equipment, smart lock and storage medium
CN104899501A (en) Dialog list display method and device and terminal
CN105893854B (en) Encryption and decryption method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160330

RJ01 Rejection of invention patent application after publication