CN106484295A - A kind of password method for retrieving and terminal - Google Patents

A kind of password method for retrieving and terminal Download PDF

Info

Publication number
CN106484295A
CN106484295A CN201610878697.1A CN201610878697A CN106484295A CN 106484295 A CN106484295 A CN 106484295A CN 201610878697 A CN201610878697 A CN 201610878697A CN 106484295 A CN106484295 A CN 106484295A
Authority
CN
China
Prior art keywords
password
cryptogam
memory area
terminal
change
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610878697.1A
Other languages
Chinese (zh)
Inventor
***
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201610878697.1A priority Critical patent/CN106484295A/en
Publication of CN106484295A publication Critical patent/CN106484295A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses a kind of password method for retrieving and terminal, wherein method includes:If the predetermined registration operation that password is given in triggering for change is detected, obtain the cryptogam prestoring;If instruction checked by password user input is detected, show the password set in described cryptogam, giving the predetermined registration operation of password for change and just cryptogam can be checked because user only need to trigger, thus simplifying the operation that user gives password for change, improve the success rate that user gives password for change.

Description

A kind of password method for retrieving and terminal
Technical field
The present invention relates to electronic technology field, more particularly, to a kind of password method for retrieving and terminal.
Background technology
In daily life, user, when using terminals such as mobile phone, panel computers, in order to prevent the information leakage of terminal, uses Family would generally be the application program setting password in terminal or terminal, if user is multiple application program setting differences of terminal Password, of long duration it is easy to forget that, cause the user perplexs.
In order to solve the puzzlement and the inconvenience that cause because forgetting Password, the password method for retrieving that prior art provides is:Logical Cross the default problem of answer or given for change by mobile phone dynamic note code.However, moving by the default problem of answer or by mobile phone When state note code gives password for change, complex operation and give for change password success rate relatively low.
Content of the invention
The embodiment of the present invention provides a kind of password method for retrieving and terminal, can simplify the operation that user gives password for change, carry High user gives the success rate of password for change.
In a first aspect, embodiments providing a kind of password method for retrieving, the method includes:
If the predetermined registration operation that password is given in triggering for change is detected, obtain the cryptogam prestoring;
If instruction checked by password user input is detected, show the password set in described cryptogam.
On the other hand, embodiments provide a kind of terminal, this terminal includes:
First acquisition unit, if give the predetermined registration operation of password for change for triggering is detected, obtains the password literary composition prestoring Part;
Display unit, if checking instruction for the password of user input is detected, shows the password in described cryptogam Set.
Such scheme, if terminal detects the predetermined registration operation that password is given in triggering for change, obtains the cryptogam prestoring;If Instruction checked by password user input is detected, shows the password set in described cryptogam, looks for because user only need to trigger The predetermined registration operation returning password just can be checked to cryptogam, thus simplifying the operation that user gives password for change, improves use The success rate of password is given at family for change.
Brief description
In order to be illustrated more clearly that embodiment of the present invention technical scheme, required use in embodiment being described below Accompanying drawing be briefly described it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow diagram of password method for retrieving provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic flow diagram of password method for retrieving that another embodiment of the present invention provides;
Fig. 3 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 4 is a kind of terminal schematic block diagram that another embodiment of the present invention provides;
Fig. 5 is a kind of terminal schematic block diagram that yet another embodiment of the invention provides.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation description is it is clear that described embodiment a part of embodiment that is the present invention, rather than whole embodiments.Based on this Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under the premise of not making creative work Example, broadly falls into the scope of protection of the invention.
It should be appreciated that when using in this specification and in the appended claims, term " inclusion " and "comprising" indicate The presence of described feature, entirety, step, operation, element and/or assembly, but it is not precluded from one or more of the other feature, whole Body, step, operation, the presence of element, assembly and/or its set or interpolation.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Hereafter clearly indicate other situations, otherwise " one " of singulative, " one " and " being somebody's turn to do " are intended to including plural form.
It will be further appreciated that, used in description of the invention and appended claims, term "and/or" is Refer to any combinations of one or more of the associated item listed and be possible to combine, and include these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if [described condition or event] is detected " can be interpreted to mean according to context " once it is determined that " or " in response to true Fixed " or " once [described condition or event] is detected " or " in response to [described condition or event] is detected ".
In implementing, the terminal described in the embodiment of the present invention including but not limited to such as has touch sensitive surface Other of the mobile phone of (for example, touch-screen display and/or touch pad), laptop computer or tablet PC etc is just Portable device.It is to be further understood that in certain embodiments, described equipment not portable communication device, but have tactile Touch the desk computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, describe the terminal including display and touch sensitive surface.It is, however, to be understood that It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control bar.
Terminal supports various application programs, for example one or more of following:Drawing application program, demonstration application journey Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application Program, telephony application, videoconference application, email application, instant messaging applications, exercise Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application Program, digital music player application and/or video frequency player application program.
The various application programs that can execute in terminal can be public using at least one of such as touch sensitive surface Physical user-interface device.Can adjust among applications and/or in corresponding application programs and/or change and touch sensitive table The corresponding information of display in the one or more functions in face and terminal.So, the public physical structure of terminal (for example, touches Sensing surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
Refer to Fig. 1, Fig. 1 is a kind of schematic flow diagram of password method for retrieving provided in an embodiment of the present invention.This enforcement In example, the executive agent of password method for retrieving is terminal.Terminal can be the mobile terminal such as smart mobile phone, panel computer, but does not limit In this, can also be other-end, not be limited herein.As shown in figure 1, password method for retrieving may comprise steps of:
S101:If the predetermined registration operation that password is given in triggering for change is detected, obtain the cryptogam prestoring.
Whether terminal real-time detection user triggers the predetermined registration operation giving password for change, triggers and gives for change if terminal detects user The predetermined registration operation of password, obtains the cryptogam prestoring.
Wherein, the predetermined registration operation giving password for change voluntarily can be arranged by user, and for example, the predetermined registration operation giving password for change is permissible Some buttons in specific touch gestures for user setup or simultaneously operation terminal, can also be user setup Other operation, be not limited herein.
Cryptogam can be one or at least two, be determined with specific reference to practical situation, do not do herein Limit.If terminal detects the predetermined registration operation that password is given in triggering for change, obtain all cryptogams prestoring.
Cryptogam includes password set, and password set includes at least one password, and password can be answered for terminal-pair The corresponding unlocking pin of application program on unlocking pin or terminal, is determined with specific reference to practical situation, herein It is not limited.
For example, when user is only to terminal setting unlocking pin, password set only includes the corresponding unlocking pin of terminal;When When user is in terminal or at least two application programs setting unlocking pin, password set includes one or at least two The each self-corresponding unlocking pin of application program;When user both arranges unlocking pin to terminal, and in terminal or at least During two application program setting passwords, password set includes the corresponding unlocking pin of terminal and one or at least two application programs Each self-corresponding unlocking pin.
Cryptogam can be stored in the password storage region of terminal.
Wherein, password storage region is used for special storage and output password file, and password storage region is invisible storage Region, that is, user cannot be directly viewable password storage region storage cryptogam.
Cryptogam, after password storage region gets cryptogam, can be exported to the visible storage of terminal by terminal Region, the such as internal memory of terminal, external equipment are medium, so that user is checked.
S102:If instruction checked by password user input is detected, show the password set in described cryptogam.
Terminal gets cryptogam and exports cryptogam to visible memory area, and whether real-time detection user is defeated Enter password and check instruction, if the password that terminal detects user input checks instruction, the password set in display cryptogam.
Wherein, password checks that instruction can be passed through to click on cryptogam input by user, also can be grasped by other by user Input, be configured with specific reference to practical situation, be not limited herein.
For example, if terminal detects the cryptogam that user clicks on visible memory area, close in display cryptogam Code collection is closed, so that user checks to the password in password set.
User according to the password viewing, in the corresponding unlocking pin of locking screen interface input terminal of terminal or in application The unlocking pin that the unlock interface of program inputs application program can unlock successfully.
Such scheme, if terminal detects the predetermined registration operation that password is given in triggering for change, obtains the cryptogam prestoring;If Instruction checked by password user input is detected, shows the password set in described cryptogam, looks for because user only need to trigger The predetermined registration operation returning password just can be checked to cryptogam, thus simplifying the operation that user gives password for change, improves use The success rate of password is given at family for change.
Refer to Fig. 2, Fig. 2 is a kind of schematic flow diagram of password method for retrieving that another embodiment of the present invention provides.This In embodiment, the executive agent of password method for retrieving is terminal.Terminal can be the mobile terminal such as smart mobile phone, panel computer, but Not limited to this, can also be other-end, not be limited herein.As shown in Fig. 2 password method for retrieving can include following walking Suddenly:
S201:If the predetermined registration operation that password is given in triggering for change is detected, obtain cryptogam from the first default memory area;Its In, the described first default memory area is invisible memory area.
Whether terminal real-time detection user triggers the predetermined registration operation giving password for change, triggers and gives for change if terminal detects user The predetermined registration operation of password, the cryptogam prestoring from the first default memory area acquisition.
Wherein, the predetermined registration operation giving password for change voluntarily can be arranged by user, and for example, the predetermined registration operation giving password for change is permissible Some buttons in specific touch gestures for user setup or simultaneously operation terminal, can also be user setup Other operation, be not limited herein.
Cryptogam can be one or at least two, be determined with specific reference to practical situation, do not do herein Limit.If terminal detects the predetermined registration operation that password is given in triggering for change, from owning that the first default memory area acquisition prestores Cryptogam.
Cryptogam includes password set, and password set includes at least one password, and password can be answered for terminal-pair The corresponding unlocking pin of application program on unlocking pin or terminal, is determined with specific reference to practical situation, herein It is not limited.
For example, when user is only to terminal setting unlocking pin, password set only includes the corresponding unlocking pin of terminal;When When user is in terminal or at least two application programs setting unlocking pin, password set includes one or at least two The each self-corresponding unlocking pin of application program;When user both arranges unlocking pin to terminal, and in terminal or at least During two application program setting passwords, password set includes the corresponding unlocking pin of terminal and one or at least two application programs Each self-corresponding unlocking pin.
First default memory area can for terminal be specially storage cryptogam and distribute password storage region.Its In, password storage region is invisible memory area, and that is, user cannot be directly viewable the cryptogam of password storage region storage.
Further, step S201 specifically may comprise steps of:
If the predetermined registration operation that password is given in triggering for change is detected, obtaining from the described first default memory area and there is default identity The cryptogam of identification code.
If terminal detects the predetermined registration operation that password is given in triggering for change, scan and obtain all tools from the first default memory area There is the cryptogam of default Identity Code.
Further, before step S201, password method for retrieving can also comprise the following steps:
Obtain the password set of user input;Wherein, described password set includes at least one password;
Described password set is write cryptogam, and presets Identity Code for described cryptogam distribution;
The cryptogam with default Identity Code is stored to the first default memory area.
After terminal gets the password set of user input, password set is write cryptogam, and divide for cryptogam Join default identity.
Wherein, cryptogam is editable document format, for example, password collected works can for text document or Other editable documents, are configured with specific reference to practical situation, are not limited herein.
Default identity can be pre-set by user, be not limited herein.For the default identity mark of cryptogam distribution The purpose known is to be distinguished cryptogam with ordinary file.
If cryptogam is one, terminal is the default identity of this cryptogam distribution;If cryptogam is at least two Individual, terminal is all distributed identical at least two cryptogams and is preset identity.
After terminal is for the default identity of cryptogam distribution, by cryptogam and its corresponding default identity storage To the first default memory area.
S202:Described cryptogam is exported to the second default memory area;Wherein, the described second default memory area is It can be seen that memory area.
Terminal, after the first default memory area gets cryptogam, cryptogam is exported to the second default memory block Domain.Wherein, the second default memory area is visible memory area, and the internal memory of such as terminal, external equipment are medium, and user can be straight Connect the content checking visible memory area storage.
S203:If instruction checked by password user input is detected, obtain and show from the described second default memory area Password set in described cryptogam.
Terminal gets cryptogam and exports cryptogam to the second default memory area, and real-time detection user is Instruction checked by no input password, if instruction checked by the password that terminal detects user input, obtains from the second default memory area Take and show the password set in cryptogam.
Wherein, password checks that instruction can be passed through to click on cryptogam input by user, also can be grasped by other by user Input, be configured with specific reference to practical situation, be not limited herein.
For example, if terminal detects the cryptogam that user clicks on the second default memory area, open cryptogam simultaneously Password set in display cryptogam, so that user checks to the password in password set.
User according to the password viewing, in the corresponding unlocking pin of locking screen interface input terminal of terminal or in application The unlocking pin that the unlock interface of program inputs application program can unlock successfully.
Such scheme, if terminal detects the predetermined registration operation that password is given in triggering for change, obtains the cryptogam prestoring;If Instruction checked by password user input is detected, shows the password set in described cryptogam, looks for because user only need to trigger The predetermined registration operation returning password just can be checked to cryptogam, thus simplifying the operation that user gives password for change, improves use The success rate of password is given at family for change.
Cryptogam is stored memory area sightless to terminal, prevents from during lost terminal, cryptogam being caused to let out Dew, and can only by the predetermined registration operation of giving password for change when just can check cryptogam, improve the safety of cryptogam.
Referring to Fig. 3, it is a kind of schematic block diagram of terminal provided in an embodiment of the present invention.Terminal 300 can be intelligent handss The mobile terminals such as machine, panel computer, can also be other-end, not be limited herein.It is each that the terminal 300 of the present embodiment includes Unit is used for executing each step in the corresponding embodiment of Fig. 1, specifically refers to the phase in the corresponding embodiment of Fig. 1 and Fig. 1 Close description, do not repeat herein.The terminal 300 of the present embodiment includes first acquisition unit 301 and display unit 302.
If first acquisition unit 301 is used for the predetermined registration operation that password is given in triggering for change is detected, obtain the password prestoring File.
For example, if first acquisition unit 301 detects the predetermined registration operation that password is given in triggering for change, obtain the password prestoring File.First acquisition unit 301 sends cryptogam to display unit 302.
Display unit 302 is used for receiving the cryptogam of first acquisition unit 301 transmission, if the close of user input is detected Code checks instruction, shows the password set in described cryptogam.
Such scheme, if terminal detects the predetermined registration operation that password is given in triggering for change, obtains the cryptogam prestoring;If Instruction checked by password user input is detected, shows the password set in described cryptogam, looks for because user only need to trigger The predetermined registration operation returning password just can be checked to cryptogam, thus simplifying the operation that user gives password for change, improves use The success rate of password is given at family for change.
Referring to Fig. 4, it is a kind of schematic block diagram of terminal that another embodiment of the present invention provides.Terminal 400 can be intelligence The mobile terminals such as energy mobile phone, panel computer, can also be other-end, not be limited herein.The terminal 400 of the present embodiment includes Each unit be used for executing each step in the corresponding embodiment of Fig. 2, specifically refer in the corresponding embodiment of Fig. 2 and Fig. 2 Associated description, do not repeat herein.The terminal 400 of the present embodiment includes:Second acquisition unit 401, allocation unit 402, storage Unit 403, first acquisition unit 404 and display unit 405.
Second acquisition unit 401 is used for obtaining the password set of user input;Wherein, described password set includes at least one Individual password.
For example, second acquisition unit 401 obtains the password set of user input.Second acquisition unit 401 is by password set Send to allocation unit 402.
Allocation unit 402 is used for receiving the password set of second acquisition unit 401 transmission, described password set is write close Code file, and preset Identity Code for described cryptogam distribution.
For example, allocation unit 402 receives the password set that second acquisition unit 401 sends, and password set is write password File, and preset Identity Code for cryptogam distribution.Allocation unit 402 will have the cryptogam of default Identity Code Send to memory element.
Memory element 403 is used for receiving the cryptogam with default Identity Code of allocation unit transmission, will have The cryptogam of default Identity Code stores to the first default memory area.
If first acquisition unit 404 is used for the predetermined registration operation that password is given in triggering for change is detected, from the first default memory area Obtain cryptogam;Wherein, the described first default memory area is invisible memory area;Described cryptogam is exported to Two default memory areas;Wherein, the described second default memory area is visible memory area.
Further, if first acquisition unit 404 gives the predetermined registration operation of password for change specifically for triggering is detected, from described First default memory area obtains the cryptogam with default Identity Code.
If instruction checked by the password that display unit 405 is used for detecting user input, from the described second default memory area Obtain and show the password set in described cryptogam.
Such scheme, if terminal detects the predetermined registration operation that password is given in triggering for change, obtains the cryptogam prestoring;If Instruction checked by password user input is detected, shows the password set in described cryptogam, looks for because user only need to trigger The predetermined registration operation returning password just can be checked to cryptogam, thus simplifying the operation that user gives password for change, improves use The success rate of password is given at family for change.
Cryptogam is stored memory area sightless to terminal, prevents from during lost terminal, cryptogam being caused to let out Dew, and can only by the predetermined registration operation of giving password for change when just can check cryptogam, improve the safety of cryptogam.
Referring to Fig. 5, it is a kind of terminal schematic block diagram that yet another embodiment of the invention provides.The present embodiment as shown in Figure 5 In terminal 500 can include:One or more processors 501, one or more input equipment 502, one or more then defeated Go out equipment 503 and one or more memorizer 504.Above-mentioned processor 501, input equipment 502, then outut device 503 and storage Device 504 completes mutual communication by communication bus 505.
Memorizer 504 is used for storage program and instructs.
Processor 501 is used for the following operation of programmed instruction execution according to memorizer 504 storage:
If processor 501 is used for the predetermined registration operation that password is given in triggering for change is detected, obtain the cryptogam prestoring.
If instruction checked by the password that processor 501 is additionally operable to detect user input, show close in described cryptogam Code collection is closed.
If the predetermined registration operation of password given for change by processor 501 specifically for triggering is detected, obtain from the first default memory area Take cryptogam;Wherein, the described first default memory area is invisible memory area;Described cryptogam is exported to second Default memory area;Wherein, the described second default memory area is visible memory area.
Processor 501 is additionally operable to obtain the password set of user input;Wherein, to include at least one close for described password set Code.
Processor 501 is additionally operable to for described password set to write cryptogam, and presets body for described cryptogam distribution Part identification code.
Processor 501 is additionally operable to store the cryptogam with default Identity Code to the first default memory area.
If the predetermined registration operation of password given for change by processor 501 specifically for triggering is detected, from the described first default memory block Domain obtains the cryptogam with default Identity Code.
If processor 501 checks instruction specifically for password user input is detected, from the described second default memory block Domain obtains and shows the password set in described cryptogam.
Such scheme, if terminal detects the predetermined registration operation that password is given in triggering for change, obtains the cryptogam prestoring;If Instruction checked by password user input is detected, shows the password set in described cryptogam, looks for because user only need to trigger The predetermined registration operation returning password just can be checked to cryptogam, thus simplifying the operation that user gives password for change, improves use The success rate of password is given at family for change.
It should be appreciated that in embodiments of the present invention, alleged processor 501 can be CPU (Central Processing Unit, CPU), this processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), special IC (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at Reason device can also be any conventional processor etc..
Input equipment 502 can include Trackpad, fingerprint adopts sensor (for gathering the finger print information of user and fingerprint Directional information), photographic head, mike etc., then outut device 503 can include display (LCD etc.), speaker etc..
This memorizer 505 can include read only memory and random access memory, and to processor 501 provide instruction and Data.The a part of of memorizer 505 can also include nonvolatile RAM.For example, memorizer 505 can also be deposited The information of storage device type.
In implementing, processor 501 described in the embodiment of the present invention, input equipment 502, outut device 503 can Execute the implementation described in the first embodiment of password method for retrieving provided in an embodiment of the present invention and second embodiment, Also can perform the implementation of the terminal described by the embodiment of the present invention, will not be described here.
Those of ordinary skill in the art are it is to be appreciated that combine the list of each example of the embodiments described herein description Unit and algorithm steps, can be with electronic hardware, computer software or the two be implemented in combination in, in order to clearly demonstrate hardware With the interchangeability of software, generally describe composition and the step of each example in the above description according to function.This A little functions to be executed with hardware or software mode actually, the application-specific depending on technical scheme and design constraint.Specially Industry technical staff can use different methods to each specific application realize described function, but this realization is not It is considered as beyond the scope of this invention.
Those skilled in the art can be understood that, for convenience of description and succinctly, the end of foregoing description End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
It should be understood that disclosed terminal and method in several embodiments provided herein, can be passed through it Its mode is realized.For example, device embodiment described above is only schematically, for example, the division of described unit, and only It is only a kind of division of logic function, actual can have other dividing mode when realizing, and for example multiple units or assembly can be tied Close or be desirably integrated into another system, or some features can be ignored, or do not execute.In addition, shown or discussed phase Coupling between mutually or direct-coupling or communication connection can be INDIRECT COUPLING or the communication by some interfaces, device or unit Connect or electricity, machinery or other forms connect.
Step in present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit in embodiment of the present invention terminal can merge according to actual needs, divides and delete.
The described unit illustrating as separating component can be or may not be physically separate, show as unit The part showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize embodiment of the present invention scheme Purpose.
In addition, can be integrated in a processing unit in each functional unit in each embodiment of the present invention it is also possible to It is that unit is individually physically present or two or more units are integrated in a unit.Above-mentioned integrated Unit both can be to be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If described integrated unit is realized and as independent production marketing or use using in the form of SFU software functional unit When, can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part in other words prior art being contributed, or all or part of this technical scheme can be in the form of software product Embody, this computer software product is stored in a storage medium, including some instructions with so that a computer Equipment (can be personal computer, server, or network equipment etc.) executes the complete of each embodiment methods described of the present invention Portion or part steps.And aforesaid storage medium includes:USB flash disk, portable hard drive, read only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, and any Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replace Change, these modifications or replacement all should be included within the scope of the present invention.Therefore, protection scope of the present invention should be with right The protection domain requiring is defined.

Claims (10)

1. a kind of password method for retrieving is it is characterised in that methods described includes:
If the predetermined registration operation that password is given in triggering for change is detected, obtain the cryptogam prestoring;
If instruction checked by password user input is detected, show the password set in described cryptogam.
If 2. method according to claim 1 is it is characterised in that described detect the predetermined registration operation that password is given in triggering for change, Obtain the cryptogam prestoring to specifically include:
If the predetermined registration operation that password is given in triggering for change is detected, obtain cryptogam from the first default memory area;Wherein, described One default memory area is invisible memory area;
Described cryptogam is exported to the second default memory area;Wherein, the described second default memory area is visible storage Region.
If 3. method according to claim 2 is it is characterised in that described detect the predetermined registration operation that password is given in triggering for change, Obtain cryptogam from the first default memory area to specifically include:
If the predetermined registration operation that password is given in triggering for change is detected, obtaining from the described first default memory area and there is default identity The cryptogam of code.
If 4. according to the method in claim 2 or 3 it is characterised in that finger checked by described password user input is detected Order, shows that the password set in described cryptogam specifically includes:
If instruction checked by password user input is detected, obtain from the described second default memory area and show described password literary composition Password set in part.
If 5. method according to claim 2 is it is characterised in that described detect the predetermined registration operation that password is given in triggering for change, Before the first default memory area obtains cryptogam, methods described also includes:
Obtain the password set of user input;Wherein, described password set includes at least one password;
Described password set is write cryptogam, and presets Identity Code for described cryptogam distribution;
The cryptogam with default Identity Code is stored to the first default memory area.
6. a kind of terminal is it is characterised in that described terminal includes:
First acquisition unit, if give the predetermined registration operation of password for change for triggering is detected, obtains the cryptogam prestoring;
Display unit, if checking instruction for the password of user input is detected, shows the password set in described cryptogam.
7. terminal according to claim 6 it is characterised in that described first acquisition unit specifically for:
If the predetermined registration operation that password is given in triggering for change is detected, obtain cryptogam from the first default memory area;Wherein, described One default memory area is invisible memory area;Described cryptogam is exported to the second default memory area;Wherein, described Second default memory area is visible memory area.
8. terminal according to claim 7 it is characterised in that described first acquisition unit specifically for:
If the predetermined registration operation that password is given in triggering for change is detected, obtaining from the described first default memory area and there is default identity The cryptogam of code.
9. the terminal according to claim 7 or 8 it is characterised in that described display unit specifically for:
If instruction checked by password user input is detected, obtain from the described second default memory area and show described password literary composition Password set in part.
10. terminal according to claim 7 is it is characterised in that described terminal also includes:
Second acquisition unit, for obtaining the password set of user input;Wherein, to include at least one close for described password set Code;
Allocation unit, for described password set is write cryptogam, and presets identity for described cryptogam distribution Code;
Memory element, for storing the cryptogam with default Identity Code to the first default memory area.
CN201610878697.1A 2016-09-30 2016-09-30 A kind of password method for retrieving and terminal Withdrawn CN106484295A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610878697.1A CN106484295A (en) 2016-09-30 2016-09-30 A kind of password method for retrieving and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610878697.1A CN106484295A (en) 2016-09-30 2016-09-30 A kind of password method for retrieving and terminal

Publications (1)

Publication Number Publication Date
CN106484295A true CN106484295A (en) 2017-03-08

Family

ID=58268648

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610878697.1A Withdrawn CN106484295A (en) 2016-09-30 2016-09-30 A kind of password method for retrieving and terminal

Country Status (1)

Country Link
CN (1) CN106484295A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106951770A (en) * 2017-05-12 2017-07-14 维沃移动通信有限公司 A kind of terminal unlock method and terminal
WO2024060705A1 (en) * 2022-09-23 2024-03-28 中兴通讯股份有限公司 Password retrieval method, terminal device, electronic device, and computer storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217375A (en) * 2008-01-16 2008-07-09 陈勇 A saving and acquisition method and device of accounts and passwords
CN102866998A (en) * 2011-07-05 2013-01-09 中兴通讯股份有限公司 Centralized password management method and centralized password management system in synchronous system
CN105656907A (en) * 2016-01-25 2016-06-08 上海斐讯数据通信技术有限公司 Router management password recovery method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217375A (en) * 2008-01-16 2008-07-09 陈勇 A saving and acquisition method and device of accounts and passwords
CN102866998A (en) * 2011-07-05 2013-01-09 中兴通讯股份有限公司 Centralized password management method and centralized password management system in synchronous system
CN105656907A (en) * 2016-01-25 2016-06-08 上海斐讯数据通信技术有限公司 Router management password recovery method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106951770A (en) * 2017-05-12 2017-07-14 维沃移动通信有限公司 A kind of terminal unlock method and terminal
WO2024060705A1 (en) * 2022-09-23 2024-03-28 中兴通讯股份有限公司 Password retrieval method, terminal device, electronic device, and computer storage medium

Similar Documents

Publication Publication Date Title
US11995171B2 (en) User interface for managing access to credentials for use in an operation
US11816194B2 (en) User interfaces for managing secure operations
US11824898B2 (en) User interfaces for managing a local network
CN107765944A (en) A kind of screen touch method, terminal device and computer-readable medium
CN106250190A (en) A kind of application startup method and terminal
CN107181858A (en) A kind of method and terminal for showing notification message
US11703996B2 (en) User input interfaces
CN106250876A (en) A kind of fingerprint identification method and terminal
CN106355059A (en) Password input method and terminal
CN106453904A (en) Information reminding method and terminal
CN106484270A (en) A kind of voice operating event adding method and terminal
CN106022077A (en) Screen unlocking method and terminal
US20230089689A1 (en) User interfaces for digital identification
US20210374744A1 (en) Configuring an account for a second user identity
US20230394899A1 (en) User interfaces for sharing an electronic key
CN107608719A (en) A kind of interface operation method, terminal and computer-readable recording medium
CN107479806A (en) The method and terminal of a kind of changing interface
CN107943359A (en) A kind of method, terminal and the computer-readable medium of the control of application program
CN106372476A (en) Terminal and unlocking method thereof
CN106599652A (en) Screen unlocking method and terminal
CN106484295A (en) A kind of password method for retrieving and terminal
CN106940620A (en) Control the method and mobile terminal of mobile terminal
CN107463303A (en) A kind of false-touch prevention method and terminal
CN106961436A (en) Method and mobile terminal that controlling network is accessed
CN107580030A (en) A kind of data managing method, device and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20170308

WW01 Invention patent application withdrawn after publication