CN106778219A - A kind of cipher code protection method and terminal - Google Patents

A kind of cipher code protection method and terminal Download PDF

Info

Publication number
CN106778219A
CN106778219A CN201611027580.9A CN201611027580A CN106778219A CN 106778219 A CN106778219 A CN 106778219A CN 201611027580 A CN201611027580 A CN 201611027580A CN 106778219 A CN106778219 A CN 106778219A
Authority
CN
China
Prior art keywords
password
terminal
user
user input
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201611027580.9A
Other languages
Chinese (zh)
Inventor
***
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201611027580.9A priority Critical patent/CN106778219A/en
Publication of CN106778219A publication Critical patent/CN106778219A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses a kind of cipher code protection method and terminal, wherein, methods described includes:If detecting the triggering command of default password conversion, the first password of user input is obtained;The first password is converted into the second password;By the final password that second password identification is the user input.The embodiment of the present invention can effectively prevent the situation that password is cracked from occurring.

Description

A kind of cipher code protection method and terminal
Technical field
The present invention relates to electronic technology field, more particularly to a kind of cipher code protection method and terminal.
Background technology
With enriching constantly for mobile terminal function, the personal data of mobile terminal memory storage are more and more.People are usual By setting the security of corresponding cryptoguard data, for example, electron mailbox, instant messaging application, on-line payment application Corresponding password is set etc. default application or unlocking pin etc. is set.
However, third party user is easy to be hit storehouse repeatedly by procedure script and logs in and crack, cause the data of user Lose.
In order to improve the security of password, to ensure the security of data in terminal, a kind of password of the prior art is protected Maintaining method is that the complexity (password digit, password species, the limitation of password login number of times etc.) for improving preset password ensures safety Property rank.
Existing cipher code protection method is still present the defect that password is easily cracked.
The content of the invention
The embodiment of the present invention provides a kind of cipher code protection method and terminal, can effectively prevent the situation that password is cracked from going out It is existing.
In a first aspect, the embodiment of the invention provides a kind of cipher code protection method, the method includes:
If detecting the triggering command of default password conversion, the first password of user input is obtained;
The first password is converted into the second password;
By the final password that second password identification is the user input.
On the other hand, a kind of terminal is the embodiment of the invention provides, the terminal includes:
Acquiring unit, if the triggering command for detecting default password conversion, obtain user input first is close Code;
Converting unit, for the first password to be converted into the second password;
Recognition unit, for by final password that second password identification is the user input.
If the embodiment of the present invention passes through to detect the triggering command that default password is changed, the first of user input is obtained Password;First password is converted into the second password;It is the final password of user input by the second password identification;Because terminal is in inspection When the triggering command for measuring default password conversion enters cryptoguard pattern, first password and the terminal of user input are finally known Second password of the user input being clipped to is different so that user cannot be input into the first password with preset password match, so as to carry Password safety coefficient high, the situation that can effectively prevent password to be cracked occurs.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, below will be to that will make needed for embodiment description Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, for ability For the those of ordinary skill of domain, on the premise of not paying creative work, can also obtain other attached according to these accompanying drawings Figure.
Fig. 1 is a kind of schematic flow diagram of cipher code protection method provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic flow diagram of cipher code protection method that another embodiment of the present invention is provided;
Fig. 3 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 4 is a kind of terminal schematic block diagram that another embodiment of the present invention is provided;
Fig. 5 is a kind of terminal schematic block diagram that yet another embodiment of the invention is provided.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than whole embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
It should be appreciated that when using in this specification and in the appended claims, term " including " and "comprising" instruction The presence of described feature, entirety, step, operation, element and/or component, but it is not precluded from one or more of the other feature, whole The presence or addition of body, step, operation, element, component and/or its set.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, " one " and " being somebody's turn to do " is intended to include plural form.
It will be further appreciated that, the term "and/or" used in description of the invention and appended claims is Refer to any combinations of one or more in the associated item listed and be possible to combination, and including these combinations.
As in this specification and in the appended claims as use, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In implementing, the terminal described in the embodiment of the present invention including but not limited to such as has touch sensitive surface Other of the mobile phone of (for example, touch-screen display and/or touch pad), laptop computer or tablet PC etc are just Portable device.It is to be further understood that in certain embodiments, the equipment not portable communication device, but with touching Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, describe to include the terminal of display and touch sensitive surface.It is, however, to be understood that It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as it is following in one or more:Drawing application program, demonstration application journey Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application Program, telephony application, videoconference application, email application, instant messaging applications, exercise Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can be public using at least one of such as touch sensitive surface Physical user-interface device.Can be adjusted among applications and/or in corresponding application programs and/or changed and touch sensitive table The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal is (for example, touch Sensing surface) can support that there are the various application programs of user interface directly perceived and transparent for a user.
Fig. 1 is referred to, Fig. 1 is a kind of schematic flow diagram of cipher code protection method provided in an embodiment of the present invention.This implementation The executive agent of cipher code protection method is terminal in example.Terminal can be that mobile phone, panel computer etc. need to set the movement of password Terminal.Cipher code protection method as shown in Figure 1 may include following steps:
S101:If detecting the triggering command of default password conversion, the first password of user input is obtained.
User opens cipher protection function when needing to carry out cryptoguard.User can be input into preset instructions triggering eventually Open cipher protection function in end, it is also possible to be configured to open cipher protection function by setting interface, be not limited herein.
Terminal opens cipher protection function when the triggering command of default password conversion is detected, into password conversion Pattern.Terminal monitoring simultaneously obtains the first password that user is input into current interactive interface.Wherein, the user can be that this terminal is used Family, or the third party user in addition to this terminal user.
S102:The first password is converted into the second password.
When the first password of user input is got, terminal starts engine manager and performs password conversion operation terminal, First password is converted into the second password.
Wherein, first password is different from the second password, and first password random transition into the second password also can may be used by terminal First password is converted into its corresponding default second password with by default corresponding relation, is not limited herein.
For example, terminal is when first password is got, can be in numeral or character (letter, the symbol included to first password Number) resequenced, so as to first password is converted into the second password;Can also at random be increased or decreased in first password At least one numeral or character, so as to obtain the second password.
It is understood that in embodiment, terminal can also be close by first according to user-defined conversion regime Code is converted into the second password, as long as ensureing that first password is different from the second password.
S103:By the final password that second password identification is the user input.
The second password identification that terminal will be converted to is the final password of user input.
Terminal by starting engine manager by the second cipher feedback to system message queue so that system message queue according to It is secondary to export to the corresponding application of current interactive interface.
Such scheme, if terminal detects the triggering command of default password conversion, obtain user input first is close Code;First password is converted into the second password;It is the final password of user input by the second password identification;Because terminal is in detection When entering cryptoguard pattern to the triggering command that default password is changed, first password and the terminal of user input are finally recognized Second password of the user input for arriving is different so that user cannot be input into the first password with preset password match, so as to improve Cryptosecurity coefficient, the situation that can effectively prevent password to be cracked occurs, and can effectively improve the security of terminal data, prevents The potential safety hazard for only causing because terminal data is compromised.
Fig. 2 is referred to, Fig. 2 is a kind of schematic flow diagram of cipher code protection method that another embodiment of the present invention is provided.This The executive agent of cipher code protection method is terminal in embodiment.Terminal can need to set password for mobile phone, panel computer etc. Mobile terminal.Cipher code protection method as shown in Figure 2 may include following steps:
S201:If detecting the triggering command of default password conversion, the first password of user input is obtained.
User opens cipher protection function when needing to carry out cryptoguard.User can be input into preset instructions triggering eventually Open cipher protection function in end, it is also possible to be configured to open cipher protection function by setting interface, be not limited herein.
Terminal opens cipher protection function when the triggering command of default password conversion is detected, into password conversion Pattern.Terminal monitoring simultaneously obtains the first password of user input.Wherein, the user can be this terminal user, or remove Third party user outside this terminal user.
Further, step S201 can be:If getting the predetermined encryption field of the user input, user is obtained The first password of input.
For example, terminal user is by being input into encrypted fields, triggering terminal opens cipher protection function, into password modulus of conversion Formula.
Terminal (but is not limited to this, could be arranged to other getting the encrypted fields Lock-L of terminal user's input Encrypted fields), terminal open cipher protection function, into password translative mode.Terminal obtains user in current interactive interface The first password of input.
Current interactive interface can be that (application can be instant messaging application or electricity for unlock interface, or application Sub-voice mailbox etc. is applied) login interface or on-line payment interface etc..
S202:The first password is converted into the second password.
When the first password of user input is got, terminal starts engine manager and performs password conversion operation terminal, First password is converted into the second password.
Wherein, first password is different from the second password, and first password random transition into the second password also can may be used by terminal First password is converted into its corresponding default second password with by default corresponding relation, is not limited herein.
For example, terminal is when first password is got, can be in numeral or character (letter, the symbol included to first password Number) resequenced, so as to first password is converted into the second password;Can also at random be increased or decreased in first password At least one numeral or character, so as to obtain the second password.
It is understood that in embodiment, terminal can also be close by first according to user-defined conversion regime Code is converted into the second password, as long as ensureing that first password is different from the second password.
Further, step S202 can include:The first password is encrypted using predetermined encryption algorithm, by institute State first password and be converted to the second password.
Terminal is encrypted using predetermined encryption algorithm to the first password for getting, by first password include numeral or Character is converted to corresponding preset number or character, forms the second password, so as to first password is converted into the second password.
Predetermined encryption algorithm can increase/reduce the numeral or character in first password, and user self-defined can also add Close algorithm.
S203:By the final password that second password identification is the user input.
The second password identification that terminal will be converted to is the final password of user input.
Terminal by starting engine manager by the second cipher feedback to system message queue so that system message queue according to It is secondary to export to the corresponding application of current interactive interface.
S204:If detecting the default triggering command for exiting cryptoguard pattern, by the user currently input Information is identified as target information.
When terminal is in cryptoguard state, user closes cipher protection function when that need not carry out cryptoguard.With Family can be input into preset instructions triggering terminal and close cipher protection function, exit cryptoguard pattern, it is also possible to by setting boundary Face is configured to close cipher protection function, is not limited herein.
Terminal detect it is default exit cryptoguard pattern triggering command when, terminal close or exit password guarantor Shield, normal input state is set to by the input state of terminal., when the information of user input is got, terminal is not to this for terminal Information is processed, and the information that user is currently input into is identified as the target information of user input.
Wherein, when the information that user currently input is password, terminal is not changed to the password, by the password identification It is the final password of user input, now user can be input into preset password.
Further, step S204 can be:If detecting the default triggering command for exiting cryptoguard pattern, will The information of the user currently input is identified as target information.
For example, terminal user closes cipher protection function by being input into decryption field, triggering terminal.
Terminal (but is not limited to this, could be arranged to it getting the decryption field Unlock-U of terminal user's input His decryption field), terminal closes cipher protection function, exits password translative mode, and the input state of terminal is set to just Normal input state.
When the information of user input is got, terminal is not processed the information terminal, and user is currently input into Information is identified as the target information of user input.
Wherein, when the information that user currently input is password, terminal is not changed to the password, by the password identification It is the final password of user input, now user can be input into preset password.
Such scheme, if terminal detects the triggering command of default password conversion, obtain user input first is close Code;First password is converted into the second password;It is the final password of user input by the second password identification;Because terminal is in detection When entering cryptoguard pattern to the triggering command that default password is changed, first password and the terminal of user input are finally recognized Second password of the user input for arriving is different so that user cannot be input into the first password with preset password match, so as to improve Cryptosecurity coefficient, the situation that can effectively prevent password to be cracked occurs, and can effectively improve the security of terminal data, prevents The potential safety hazard for only causing because terminal data is compromised.
First password is converted to the second password by terminal according to predetermined encryption algorithm so that user cannot currently be input into default Password.The complexity of preset password need not be increased due to terminal, you can improve the security of password, user can be easy to remember Password, it is user-friendly.
Referring to Fig. 3, Fig. 3 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention.Terminal can be mobile phone, put down The mobile terminals such as plate computer, but this is not limited to, can also be other-end, it is not limited herein.The terminal bag of the present embodiment The each unit for including is used to perform each step in the corresponding embodiments of Fig. 1, specifically refers to the corresponding embodiments of Fig. 1 and Fig. 1 In associated description, do not repeat herein.The terminal 300 of the present embodiment includes:Acquiring unit 310, converting unit 320 and identification Unit 330.
If acquiring unit 310 is used to detect the triggering command of default password conversion, the first of user input is obtained Password.Such as, if acquiring unit 310 detects the triggering command of default password conversion, obtain user input first is close Code.Acquiring unit 310 sends first password to converting unit 320.
Converting unit 320 is used to receive the first password of the transmission of acquiring unit 310, first password is converted into second close Code.Such as, converting unit 320 receives the first password that acquiring unit 310 sends, and first password is converted into the second password.Turn Unit 320 is changed to send the second password to recognition unit 330.
Recognition unit 330 is used to receive the second password of the transmission of converting unit 320, is user input by the second password identification Final password.Such as, recognition unit 330 receives the second password that converting unit 320 sends, and is user by the second password identification The final password of input.
Such scheme, if terminal detects the triggering command of default password conversion, obtain user input first is close Code;First password is converted into the second password;It is the final password of user input by the second password identification;Because terminal is in detection When entering cryptoguard pattern to the triggering command that default password is changed, first password and the terminal of user input are finally recognized Second password of the user input for arriving is different so that user cannot be input into the first password with preset password match, so as to improve Cryptosecurity coefficient, the situation that can effectively prevent password to be cracked occurs, and can effectively improve the security of terminal data, prevents The potential safety hazard for only causing because terminal data is compromised.
Referring to Fig. 4, Fig. 4 is a kind of schematic block diagram of terminal that another embodiment of the present invention is provided.Terminal can be hand The mobile terminals such as machine, panel computer, but this is not limited to, can also be other-end, it is not limited herein.The end of the present embodiment The each unit that end includes is used for each step performed in the corresponding embodiments of Fig. 2, specifically refers to the corresponding realities of Fig. 2 and Fig. 2 The associated description in example is applied, is not repeated herein.The terminal 400 of the present embodiment includes:Acquiring unit 410, converting unit 420 and Recognition unit 430.Wherein, acquiring unit 410 can include encrypted fields acquiring unit 411.
If acquiring unit 410 is used to detect the triggering command of default password conversion, the first of user input is obtained Password.Such as, if acquiring unit 410 detects the triggering command of default password conversion, obtain user input first is close Code.
Alternatively, when acquiring unit 410 includes encrypted fields acquiring unit 411, encrypted fields acquiring unit 411 is used for If getting the predetermined encryption field of user input, the first password of user input is obtained.
Acquiring unit 410 sends first password to converting unit 420.
Converting unit 420 is used to receive the first password of the transmission of acquiring unit 410, first password is converted into second close Code.Such as, converting unit 420 receives the first password that acquiring unit 410 sends, and first password is converted into the second password.
Alternatively, converting unit 420 is close by first specifically for being encrypted to first password using predetermined encryption algorithm Code is converted to the second password.
Converting unit 420 sends the second password to recognition unit 430.
Recognition unit 430 is used to receive the second password of the transmission of converting unit 420, is user input by the second password identification Final password.Such as, recognition unit 430 receives the second password that converting unit 420 sends, and is user by the second password identification The final password of input.
If recognition unit 430 is additionally operable to detect the default triggering command for exiting cryptoguard pattern, user is worked as The information of preceding input is identified as target information.
Such as, it is if recognition unit 430 detects the default triggering command for exiting cryptoguard pattern, user is current The information of input is identified as target information.
Alternatively, if recognition unit 430 works as user also particularly useful for the default decryption field for getting user input The information of preceding input is identified as target information.
Such scheme, if terminal detects the triggering command of default password conversion, obtain user input first is close Code;First password is converted into the second password;It is the final password of user input by the second password identification;Because terminal is in detection When entering cryptoguard pattern to the triggering command that default password is changed, first password and the terminal of user input are finally recognized Second password of the user input for arriving is different so that user cannot be input into the first password with preset password match, so as to improve Cryptosecurity coefficient, the situation that can effectively prevent password to be cracked occurs, and can effectively improve the security of terminal data, prevents The potential safety hazard for only causing because terminal data is compromised.
First password is converted to the second password by terminal according to predetermined encryption algorithm so that user cannot currently be input into default Password.The complexity of preset password need not be increased due to terminal, you can improve the security of password, user can be easy to remember Password, it is user-friendly.
Referring to Fig. 5, Fig. 5 is a kind of terminal schematic block diagram that yet another embodiment of the invention is provided.This reality as depicted The terminal 500 applied in example can include:One or more processors 510;One or more input equipments 520, one or more Output equipment 530 and memory 540.Above-mentioned processor 510, input equipment 520, output equipment 530 and memory 540 are by total Line 550 is connected.
Memory 540 is instructed for storage program.
The programmed instruction that processor 510 is used to be stored according to memory 540 performs following operation:
If processor 510 is used to detect the triggering command of default password conversion, obtain user input first is close Code.
Processor 510 is additionally operable to for the first password to be converted to the second password.
Processor 510 is additionally operable to final password that second password identification is the user input.
Alternatively, if processor 510 is additionally operable to detect the default triggering command for exiting cryptoguard pattern, by institute The information for stating user's currently input is identified as target information.
Alternatively, processor 510, will be described specifically for being encrypted to the first password using predetermined encryption algorithm First password is converted to the second password.
Alternatively, if processor 510 obtains user specifically for getting the predetermined encryption field of the user input The first password of input.
Alternatively, if processor 510 is specifically for getting the default decryption field of the user input, by the use The information of family currently input is identified as target information.
Such scheme, if terminal detects default unlocking screen triggering command, the spy of the target face that judgement is collected Whether reference breath matches with the characteristic information of default face;If the characteristic information of the characteristic information of target face and default face Match somebody with somebody, the hiding unlock interface of display;The unlocking information that user is input into according to the unlock interface is obtained, unlocking information is verified;If Unlocking information is verified successfully, removing screen locking.Because terminal is under lock state of screen, unlock interface is hiding, if Active user is unauthorized user, even if lighting terminal screen cannot also get unlock interface, it is impossible to which terminal is unlocked, The security of terminal data can be effectively improved, the potential safety hazard caused because terminal data is compromised is prevented, can effectively be carried The security of terminal data high, prevents the potential safety hazard caused because terminal data is compromised.
Terminal can set different latching modes, because the second latching mode correspondence combines unlocking manner, even if second The unlocking information of the first unlocking manner of latching mode is illegally accessed, and also can only see the second unblock circle of the second latching mode Face, in the unlocking information of the second unlock interface without the second latching mode, still cannot be unlocked, to terminal by increasing Plus the complexity of unblock, further increase the security of terminal data.
It should be appreciated that in embodiments of the present invention, alleged processor 510 can be CPU (Central Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at Reason device can also be any conventional processor etc..
Input equipment 520 can include that Trackpad, fingerprint adopt sensor (finger print information and fingerprint for gathering user Directional information), microphone etc., output equipment 530 can be including display (LCD etc.), loudspeaker etc..
The memory 540 can include read-only storage and random access memory, and to processor 510 provide instruction and Data.The a part of of memory 540 can also include nonvolatile RAM.For example, memory 540 can also be deposited Store up the information of device type.
In implementing, processor 510, input equipment 520 described in the embodiment of the present invention, output equipment 530 can The implementation described in the first embodiment and second embodiment of cipher code protection method provided in an embodiment of the present invention is performed, Also the implementation of the terminal described by the embodiment of the present invention is can perform, is will not be repeated here.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Unit and algorithm steps, can be realized, with electronic hardware, computer software or the combination of the two in order to clearly demonstrate hardware With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This A little functions are performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme.Specially Industry technical staff can realize described function to each specific application using distinct methods, but this realization is not It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that, for convenience of description and succinctly, the end of foregoing description End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed terminal and method, can be by it Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only Only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can be tied Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.In addition, shown or discussed phase Coupling or direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication by some interfaces, device or unit Connection, or electricity, machinery or other forms connections.
Step in present invention method can according to actual needs carry out order adjustment, merge and delete.
Unit in embodiment of the present invention terminal can according to actual needs be merged, divides and deleted.
The unit that is illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be according to the actual needs selected to realize embodiment of the present invention scheme Purpose.
In addition, during each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, or two or more units are integrated in a unit.It is above-mentioned integrated Unit can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is to realize in the form of SFU software functional unit and as independent production marketing or use When, can store in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part for being contributed to prior art in other words, or all or part of the technical scheme can be in the form of software product Embody, the computer software product is stored in a storage medium, including some instructions are used to so that a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The above, specific embodiment only of the invention, but protection scope of the present invention is not limited thereto, and it is any Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced Change, these modifications or replacement should all be included within the scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection domain be defined.

Claims (10)

1. a kind of cipher code protection method, it is characterised in that the cipher code protection method includes:
If detecting the triggering command of default password conversion, the first password of user input is obtained;
The first password is converted into the second password;
By the final password that second password identification is the user input.
2. cipher code protection method according to claim 1, it is characterised in that the cipher code protection method also includes:
If detecting the default triggering command for exiting cryptoguard pattern, the information of the user currently input is identified as Target information.
3. cipher code protection method according to claim 1, it is characterised in that described that the first password is converted to second Password includes:
The first password is encrypted using predetermined encryption algorithm, the first password is converted into the second password.
4. cipher code protection method according to claim 1 and 2, it is characterised in that detect default password and turn if described The triggering command changed, the then first password for obtaining user input includes:
If getting the predetermined encryption field of the user input, the first password of user input is obtained.
5. cipher code protection method according to claim 3, it is characterised in that if described detecting default exits password guarantor The triggering command of shield pattern, then also wrap the target information that the information of the user currently input is identified as the user input Include:
If getting the default decryption field of the user input, the information of the user currently input is identified as target letter Breath.
6. a kind of terminal, it is characterised in that the terminal includes:
Acquiring unit, if the triggering command for detecting default password conversion, obtains the first password of user input;
Converting unit, for the first password to be converted into the second password;
Recognition unit, for by final password that second password identification is the user input.
7. terminal according to claim 6, it is characterised in that if the recognition unit is additionally operable to detect default exiting The triggering command of cryptoguard pattern, then be identified as target information by the information that the user is currently input into.
8. terminal according to claim 6, it is characterised in that the converting unit is specifically for using predetermined encryption algorithm The first password is encrypted, the first password is converted into the second password.
9. the terminal according to claim 6 or 7, it is characterised in that the acquiring unit includes:
Encrypted fields acquiring unit, if the predetermined encryption field for getting the user input, obtains user input First password.
10. terminal according to claim 8, it is characterised in that if the recognition unit is specifically for getting the use The default decryption field of family input, then be identified as target information by the information that the user is currently input into.
CN201611027580.9A 2016-11-17 2016-11-17 A kind of cipher code protection method and terminal Withdrawn CN106778219A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611027580.9A CN106778219A (en) 2016-11-17 2016-11-17 A kind of cipher code protection method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611027580.9A CN106778219A (en) 2016-11-17 2016-11-17 A kind of cipher code protection method and terminal

Publications (1)

Publication Number Publication Date
CN106778219A true CN106778219A (en) 2017-05-31

Family

ID=58970798

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611027580.9A Withdrawn CN106778219A (en) 2016-11-17 2016-11-17 A kind of cipher code protection method and terminal

Country Status (1)

Country Link
CN (1) CN106778219A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111914248A (en) * 2020-08-18 2020-11-10 科大讯飞股份有限公司 Password input method, device, equipment and storage medium
CN113282913A (en) * 2021-07-23 2021-08-20 天聚地合(苏州)数据股份有限公司 Password replacement method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102737441A (en) * 2011-08-19 2012-10-17 广州广电运通金融电子股份有限公司 Self-service terminal password input device
CN104156071A (en) * 2014-08-22 2014-11-19 小米科技有限责任公司 Method and device for setting screen password and unlocking screen
CN104424427A (en) * 2013-08-28 2015-03-18 联发科技(新加坡)私人有限公司 Password authentication method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102737441A (en) * 2011-08-19 2012-10-17 广州广电运通金融电子股份有限公司 Self-service terminal password input device
CN104424427A (en) * 2013-08-28 2015-03-18 联发科技(新加坡)私人有限公司 Password authentication method and device
CN104156071A (en) * 2014-08-22 2014-11-19 小米科技有限责任公司 Method and device for setting screen password and unlocking screen

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111914248A (en) * 2020-08-18 2020-11-10 科大讯飞股份有限公司 Password input method, device, equipment and storage medium
CN111914248B (en) * 2020-08-18 2023-10-27 科大讯飞股份有限公司 Password input method, device, equipment and storage medium
CN113282913A (en) * 2021-07-23 2021-08-20 天聚地合(苏州)数据股份有限公司 Password replacement method and device

Similar Documents

Publication Publication Date Title
CN107704765A (en) A kind of interface access method, server and computer-readable recording medium
CN101529366B (en) Identification and visualization of trusted user interface objects
CN106778130B (en) Message display method, display device and mobile terminal
CN105354466B (en) A kind of fingerprint identification method and mobile terminal
US20090044282A1 (en) System and Method for Generating and Displaying a Keyboard Comprising a Random Layout of Keys
CN106355059A (en) Password input method and terminal
CN105519038A (en) Data protection based on user input during device boot-up, user login, and device shut-down states
CN107491732A (en) A kind of identity authentication method and terminal
CN106357672A (en) Login method and terminal
CN107169343A (en) A kind of method and terminal of control application program
CN107466031A (en) A kind of method and terminal for protecting data
CN108769027A (en) Safety communicating method, device, mobile terminal and storage medium
CN105493094A (en) Data protection system based on user input patterns on device
CN107358114A (en) A kind of method and terminal for preventing user data loss
US11204994B2 (en) Injection attack identification and mitigation
CN106022077A (en) Screen unlocking method and terminal
CN106709383A (en) Communication message protection method and device and mobile terminal
CN106713618A (en) Processing method of identifying code and mobile terminal
CN107633169A (en) A kind of terminal unlock method, terminal and computer-readable recording medium
CN106529235A (en) Unlocking method and terminal
EP2919422B1 (en) Method and device for detecting spoofed messages
CN106778219A (en) A kind of cipher code protection method and terminal
CN106851613A (en) Service request method, the verification method of business handling number and its terminal
CN109522683A (en) Software source tracing method, system, computer equipment and storage medium
CN108092795A (en) A kind of reminding method, terminal device and computer-readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20170531