CN106778219A - A kind of cipher code protection method and terminal - Google Patents
A kind of cipher code protection method and terminal Download PDFInfo
- Publication number
- CN106778219A CN106778219A CN201611027580.9A CN201611027580A CN106778219A CN 106778219 A CN106778219 A CN 106778219A CN 201611027580 A CN201611027580 A CN 201611027580A CN 106778219 A CN106778219 A CN 106778219A
- Authority
- CN
- China
- Prior art keywords
- password
- terminal
- user
- user input
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention discloses a kind of cipher code protection method and terminal, wherein, methods described includes:If detecting the triggering command of default password conversion, the first password of user input is obtained;The first password is converted into the second password;By the final password that second password identification is the user input.The embodiment of the present invention can effectively prevent the situation that password is cracked from occurring.
Description
Technical field
The present invention relates to electronic technology field, more particularly to a kind of cipher code protection method and terminal.
Background technology
With enriching constantly for mobile terminal function, the personal data of mobile terminal memory storage are more and more.People are usual
By setting the security of corresponding cryptoguard data, for example, electron mailbox, instant messaging application, on-line payment application
Corresponding password is set etc. default application or unlocking pin etc. is set.
However, third party user is easy to be hit storehouse repeatedly by procedure script and logs in and crack, cause the data of user
Lose.
In order to improve the security of password, to ensure the security of data in terminal, a kind of password of the prior art is protected
Maintaining method is that the complexity (password digit, password species, the limitation of password login number of times etc.) for improving preset password ensures safety
Property rank.
Existing cipher code protection method is still present the defect that password is easily cracked.
The content of the invention
The embodiment of the present invention provides a kind of cipher code protection method and terminal, can effectively prevent the situation that password is cracked from going out
It is existing.
In a first aspect, the embodiment of the invention provides a kind of cipher code protection method, the method includes:
If detecting the triggering command of default password conversion, the first password of user input is obtained;
The first password is converted into the second password;
By the final password that second password identification is the user input.
On the other hand, a kind of terminal is the embodiment of the invention provides, the terminal includes:
Acquiring unit, if the triggering command for detecting default password conversion, obtain user input first is close
Code;
Converting unit, for the first password to be converted into the second password;
Recognition unit, for by final password that second password identification is the user input.
If the embodiment of the present invention passes through to detect the triggering command that default password is changed, the first of user input is obtained
Password;First password is converted into the second password;It is the final password of user input by the second password identification;Because terminal is in inspection
When the triggering command for measuring default password conversion enters cryptoguard pattern, first password and the terminal of user input are finally known
Second password of the user input being clipped to is different so that user cannot be input into the first password with preset password match, so as to carry
Password safety coefficient high, the situation that can effectively prevent password to be cracked occurs.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, below will be to that will make needed for embodiment description
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, for ability
For the those of ordinary skill of domain, on the premise of not paying creative work, can also obtain other attached according to these accompanying drawings
Figure.
Fig. 1 is a kind of schematic flow diagram of cipher code protection method provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic flow diagram of cipher code protection method that another embodiment of the present invention is provided;
Fig. 3 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 4 is a kind of terminal schematic block diagram that another embodiment of the present invention is provided;
Fig. 5 is a kind of terminal schematic block diagram that yet another embodiment of the invention is provided.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than whole embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
It should be appreciated that when using in this specification and in the appended claims, term " including " and "comprising" instruction
The presence of described feature, entirety, step, operation, element and/or component, but it is not precluded from one or more of the other feature, whole
The presence or addition of body, step, operation, element, component and/or its set.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment
And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singulative, " one " and " being somebody's turn to do " is intended to include plural form.
It will be further appreciated that, the term "and/or" used in description of the invention and appended claims is
Refer to any combinations of one or more in the associated item listed and be possible to combination, and including these combinations.
As in this specification and in the appended claims as use, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In implementing, the terminal described in the embodiment of the present invention including but not limited to such as has touch sensitive surface
Other of the mobile phone of (for example, touch-screen display and/or touch pad), laptop computer or tablet PC etc are just
Portable device.It is to be further understood that in certain embodiments, the equipment not portable communication device, but with touching
Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, describe to include the terminal of display and touch sensitive surface.It is, however, to be understood that
It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as it is following in one or more:Drawing application program, demonstration application journey
Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application
Program, telephony application, videoconference application, email application, instant messaging applications, exercise
Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application
Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can be public using at least one of such as touch sensitive surface
Physical user-interface device.Can be adjusted among applications and/or in corresponding application programs and/or changed and touch sensitive table
The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal is (for example, touch
Sensing surface) can support that there are the various application programs of user interface directly perceived and transparent for a user.
Fig. 1 is referred to, Fig. 1 is a kind of schematic flow diagram of cipher code protection method provided in an embodiment of the present invention.This implementation
The executive agent of cipher code protection method is terminal in example.Terminal can be that mobile phone, panel computer etc. need to set the movement of password
Terminal.Cipher code protection method as shown in Figure 1 may include following steps:
S101:If detecting the triggering command of default password conversion, the first password of user input is obtained.
User opens cipher protection function when needing to carry out cryptoguard.User can be input into preset instructions triggering eventually
Open cipher protection function in end, it is also possible to be configured to open cipher protection function by setting interface, be not limited herein.
Terminal opens cipher protection function when the triggering command of default password conversion is detected, into password conversion
Pattern.Terminal monitoring simultaneously obtains the first password that user is input into current interactive interface.Wherein, the user can be that this terminal is used
Family, or the third party user in addition to this terminal user.
S102:The first password is converted into the second password.
When the first password of user input is got, terminal starts engine manager and performs password conversion operation terminal,
First password is converted into the second password.
Wherein, first password is different from the second password, and first password random transition into the second password also can may be used by terminal
First password is converted into its corresponding default second password with by default corresponding relation, is not limited herein.
For example, terminal is when first password is got, can be in numeral or character (letter, the symbol included to first password
Number) resequenced, so as to first password is converted into the second password;Can also at random be increased or decreased in first password
At least one numeral or character, so as to obtain the second password.
It is understood that in embodiment, terminal can also be close by first according to user-defined conversion regime
Code is converted into the second password, as long as ensureing that first password is different from the second password.
S103:By the final password that second password identification is the user input.
The second password identification that terminal will be converted to is the final password of user input.
Terminal by starting engine manager by the second cipher feedback to system message queue so that system message queue according to
It is secondary to export to the corresponding application of current interactive interface.
Such scheme, if terminal detects the triggering command of default password conversion, obtain user input first is close
Code;First password is converted into the second password;It is the final password of user input by the second password identification;Because terminal is in detection
When entering cryptoguard pattern to the triggering command that default password is changed, first password and the terminal of user input are finally recognized
Second password of the user input for arriving is different so that user cannot be input into the first password with preset password match, so as to improve
Cryptosecurity coefficient, the situation that can effectively prevent password to be cracked occurs, and can effectively improve the security of terminal data, prevents
The potential safety hazard for only causing because terminal data is compromised.
Fig. 2 is referred to, Fig. 2 is a kind of schematic flow diagram of cipher code protection method that another embodiment of the present invention is provided.This
The executive agent of cipher code protection method is terminal in embodiment.Terminal can need to set password for mobile phone, panel computer etc.
Mobile terminal.Cipher code protection method as shown in Figure 2 may include following steps:
S201:If detecting the triggering command of default password conversion, the first password of user input is obtained.
User opens cipher protection function when needing to carry out cryptoguard.User can be input into preset instructions triggering eventually
Open cipher protection function in end, it is also possible to be configured to open cipher protection function by setting interface, be not limited herein.
Terminal opens cipher protection function when the triggering command of default password conversion is detected, into password conversion
Pattern.Terminal monitoring simultaneously obtains the first password of user input.Wherein, the user can be this terminal user, or remove
Third party user outside this terminal user.
Further, step S201 can be:If getting the predetermined encryption field of the user input, user is obtained
The first password of input.
For example, terminal user is by being input into encrypted fields, triggering terminal opens cipher protection function, into password modulus of conversion
Formula.
Terminal (but is not limited to this, could be arranged to other getting the encrypted fields Lock-L of terminal user's input
Encrypted fields), terminal open cipher protection function, into password translative mode.Terminal obtains user in current interactive interface
The first password of input.
Current interactive interface can be that (application can be instant messaging application or electricity for unlock interface, or application
Sub-voice mailbox etc. is applied) login interface or on-line payment interface etc..
S202:The first password is converted into the second password.
When the first password of user input is got, terminal starts engine manager and performs password conversion operation terminal,
First password is converted into the second password.
Wherein, first password is different from the second password, and first password random transition into the second password also can may be used by terminal
First password is converted into its corresponding default second password with by default corresponding relation, is not limited herein.
For example, terminal is when first password is got, can be in numeral or character (letter, the symbol included to first password
Number) resequenced, so as to first password is converted into the second password;Can also at random be increased or decreased in first password
At least one numeral or character, so as to obtain the second password.
It is understood that in embodiment, terminal can also be close by first according to user-defined conversion regime
Code is converted into the second password, as long as ensureing that first password is different from the second password.
Further, step S202 can include:The first password is encrypted using predetermined encryption algorithm, by institute
State first password and be converted to the second password.
Terminal is encrypted using predetermined encryption algorithm to the first password for getting, by first password include numeral or
Character is converted to corresponding preset number or character, forms the second password, so as to first password is converted into the second password.
Predetermined encryption algorithm can increase/reduce the numeral or character in first password, and user self-defined can also add
Close algorithm.
S203:By the final password that second password identification is the user input.
The second password identification that terminal will be converted to is the final password of user input.
Terminal by starting engine manager by the second cipher feedback to system message queue so that system message queue according to
It is secondary to export to the corresponding application of current interactive interface.
S204:If detecting the default triggering command for exiting cryptoguard pattern, by the user currently input
Information is identified as target information.
When terminal is in cryptoguard state, user closes cipher protection function when that need not carry out cryptoguard.With
Family can be input into preset instructions triggering terminal and close cipher protection function, exit cryptoguard pattern, it is also possible to by setting boundary
Face is configured to close cipher protection function, is not limited herein.
Terminal detect it is default exit cryptoguard pattern triggering command when, terminal close or exit password guarantor
Shield, normal input state is set to by the input state of terminal., when the information of user input is got, terminal is not to this for terminal
Information is processed, and the information that user is currently input into is identified as the target information of user input.
Wherein, when the information that user currently input is password, terminal is not changed to the password, by the password identification
It is the final password of user input, now user can be input into preset password.
Further, step S204 can be:If detecting the default triggering command for exiting cryptoguard pattern, will
The information of the user currently input is identified as target information.
For example, terminal user closes cipher protection function by being input into decryption field, triggering terminal.
Terminal (but is not limited to this, could be arranged to it getting the decryption field Unlock-U of terminal user's input
His decryption field), terminal closes cipher protection function, exits password translative mode, and the input state of terminal is set to just
Normal input state.
When the information of user input is got, terminal is not processed the information terminal, and user is currently input into
Information is identified as the target information of user input.
Wherein, when the information that user currently input is password, terminal is not changed to the password, by the password identification
It is the final password of user input, now user can be input into preset password.
Such scheme, if terminal detects the triggering command of default password conversion, obtain user input first is close
Code;First password is converted into the second password;It is the final password of user input by the second password identification;Because terminal is in detection
When entering cryptoguard pattern to the triggering command that default password is changed, first password and the terminal of user input are finally recognized
Second password of the user input for arriving is different so that user cannot be input into the first password with preset password match, so as to improve
Cryptosecurity coefficient, the situation that can effectively prevent password to be cracked occurs, and can effectively improve the security of terminal data, prevents
The potential safety hazard for only causing because terminal data is compromised.
First password is converted to the second password by terminal according to predetermined encryption algorithm so that user cannot currently be input into default
Password.The complexity of preset password need not be increased due to terminal, you can improve the security of password, user can be easy to remember
Password, it is user-friendly.
Referring to Fig. 3, Fig. 3 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention.Terminal can be mobile phone, put down
The mobile terminals such as plate computer, but this is not limited to, can also be other-end, it is not limited herein.The terminal bag of the present embodiment
The each unit for including is used to perform each step in the corresponding embodiments of Fig. 1, specifically refers to the corresponding embodiments of Fig. 1 and Fig. 1
In associated description, do not repeat herein.The terminal 300 of the present embodiment includes:Acquiring unit 310, converting unit 320 and identification
Unit 330.
If acquiring unit 310 is used to detect the triggering command of default password conversion, the first of user input is obtained
Password.Such as, if acquiring unit 310 detects the triggering command of default password conversion, obtain user input first is close
Code.Acquiring unit 310 sends first password to converting unit 320.
Converting unit 320 is used to receive the first password of the transmission of acquiring unit 310, first password is converted into second close
Code.Such as, converting unit 320 receives the first password that acquiring unit 310 sends, and first password is converted into the second password.Turn
Unit 320 is changed to send the second password to recognition unit 330.
Recognition unit 330 is used to receive the second password of the transmission of converting unit 320, is user input by the second password identification
Final password.Such as, recognition unit 330 receives the second password that converting unit 320 sends, and is user by the second password identification
The final password of input.
Such scheme, if terminal detects the triggering command of default password conversion, obtain user input first is close
Code;First password is converted into the second password;It is the final password of user input by the second password identification;Because terminal is in detection
When entering cryptoguard pattern to the triggering command that default password is changed, first password and the terminal of user input are finally recognized
Second password of the user input for arriving is different so that user cannot be input into the first password with preset password match, so as to improve
Cryptosecurity coefficient, the situation that can effectively prevent password to be cracked occurs, and can effectively improve the security of terminal data, prevents
The potential safety hazard for only causing because terminal data is compromised.
Referring to Fig. 4, Fig. 4 is a kind of schematic block diagram of terminal that another embodiment of the present invention is provided.Terminal can be hand
The mobile terminals such as machine, panel computer, but this is not limited to, can also be other-end, it is not limited herein.The end of the present embodiment
The each unit that end includes is used for each step performed in the corresponding embodiments of Fig. 2, specifically refers to the corresponding realities of Fig. 2 and Fig. 2
The associated description in example is applied, is not repeated herein.The terminal 400 of the present embodiment includes:Acquiring unit 410, converting unit 420 and
Recognition unit 430.Wherein, acquiring unit 410 can include encrypted fields acquiring unit 411.
If acquiring unit 410 is used to detect the triggering command of default password conversion, the first of user input is obtained
Password.Such as, if acquiring unit 410 detects the triggering command of default password conversion, obtain user input first is close
Code.
Alternatively, when acquiring unit 410 includes encrypted fields acquiring unit 411, encrypted fields acquiring unit 411 is used for
If getting the predetermined encryption field of user input, the first password of user input is obtained.
Acquiring unit 410 sends first password to converting unit 420.
Converting unit 420 is used to receive the first password of the transmission of acquiring unit 410, first password is converted into second close
Code.Such as, converting unit 420 receives the first password that acquiring unit 410 sends, and first password is converted into the second password.
Alternatively, converting unit 420 is close by first specifically for being encrypted to first password using predetermined encryption algorithm
Code is converted to the second password.
Converting unit 420 sends the second password to recognition unit 430.
Recognition unit 430 is used to receive the second password of the transmission of converting unit 420, is user input by the second password identification
Final password.Such as, recognition unit 430 receives the second password that converting unit 420 sends, and is user by the second password identification
The final password of input.
If recognition unit 430 is additionally operable to detect the default triggering command for exiting cryptoguard pattern, user is worked as
The information of preceding input is identified as target information.
Such as, it is if recognition unit 430 detects the default triggering command for exiting cryptoguard pattern, user is current
The information of input is identified as target information.
Alternatively, if recognition unit 430 works as user also particularly useful for the default decryption field for getting user input
The information of preceding input is identified as target information.
Such scheme, if terminal detects the triggering command of default password conversion, obtain user input first is close
Code;First password is converted into the second password;It is the final password of user input by the second password identification;Because terminal is in detection
When entering cryptoguard pattern to the triggering command that default password is changed, first password and the terminal of user input are finally recognized
Second password of the user input for arriving is different so that user cannot be input into the first password with preset password match, so as to improve
Cryptosecurity coefficient, the situation that can effectively prevent password to be cracked occurs, and can effectively improve the security of terminal data, prevents
The potential safety hazard for only causing because terminal data is compromised.
First password is converted to the second password by terminal according to predetermined encryption algorithm so that user cannot currently be input into default
Password.The complexity of preset password need not be increased due to terminal, you can improve the security of password, user can be easy to remember
Password, it is user-friendly.
Referring to Fig. 5, Fig. 5 is a kind of terminal schematic block diagram that yet another embodiment of the invention is provided.This reality as depicted
The terminal 500 applied in example can include:One or more processors 510;One or more input equipments 520, one or more
Output equipment 530 and memory 540.Above-mentioned processor 510, input equipment 520, output equipment 530 and memory 540 are by total
Line 550 is connected.
Memory 540 is instructed for storage program.
The programmed instruction that processor 510 is used to be stored according to memory 540 performs following operation:
If processor 510 is used to detect the triggering command of default password conversion, obtain user input first is close
Code.
Processor 510 is additionally operable to for the first password to be converted to the second password.
Processor 510 is additionally operable to final password that second password identification is the user input.
Alternatively, if processor 510 is additionally operable to detect the default triggering command for exiting cryptoguard pattern, by institute
The information for stating user's currently input is identified as target information.
Alternatively, processor 510, will be described specifically for being encrypted to the first password using predetermined encryption algorithm
First password is converted to the second password.
Alternatively, if processor 510 obtains user specifically for getting the predetermined encryption field of the user input
The first password of input.
Alternatively, if processor 510 is specifically for getting the default decryption field of the user input, by the use
The information of family currently input is identified as target information.
Such scheme, if terminal detects default unlocking screen triggering command, the spy of the target face that judgement is collected
Whether reference breath matches with the characteristic information of default face;If the characteristic information of the characteristic information of target face and default face
Match somebody with somebody, the hiding unlock interface of display;The unlocking information that user is input into according to the unlock interface is obtained, unlocking information is verified;If
Unlocking information is verified successfully, removing screen locking.Because terminal is under lock state of screen, unlock interface is hiding, if
Active user is unauthorized user, even if lighting terminal screen cannot also get unlock interface, it is impossible to which terminal is unlocked,
The security of terminal data can be effectively improved, the potential safety hazard caused because terminal data is compromised is prevented, can effectively be carried
The security of terminal data high, prevents the potential safety hazard caused because terminal data is compromised.
Terminal can set different latching modes, because the second latching mode correspondence combines unlocking manner, even if second
The unlocking information of the first unlocking manner of latching mode is illegally accessed, and also can only see the second unblock circle of the second latching mode
Face, in the unlocking information of the second unlock interface without the second latching mode, still cannot be unlocked, to terminal by increasing
Plus the complexity of unblock, further increase the security of terminal data.
It should be appreciated that in embodiments of the present invention, alleged processor 510 can be CPU (Central
Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
Reason device can also be any conventional processor etc..
Input equipment 520 can include that Trackpad, fingerprint adopt sensor (finger print information and fingerprint for gathering user
Directional information), microphone etc., output equipment 530 can be including display (LCD etc.), loudspeaker etc..
The memory 540 can include read-only storage and random access memory, and to processor 510 provide instruction and
Data.The a part of of memory 540 can also include nonvolatile RAM.For example, memory 540 can also be deposited
Store up the information of device type.
In implementing, processor 510, input equipment 520 described in the embodiment of the present invention, output equipment 530 can
The implementation described in the first embodiment and second embodiment of cipher code protection method provided in an embodiment of the present invention is performed,
Also the implementation of the terminal described by the embodiment of the present invention is can perform, is will not be repeated here.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein
Unit and algorithm steps, can be realized, with electronic hardware, computer software or the combination of the two in order to clearly demonstrate hardware
With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This
A little functions are performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme.Specially
Industry technical staff can realize described function to each specific application using distinct methods, but this realization is not
It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that, for convenience of description and succinctly, the end of foregoing description
End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed terminal and method, can be by it
Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only
Only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can be tied
Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.In addition, shown or discussed phase
Coupling or direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication by some interfaces, device or unit
Connection, or electricity, machinery or other forms connections.
Step in present invention method can according to actual needs carry out order adjustment, merge and delete.
Unit in embodiment of the present invention terminal can according to actual needs be merged, divides and deleted.
The unit that is illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit
The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be according to the actual needs selected to realize embodiment of the present invention scheme
Purpose.
In addition, during each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, or two or more units are integrated in a unit.It is above-mentioned integrated
Unit can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is to realize in the form of SFU software functional unit and as independent production marketing or use
When, can store in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part for being contributed to prior art in other words, or all or part of the technical scheme can be in the form of software product
Embody, the computer software product is stored in a storage medium, including some instructions are used to so that a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the invention
Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The above, specific embodiment only of the invention, but protection scope of the present invention is not limited thereto, and it is any
Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced
Change, these modifications or replacement should all be included within the scope of the present invention.Therefore, protection scope of the present invention should be with right
It is required that protection domain be defined.
Claims (10)
1. a kind of cipher code protection method, it is characterised in that the cipher code protection method includes:
If detecting the triggering command of default password conversion, the first password of user input is obtained;
The first password is converted into the second password;
By the final password that second password identification is the user input.
2. cipher code protection method according to claim 1, it is characterised in that the cipher code protection method also includes:
If detecting the default triggering command for exiting cryptoguard pattern, the information of the user currently input is identified as
Target information.
3. cipher code protection method according to claim 1, it is characterised in that described that the first password is converted to second
Password includes:
The first password is encrypted using predetermined encryption algorithm, the first password is converted into the second password.
4. cipher code protection method according to claim 1 and 2, it is characterised in that detect default password and turn if described
The triggering command changed, the then first password for obtaining user input includes:
If getting the predetermined encryption field of the user input, the first password of user input is obtained.
5. cipher code protection method according to claim 3, it is characterised in that if described detecting default exits password guarantor
The triggering command of shield pattern, then also wrap the target information that the information of the user currently input is identified as the user input
Include:
If getting the default decryption field of the user input, the information of the user currently input is identified as target letter
Breath.
6. a kind of terminal, it is characterised in that the terminal includes:
Acquiring unit, if the triggering command for detecting default password conversion, obtains the first password of user input;
Converting unit, for the first password to be converted into the second password;
Recognition unit, for by final password that second password identification is the user input.
7. terminal according to claim 6, it is characterised in that if the recognition unit is additionally operable to detect default exiting
The triggering command of cryptoguard pattern, then be identified as target information by the information that the user is currently input into.
8. terminal according to claim 6, it is characterised in that the converting unit is specifically for using predetermined encryption algorithm
The first password is encrypted, the first password is converted into the second password.
9. the terminal according to claim 6 or 7, it is characterised in that the acquiring unit includes:
Encrypted fields acquiring unit, if the predetermined encryption field for getting the user input, obtains user input
First password.
10. terminal according to claim 8, it is characterised in that if the recognition unit is specifically for getting the use
The default decryption field of family input, then be identified as target information by the information that the user is currently input into.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611027580.9A CN106778219A (en) | 2016-11-17 | 2016-11-17 | A kind of cipher code protection method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611027580.9A CN106778219A (en) | 2016-11-17 | 2016-11-17 | A kind of cipher code protection method and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106778219A true CN106778219A (en) | 2017-05-31 |
Family
ID=58970798
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611027580.9A Withdrawn CN106778219A (en) | 2016-11-17 | 2016-11-17 | A kind of cipher code protection method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106778219A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111914248A (en) * | 2020-08-18 | 2020-11-10 | 科大讯飞股份有限公司 | Password input method, device, equipment and storage medium |
CN113282913A (en) * | 2021-07-23 | 2021-08-20 | 天聚地合(苏州)数据股份有限公司 | Password replacement method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102737441A (en) * | 2011-08-19 | 2012-10-17 | 广州广电运通金融电子股份有限公司 | Self-service terminal password input device |
CN104156071A (en) * | 2014-08-22 | 2014-11-19 | 小米科技有限责任公司 | Method and device for setting screen password and unlocking screen |
CN104424427A (en) * | 2013-08-28 | 2015-03-18 | 联发科技(新加坡)私人有限公司 | Password authentication method and device |
-
2016
- 2016-11-17 CN CN201611027580.9A patent/CN106778219A/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102737441A (en) * | 2011-08-19 | 2012-10-17 | 广州广电运通金融电子股份有限公司 | Self-service terminal password input device |
CN104424427A (en) * | 2013-08-28 | 2015-03-18 | 联发科技(新加坡)私人有限公司 | Password authentication method and device |
CN104156071A (en) * | 2014-08-22 | 2014-11-19 | 小米科技有限责任公司 | Method and device for setting screen password and unlocking screen |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111914248A (en) * | 2020-08-18 | 2020-11-10 | 科大讯飞股份有限公司 | Password input method, device, equipment and storage medium |
CN111914248B (en) * | 2020-08-18 | 2023-10-27 | 科大讯飞股份有限公司 | Password input method, device, equipment and storage medium |
CN113282913A (en) * | 2021-07-23 | 2021-08-20 | 天聚地合(苏州)数据股份有限公司 | Password replacement method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107704765A (en) | A kind of interface access method, server and computer-readable recording medium | |
CN101529366B (en) | Identification and visualization of trusted user interface objects | |
CN106778130B (en) | Message display method, display device and mobile terminal | |
CN105354466B (en) | A kind of fingerprint identification method and mobile terminal | |
US20090044282A1 (en) | System and Method for Generating and Displaying a Keyboard Comprising a Random Layout of Keys | |
CN106355059A (en) | Password input method and terminal | |
CN105519038A (en) | Data protection based on user input during device boot-up, user login, and device shut-down states | |
CN107491732A (en) | A kind of identity authentication method and terminal | |
CN106357672A (en) | Login method and terminal | |
CN107169343A (en) | A kind of method and terminal of control application program | |
CN107466031A (en) | A kind of method and terminal for protecting data | |
CN108769027A (en) | Safety communicating method, device, mobile terminal and storage medium | |
CN105493094A (en) | Data protection system based on user input patterns on device | |
CN107358114A (en) | A kind of method and terminal for preventing user data loss | |
US11204994B2 (en) | Injection attack identification and mitigation | |
CN106022077A (en) | Screen unlocking method and terminal | |
CN106709383A (en) | Communication message protection method and device and mobile terminal | |
CN106713618A (en) | Processing method of identifying code and mobile terminal | |
CN107633169A (en) | A kind of terminal unlock method, terminal and computer-readable recording medium | |
CN106529235A (en) | Unlocking method and terminal | |
EP2919422B1 (en) | Method and device for detecting spoofed messages | |
CN106778219A (en) | A kind of cipher code protection method and terminal | |
CN106851613A (en) | Service request method, the verification method of business handling number and its terminal | |
CN109522683A (en) | Software source tracing method, system, computer equipment and storage medium | |
CN108092795A (en) | A kind of reminding method, terminal device and computer-readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20170531 |