CN110837628A - Encryption and decryption method and device for terminal equipment, computer equipment and storage medium - Google Patents

Encryption and decryption method and device for terminal equipment, computer equipment and storage medium Download PDF

Info

Publication number
CN110837628A
CN110837628A CN201810936370.4A CN201810936370A CN110837628A CN 110837628 A CN110837628 A CN 110837628A CN 201810936370 A CN201810936370 A CN 201810936370A CN 110837628 A CN110837628 A CN 110837628A
Authority
CN
China
Prior art keywords
input
password
user
characters
password characters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810936370.4A
Other languages
Chinese (zh)
Other versions
CN110837628B (en
Inventor
刘小华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BYD Co Ltd
Original Assignee
BYD Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BYD Co Ltd filed Critical BYD Co Ltd
Priority to CN201810936370.4A priority Critical patent/CN110837628B/en
Publication of CN110837628A publication Critical patent/CN110837628A/en
Application granted granted Critical
Publication of CN110837628B publication Critical patent/CN110837628B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

The invention discloses an encryption and decryption method and device of terminal equipment, computer equipment and a storage medium, wherein the encryption method comprises the following steps: displaying a password setting interface; acquiring password characters input by a user and input mode information of the input password characters; when the number of times of inputting the password characters by the user is detected to be at least two times, whether the password characters input each time and the input modes of inputting the password characters are consistent or not is judged, if yes, the password is prompted to be successfully set, and if not, the password characters are prompted to be input again.

Description

Encryption and decryption method and device for terminal equipment, computer equipment and storage medium
Technical Field
The present invention relates to the field of information security technologies, and in particular, to an encryption and decryption method and apparatus for a terminal device, a computer device, and a storage medium.
Background
At present, when terminal equipment such as a mobile phone and a tablet personal computer performs password setting and decryption operations, only password content is judged, which is a commonly used mode in the prior art, the encryption and decryption mode is single, the confidentiality of the encryption and decryption mode is insufficient, password information is easy to leak, property loss of a user is caused, especially, with the continuous development of the internet, ways and modes for stealing the password information of the user are more and more, and the encryption and decryption mode for judging the password content can seriously endanger individual secret information of the user.
Disclosure of Invention
The invention aims to provide an encryption method, a decryption method, an encryption system and a decryption system of terminal equipment, and aims to solve the problem of insufficient confidentiality caused by single encryption and decryption modes of the existing terminal equipment.
The present invention is achieved in this way, and a first aspect of the present invention provides an encryption method for a terminal device, the encryption method including:
displaying a password setting interface;
acquiring password characters input by a user and input mode information of the input password characters;
when the number of times that the user inputs the password characters is detected to be at least two, whether the password characters input each time and the input modes of the input password characters are consistent or not is judged, if yes, the password is prompted to be successfully set, and if not, the password characters are prompted to be input again.
A second aspect of the present invention provides a decryption method for a terminal device, where the decryption method includes:
displaying a password input interface;
acquiring password characters input by a user and input mode information of the input password characters;
and judging whether the password characters input by the user are consistent with the stored password characters and the input mode information of the input password characters is consistent with the stored input mode information, if so, prompting that the password is unlocked successfully, and if not, prompting that the password is input again.
A third aspect of the present invention provides an encryption apparatus for a terminal device, the encryption apparatus comprising:
the encryption interface display module is used for displaying a password setting interface;
the encrypted information acquisition module is used for acquiring password characters input by a user and input mode information of the input password characters;
and the encrypted information judging module is used for judging whether the password characters input each time are consistent with the input modes of the input password characters when the number of times of inputting the password characters by the user is detected to be at least twice, if so, prompting that the password setting is successful, and if not, prompting that the password characters are input again.
A fourth aspect of the present invention provides a decryption apparatus for a terminal device, the decryption apparatus comprising:
the decryption interface display module is used for displaying a password input interface;
the decryption information acquisition module is used for acquiring password characters input by a user and input mode information of the input password characters;
and the decryption information judgment module is used for judging whether the password characters input by the user are consistent with the stored password characters and the input mode information of the input password characters is consistent with the stored input mode information, if so, prompting that the password is successfully unlocked, and if not, prompting that the password is input again.
A fifth aspect of the present invention provides a computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the method according to the first aspect or the second aspect when executing the computer program.
A sixth aspect of the present invention provides a computer readable storage medium storing a computer program which, when executed by a processor, performs the steps of the method according to the first aspect or the second aspect.
The invention provides an encryption and decryption method and device for terminal equipment, computer equipment and a storage medium, wherein the encryption method comprises the following steps: displaying a password setting interface; acquiring password characters input by a user and input mode information of the input password characters; when the number of times of inputting the password characters by the user is detected to be at least two times, whether the password characters input each time and the input modes of inputting the password characters are consistent or not is judged, if yes, the password is prompted to be successfully set, and if not, the password characters are prompted to be input again.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart of an encryption method for a terminal device according to embodiment 1 of the present invention;
fig. 2 is a specific flowchart of step S20 in the encryption method for a terminal device according to embodiment 1 of the present invention;
fig. 3 is a schematic structural diagram of an encryption apparatus of a terminal device according to embodiment 2 of the present invention;
fig. 4 is a flowchart of a decryption method of a terminal device according to embodiment 3 of the present invention;
fig. 5 is a schematic structural diagram of a decryption apparatus of a terminal device according to embodiment 4 of the present invention;
fig. 6 is a schematic structural diagram of a computer device provided in embodiment 6 of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Example 1
For easy understanding, please refer to fig. 1, fig. 1 shows a flowchart of steps of an encryption method of a terminal device in this embodiment, and the following detailed examples illustrate a process of implementing encryption of the terminal device in the encryption method of the terminal device:
step S10: and displaying a password setting interface.
In step S10, when the user sets a password on the terminal device, the terminal device displays a password setting interface, where the password setting interface includes a virtual numeric keypad and a multi-digit display box that displays characters for inputting encrypted information, and the multi-digit display box jumps in sequence along with the input of the password characters, and the input of the password characters can be implemented by a touch function of the terminal device. Specifically, a user enters a password setting interface by operating a terminal device, and inputs password characters by different input modes, wherein the input modes include finger touch input for the terminal device, electromagnetic pen input for the terminal device, and the like; and the terminal equipment acquires password characters and input modes corresponding to the characters through the virtual numeric keyboard.
For example, the terminal device is a high-end tablet computer with an electromagnetic stylus function, and the tablet computer is preset with a touch electromagnetic pen capable of realizing a touch function, and then the input modes are finger touch input and electromagnetic pen input.
Step S20: and acquiring password characters input by a user and input mode information of the input password characters.
In step S20, the user inputs a password character through the terminal device, the user is prompted to use different devices to input the password character each time the password character is input, the user can input the password to the terminal device through a finger on the touch screen, or the user can input the password to the terminal device through the electromagnetic pen, and the terminal device obtains and stores the password character and the input mode information corresponding to each character each time the password is input.
For example, the password character set by the user is 1234, where the user inputs a part of the password character 123 through the touch screen, the terminal device records the password 123 and the corresponding input mode information as a finger touch input, the user inputs the remaining password 4 through the electromagnetic pen, and the terminal device records the password 4 and the corresponding input mode information as an electromagnetic pen input.
Compared with the prior art, the method not only can acquire and store the password characters, but also can store the input mode information of each password character, thereby providing more choices for subsequent password verification.
As an embodiment, as shown in fig. 2, step S20 includes:
step S201, password characters input by a user for the first time and input mode information corresponding to each password character are obtained.
In step S201, when the user inputs the password for the first time, the terminal device records and stores each password character and the input mode information corresponding to each character.
Step S202, judging whether the input modes of the password characters input by the user are at least two, if not, executing step S203 to prompt the user to input the password characters again, if so, executing step S204 to detect whether the user continues to execute encryption setting.
In steps S202 to S204, the number of input modes is obtained according to the obtained input mode information, when the input mode is one, it is determined that the input mode does not satisfy the condition, the user is prompted to re-input on the interface of the terminal device, and further, the user is prompted to use at least two input modes for input, when the input mode of the user satisfies the condition, the user is prompted whether to confirm the password, and the user can be prompted by displaying a "continue" button and a "cancel" button.
And S205, when the situation that the user does not continuously execute the encryption setting is detected, judging the number of times of inputting the password characters by the user to be one time, and determining the current input password to be the set password.
In step S205, specifically, when the user selects the "cancel" button, which indicates that the user has completed the password setting, the set password can be determined only by performing the password input once.
And S206, when the situation that the user continues to execute encryption setting is detected, acquiring password characters input for the second time and input mode information corresponding to each password character, and judging the times of inputting the password characters by the user to be twice.
In step S206, specifically, when the user selects the "continue" button, it indicates that the user selects to confirm the password, at this time, it may be determined that the user has input the password twice, or when the user inputs the password for the second time, the terminal device may record and store each password character and input mode information corresponding to each character, and may determine that the user has input the password twice through the stored password input by the user for the second time.
Step S30: when the number of times of inputting the password characters by the user is detected to be at least two, whether the password characters input each time are consistent with the input mode of the input password characters is judged, if yes, step S40 is executed to prompt that the password setting is successful, and if not, step S50 is executed to prompt that the password characters are input again.
In steps S30 to S50, as an embodiment, the step S30 determines whether the password character input each time and the input mode of the input password character are consistent, if yes, it is prompted that the password setting is successful, and if no, it is prompted that the password character is input again, including:
when the user inputs the password for the second time, whether the first character in the password characters input for the second time is consistent with the first character in the stored password characters input for the first time is judged, if not, the password characters are prompted to be input again, if yes, whether the input mode of the first character input for the second time is consistent with the input mode of the first character input for the first time is judged, if not, the password characters are prompted to be input again, if yes, the rest password characters input by the user are continuously judged, the password characters input by the user are judged one by one, and the speed of judging the correctness of the password characters is increased.
For example, the password character input by the user for the first time is 1234, wherein the input modes of the character 123 are all finger touch input, the input mode of the character 4 is electromagnetic pen input, when the first character of the password character input by the user for the second time is input by the user, whether the first character is 1 or not is judged, if not, the password character is prompted to be input again, if yes, whether the input mode of the first password character input by the user is input by the finger through the touch screen is judged, if not, the password character is prompted to be input again, if yes, whether the input mode of the second password character input by the user for the second time is input by the finger through the touch screen is judged, if no, the password character is prompted to be input again, if yes, whether the third character input by the user is 3 or not is judged, if no, the password character is prompted to be input again, if so, judging whether the input mode of the third password character input by the user for the second time is input by fingers through the touch screen, if not, prompting to input the password character again, if yes, judging whether the fourth character input by the user is 4, if not, prompting to input the password character again, if yes, judging whether the input mode of the fourth password character input by the user for the second time is input by an electromagnetic pen, if not, prompting to input the password character again, and if yes, prompting to successfully set the password.
In step S30 to step S50, as another embodiment, the step S30 is to determine whether the password character input each time and the input mode of the input password character are consistent, if yes, the password setting is prompted to be successful, and if no, the password character is prompted to be input again, including:
and judging whether the password characters input twice are consistent, if not, prompting to re-input the password characters, if so, judging whether the input modes corresponding to each password character in the password characters input twice are consistent, if so, prompting that the password setting is successful, and if not, prompting to re-input the password characters.
For example, the password character input by the user for the first time is 1234, wherein the input modes of the character 123 are both finger touch input, the input mode of the character 4 is electromagnetic pen input, after the user finishes inputting the password for the second time, whether the password input by the user for the second time is 1234 is judged, if not, the password character is prompted to be input again, if yes, whether the input mode of the password 123 input for the second time is finger input through the touch screen is judged, whether the input mode of the password 4 input for the second time is electromagnetic pen input is judged, if not, the password character is prompted to be input again, and if yes, the password setting is prompted to be successful.
Compared with the prior art, the encryption setting of the embodiment increases the verification of the input mode information, increases the diversity of password confidentiality in the encryption mode, and ensures that the verification of the input mode information is another protection to confidential data when password characters are cracked, thereby greatly enhancing the confidentiality of the data and improving the safety of the data.
Example 2
An embodiment 2 of the present invention provides an encryption apparatus for a terminal device, where as shown in fig. 2, the encryption apparatus includes:
an encryption interface display module 101, configured to display a password setting interface;
an encrypted information obtaining module 102, configured to obtain a password character input by a user and input mode information of the input password character;
the encrypted information judgment module 103 is configured to, when it is detected that the number of times of inputting the password character by the user is at least two, judge whether the password character input each time and the input mode of the input password character are consistent, if yes, prompt that the password setting is successful, and if not, prompt that the password character is input again.
Further, the encrypted information obtaining module 102 is specifically configured to:
acquiring password characters input by a user for the first time and input mode information corresponding to each password character;
judging whether the input modes of inputting the password characters by the user are at least two, prompting to input the password characters again if not, detecting whether the user continues to execute encryption setting or not if yes, judging the times of inputting the password characters by the user to be one time when detecting that the user does not continue to execute the encryption setting, and determining that the current input password is the set password;
and when detecting that the user continues to execute the encryption setting, acquiring the password characters input for the second time and the input mode information corresponding to each password character, and judging the times of inputting the password characters by the user to be twice.
Further, the encrypted information determining module 103 is specifically configured to:
judging whether the password characters input twice are consistent, if not, prompting to input the password characters again;
if yes, judging whether the input mode corresponding to each password character in the password characters input twice is consistent, if yes, prompting that the password is successfully set, and if not, prompting that the password characters are input again.
The specific working process of the module in the terminal device may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
Example 3
Embodiment 3 of the present invention provides a decryption method for a terminal device, and fig. 3 shows a flowchart of steps of the decryption method for a terminal device in this embodiment. The implementation process of the terminal device decryption in the decryption method of the terminal device is described by the following detailed example:
and S110, displaying a password input interface.
In step S110, when the user needs to enter the terminal device, the user clicks a power on/off button of the terminal device to display a password input interface, where the password input interface includes a virtual numeric keypad and a multi-digit display box for displaying characters for inputting encrypted information.
And S120, acquiring password characters input by a user and input mode information of the input password characters.
In step S120, the user inputs the password character through the terminal device, may input the password to the terminal device by clicking the touch screen with a finger, may also input the password to the terminal device through the electromagnetic pen, and each time the password is input, the terminal device may obtain the password character and the input mode information corresponding to each character, and store them.
Further, after the user inputs the password characters, the terminal device can prompt the user to check whether the input password characters are correct or not, the user can be prompted by displaying a confirmation button and a cancel button, the user can confirm whether the input password characters are correct again, and when the user considers that the input password characters are correct, the user selects confirmation to enter the next step; when the user needs to input the decryption password again due to other reasons such as hand mistake and the like, the user can select 'cancel' and input the decryption password again, so that the user can realize decryption operation better, and the user experience is improved.
Further, obtaining the password character input by the user and the input mode information of the input password character, and then further comprising:
judging whether the input modes of the user for inputting the password characters are at least two, if not, prompting to input the password characters again, and if so, judging whether the password characters input by the user are consistent with the stored password characters.
Specifically, the number of the input modes is acquired according to the acquired input mode information, when the input mode is one, the input mode is judged not to meet the condition, the user is prompted to re-input on an interface of the terminal equipment, the input is further prompted to use at least two input modes for input, when the input mode of the user meets the condition, the user is prompted whether to confirm the password, and the user can be prompted by displaying a 'continue' button and a 'cancel' button.
S130, judging whether the password characters input by the user are consistent with the stored password characters and whether the input mode information of the input password characters is consistent with the stored input mode information; if yes, step S140 is executed to prompt that the password unlocking is successful, and if no, step S150 is executed to prompt that the password is input again.
Wherein, judge whether the input mode information of input password character is unanimous with the input mode information of storage, include:
and judging whether the input mode corresponding to each password character in the input password characters is consistent with the input mode corresponding to the stored password characters.
In steps S130 to S150, as an embodiment, it is determined whether the password character input by the user is consistent with the stored password character and whether the input mode information of the input password character is consistent with the stored input mode information; if yes, prompting that the password is successfully unlocked, otherwise prompting that the password is input again, and the method comprises the following steps:
when a user inputs password characters, whether the first character in the input password characters is consistent with the first character in the stored password characters is judged, if not, the password characters are prompted to be input again, if yes, whether the input mode of the first character is consistent with the input mode of the first character is judged, if not, the password characters are prompted to be input again, if yes, the rest password characters input by the user are continuously judged, the password characters input by the user are judged one by one, and the speed of judging the correctness of the password characters is increased.
For example, the password character stored in the terminal device is 1234, where the input modes of the character 123 are both finger touch input, the input mode of the character 4 is electromagnetic pen input, when the first character of the password character input by the user is judged to be 1, if not, the password character is prompted to be input again, if yes, whether the input mode of the first password character input by the user is input by a finger through a touch screen is judged, if not, the password character is prompted to be input again, if yes, whether the second character input by the user is 2 is judged, if not, the password character is prompted to be input again, if yes, whether the input mode of the second password character input by the user is input by a finger through a touch screen is judged, if yes, the password character is prompted to be input again, if yes, whether the third character input by the user is 3 is judged, if no, the password character is prompted to be input again, if so, judging whether the input mode of a third password character input by the user for the second time is input by a finger through the touch screen, if not, prompting to input the password character again, if yes, judging whether the fourth character input by the user is 4, if not, prompting to input the password character again, if yes, judging whether the input mode of the fourth password character input by the user is input by an electromagnetic pen, if not, prompting to input the password character again, and if yes, prompting to successfully decrypt the password.
In step S130 to step S150, as another embodiment, it is determined whether the password character input by the user is consistent with the stored password character and whether the input mode information of the input password character is consistent with the stored input mode information; if yes, prompting that the password is successfully unlocked, otherwise prompting that the password is input again, and the method comprises the following steps:
judging whether the password characters input by the user are consistent with the stored password characters, if not, prompting to input the password characters again, if so, judging whether input mode information corresponding to each password character in the input password characters is consistent with the stored input mode information, if so, prompting that the password is successfully set, and if not, prompting to input the password characters again.
For example, the password character set by the user is 1234, wherein the input modes of the character 123 are both finger touch input, the input mode of the character 4 is electromagnetic pen input, after the user finishes inputting the password, whether the password input by the user is 1234 is judged, if not, the password character is prompted to be input again, if yes, whether the input mode of the input password 123 is finger input through a touch screen and whether the input mode of the input password 4 is electromagnetic pen input is judged, if not, the password character is prompted to be input again, and if yes, the password setting is prompted to be successful.
Compared with the prior art, the decryption of the embodiment increases the verification of the input mode information, the encryption mode increases the diversity of password confidentiality, and when the password characters are cracked, the verification of the input mode information is another protection to the confidential data, so that the data confidentiality is greatly enhanced, and the data security is improved.
Further, to implement the decryption method of the terminal device of this embodiment, a check box control "distinguish input mode" and its internal control logic may be added to a password unlock function setting interface of the "setup" application of the terminal device, the password unlock interface is entered after startup or sleep wakeup, whether the check box "distinguish input mode" is checked, when checked, it is determined whether the password character and the input mode are the same, when the environment where the user is located is a safer state or the user considers that the user does not need to use the unlocking of the verification input mode information, the terminal device may be set to turn off the "distinguish input mode" function, so as to implement the unlocking only by verifying the password character, that is, the decryption method of the terminal device of this application also uses the decryption mode in the prior art, and uses different decryption settings in different situations, the terminal equipment is more humanized, and user experience is further improved.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
Example 4
Embodiment 4 of the present invention provides a decryption apparatus for a terminal device, where, as shown in fig. 5, the decryption apparatus includes:
a decryption interface display module 120, configured to display a password input interface;
a decryption information obtaining module 121, configured to obtain a password character input by a user and input mode information of the input password character;
and the decryption information judgment module 122 is configured to judge whether the password characters input by the user are consistent with the stored password characters and whether the input mode information of the input password characters is consistent with the stored input mode information, prompt that the password is unlocked successfully when the judgment results are yes, and prompt that the password is input again when one of the judgment results is no or the judgment results are no.
Further, the decryption information obtaining module 121 is further specifically configured to:
and judging whether the input modes of the password characters input by the user are at least two, if not, prompting to input the password characters again, and if so, judging whether the password characters input by the user are consistent with the stored password characters.
Further, the decryption information determining module 122 is further specifically configured to:
and judging whether the input mode corresponding to each password character in the input password characters is consistent with the input mode corresponding to the stored password characters.
The specific working process of each module in the above description may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
Example 5
Embodiment 5 of the present invention provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements an encryption method or a decryption method of a terminal device in the foregoing embodiments, and details are not described here to avoid repetition. Or, when being executed by a processor, the computer program implements the functions of each module/unit in the encryption apparatus or the decryption apparatus of the terminal device in the foregoing embodiments, and is not described herein again to avoid repetition.
Example 6
Fig. 6 is a schematic diagram of a computer device in embodiment 6 of the present invention. As shown in fig. 6, the computer device 6 comprises a processor 63, a memory 61 and a computer program 62 stored in the memory 61 and executable on the processor 63. The processor 63 implements the respective steps of the encryption method or the decryption method of one of the terminal devices in the above-described embodiments, such as steps S10, S20, S30, S40, and S50 shown in fig. 1, when executing the computer program 62. Alternatively, the functions of the modules/units in the above-described embodiments are implemented when the processor 63 executes the computer program 62.
Illustratively, the computer program 62 may be divided into one or more modules/units, which are stored in the memory 61 and executed by the processor 63 to perform the data processing procedures of the present invention. One or more of the modules/units may be a series of computer program segments capable of performing certain functions, which are used to describe the execution of the computer program 62 in the computer device 6.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. An encryption method of a terminal device, the encryption method comprising:
displaying a password setting interface;
acquiring password characters input by a user and input mode information of the input password characters;
when the number of times that the user inputs the password characters is detected to be at least two, whether the password characters input each time and the input modes of the input password characters are consistent or not is judged, if yes, the password is prompted to be successfully set, and if not, the password characters are prompted to be input again.
2. The encryption method of a terminal device according to claim 1, wherein acquiring the password character input by the user and the input mode information of the input password character comprises:
acquiring password characters input by a user for the first time and input mode information corresponding to each password character;
judging whether the input modes of inputting the password characters by the user are at least two, if not, prompting to input the password characters again, and if so, detecting whether the user continues to execute encryption setting;
when detecting that the user does not continue to execute encryption setting, judging the number of times of inputting password characters by the user to be one time, and determining the current input password to be a set password;
and when detecting that the user continues to execute the encryption setting, acquiring the password characters input for the second time and the input mode information corresponding to each password character, and judging the times of inputting the password characters by the user to be twice.
3. The encryption method of the terminal device according to claim 2, wherein judging whether the password character input each time and the input mode of the input password character are consistent, if yes, prompting that the password setting is successful, and if not, prompting that the password character is input again comprises:
judging whether the password characters input twice are consistent, if not, prompting to input the password characters again;
if yes, judging whether the input mode corresponding to each password character in the password characters input twice is consistent, if yes, prompting that the password is successfully set, and if not, prompting that the password characters are input again.
4. A decryption method of a terminal device, the decryption method comprising:
displaying a password input interface;
acquiring password characters input by a user and input mode information of the input password characters;
and judging whether the password characters input by the user are consistent with the stored password characters and the input mode information of the input password characters is consistent with the stored input mode information, if so, prompting that the password is unlocked successfully, and if not, prompting that the password is input again.
5. The decryption method of the terminal device according to claim 4, wherein the password character input by the user and the input mode information of the input password character are acquired, and thereafter, the method further comprises:
judging whether the input modes of the user for inputting the password characters are at least two, if not, prompting to input the password characters again, and if so, judging whether the password characters input by the user are consistent with the stored password characters.
6. The decryption method of the terminal device according to claim 4, wherein the judging whether the input mode information of the input password character is identical to the stored input mode information comprises:
and judging whether the input mode corresponding to each password character in the input password characters is consistent with the input mode corresponding to the stored password characters.
7. An encryption apparatus of a terminal device, the encryption apparatus comprising:
the encryption interface display module is used for displaying a password setting interface;
the encrypted information acquisition module is used for acquiring password characters input by a user and input mode information of the input password characters;
and the encrypted information judging module is used for judging whether the password characters input each time are consistent with the input modes of the input password characters when the number of times of inputting the password characters by the user is detected to be at least twice, if so, prompting that the password setting is successful, and if not, prompting that the password characters are input again.
8. A decryption apparatus of a terminal device, characterized in that the decryption apparatus comprises:
the decryption interface display module is used for displaying a password input interface;
the decryption information acquisition module is used for acquiring password characters input by a user and input mode information of the input password characters;
and the decryption information judgment module is used for judging whether the password characters input by the user are consistent with the stored password characters and the input mode information of the input password characters is consistent with the stored input mode information, if so, prompting that the password is successfully unlocked, and if not, prompting that the password is input again.
9. A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any one of claims 1 to 3 or 4 to 6 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 3 or 4 to 6.
CN201810936370.4A 2018-08-16 2018-08-16 Encryption and decryption method and device for terminal equipment, computer equipment and storage medium Active CN110837628B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810936370.4A CN110837628B (en) 2018-08-16 2018-08-16 Encryption and decryption method and device for terminal equipment, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810936370.4A CN110837628B (en) 2018-08-16 2018-08-16 Encryption and decryption method and device for terminal equipment, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110837628A true CN110837628A (en) 2020-02-25
CN110837628B CN110837628B (en) 2023-03-14

Family

ID=69573346

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810936370.4A Active CN110837628B (en) 2018-08-16 2018-08-16 Encryption and decryption method and device for terminal equipment, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110837628B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006155382A (en) * 2004-11-30 2006-06-15 Nomura Research Institute Ltd Password collation program and method
CN101093525A (en) * 2006-09-01 2007-12-26 厦门好旺角信息技术开发有限公司 Method and device of inputting secret code for raising cryptographic security
CN101286848A (en) * 2008-05-23 2008-10-15 杨筑平 Login authentication method and login signature procedure
CN102156544A (en) * 2011-04-18 2011-08-17 湘潭大学 Multimodality code-word disorderly combined password input device
CN102542452A (en) * 2011-11-09 2012-07-04 王筱雨 Method and system for verifying transaction passwords of point-of-sale (POS) machine terminal
CN104268459A (en) * 2014-09-19 2015-01-07 苏州天平先进数字科技有限公司 Customized screen locking method for touch screen terminal
CN104298941A (en) * 2013-07-19 2015-01-21 鸿富锦精密工业(深圳)有限公司 Handheld device, information input method and information input system
CN104463040A (en) * 2014-12-18 2015-03-25 恒宝股份有限公司 Secure input method and system for password
CN104850770A (en) * 2015-06-05 2015-08-19 深圳市智诺微智能电子科技有限公司 Gesture password input virtual keyboard and application method
US20150304313A1 (en) * 2012-03-31 2015-10-22 Feitian Technologies Co., Ltd. One-time password operating method
CN105871546A (en) * 2016-05-24 2016-08-17 张雪莱 Verification method combining static password and dynamic password and terminal equipment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006155382A (en) * 2004-11-30 2006-06-15 Nomura Research Institute Ltd Password collation program and method
CN101093525A (en) * 2006-09-01 2007-12-26 厦门好旺角信息技术开发有限公司 Method and device of inputting secret code for raising cryptographic security
CN101286848A (en) * 2008-05-23 2008-10-15 杨筑平 Login authentication method and login signature procedure
CN102156544A (en) * 2011-04-18 2011-08-17 湘潭大学 Multimodality code-word disorderly combined password input device
CN102542452A (en) * 2011-11-09 2012-07-04 王筱雨 Method and system for verifying transaction passwords of point-of-sale (POS) machine terminal
US20150304313A1 (en) * 2012-03-31 2015-10-22 Feitian Technologies Co., Ltd. One-time password operating method
CN104298941A (en) * 2013-07-19 2015-01-21 鸿富锦精密工业(深圳)有限公司 Handheld device, information input method and information input system
CN104268459A (en) * 2014-09-19 2015-01-07 苏州天平先进数字科技有限公司 Customized screen locking method for touch screen terminal
CN104463040A (en) * 2014-12-18 2015-03-25 恒宝股份有限公司 Secure input method and system for password
CN104850770A (en) * 2015-06-05 2015-08-19 深圳市智诺微智能电子科技有限公司 Gesture password input virtual keyboard and application method
CN105871546A (en) * 2016-05-24 2016-08-17 张雪莱 Verification method combining static password and dynamic password and terminal equipment

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
周珂: "异源码字信息无序交融机制及其应用", 《计算机工程》 *
周珂: "异源码字信息无序交融机制及其应用", 《计算机工程》, vol. 38, no. 21, 5 November 2012 (2012-11-05), pages 1 - 3 *
金冉等: "一种网络传输信息加密解密***研制的方法", 《现代电子技术》 *
金冉等: "一种网络传输信息加密解密***研制的方法", 《现代电子技术》, no. 05, 1 May 2005 (2005-05-01), pages 93 - 94 *

Also Published As

Publication number Publication date
CN110837628B (en) 2023-03-14

Similar Documents

Publication Publication Date Title
US9817964B2 (en) Methods and apparatus to facilitate secure screen input
CN103870744B (en) A kind of method and electronic equipment for verifying password
CN103092484B (en) The method of unlock screen, device and terminal
CN104049897B (en) Touch panel device unlock method and device
EP2763070B1 (en) Graphical user interface (GUI) that receives directional input to change face for receiving passcode
CN104143068B (en) Method of password authentication and system
KR101201934B1 (en) Method and apparatus for authenticating password of user device using variable password
EP3306504A1 (en) Multi-user login method, device and storage medium
CN106709382B (en) Keyboard display method and device
CN105373737B (en) A kind of application encryption method and mobile terminal
CN105159557B (en) The generation method and mobile terminal of a kind of unlocking pin
CN105809000A (en) Information processing method and electronic device
CN105930076B (en) The display methods of mobile communication terminal and its hiding selected object
JP2016009340A (en) Information processing device, and display control method for locked screen and display control program for the device
CN103996011A (en) Method and device for protecting codes to be input safely
Ritter et al. Miba: Multitouch image-based authentication on smartphones
CN105933503B (en) Information processing method and electronic equipment
CN105354458A (en) Password input verification method and system
KR101122197B1 (en) Method of displaying virtual keypad for preventing the leaking of information
Arif et al. The use of pseudo pressure in authenticating smartphone users
CN103761486A (en) Electronic file encryption method and device
Ali et al. Developing and evaluating a gestural and tactile mobile interface to support user authentication
KR20130085566A (en) Apparatus and method of authentifying password using captcha
CN104392158A (en) Mobile terminal unlocking method and mobile terminal
CN110837628B (en) Encryption and decryption method and device for terminal equipment, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant