CN108154055B - Password input method, mobile terminal and storage medium - Google Patents
Password input method, mobile terminal and storage medium Download PDFInfo
- Publication number
- CN108154055B CN108154055B CN201810024879.1A CN201810024879A CN108154055B CN 108154055 B CN108154055 B CN 108154055B CN 201810024879 A CN201810024879 A CN 201810024879A CN 108154055 B CN108154055 B CN 108154055B
- Authority
- CN
- China
- Prior art keywords
- keyboard
- displayed
- random
- password input
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Input From Keyboards Or The Like (AREA)
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a password input method, a mobile terminal and a storage medium, wherein the method comprises the following steps: the method comprises the steps that a mobile terminal responds to a password input request triggered by a user, a keyboard to be displayed is obtained in a preset storage area according to the password input request, and a key sequence in the keyboard to be displayed is extracted; randomly arranging the key sequences in the keyboard to be displayed to obtain a random keyboard, and displaying the random keyboard; responding to a click command input by a user based on the random keyboard, and determining coordinate information corresponding to the click command; and searching a key-in value corresponding to the coordinate information in a relation mapping table prestored locally according to the coordinate information, and taking the searched key-in value as a password. According to the invention, each time the user inputs the password, the random keyboard is pushed to display the password to the user for inputting the password, so that the password input safety is improved.
Description
Technical Field
The present invention relates to the field of mobile terminals, and in particular, to a password input method, a mobile terminal, and a storage medium.
Background
When a mobile phone or other equipment inputs a password, the positions of the number keys or letter keys of the keyboard are generally fixed. Because the position of the number key or the letter key is fixed, the input action of the user is basically the same every time when the user inputs the password, so that lawless persons can easily remember the input action of the user, the password is leaked, and the password input safety of the user is not facilitated.
Disclosure of Invention
The invention mainly aims to provide a password input method, a mobile terminal and a storage medium, and aims to solve the technical problem that effective photos cannot be shot due to the fact that eyes of a user are closed in the prior art.
In order to achieve the above object, the present invention provides a password input method, including the steps of:
the method comprises the steps that a mobile terminal responds to a password input request triggered by a user, a keyboard to be displayed is obtained in a preset storage area according to the password input request, and a key sequence in the keyboard to be displayed is extracted;
randomly arranging the key sequences in the keyboard to be displayed to obtain a random keyboard, and displaying the random keyboard;
responding to a click command input by a user based on the random keyboard, and determining coordinate information corresponding to the click command;
and searching a key-in value corresponding to the coordinate information in a relation mapping table prestored locally according to the coordinate information, and taking the searched key-in value as a password.
Preferably, the mobile terminal responds to a password input request triggered by a user, acquires a keyboard to be displayed in a preset storage area according to the password input request, and extracts a key sequence in the keyboard to be displayed, and specifically includes:
the mobile terminal responds to a password input request triggered by a user, extracts a keyboard type in the password input request, searches a keyboard to be displayed in a preset storage area according to the keyboard type, and extracts a key sequence in the keyboard to be displayed.
Preferably, the keyboard to be displayed includes at least one of a numeric keyboard, an alphabetic keyboard, and a symbolic keyboard.
Preferably, the randomly arranging the key sequences in the keyboard to be displayed to obtain a random keyboard, and displaying the random keyboard specifically includes:
calling a random function to enable the random function to traverse keyboard elements in a keyboard to be displayed, selecting target elements according to a preset probability, selecting reference elements related to the target elements through the target elements, combining the target elements and the reference elements to obtain a random keyboard, and displaying the random keyboard.
Preferably, the calling a random function to traverse keyboard elements in a keyboard to be displayed by the random function, select a target element according to a preset probability, select a reference element related to the target element through the target element, combine the target element and the reference element to obtain a random keyboard, and display the random keyboard specifically includes:
calling a random function through a preset interface so that the random function traverses keyboard elements in a keyboard to be displayed, selecting target elements according to a preset probability, selecting reference elements related to the target elements through the target elements, combining the target elements and the reference elements to obtain a random keyboard, and displaying the random keyboard.
Preferably, before the key-in value corresponding to the coordinate information is searched in a locally pre-stored relationship mapping table according to the coordinate information and the searched key-in value is used as a password, the method further includes:
and associating the key-in value with the coordinate information, establishing a relational mapping table according to the associated key-in value and the coordinate information, and storing the relational mapping table locally.
Preferably, after the verifying the entered value, the method further comprises:
and when the verification fails, the steps of randomly arranging the key sequences in the keyboard to be displayed to obtain a random keyboard and displaying the random keyboard are executed again.
Preferably, after the step of re-performing the random arrangement of the key sequences in the keyboard to be displayed to obtain the random keyboard and displaying the random keyboard when the verification fails, the method further includes:
and counting the times of verification failure, and locking the current display interface when the times reach a preset time threshold.
In addition, to achieve the above object, the present invention further provides a mobile terminal, including: a memory, a processor and a password entry program stored on the memory and executable on the processor, the password entry program configured to implement the steps of the password entry method as described above.
In addition, to achieve the above object, the present invention further provides a storage medium having a password input program stored thereon, which when executed by a processor implements the steps of the password input method as described above.
According to the scheme, the mobile terminal responds to a password input request triggered by a user, acquires a keyboard to be displayed in a preset storage area according to the password input request, and extracts a key sequence in the keyboard to be displayed; randomly arranging the key sequences in the keyboard to be displayed to obtain a random keyboard, and displaying the random keyboard; responding to a click command input by a user based on the random keyboard, and determining coordinate information corresponding to the click command; and searching a key-in value corresponding to the coordinate information in a relation mapping table prestored locally according to the coordinate information, and pushing a random keyboard to display to a user for password input each time the user inputs a password according to the searched key-in value as the password, so that the security of password input is improved.
Drawings
Fig. 1 is a schematic structural diagram of a mobile terminal in a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a first embodiment of a password input method according to the present invention;
FIG. 3a is a schematic structural diagram of a conventional numeric keypad;
FIG. 3b is a schematic structural diagram of a conventional alphabet keyboard;
FIG. 3c is a schematic structural diagram of a conventional character keyboard;
FIG. 4a is a schematic structural diagram of a numeric keypad according to the present invention;
FIG. 4b is a schematic structural diagram of the alphanumeric keyboard of the present invention;
FIG. 4c is a schematic structural diagram of a character keyboard according to the present invention;
FIG. 5 is a flowchart illustrating a second embodiment of a password input method according to the present invention;
FIG. 6 is a flowchart illustrating a third embodiment of a password input method according to the present invention;
FIG. 7 is a flowchart illustrating a fourth embodiment of a password input method according to the present invention;
fig. 8 is a flowchart illustrating a password input method according to a fifth embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a mobile terminal in a hardware operating environment according to an embodiment of the present invention.
As shown in fig. 1, the mobile terminal may include: a processor 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 1 is not intended to be limiting of mobile terminals and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a storage medium, may include therein an operating system, a network communication module, a user interface module, and a password input program.
In the mobile terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to the internet and communicating data with the internet; the user interface 1003 is mainly used for connecting other terminals and performing data communication with other terminals; the mobile terminal calls a password input program stored in the memory 1005 through the processor 1001 and performs the following operations:
responding to a password input request triggered by a user, acquiring a keyboard to be displayed in a preset storage area according to the password input request, and extracting a key sequence in the keyboard to be displayed;
randomly arranging the key sequences in the keyboard to be displayed to obtain a random keyboard, and displaying the random keyboard;
responding to a click command input by a user based on the random keyboard, and determining coordinate information corresponding to the click command;
and searching a key-in value corresponding to the coordinate information in a relation mapping table prestored locally according to the coordinate information, and taking the searched key-in value as a password.
Further, the processor 1001 may call a password input program stored in the memory 1005, and also perform the following operations:
responding to a password input request triggered by a user, extracting a keyboard type in the password input request, searching a keyboard to be displayed in a preset storage area according to the keyboard type, and extracting a key sequence in the keyboard to be displayed.
Further, the processor 1001 may call a password input program stored in the memory 1005, and also perform the following operations:
calling a random function to enable the random function to traverse keyboard elements in a keyboard to be displayed, selecting target elements according to a preset probability, selecting reference elements related to the target elements through the target elements, combining the target elements and the reference elements to obtain a random keyboard, and displaying the random keyboard.
Further, the processor 1001 may call a password input program stored in the memory 1005, and also perform the following operations:
calling a random function through a preset interface so that the random function traverses keyboard elements in a keyboard to be displayed, selecting target elements according to a preset probability, selecting reference elements related to the target elements through the target elements, combining the target elements and the reference elements to obtain a random keyboard, and displaying the random keyboard.
Further, the processor 1001 may call a password input program stored in the memory 1005, and also perform the following operations:
and associating the key-in value with the coordinate information, establishing a relational mapping table according to the associated key-in value and the coordinate information, and storing the relational mapping table locally.
Further, the processor 1001 may call a password input program stored in the memory 1005, and also perform the following operations:
and when the verification fails, re-executing the steps of acquiring the keyboard features to be displayed in a preset area according to the password input request and extracting the keyboard sequence in the keyboard features.
Further, the processor 1001 may call a password input program stored in the memory 1005, and also perform the following operations:
and counting the times of verification failure, and locking the current display interface when the times reach a preset time threshold.
According to the scheme, the mobile terminal responds to a password input request triggered by a user, acquires a keyboard to be displayed in a preset storage area according to the password input request, and extracts a key sequence in the keyboard to be displayed; randomly arranging the key sequences in the keyboard to be displayed to obtain a random keyboard, and displaying the random keyboard; responding to a click command input by a user based on the random keyboard, and determining coordinate information corresponding to the click command; and searching a key-in value corresponding to the coordinate information in a relation mapping table prestored locally according to the coordinate information, and taking the searched key-in value as a password. According to the invention, each time the user inputs the password, the random keyboard is pushed to display the password to the user for inputting the password, so that the password input safety is improved.
Based on the hardware structure, the embodiment of the password input method is provided.
Referring to fig. 2, fig. 2 is a flowchart illustrating a password input method according to a first embodiment of the present invention.
In a first embodiment, the password input method includes the steps of:
step S10, the mobile terminal responds to a password input request triggered by a user, acquires a keyboard to be displayed in a preset storage area according to the password input request, and extracts a key sequence in the keyboard to be displayed;
it should be noted that the mobile terminal may be a mobile phone, a tablet, and other mobile devices, and may also be a security device for inputting a password in other departments, which is not limited in this embodiment.
The password input request of the user can be a password input request triggered by the user on the current display interface, for example, the user unlocks through a mobile phone, and also can be an operation of paying the password when the user enters the payment interface, the password input request of the user comprises the input request of the user, for example, the type of the password display interface required to be selected by the user, for example, when the user carries out the operation of paying the password through the payment interface, the user can obtain that the user only needs to input the bank card password, and the general bank password is a 6-digit password displayed, and under the condition, a relatively complex letter keyboard with letter display does not need to be displayed, so that the complexity of inputting the password by the user is caused.
In the specific implementation, the information required to be input by the user, such as the payment password that the user only needs to input the bank card password, is obtained in the password request of the user through the password input request of the user, and in this case, the numeric keyboard only needs to be displayed for corresponding display, so that the complexity of user input is reduced, and the user experience is improved.
Step S20, randomly arranging the key sequences in the keyboard to be displayed to obtain a random keyboard, and displaying the random keyboard;
it should be noted that the preset storage area may be a nonvolatile memory of a mobile phone, and a plurality of keyboard information, such as numeric keyboard information, alphabetic keyboard information, and symbol keyboard information, is stored in the preset storage area.
And acquiring keyboard information to be displayed in a preset storage area according to the password input request, for example, when a user performs a wakeup operation and performs an unlocking operation, acquiring correct password information stored by the user in the preset storage area, extracting password attributes in the password information, for example, only numbers in the password information are represented, and acquiring corresponding numerical keyboard information.
In a specific implementation, after the corresponding numeric keypad information is obtained, original numeric keypad information including a numeric sequence may be obtained, the original numeric keypad information may be pre-stored keyboard information used last time, and may also be pre-made numeric keypad information, keyboard information to be displayed is obtained in a preset storage area, and the corresponding keyboard sequence is obtained from the keyboard information.
In a specific implementation, the obtained keyboard sequence is randomly arranged, where the random arrangement may be random number generated, and the keyboard sequence is randomly arranged by the random number, or may be randomly arranged by other manners, which is not limited in this embodiment.
It will be appreciated that the rearranged keyboard sequences are recombined by a certain rule to generate a corresponding random keyboard, for example, the keyboard sequences are arranged correspondingly on twelve numeric keyboards, so that there is a random keyboard composed of twelve numbers and special characters. And pushing the generated random keyboard to a user, and enabling the user to input a corresponding password through the random keyboard.
Referring to fig. 3a, fig. 3b and fig. 3c, a conventional keyboard is a fixed-format keyboard, such as a numeric keyboard with numeric keypads arranged in order of size from 1 to 9, an alphabetic keyboard with a fixed arrangement consistent with a conventional keyboard, and a symbol keyboard with two parts, a numeric input part and a symbol input part, which are also arranged in a fixed arrangement.
As shown in fig. 4a, fig. 4b, and fig. 4c, the keyboard structure of the present invention is schematically illustrated, in the figure, the numeric keyboards are not displayed in a random arrangement manner from large to small, and the corresponding keyboard formats are generated in the alphabetic keyboard and the character keyboard in a random manner, instead of the existing fixed manner, and the keyboard is displayed in a random manner, so that the original fixed keyboard format improves the security of password input.
Step S30, responding to a click command input by a user based on the random keyboard, and determining coordinate information corresponding to the click command;
and receiving coordinate information input by a user through the random keyboard, searching a key-in value corresponding to the coordinate information in a locally pre-stored relation mapping table according to the coordinate information, verifying the key-in value, and hiding the random keyboard after the verification is successful.
And step S40, searching the keying-in value corresponding to the coordinate information in a local pre-stored relation mapping table according to the coordinate information, and taking the found keying-in value as a password.
In the embodiment, a mobile terminal responds to a password input request triggered by a user, acquires a keyboard to be displayed in a preset storage area according to the password input request, and extracts a key sequence in the keyboard to be displayed; randomly arranging the key sequences in the keyboard to be displayed to obtain a random keyboard, and displaying the random keyboard; responding to a click command input by a user based on the random keyboard, and determining coordinate information corresponding to the click command; and searching a key-in value corresponding to the coordinate information in a relation mapping table prestored locally according to the coordinate information, and taking the searched key-in value as a password. According to the invention, each time the user inputs the password, the random keyboard is pushed to display the password to the user for inputting the password, so that the password input safety is improved.
Further, as shown in fig. 5, a second embodiment of the password input method of the present invention is proposed based on the first embodiment, and in this embodiment, the step S10 specifically includes:
step S101, the mobile terminal responds to a password input request triggered by a user, extracts a keyboard type in the password input request, searches a keyboard to be displayed in a preset storage area according to the keyboard type, and extracts a key sequence in the keyboard to be displayed.
It should be noted that the keyboard information to be displayed includes at least one item of numeric keyboard information, alphabetic keyboard information, and symbolic keyboard information, that is, the keyboard type in the user password input request is extracted, and according to the keyboard type, corresponding keyboard information can be searched from a preset storage area, for example, when a user inputs a bank card password, display information of the bank card password currently displayed by the user is obtained, and a related password display type can be found through the display information, and through an attribute of the bank card password, the user can know that the user needs to use a numeric keyboard, so that the related numeric keyboard information is found in the keyboard information, and the user can perform password input through a simple keyboard more favorably.
In the specific implementation, a user inputs related account information on a display page, in this case, password information pre-stored in a mobile phone by the user can be acquired, judgment is performed according to the password information, it is judged that the password information of the user contains alphabetic information, an alphabetic keyboard can be extracted from a preset storage area through the acquired alphabetic information, and an extracted keyboard sequence of the alphabetic keyboard is acquired, so that the input requirement of the user can be met.
In this embodiment, the keyboard type in the password input request is extracted, the keyboard information to be displayed is searched in the preset storage area according to the keyboard type, the keyboard sequence in the keyboard information is extracted, the input requirement of the user is judged, and the related keyboard is obtained according to the judgment result, so that the input requirement of the user can be met, and the user experience is improved.
Further, as shown in fig. 6, a third embodiment of the password input method of the present invention is proposed based on the first embodiment and the second embodiment, in this embodiment, based on the first embodiment, the step S20 specifically includes:
step S201, calling a random function to enable the random function to traverse keyboard elements in a keyboard to be displayed, selecting target elements according to a preset probability, selecting reference elements related to the target elements through the target elements, combining the target elements and the reference elements to obtain a random keyboard, and displaying the random keyboard.
It should be noted that a random program is pre-stored in a preset storage area, the order of the keyboard can be disordered through the random program, the random program can be a section of random program in the bottom layer of the mobile phone software, the random program can be simply realized by modifying the software of the bottom layer of the mobile phone, the order of the keyboard can be disordered, if a user has other requirements on the random keyboard, the random program can be simply modified through the bottom layer of the software, and therefore the requirements of the user can be simply met by modifying the bottom layer of the software.
And acquiring the arranged keyboard sequence, recombining the arranged keyboard sequence into a random keyboard, and displaying the random keyboard.
It can be understood that after the keyboard sequence is disordered, the disordered keyboard sequence is recombined to generate a random keyboard, the random keyboard is correspondingly displayed, and the generated random keyboard is pushed to a user.
In the concrete implementation, in the process of inputting by the user, under the condition that an input error possibly exists, under the condition, the user can delete the input content with the input error, so that after deletion, no input content exists on the input interface of the user, the current keyboard is hidden, and a new random keyboard is generated to cover the current random keyboard, so that the situation that the user performs misoperation is ensured, the new random keyboard can be displayed, and the password input safety of the user is favorably improved.
Further, the step S201 specifically includes:
step S202, a random function is called through a preset interface, so that the random function traverses keyboard elements in a keyboard to be displayed, a target element is selected according to a preset probability, a reference element related to the target element is selected through the target element, the target element and the reference element are combined, a random keyboard is obtained, and the random keyboard is displayed.
In this embodiment, in the process of generating the random keyboard, a random program may be called through a preset interface, and the keyboard sequence is randomly arranged through the random program.
In the embodiment, the keyboard sequence is disordered through the random program, and the disordered keyboard sequence is recombined into a new random keyboard, so that the displayed keyboards are different and randomly generated when the user inputs the passwords at each time, and the password input safety of the user is ensured.
Further, as shown in fig. 7, a fourth embodiment of the password input method according to the present invention is proposed based on the first embodiment and the second embodiment, and in this embodiment, the method includes, before step S40:
step S401, associating the key-in value with the coordinate information, establishing a relational mapping table according to the associated key-in value and the coordinate information, and storing the relational mapping table locally.
It should be noted that the relation mapping table may be a mapping table in which a position relation between coordinate information and a random keyboard is stored, and the relation mapping table is stored locally, for example, a user confirms typing in a third input cell on the displayed random keyboard, the typing information of the user is determined, and an input value of the third input cell is found to be 6 in a relation mapping table pre-stored locally, so that the typing value of the user can be obtained.
It can be understood that the relation mapping table may be modified correspondingly to be consistent with the changed keyboard sequence relation under the condition of random scrambling through a random program, or may be established as a new relation mapping table under the condition of random scrambling through a random program, and the relation mapping table covers the original relation mapping table correspondingly to ensure the accuracy of the relation mapping table.
In this embodiment, the accuracy of the relational mapping table is ensured by establishing the relational mapping table of the random keyboard and the coordinate information and locally storing the relational mapping table.
Further, as shown in fig. 8, a fifth embodiment of the password input method according to the present invention is proposed based on the first embodiment and the second embodiment, in this embodiment, the description is made based on the first embodiment, and after step S40, the method further includes:
step S402, when the verification fails, the key sequences in the keyboard to be displayed are rearranged randomly to obtain a random keyboard, and the random keyboard is displayed.
It should be noted that, the coordinate information input by the user through the random keyboard is received, the keyed-in value corresponding to the coordinate information is searched in a relation mapping table pre-stored locally according to the coordinate information, the keyed-in value is verified, and the program for generating the random keyboard is re-executed under the condition that the verification fails, so that the user is ensured to display different random keyboards during each input.
Further, after the step S402, the method further includes:
step S403, counting the times of verification failure, and locking the current display interface when the times reach a preset time threshold.
It can be understood that, when the user inputs the password, the security of the password input of the user can be improved by displaying the random keyboard, but the user cannot input the password in an unlimited amount, in this case, the number of times of inputting the user can be limited, when the number reaches a preset number threshold, the interface used by the current user is locked, for example, the mobile phone sets the maximum number of input errors to be 5, and the user locks the interface currently input by the user after 5 times or under the condition of verification errors.
In the specific implementation, the preset time can be set after the user inputs a mistake once, and the random keyboard is pushed after the preset time is reached, so that the situation that the user repeatedly inputs wrong passwords is prevented, and the input accuracy of the user is improved.
In the embodiment, the current display interface is locked when the times of verification failure reaches the preset times threshold value through counting the times of verification failure, so that the situation that a user repeatedly inputs wrong passwords is prevented, and the input accuracy of the user is improved.
In addition, an embodiment of the present invention further provides a storage medium, where a password input program is stored on the storage medium, and when executed by a processor, the password input program implements the following operations:
responding to a password input request triggered by a user, acquiring a keyboard to be displayed in a preset storage area according to the password input request, and extracting a key sequence in the keyboard to be displayed;
randomly arranging the key sequences in the keyboard to be displayed to obtain a random keyboard, and displaying the random keyboard;
responding to a click command input by a user based on the random keyboard, and determining coordinate information corresponding to the click command;
and searching a key-in value corresponding to the coordinate information in a relation mapping table prestored locally according to the coordinate information, and taking the searched key-in value as a password.
Further, the password input program when executed by the processor further implements the following operations:
responding to a password input request triggered by a user, extracting a keyboard type in the password input request, searching a keyboard to be displayed in a preset storage area according to the keyboard type, and extracting a key sequence in the keyboard to be displayed.
Further, the password input program when executed by the processor further implements the following operations:
calling a random function to enable the random function to traverse keyboard elements in a keyboard to be displayed, selecting target elements according to a preset probability, selecting reference elements related to the target elements through the target elements, combining the target elements and the reference elements to obtain a random keyboard, and displaying the random keyboard.
Further, the password input program when executed by the processor further implements the following operations:
calling a random function through a preset interface so that the random function traverses keyboard elements in a keyboard to be displayed, selecting target elements according to a preset probability, selecting reference elements related to the target elements through the target elements, combining the target elements and the reference elements to obtain a random keyboard, and displaying the random keyboard.
Further, the password input program when executed by the processor further implements the following operations:
and associating the key-in value with the coordinate information, establishing a relational mapping table according to the associated key-in value and the coordinate information, and storing the relational mapping table locally.
Further, the password input program when executed by the processor further implements the following operations:
and when the verification fails, the steps of randomly arranging the key sequences in the keyboard to be displayed to obtain a random keyboard and displaying the random keyboard are executed again.
Further, the password input program when executed by the processor further implements the following operations:
and counting the times of verification failure, and locking the current display interface when the times reach a preset time threshold.
According to the scheme, the mobile terminal responds to a password input request triggered by a user, acquires a keyboard to be displayed in a preset storage area according to the password input request, and extracts a key sequence in the keyboard to be displayed; randomly arranging the key sequences in the keyboard to be displayed to obtain a random keyboard, and displaying the random keyboard; responding to a click command input by a user based on the random keyboard, and determining coordinate information corresponding to the click command; and searching a key-in value corresponding to the coordinate information in a relation mapping table prestored locally according to the coordinate information, and taking the searched key-in value as a password. According to the invention, each time the user inputs the password, the random keyboard is pushed to display the password to the user for inputting the password, so that the password input safety is improved.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (8)
1. A password input method, characterized in that the password input method comprises the steps of:
the method comprises the steps that a mobile terminal responds to a password input request triggered by a user, a keyboard to be displayed is obtained in a preset storage area according to the password input request, and a key sequence in the keyboard to be displayed is extracted;
calling a random function through a preset interface so that the random function traverses keyboard elements in a keyboard to be displayed, selecting target elements according to a preset probability, selecting reference elements related to the target elements through the target elements, combining the target elements and the reference elements to obtain a random keyboard, and displaying the random keyboard;
responding to a click command input by a user based on the random keyboard, and determining coordinate information corresponding to the click command;
searching a key-in value corresponding to the coordinate information in a relation mapping table prestored locally according to the coordinate information, taking the searched key-in value as a password, verifying the key-in value, establishing a new relation mapping table under the condition that a keyboard sequence is disordered through a random program in the relation mapping table, and correspondingly covering the original relation mapping table according to the new relation mapping table;
the method comprises the following steps that the mobile terminal responds to a password input request triggered by a user, acquires a keyboard to be displayed in a preset storage area according to the password input request, and extracts a key sequence in the keyboard to be displayed, and comprises the following steps:
the mobile terminal responds to a password input request triggered by a user, acquires information required to be input by the user from the password input request, acquires a keyboard to be displayed in a preset storage area according to the information required to be input, and extracts a key sequence in the keyboard to be displayed.
2. The password input method according to claim 1, wherein the mobile terminal responds to a password input request triggered by a user, obtains information required to be input by the user from the password input request, obtains a keyboard to be displayed in a preset storage area according to the information required to be input, and extracts a key sequence in the keyboard to be displayed, and specifically comprises:
the mobile terminal responds to a password input request triggered by a user, extracts a keyboard type corresponding to the information needing to be input, searches a keyboard to be displayed in a preset storage area according to the keyboard type, and extracts a key sequence in the keyboard to be displayed.
3. The password input method of claim 2, wherein the keypad to be displayed comprises at least one of a numeric keypad, an alphabetic keypad, and a symbol keypad.
4. The password input method according to any one of claims 1 to 3, wherein the step of searching the keyed-in value corresponding to the coordinate information in a locally pre-stored relationship mapping table according to the coordinate information and before using the searched keyed-in value as a password further comprises:
and associating the key-in value with the coordinate information, establishing a relational mapping table according to the associated key-in value and the coordinate information, and storing the relational mapping table locally.
5. The password input method of claim 1, wherein after said verifying said entered value, said method further comprises:
and when the verification fails, the steps of randomly arranging the key sequences in the keyboard to be displayed to obtain a random keyboard and displaying the random keyboard are executed again.
6. The password input method of claim 5, wherein, when the authentication fails, the step of re-performing the random arrangement of the key sequences in the keyboard to be displayed to obtain a random keyboard and displaying the random keyboard is further performed, and the method further comprises:
and counting the times of verification failure, and locking the current display interface when the times reach a preset time threshold.
7. A mobile terminal, characterized in that the mobile terminal comprises: a memory, a processor, and a password entry program stored on the memory and executable on the processor, the password entry program configured to implement the steps of the password entry method of any of claims 1 to 6.
8. A storage medium having stored thereon a password input program which, when executed by a processor, implements the steps of the password input method of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810024879.1A CN108154055B (en) | 2018-01-10 | 2018-01-10 | Password input method, mobile terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810024879.1A CN108154055B (en) | 2018-01-10 | 2018-01-10 | Password input method, mobile terminal and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108154055A CN108154055A (en) | 2018-06-12 |
CN108154055B true CN108154055B (en) | 2021-09-24 |
Family
ID=62461296
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810024879.1A Active CN108154055B (en) | 2018-01-10 | 2018-01-10 | Password input method, mobile terminal and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108154055B (en) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108898035A (en) * | 2018-06-26 | 2018-11-27 | Oppo广东移动通信有限公司 | Mobile terminal unlocking method, device and calculating equipment |
CN111222107A (en) * | 2018-11-23 | 2020-06-02 | 奇酷互联网络科技(深圳)有限公司 | Unlocking method, intelligent terminal and computer readable storage medium |
CN109559415A (en) * | 2018-12-18 | 2019-04-02 | 云丁网络技术(北京)有限公司 | A kind of intelligent door lock control method and intelligent door lock |
CN111340978B (en) * | 2018-12-18 | 2022-07-19 | 云丁网络技术(北京)有限公司 | Intelligent device unlocking method and system |
WO2020125667A1 (en) * | 2018-12-18 | 2020-06-25 | 云丁网络技术(北京)有限公司 | Device control method, apparatus and system |
CN110543755B (en) * | 2019-09-04 | 2022-03-01 | 四川长虹电器股份有限公司 | Method for realizing scratch card effect verification code based on Canvas |
CN110660178A (en) * | 2019-09-26 | 2020-01-07 | 中国工商银行股份有限公司 | ATM password system |
CN111082927B (en) * | 2019-11-07 | 2023-12-12 | 贵州警察学院 | Private key management method and device and terminal equipment |
CN111061625A (en) * | 2019-11-18 | 2020-04-24 | 中国建设银行股份有限公司 | Automatic testing method and device applied to out-of-order password keyboard |
CN111460536B (en) * | 2020-03-30 | 2023-11-17 | 李雨柔 | Password verification method and device, storage medium and electronic equipment |
CN114650143B (en) * | 2022-03-16 | 2023-11-24 | 福建汇思博数字科技有限公司 | Password input method and terminal |
CN116895112B (en) * | 2023-08-08 | 2024-02-06 | 刘强 | Password input method and system for separating dynamic key position information from keyboard |
CN117807584B (en) * | 2024-01-02 | 2024-07-02 | 珠海海富思科技有限公司 | Intelligent lock plate digital analysis data processing system and method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8599152B1 (en) * | 2010-06-25 | 2013-12-03 | Sprint Communications Company L.P. | Intelligent touch screen keyboard |
CN106022172A (en) * | 2016-05-24 | 2016-10-12 | 中国银行股份有限公司 | Password input method and system protecting password keyboard button input operation |
CN107273736A (en) * | 2017-05-10 | 2017-10-20 | 百富计算机技术(深圳)有限公司 | Cipher-code input method, device, computer equipment and storage medium |
-
2018
- 2018-01-10 CN CN201810024879.1A patent/CN108154055B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8599152B1 (en) * | 2010-06-25 | 2013-12-03 | Sprint Communications Company L.P. | Intelligent touch screen keyboard |
CN106022172A (en) * | 2016-05-24 | 2016-10-12 | 中国银行股份有限公司 | Password input method and system protecting password keyboard button input operation |
CN107273736A (en) * | 2017-05-10 | 2017-10-20 | 百富计算机技术(深圳)有限公司 | Cipher-code input method, device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108154055A (en) | 2018-06-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108154055B (en) | Password input method, mobile terminal and storage medium | |
US10176315B2 (en) | Graphical authentication | |
US9853815B2 (en) | Password verifying device and method | |
RU2665222C2 (en) | Authenticity confirmation device and authenticity confirmation method | |
US8010797B2 (en) | Electronic apparatus and recording medium storing password input program | |
US8661532B2 (en) | Method and apparatus for authenticating password | |
CN103034417A (en) | Unlocking method for touch screen and terminal equipment | |
JP2012133717A (en) | Password input authentication device and portable terminal device using the same | |
CN106203038B (en) | A kind of unlocking method and mobile terminal | |
CN101882193A (en) | Method and equipment for unlocking handheld device | |
CN104063169A (en) | Unlocking method based on touch screen | |
CN106815517A (en) | A kind of method of password authentication and device | |
CN105929974A (en) | Password input management method and mobile terminal | |
US20180077571A1 (en) | System and method of authenticating a user of an electronic device | |
JP2001331258A (en) | Information service terminal | |
CN108124490A (en) | Smart lock and unlocking method | |
CN112733106A (en) | Screen unlocking method and device, storage medium and electronic equipment | |
JP2007310515A (en) | Password authentication system, password authentication server, password authentication method and program | |
CN106570386B (en) | Touch screen unlocking method and system | |
KR101122197B1 (en) | Method of displaying virtual keypad for preventing the leaking of information | |
US20170154173A1 (en) | Array password authentication system and method thereof | |
JP5471706B2 (en) | Password input system, input method, and input program | |
CN105160221A (en) | Unlocking method and system of electronic equipment | |
CN105468944A (en) | Unlocking method and apparatus | |
US10586037B1 (en) | Disambiguation of an alphanumeric security code to a user |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20221223 Address after: 201203 1st floor, building 1, Lane 36, Xuelin Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai, 201203 Patentee after: SHANGHAI TRANSSION INFORMATION TECHNOLOGY Ltd. Address before: Room 922 / 926, block a, No. 1, Lane 399, shengxia Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai, 201203 Patentee before: SHANGHAI SPREADRISE COMMUNICATION TECHNOLOGY Ltd. |
|
TR01 | Transfer of patent right |