[go: up one dir, main page]

CN106326727A - Method and equipment for identifying passwords - Google Patents

Method and equipment for identifying passwords Download PDF

Info

Publication number
CN106326727A
CN106326727A CN201510404772.6A CN201510404772A CN106326727A CN 106326727 A CN106326727 A CN 106326727A CN 201510404772 A CN201510404772 A CN 201510404772A CN 106326727 A CN106326727 A CN 106326727A
Authority
CN
China
Prior art keywords
key
password
value
quantized value
input operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510404772.6A
Other languages
Chinese (zh)
Other versions
CN106326727B (en
Inventor
陈磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510404772.6A priority Critical patent/CN106326727B/en
Priority to PCT/CN2016/087470 priority patent/WO2017008633A1/en
Publication of CN106326727A publication Critical patent/CN106326727A/en
Application granted granted Critical
Publication of CN106326727B publication Critical patent/CN106326727B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Input From Keyboards Or The Like (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention provides a method and equipment for identifying passwords. The method comprises the following steps of identifying to obtain key codes corresponding to the input of each digit of password, wherein the key codes comprise a first key code or a second key code. The method has the advantages that when all identified digits of password correspond to the preset combination of first key code and/or second key code, the input correctness of the password is judged, so as to solve the problem of false input because multiple press keys corresponding to the key codes are set on the screens, especially smaller screens, the area of each press key is smaller, the user difficultly identifies, and the other press keys are falsely touched; in addition, if the press keys are not set on the screen, the confidentiality of the password is improved, and the problem of low confidentiality of conventional digit and/or aliphatic passwords is solved.

Description

A kind of password identification method and apparatus
Technical field
The application relates to computer realm, particularly relates to a kind of password identification method and apparatus.
Background technology
Existing Password Input, it is mostly the input mode of the selection using letter and/or button, for small screen device, owing to screen area is less, and the selective button of display is too much on screen, user presses the button of corresponding less area when inputting password after needing to watch close screen definition digital or letter, and easily other button is touched in false touch, causes input error, additionally, this type of password describes the most easily and informs other people, can cause the problem that password is revealed, and confidentiality is the highest.
Summary of the invention
One purpose of the application is to provide a kind of password identification method and apparatus, it is possible to solve the problem that Password Input error is the highest with confidentiality.
An aspect according to the application, it is provided that a kind of password identification method, the method includes:
Identifying the key corresponding to input operation of each password got, wherein, described key includes the first key or the second key;
When the combination that all positions password recognized is corresponding the first key preset and/or the second key, it is judged that Password Input is correct.
Further, in said method, described first key is a little, and described second key is line.
Further, in said method, identify the key corresponding to input operation of each password got, including:
Calculate the quantized value of the input operation of each password got;
The key corresponding to input operation according to described quantized value this password of identification.
Further, in said method, according to the key corresponding to the input operation of described quantized value this password of identification, including:
Judge whether described quantized value exceedes predetermined threshold value,
The most then identify that the key corresponding to the input operation of this password is the first key;
If it is not, then identify that the key corresponding to input operation of this password is the second key.
Further, in said method, it is judged that whether described quantized value exceedes described predetermined threshold value, including:
Judge whether the finger belly area value of finger exceedes preset area threshold value.
Further, in said method, it is judged that whether described quantized value exceedes described predetermined threshold value, including:
Judge whether dynamics of the pressing value of finger exceedes preset by dynamics threshold value.
Further, in said method, it is judged that whether described quantized value exceedes described predetermined threshold value, including:
Judge to input whether time-consuming value exceedes the time-consuming threshold value of default input.
Further, in said method, while identifying the key corresponding to input operation of each password got, also include:
The key that display is corresponding.
Further, in said method, while identifying the key corresponding to input operation of each password got, also include:
The animation effect of the identification process of the key that display is corresponding.
According to further aspect of the application, it is provided that a kind of password identification equipment, this equipment includes:
Identifying device, for identifying the key corresponding to input operation of each password got, wherein, described key includes the first key or the second key;
Judgment means, for during when the combination that all positions password recognized is corresponding the first key preset and/or the second key, it is judged that Password Input is correct.
Further, in the said equipment, described first key is a little, and described second key is line.
Further, in the said equipment, described identification device includes:
For calculating the module of the quantized value of the input operation of each password got;
Module for the key corresponding to the input operation according to described quantized value this password of identification.
Further, in the said equipment, the described module for the key corresponding to the input operation according to described quantized value this password of identification, including:
For judging whether described quantized value exceedes the unit of described predetermined threshold value,
If exceeding described predetermined threshold value for described quantized value, then identify the unit that the key corresponding to the input operation of this password is the first key;
If for described quantized value not less than described predetermined threshold value, then identifying the unit that the key corresponding to the input operation of this password is the second key.
Further, in the said equipment, described for judging whether described quantized value exceedes the unit of described predetermined threshold value, for judging whether the finger belly area value of finger exceedes preset area threshold value.
Further, in the said equipment, for judging whether described quantized value exceedes the unit of described predetermined threshold value, for judging whether dynamics of the pressing value of finger exceedes preset by dynamics threshold value.
Further, in the said equipment, for judging whether described quantized value exceedes the unit of described predetermined threshold value, it is used for judging to input whether time-consuming value exceedes the time-consuming threshold value of default input.
Further, in the said equipment, described equipment also includes showing key device, for, while the key corresponding to the input operation identifying each password got, showing corresponding key.
Further, in the said equipment, described equipment also includes showing dynamic effect device, for, while the key corresponding to the input operation identifying each password got, showing the animation effect of the identification process of corresponding key.
Compared with prior art, key corresponding to the input operation of each password that the application is got by identification, wherein, described key includes the first key or the second key, when the combination that all positions password recognized is corresponding the first key preset and/or the second key, judge that Password Input is correct, such that it is able to avoid arranging on screen the least on screen the button corresponding to too much key, the area causing each button is less, user is not easy to identify, easily other button is touched in false touch, the problem causing input error, additionally, if not arranging button case on screen, the confidentiality of password can also be improved, solve the numeral of routine and/or the problem that letter code confidentiality is the highest.
Further, the application is by being set to a little by described first key, described second key is set to line, thus utilize the key of similar Morse code only " drip, clatter (point, line) " two kinds of forms, being combined into the password of various implication, length and complexity to define according to user oneself, password is arranged can simply can be complicated, operator can be made to be simply done rapidly Password Input in conjunction with having corresponding button or the input mode without corresponding button on screen.
Further, the quantized value of the input operation of each password that the application is got by calculating, the key corresponding to input operation according to described quantized value this password of identification, can be according to the corresponding inhomogeneous quantized value of inhomogeneous input operation, owing to needing the corresponding key identified to only have two according to every class quantization value, it it is the first key, it it is the second key, every class quantization value correspondence can be divided into two kinds, and by corresponding for the first quantized value of such quantized value the first key, separately by corresponding for the second quantized value of such quantized value the second key, so that the first key and the identification of the second key and distinguish more efficient, more accurate.
Accompanying drawing explanation
By reading the detailed description being made non-limiting example made with reference to the following drawings, other features, purpose and advantage will become more apparent upon:
Fig. 1 illustrates the flow chart of a kind of password identification method according to one aspect of the application;
Fig. 2 illustrates the interface activating pin input figure of the application embodiment;
Fig. 3 illustrates the interface for password input figure according to one embodiment of the application;
Fig. 4 illustrates that the initial password according to one embodiment of the application arranges surface chart;
Fig. 5 illustrate according to one embodiment of the application when single finger tripe area screen contact area little Yu equal to described maximum contact area 45% time surface chart;
Fig. 6 illustrates single finger tripe area according to one embodiment of the application contact area at the screen surface chart more than the 45% of described maximum contact area;
Fig. 7 illustrates the identification process interface figure of the Password Input mistake according to one embodiment of the application;
Fig. 8 (a) illustrates the gradual-change animation effect surface chart that the input according to one embodiment of the application is point;
Fig. 8 (b) illustrates the surface chart of the gradual-change animation effect that input is line according to one embodiment of the application;
Fig. 9 illustrates the surface chart of the gradual-change animation effect that input in detail is point of Fig. 8 (a);
Figure 10 illustrates the surface chart of the gradual-change animation effect that input in detail is line of Fig. 8 (b)
Figure 11 illustrates the surface chart of the gradual-change animation effect that input is line according to another embodiment of the application;
Figure 12 illustrates the structure chart according to the application a kind of password identification equipment in terms of another;
Figure 13 illustrates the structure chart of the password identification equipment according to one preferred embodiment of the application;
Figure 14 illustrates the structure chart of the password identification equipment according to another preferred embodiment of the application;
Figure 15 illustrates the structure chart of the password identification equipment according to another preferred embodiment of the application;
Figure 16 illustrates the structure chart of the password identification equipment according to another preferred embodiment of the application.
In accompanying drawing, same or analogous reference represents same or analogous parts.
Detailed description of the invention
Below in conjunction with the accompanying drawings the application is described in further detail.
In one typical configuration of the application, terminal, the equipment of service network and trusted party all include one or more processor (CPU), input/output interface, network interface and internal memory.
Internal memory potentially includes the forms such as the volatile memory in computer-readable medium, random access memory (RAM) and/or Nonvolatile memory, such as read only memory (ROM) or flash memory (flash RAM).Internal memory is the example of computer-readable medium.
Computer-readable medium includes that removable media permanent and non-permanent, removable and non-can be stored to realize information by any method or technology.Information can be computer-readable instruction, data structure, the module of program or other data.The example of the storage medium of computer includes, but it is not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassette tape, magnetic disk storage or other magnetic storage apparatus or any other non-transmission medium, can be used for the information that storage can be accessed by a computing device.According to defining herein, computer-readable medium does not include non-temporary computer readable media (transitory media), such as data signal and the carrier wave of modulation.
As it is shown in figure 1, the application provides a kind of password identification method, wherein, the method includes:
Step S1, identifies the key corresponding to input operation of each password got, and wherein, described key includes the first key or the second key;
Step S2, when the combination that all positions password recognized is corresponding the first key preset and/or the second key, it is judged that Password Input is correct.nullAt this,It is different from existing usual key and includes 26 letters and 10 numerals etc.,And key described in the present embodiment only has two selections,It it is the first key,It it is the second key,Such that it is able to avoid arranging on screen the least on screen the button corresponding to too much key,The area causing each button is less,User is not easy to identify,Easily other button is touched in false touch,Cause input error,The present embodiment only can only arrange two buttons on screen or not arrange button,Described first key and the second key such as can distinguish one of them in the symbol that corresponding any two is preset,Described symbol can be letter、Numeral、Any type such as labelling or figure,Described first key and the second key do not sort on restriction,As long as the first key and the second key are different,Can be distinguished by,Such as,First key and the second key can be respectively any two in 26 letters,Can also is that any two in 0~9 numerals,One of them key in first key and the second key can also be any one letter in 26 letters,Another key is any one numeral in 0~9 numerals,Also or the first key and the second key can be respectively other any two kinds of characters wherein one.The complexity of password can be regulated by the figure place controlling password, wherein, password figure place is the fewest, the password become by the first key and the second key permutation and combination is the simplest, password figure place is the most, the password become by the first key and the second key permutation and combination is the most complicated, can meet the different user demand to simple or complicated password.When arranging button on screen, as long as coming corresponding first key or the second key, even if so on the least screen, the two button can also arrange sufficiently large, to facilitate user discrimination and selection owing to arranging two buttons, it is to avoid the generation of input error;nullWhen being not provided with button on screen,Two different input operations can be pre-defined to corresponding first key and the second key respectively,Due to only two different keys,So being recognized corresponding key by input operation only have two kinds of possibilities,It it is the first key,It it is the second key,Such as input operation is for being divided into the first operation and the second operation,When inputting the first operation,What correspondence recognized is the first key,When inputting the second operation,What correspondence recognized is the second key,In addition other key will not be corresponded to by input operation,As long as the content recognized selects one from the first key and the second key,Recognition speed can be the fastest,Thereby may be ensured that the first key or the higher recognition accuracy of the second key and recognition efficiency,Additionally this type of does not arrange the scheme of button on screen,The confidentiality of password can also be improved,Solve the numeral of routine and/or the problem that letter code confidentiality is the highest.
In password identification method one preferred embodiment of the application, described first key is a little, and described second key is line.nullAt this,The present embodiment introduces the concept of Morse code,Similar Morse code is utilized only " to drip、Clatter (point、Line) " key of two kinds of forms,It is combined into the password of various implication,Length and complexity can define according to user oneself,Password is arranged can simply can be complicated,Can be in conjunction with having corresponding button or the input mode without corresponding button on screen,Operator is made to be simply done rapidly Password Input,Such as,Input operation can be pre-defined and have two kinds,I.e. first input operation and the second operation,First operation correspondence is identified as a little,Second operation correspondence is identified as line,Operator can be after interface activating pin input flow process as shown in Figure 2,Operator has only to by the permutation and combination order of memory Points And lines,Screen has in the case of button with finger point or by the button on screen,As shown in Figure 3,On screen without in the case of button with finger point or press screen,Input password,It is not required to operator and watches close a large amount of letter or numbers on screen resolution screen,Improve input operation and identify efficiency and the accuracy rate of key.Additionally, the password that operator can arrange 2~16 sites in interface as shown in Figure 4 and/or line is combined into, wherein, interface shown in Fig. 4 (a) is pointed out the password that operator arranges 2~16 sites and/or line is combined into, then in the interface shown in 4 (b), first pass input needs the password arranged, the last password of second time input needs setting in the interface shown in 4 (c), thus complete the setting of initial password.Those skilled in the art will be understood that the description of above-mentioned first and second keys is only for example; other descriptions of the first and second keys that are existing or that be likely to occur from now on are such as applicable to the application; also within should being included in the application protection domain, and it is incorporated herein with way of reference at this.
In password identification method one preferred embodiment of the application, identify the key corresponding to input operation of each password got, including:
Calculate the quantized value of the input operation of each password got;
The key corresponding to input operation according to described quantized value this password of identification.At this, by input operation being calculated the quantized value being converted into correspondence, can be according to the corresponding inhomogeneous quantized value of inhomogeneous input operation, with above-mentioned first key as point, as a example by described second key is line, owing to needing the corresponding key identified to only have two according to every class quantization value, it is a little, it it is line, every class quantization value correspondence can be divided into two kinds, and by the first quantized value corresponding point of such quantized value, separately by homologous pair for the second quantized value of such quantized value, so that the first key and the identification of the second key and distinguish more efficient, more accurate.Those skilled in the art will be understood that the description of above-mentioned quantized value is only for example, and other descriptions of quantized value that are existing or that be likely to occur from now on are such as applicable to the application, within also should being included in the application protection domain, and are incorporated herein with way of reference at this.
In password identification method one preferred embodiment of the application, according to the key corresponding to the input operation of described quantized value this password of identification, including:
Judge whether described quantized value exceedes predetermined threshold value,
The most then identify that the key corresponding to the input operation of this password is the first key;
If it is not, then identify that the key corresponding to input operation of this password is the second key.At this, connect one and every class quantization value correspondence is divided into two kinds, and by corresponding for the first quantized value of such quantized value the first key, separately by the embodiment of corresponding for the second quantized value of such quantized value the second key, with above-mentioned first key as point, as a example by described second key is line, in the present embodiment, certain class quantization value correspondence is divided into two kinds, the first is not less than the quantized value corresponding point of predetermined threshold value, the quantized value that the second of such quantized value separately exceedes described predetermined threshold value is homologous pair, so that identifying that the quantized value scope of Points And lines has an i.e. predetermined threshold value in common border, can be efficient with this border, accurately identify the first key and the second key.Those skilled in the art will be understood that the description of above-mentioned predetermined threshold value is only for example, and other descriptions of predetermined threshold value that are existing or that be likely to occur from now on are such as applicable to the application, within also should being included in the application protection domain, and are incorporated herein with way of reference at this.
In password identification method one preferred embodiment of the application, it is judged that whether described quantized value exceedes described predetermined threshold value, including:
Judge whether the finger belly area value of finger exceedes preset area threshold value.At this, connect one and every class quantization value correspondence is divided into two kinds, and by corresponding for the first quantized value of such quantized value the first key, separately by the embodiment of corresponding for the second quantized value of such quantized value the second key, with above-mentioned first key as point, as a example by described second key is line, in the present embodiment, the classification of quantized value is the finger belly area value of finger, additionally, the finger belly area value correspondence of finger is divided into two kinds, the first is not less than the quantized value corresponding point of preset area threshold value, the quantized value that the second of such quantized value separately exceedes described preset area threshold value is homologous pair, so that identifying that the quantized value scope of Points And lines has a common border i.e. preset area threshold value, can be efficient with this border, accurately identify the first key and the second key.Such as, the scanning theory of capacitance plate can be utilized, as illustrated in Figures 5 and 6, screen entirety is divided into the grid of mean size, from X, Y axis scanning contact point carrys out calculating contact area, specifically, single the finger tripe area according to common situation operator is 2cm*3cm at the maximum contact area of screen, as shown in Figure 5, when single finger tripe area screen contact area little Yu equal to described maximum contact area 45% time (the first is not less than the quantized value of preset area threshold value), then be judged to input is the first key e.g. " point ", as shown in Figure 6, when single finger tripe area in the contact area of screen more than 45% quantized value of described preset area threshold value (the second exceed) of described maximum contact area, then be judged to input is " line ".Those skilled in the art will be understood that the description of above-mentioned quantized value is only for example, and other descriptions of quantized value that are existing or that be likely to occur from now on are such as applicable to the application, within also should being included in the application protection domain, and are incorporated herein with way of reference at this.
In password identification method one preferred embodiment of the application, it is judged that whether described quantized value exceedes described predetermined threshold value, including:
Judge whether dynamics of the pressing value of finger exceedes preset by dynamics threshold value.nullAt this,Connect one and every class quantization value correspondence is divided into two kinds,And by corresponding for the first quantized value of such quantized value the first key,Separately by the embodiment of corresponding for the second quantized value of such quantized value the second key,With above-mentioned first key as point,As a example by described second key is line,In the present embodiment,The classification of quantized value is dynamics of the pressing value of finger,The present embodiment can be not provided with the button of correspondence on touch screen,Operator can carry out input operation in any position on touch screen,Additionally,Dynamics of the pressing value correspondence of finger is divided into two kinds,The first presses the quantized value corresponding point of dynamics threshold value not less than preset,Separately the second of such quantized value is exceeded described preset homologous pair by the quantized value of dynamics threshold value,So that identifying that the quantized value scope of Points And lines has i.e. preset, a common border by dynamics threshold value,Can be efficient with this border、Accurately identify the first key and the second key.For example, it is possible to utilize pressure sensitivity touch technology, the finger of sense operation person is pressed or the dynamics of weight the light of touch screen, and recalls different corresponding points or line, as flicking is " point ", heavily presses as " line ".Specifically, when operator finger the light pressure of touch screen produce little Yu equal to described preset by dynamics of the pressing value of dynamics threshold value time (the first not less than preset by the quantized value of dynamics threshold value), then be judged to input is the first key e.g. " point ", when the finger of operator is when the light pressure of touch screen produces more than described preset by dynamics of the pressing value of dynamics threshold value (the second exceedes the described preset quantized value by dynamics threshold value), then be judged to input is " line ".Those skilled in the art will be understood that the description of above-mentioned quantized value is only for example, and other descriptions of quantized value that are existing or that be likely to occur from now on are such as applicable to the application, within also should being included in the application protection domain, and are incorporated herein with way of reference at this.
In password identification method one preferred embodiment of the application, it is judged that whether described quantized value exceedes described predetermined threshold value, including:
Judge to input whether time-consuming value exceedes the time-consuming threshold value of default input.nullAt this,Connect one and every class quantization value correspondence is divided into two kinds,And by corresponding for the first quantized value of such quantized value the first key,Separately by the embodiment of corresponding for the second quantized value of such quantized value the second key,In the present embodiment,The classification of quantized value is that the input of input operation is time-consumingly worth,Can be such as that finger presses duration at touch screen,With above-mentioned first key as point,As a example by described second key is line,The present embodiment can be not provided with the button of correspondence on touch screen,Operator can carry out input operation in any position on touch screen,Additionally,The input of input operation is time-consumingly worth correspondence and is divided into two kinds,The first is not less than the quantized value corresponding point of the time-consuming threshold value of default input,The quantized value that the second of such quantized value separately exceedes the described time-consuming threshold value of default input is homologous pair,So that identifying that the quantized value scope of Points And lines has a common border i.e. to preset and inputs time-consuming threshold value,Can be efficient with this border、Accurately identify the first key and the second key.Such as, pressure sensitivity touch technology can be utilized, the finger of sense operation person is pressed or the dynamics of weight the light of touch screen, and recall different corresponding points or line, finger i.e. can be utilized to judge with the time length of touch screen contact, short time presses as " point ", long by being " line ", as long by the duration meeting 500 milliseconds, specifically, when operator finger touch screen press duration little Yu equal to described default input time-consuming threshold value time (the first is not less than the quantized value of the time-consuming threshold value of default input), then be judged to input is the first key e.g. " point ", when the finger of operator at touch screen when pressing duration more than described default input time-consuming threshold value the quantized value of the described time-consuming threshold value of default input (the second exceed), then be judged to input is " line ".Those skilled in the art will be understood that the description of above-mentioned quantized value is only for example, and other descriptions of quantized value that are existing or that be likely to occur from now on are such as applicable to the application, within also should being included in the application protection domain, and are incorporated herein with way of reference at this.
In password identification method one preferred embodiment of the application, while identifying the key corresponding to input operation of each password got, also include:
The key that display is corresponding.At this, with above-mentioned first key as point, as a example by described second key is line, user's confirmation recognizes for convenience point or line are the most correct, the corresponding point or line recognized can be shown in the subregion of screen, in the case of identification is incorrect, operator can find in time, and re-starts input operation.It addition, for the confidentiality ensureing password, screen shows the size of the first key or the second key is unsuitable excessive, can clearly see clearly with operator and be limited, to avoid the people around operator to peep password.Such as, as shown in Figure 7, the input operation of corresponding Points And lines can be carried out successively in the interface of Fig. 7 (a), often one password of input, just the bottom at screen shows the every password currently recognized, when all Password Inputs are complete, the password of all positions can be shown in the interface of Fig. 7 (b), to facilitate user to confirm whether password inputs correctly, if input is correct, operator can slide up on the screen interface of Fig. 7 (b) and start to refer to, the password inputted with confirmation, if inputting incorrect, obtain the interface of Fig. 7 (c) input code error, operator can refer to by slide downward hands in the interface screen of Fig. 7 (c), to re-enter password.Those skilled in the art will be understood that the description of key corresponding to above-mentioned display is only for example; the description of the key that other displays that are existing or that be likely to occur from now on are corresponding is such as applicable to the application; also within should being included in the application protection domain, and it is incorporated herein with way of reference at this.
In password identification method one preferred embodiment of the application, while identifying the key corresponding to input operation of each password got, also include:
The animation effect of the identification process of the key that display is corresponding.At this, with above-mentioned first key as point, as a example by described second key is line, user's confirmation recognizes for convenience point or line are the most correct, the different animation effect of the point corresponding to recognizing or line can be set, without the key corresponding in screen display, do not leak with protection password, owing to key only has two kinds, i.e. Points And lines, so it is two kinds that animation effect is also correspondingly arranged, so the key that user can identify with rapid identification according to the different animation effect of display is the most correct, in the case of identification is incorrect, operator can find in time, and re-start input operation.Such as, for dynamics of the pressing value that quantized value is finger of above-described embodiment or the situation of the finger belly area value of finger, when in the interface as shown in Fig. 8 (a), input is the first key of point, the then corresponding horizontal ellipse annular gradual-change animation effect that can produce blueness around the fingerprint at the interface shown in Fig. 8 (a), when in the interface as shown in Fig. 8 (b), input is the second key of line, then the corresponding longitudinal direction ellipse annular gradual-change animation effect that can produce yellow around the fingerprint at the interface shown in Fig. 8 (b).For another example, the whole progressive formation correspondence of the horizontal ellipse annular gradual-change animation effect producing blueness around the fingerprint at the interface shown in Fig. 8 (a) can be found in Fig. 9 (a)~9 (f), and the whole progressive formation correspondence of the longitudinal direction ellipse annular gradual-change animation effect producing yellow around the fingerprint at the interface shown in Fig. 8 (b) can be found in Figure 10 (a)~10 (f).For another example, such as, the situation that quantized value is the time-consuming value of input for above-described embodiment, when input is the second key of line in the interface as shown in Figure 11 (a)~11 (d), then corresponding can show finger length yellow strip gradual-change animation effect as corresponding to the input operation of screen movement successively at the interface shown in Figure 11 (a)~11 (d).Additionally, while the key corresponding to the input operation of each password got, the scheme of the animation effect of the identifications process of the key that the display of the present embodiment is corresponding can be able to be used together with the scheme showing corresponding key of a upper embodiment, by facilitate user with arbitrary like in the way of confirm that the first key of recognizing or the second key are the most correct.Those skilled in the art will be understood that the description of above-mentioned animation effect is only for example; other descriptions of animation effect that are existing or that be likely to occur from now on are such as applicable to the application; also within should being included in the application protection domain, and it is incorporated herein with way of reference at this.
As shown in figure 12, also providing for a kind of password identification equipment 100 according to the another side of the application, this equipment 100 includes:
Identifying device 1, for identifying the key corresponding to input operation of each password got, wherein, described key includes the first key or the second key;
Judgment means 2, for during when the combination that all positions password recognized is corresponding the first key preset and/or the second key, it is judged that Password Input is correct.nullAt this,It is different from existing usual key and includes 26 letters and 10 numerals etc.,And key described in the present embodiment only has two selections,It it is the first key,It it is the second key,Such that it is able to avoid arranging on screen the least on screen the button corresponding to too much key,The area causing each button is less,User is not easy to identify,Easily other button is touched in false touch,Cause input error,The present embodiment only can only arrange two buttons on screen or not arrange button,Described first key and the second key such as can distinguish one of them in the symbol that corresponding any two is preset,Described symbol can be letter、Numeral、Any type such as labelling or figure,Described first key and the second key do not sort on restriction,As long as the first key and the second key are different,Can be distinguished by,Such as,First key and the second key can be respectively any two in 26 letters,Can also is that any two in 0~9 numerals,One of them key in first key and the second key can also be any one letter in 26 letters,Another key is any one numeral in 0~9 numerals,Also or the first key and the second key can be respectively other any two kinds of characters wherein one.The complexity of password can be regulated by the figure place controlling password, wherein, password figure place is the fewest, the password become by the first key and the second key permutation and combination is the simplest, password figure place is the most, the password become by the first key and the second key permutation and combination is the most complicated, can meet the different user demand to simple or complicated password.When arranging button on screen, as long as coming corresponding first key or the second key, even if so on the least screen, the two button can also arrange sufficiently large, to facilitate user discrimination and selection owing to arranging two buttons, it is to avoid the generation of input error;nullWhen being not provided with button on screen,Two different input operations can be pre-defined to corresponding first key and the second key respectively,Due to only two different keys,So being recognized corresponding key by input operation only have two kinds of possibilities,It it is the first key,It it is the second key,Such as input operation is for being divided into the first operation and the second operation,When inputting the first operation,What correspondence recognized is the first key,When inputting the second operation,What correspondence recognized is the second key,In addition other key will not be corresponded to by input operation,As long as the content recognized selects one from the first key and the second key,Recognition speed can be the fastest,Thereby may be ensured that the first key or the higher recognition accuracy of the second key and recognition efficiency,Additionally this type of does not arrange the scheme of button on screen,The confidentiality of password can also be improved,Solve the numeral of routine and/or the problem that letter code confidentiality is the highest.
In password identification equipment one preferred embodiment of the application, described first key is a little, and described second key is line.nullAt this,The present embodiment introduces the concept of Morse code,Similar Morse code is utilized only " to drip、Clatter (point、Line) " key of two kinds of forms,It is combined into the password of various implication,Length and complexity can define according to user oneself,Password is arranged can simply can be complicated,Can be in conjunction with having corresponding button or the input mode without corresponding button on screen,Operator is made to be simply done rapidly Password Input,Such as,Input operation can be pre-defined and have two kinds,I.e. first input operation and the second operation,First operation correspondence is identified as a little,Second operation correspondence is identified as line,Operator can be after interface activating pin input flow process as shown in Figure 2,Operator has only to by the permutation and combination order of memory Points And lines,Screen has in the case of button with finger point or by the button on screen,As shown in Figure 3,On screen without in the case of button with finger point or press screen,Input password,It is not required to operator and watches close a large amount of letter or numbers on screen resolution screen,Improve input operation and identify efficiency and the accuracy rate of key.Additionally, the password that operator can arrange 2~16 sites in interface as shown in Figure 4 and/or line is combined into, wherein, interface shown in Fig. 4 (a) is pointed out the password that operator arranges 2~16 sites and/or line is combined into, then in the interface shown in 4 (b), first pass input needs the password arranged, the last password of second time input needs setting in the interface shown in 4 (c), thus complete the setting of initial password.Those skilled in the art will be understood that the description of above-mentioned first and second keys is only for example; other descriptions of the first and second keys that are existing or that be likely to occur from now on are such as applicable to the application; also within should being included in the application protection domain, and it is incorporated herein with way of reference at this.
As shown in figure 13, in password identification equipment one preferred embodiment of the application, described identification device 1, for calculating the module 11 of the quantized value of the input operation of each password got;
, for the module 12 according to the key corresponding to the input operation of described quantized value this password of identification.At this, by input operation being calculated the quantized value being converted into correspondence, can be according to the corresponding inhomogeneous quantized value of inhomogeneous input operation, with above-mentioned first key as point, as a example by described second key is line, owing to needing the corresponding key identified to only have two according to every class quantization value, it is a little, it it is line, every class quantization value correspondence can be divided into two kinds, and by the first quantized value corresponding point of such quantized value, separately by homologous pair for the second quantized value of such quantized value, so that the first key and the identification of the second key and distinguish more efficient, more accurate.Those skilled in the art will be understood that the description of above-mentioned quantized value is only for example, and other descriptions of quantized value that are existing or that be likely to occur from now on are such as applicable to the application, within also should being included in the application protection domain, and are incorporated herein with way of reference at this.
As shown in figure 14, in password identification equipment one preferred embodiment of the application, the described module 12 for the key corresponding to the input operation according to described quantized value this password of identification, including:
For judging whether described quantized value exceedes the unit 121 of described predetermined threshold value,
If exceeding described predetermined threshold value for described quantized value, then identify the unit 122 that the key corresponding to the input operation of this password is the first key;
If for described quantized value not less than described predetermined threshold value, then identifying the unit 123 that the key corresponding to the input operation of this password is the second key.At this, connect one and every class quantization value correspondence is divided into two kinds, and by corresponding for the first quantized value of such quantized value the first key, separately by the embodiment of corresponding for the second quantized value of such quantized value the second key, with above-mentioned first key as point, as a example by described second key is line, in the present embodiment, certain class quantization value correspondence is divided into two kinds, the first is not less than the quantized value corresponding point of predetermined threshold value, the quantized value that the second of such quantized value separately exceedes described predetermined threshold value is homologous pair, so that identifying that the quantized value scope of Points And lines has an i.e. predetermined threshold value in common border, can be efficient with this border, accurately identify the first key and the second key.Those skilled in the art will be understood that the description of above-mentioned predetermined threshold value is only for example, and other descriptions of predetermined threshold value that are existing or that be likely to occur from now on are such as applicable to the application, within also should being included in the application protection domain, and are incorporated herein with way of reference at this.
In the password identification equipment one preferably embodiment of the application, described for judging whether described quantized value exceedes the unit 121 of described predetermined threshold value, for judging whether the finger belly area value of finger exceedes preset area threshold value.At this, connect one and every class quantization value correspondence is divided into two kinds, and by corresponding for the first quantized value of such quantized value the first key, separately by the embodiment of corresponding for the second quantized value of such quantized value the second key, with above-mentioned first key as point, as a example by described second key is line, in the present embodiment, the classification of quantized value is the finger belly area value of finger, additionally, the finger belly area value correspondence of finger is divided into two kinds, the first is not less than the quantized value corresponding point of preset area threshold value, the quantized value that the second of such quantized value separately exceedes described preset area threshold value is homologous pair, so that identifying that the quantized value scope of Points And lines has a common border i.e. preset area threshold value, can be efficient with this border, accurately identify the first key and the second key.Such as, the scanning theory of capacitance plate can be utilized, as illustrated in Figures 5 and 6, screen entirety is divided into the grid of mean size, from X, Y axis scanning contact point carrys out calculating contact area, specifically, single the finger tripe area according to common situation operator is 2cm*3cm at the maximum contact area of screen, as shown in Figure 5, when single finger tripe area screen contact area little Yu equal to described maximum contact area 45% time (the first is not less than the quantized value of preset area threshold value), then be judged to input is the first key e.g. " point ", as shown in Figure 6, when single finger tripe area in the contact area of screen more than 45% quantized value of described preset area threshold value (the second exceed) of described maximum contact area, then be judged to input is " line ".Those skilled in the art will be understood that the description of above-mentioned quantized value is only for example, and other descriptions of quantized value that are existing or that be likely to occur from now on are such as applicable to the application, within also should being included in the application protection domain, and are incorporated herein with way of reference at this.
It is in the password identification equipment one preferably embodiment of the application, described for judging whether described quantized value exceedes the unit 121 of described predetermined threshold value, for judging whether dynamics of the pressing value of finger exceedes preset by dynamics threshold value.nullAt this,Connect one and every class quantization value correspondence is divided into two kinds,And by corresponding for the first quantized value of such quantized value the first key,Separately by the embodiment of corresponding for the second quantized value of such quantized value the second key,With above-mentioned first key as point,As a example by described second key is line,In the present embodiment,The classification of quantized value is dynamics of the pressing value of finger,The present embodiment can be not provided with the button of correspondence on touch screen,Operator can carry out input operation in any position on touch screen,Additionally,Dynamics of the pressing value correspondence of finger is divided into two kinds,The first presses the quantized value corresponding point of dynamics threshold value not less than preset,Separately the second of such quantized value is exceeded described preset homologous pair by the quantized value of dynamics threshold value,So that identifying that the quantized value scope of Points And lines has i.e. preset, a common border by dynamics threshold value,Can be efficient with this border、Accurately identify the first key and the second key.For example, it is possible to utilize pressure sensitivity touch technology, the finger of sense operation person is pressed or the dynamics of weight the light of touch screen, and recalls different corresponding points or line, as flicking is " point ", heavily presses as " line ".Specifically, when operator finger the light pressure of touch screen produce little Yu equal to described preset by dynamics of the pressing value of dynamics threshold value time (the first not less than preset by the quantized value of dynamics threshold value), then be judged to input is the first key e.g. " point ", when the finger of operator is when the light pressure of touch screen produces more than described preset by dynamics of the pressing value of dynamics threshold value (the second exceedes the described preset quantized value by dynamics threshold value), then be judged to input is " line ".Those skilled in the art will be understood that the description of above-mentioned quantized value is only for example, and other descriptions of quantized value that are existing or that be likely to occur from now on are such as applicable to the application, within also should being included in the application protection domain, and are incorporated herein with way of reference at this.
In the password identification equipment one preferably embodiment of the application, described for judging whether described quantized value exceedes the unit 121 of described predetermined threshold value, it is used for judging to input whether time-consuming value exceedes the time-consuming threshold value of default input.nullAt this,Connect one and every class quantization value correspondence is divided into two kinds,And by corresponding for the first quantized value of such quantized value the first key,Separately by the embodiment of corresponding for the second quantized value of such quantized value the second key,In the present embodiment,The classification of quantized value is that the input of input operation is time-consumingly worth,Can be such as that finger presses duration at touch screen,With above-mentioned first key as point,As a example by described second key is line,The present embodiment can be not provided with the button of correspondence on touch screen,Operator can carry out input operation in any position on touch screen,Additionally,The input of input operation is time-consumingly worth correspondence and is divided into two kinds,The first is not less than the quantized value corresponding point of the time-consuming threshold value of default input,The quantized value that the second of such quantized value separately exceedes the described time-consuming threshold value of default input is homologous pair,So that identifying that the quantized value scope of Points And lines has a common border i.e. to preset and inputs time-consuming threshold value,Can be efficient with this border、Accurately identify the first key and the second key.Such as, pressure sensitivity touch technology can be utilized, the finger of sense operation person is pressed or the dynamics of weight the light of touch screen, and recall different corresponding points or line, finger i.e. can be utilized to judge with the time length of touch screen contact, short time presses as " point ", long by being " line ", as long by the duration meeting 500 milliseconds, specifically, when operator finger touch screen press duration little Yu equal to described default input time-consuming threshold value time (the first is not less than the quantized value of the time-consuming threshold value of default input), then be judged to input is the first key e.g. " point ", when the finger of operator at touch screen when pressing duration more than described default input time-consuming threshold value the quantized value of the described time-consuming threshold value of default input (the second exceed), then be judged to input is " line ".Those skilled in the art will be understood that the description of above-mentioned quantized value is only for example, and other descriptions of quantized value that are existing or that be likely to occur from now on are such as applicable to the application, within also should being included in the application protection domain, and are incorporated herein with way of reference at this.
As shown in figure 15, in password identification equipment one preferred embodiment of the application, described equipment also includes showing key device 3, for, while the key corresponding to the input operation identifying each password got, showing corresponding key.At this, with above-mentioned first key as point, as a example by described second key is line, user's confirmation recognizes for convenience point or line are the most correct, the corresponding point or line recognized can be shown in the subregion of screen, in the case of identification is incorrect, operator can find in time, and re-starts input operation.It addition, for the confidentiality ensureing password, screen shows the size of the first key or the second key is unsuitable excessive, can clearly see clearly with operator and be limited, to avoid the people around operator to peep password.Such as, as shown in Figure 7, the input operation of corresponding Points And lines can be carried out successively in the interface of Fig. 7 (a), often one password of input, just the bottom at screen shows the every password currently recognized, when all Password Inputs are complete, the password of all positions can be shown in the interface of Fig. 7 (b), to facilitate user to confirm whether password inputs correctly, if input is correct, operator can slide up on the screen interface of Fig. 7 (b) and start to refer to, the password inputted with confirmation, if inputting incorrect, obtain the interface of Fig. 7 (c) input code error, operator can refer to by slide downward hands in the interface screen of Fig. 7 (c), to re-enter password.Those skilled in the art will be understood that the description of key corresponding to above-mentioned display is only for example; the description of the key that other displays that are existing or that be likely to occur from now on are corresponding is such as applicable to the application; also within should being included in the application protection domain, and it is incorporated herein with way of reference at this.
As shown in figure 16, in password identification equipment one preferred embodiment of the application, described equipment also includes showing dynamic effect device 4, for, while the key corresponding to the input operation identifying each password got, showing the animation effect of the identification process of corresponding key.At this, at this, with above-mentioned first key as point, as a example by described second key is line, user's confirmation recognizes for convenience point or line are the most correct, the different animation effect of the point corresponding to recognizing or line can be set, without the key corresponding in screen display, do not leak with protection password, owing to key only has two kinds, i.e. Points And lines, so it is two kinds that animation effect is also correspondingly arranged, so the key that user can identify with rapid identification according to the different animation effect of display is the most correct, in the case of identification is incorrect, operator can find in time, and re-start input operation.Such as, for dynamics of the pressing value that quantized value is finger of above-described embodiment or the situation of the finger belly area value of finger, when in the interface as shown in Fig. 8 (a), input is the first key of point, the then corresponding horizontal ellipse annular gradual-change animation effect that can produce blueness around the fingerprint at the interface shown in Fig. 8 (a), when in the interface as shown in Fig. 8 (b), input is the second key of line, then the corresponding longitudinal direction ellipse annular gradual-change animation effect that can produce yellow around the fingerprint at the interface shown in Fig. 8 (b).For another example, the whole progressive formation correspondence of the horizontal ellipse annular gradual-change animation effect producing blueness around the fingerprint at the interface shown in Fig. 8 (a) can be found in Fig. 9 (a)~9 (f), and the whole progressive formation correspondence of the longitudinal direction ellipse annular gradual-change animation effect producing yellow around the fingerprint at the interface shown in Fig. 8 (b) can be found in Figure 10 (a)~10 (f).For another example, such as, the situation that quantized value is the time-consuming value of input for above-described embodiment, when input is the second key of line in the interface as shown in Figure 11 (a)~11 (d), then corresponding can show finger length yellow strip gradual-change animation effect as corresponding to the input operation of screen movement successively at the interface shown in Figure 11 (a)~11 (d).Additionally, while the key corresponding to the input operation of each password got, the scheme of the animation effect of the identifications process of the key that the display of the present embodiment is corresponding can be able to be used together with the scheme showing corresponding key of a upper embodiment, by facilitate user with arbitrary like in the way of confirm that the first key of recognizing or the second key are the most correct.Those skilled in the art will be understood that the description of above-mentioned animation effect is only for example, and other descriptions of animation effect that are existing or that be likely to occur from now on are such as applicable to the application, within also should being included in the application protection domain, and are incorporated herein with way of reference at this.
In sum, key corresponding to the input operation of each password that the application is got by identification, wherein, described key includes the first key or the second key, when the combination that all positions password recognized is corresponding the first key preset and/or the second key, judge that Password Input is correct, such that it is able to avoid arranging on screen the least on screen the button corresponding to too much key, the area causing each button is less, user is not easy to identify, easily other button is touched in false touch, the problem causing input error, additionally, if not arranging button case on screen, the confidentiality of password can also be improved, solve the numeral of routine and/or the problem that letter code confidentiality is the highest.
Further, the application is by being set to a little by described first key, described second key is set to line, thus utilize the key of similar Morse code only " drip, clatter (point, line) " two kinds of forms, being combined into the password of various implication, length and complexity to define according to user oneself, password is arranged can simply can be complicated, operator can be made to be simply done rapidly Password Input in conjunction with having corresponding button or the input mode without corresponding button on screen.
Further, the quantized value of the input operation of each password that the application is got by calculating, the key corresponding to input operation according to described quantized value this password of identification, can be according to the corresponding inhomogeneous quantized value of inhomogeneous input operation, owing to needing the corresponding key identified to only have two according to every class quantization value, it it is the first key, it it is the second key, every class quantization value correspondence can be divided into two kinds, and by corresponding for the first quantized value of such quantized value the first key, separately by corresponding for the second quantized value of such quantized value the second key, so that the first key and the identification of the second key and distinguish more efficient, more accurate.
Obviously, those skilled in the art can carry out various change and modification without deviating from spirit and scope to the application.So, if these amendments of the application and modification belong within the scope of the application claim and equivalent technologies thereof, then the application is also intended to comprise these change and modification.
It should be noted that the application can be carried out at software and/or software in the assembly of hardware, such as, special IC (ASIC), general purpose computer or any other similar hardware device can be used to realize.In one embodiment, the software program of the application can perform to realize steps described above or function by processor.Similarly, the software program of the application can be stored in computer readable recording medium storing program for performing (including the data structure being correlated with), such as, and RAM memory, magnetically or optically driver or floppy disc and similar devices.It addition, some steps of the application or function can employ hardware to realize, such as, perform the circuit of each step or function as coordinating with processor.
It addition, the part of the application can be applied to computer program, such as computer program instructions, when it is computer-executed, by the operation of this computer, can call or provide according to the present processes and/or technical scheme.And call the programmed instruction of the present processes, it is possibly stored in fixing or movably in record medium, and/or be transmitted by the data stream in broadcast or other signal bearing medias, and/or it is stored in the working storage of the computer equipment run according to described programmed instruction.At this, an embodiment according to the application includes a device, this device includes the memorizer for storing computer program instructions and for performing the processor of programmed instruction, wherein, when this computer program instructions is performed by this processor, trigger this plant running method based on aforementioned multiple embodiments according to the application and/or technical scheme.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned one exemplary embodiment, and in the case of without departing substantially from spirit herein or basic feature, it is possible to realize the application in other specific forms.Therefore, no matter from the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, scope of the present application is limited by claims rather than described above, it is intended that all changes fallen in the implication of equivalency and scope of claim be included in the application.Should not be considered as limiting involved claim by any reference in claim.Furthermore, it is to be understood that " an including " word is not excluded for other unit or step, odd number is not excluded for plural number.In device claim, multiple unit or the device of statement can also be realized by software or hardware by a unit or device.The first, the second word such as grade is used for representing title, and is not offered as any specific order.

Claims (18)

1. a password identification method, wherein, the method includes:
Identify the key corresponding to input operation of each password got, wherein, described key Including the first key or the second key;
When all positions password recognized is corresponding the first key preset and/or the combination of the second key Time, it is judged that Password Input is correct.
The most described first key is a little, described second key Code is line.
3. method as claimed in claim 1 or 2, wherein, each password that identification gets Key corresponding to input operation, including:
Calculate the quantized value of the input operation of each password got;
The key corresponding to input operation according to described quantized value this password of identification.
4. method as claimed in claim 3, wherein, according to described quantized value this password of identification Key corresponding to input operation, including:
Judge whether described quantized value exceedes predetermined threshold value,
The most then identify that the key corresponding to the input operation of this password is the first key;
If it is not, then identify that the key corresponding to input operation of this password is the second key.
5. method as claimed in claim 4, wherein, it is judged that whether described quantized value exceedes described pre- If threshold value, including:
Judge whether the finger belly area value of finger exceedes preset area threshold value.
6. method as claimed in claim 4, wherein, it is judged that whether described quantized value exceedes described pre- If threshold value, including:
Judge whether dynamics of the pressing value of finger exceedes preset by dynamics threshold value.
7. method as claimed in claim 4, wherein, it is judged that whether described quantized value exceedes described pre- If threshold value, including:
Judge to input whether time-consuming value exceedes the time-consuming threshold value of default input.
8. the method as described in any one of claim 1 to 7, wherein, identifies each got While key corresponding to the input operation of password, also include:
The key that display is corresponding.
9. the method as described in any one of claim 1 to 8, wherein, identifies each got While key corresponding to the input operation of password, also include:
The animation effect of the identification process of the key that display is corresponding.
10. a password identification equipment, wherein, this equipment includes:
Identify device, for identifying the key corresponding to input operation of each password got, Wherein, described key includes the first key or the second key;
Judgment means, for being corresponding the first key preset and/or the when all positions password that recognize During the combination of two keys, it is judged that Password Input is correct.
11. equipment as claimed in claim 10, wherein, described first key is a little, described second Key is line.
12. equipment as described in claim 10 or 11, wherein, described identification device includes:
For calculating the module of the quantized value of the input operation of each password got;
Module for the key corresponding to the input operation according to described quantized value this password of identification.
13. equipment as claimed in claim 12, wherein, described for according to described quantized value identification The module of the key corresponding to the input operation of this password includes:
For judging whether described quantized value exceedes the unit of described predetermined threshold value,
If exceeding described predetermined threshold value for described quantized value, then identify the input operation institute of this password The corresponding unit that key is the first key;
If for described quantized value not less than described predetermined threshold value, then identifying the input operation of this password The corresponding unit that key is the second key.
14. equipment as claimed in claim 13, wherein, described for whether judging described quantized value Exceed the unit of described predetermined threshold value, for judging whether the finger belly area value of finger exceedes preset area Threshold value.
15. equipment as claimed in claim 13, wherein, described for whether judging described quantized value Exceed the unit of described predetermined threshold value, for judge dynamics of the pressing value of finger whether exceed preset by Dynamics threshold value.
16. methods as claimed in claim 13, wherein, described for whether judging described quantized value Exceed the unit of described predetermined threshold value, be used for judging to input whether time-consuming value exceedes the time-consuming threshold of default input Value.
17. equipment as described in any one of claim 10 to 16, wherein, described equipment also includes Display key device, at the key corresponding to the input operation identifying each password got While, the key that display is corresponding.
18. equipment as described in any one of claim 10 to 16, wherein, described equipment also includes Display dynamic effect device, at the key corresponding to the input operation identifying each password got While, the animation effect of the identification process of the key that display is corresponding.
CN201510404772.6A 2015-07-10 2015-07-10 A kind of password identification method and apparatus Active CN106326727B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510404772.6A CN106326727B (en) 2015-07-10 2015-07-10 A kind of password identification method and apparatus
PCT/CN2016/087470 WO2017008633A1 (en) 2015-07-10 2016-06-28 Password identification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510404772.6A CN106326727B (en) 2015-07-10 2015-07-10 A kind of password identification method and apparatus

Publications (2)

Publication Number Publication Date
CN106326727A true CN106326727A (en) 2017-01-11
CN106326727B CN106326727B (en) 2019-07-19

Family

ID=57725657

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510404772.6A Active CN106326727B (en) 2015-07-10 2015-07-10 A kind of password identification method and apparatus

Country Status (2)

Country Link
CN (1) CN106326727B (en)
WO (1) WO2017008633A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110059505A (en) * 2019-03-18 2019-07-26 南京工业职业技术学院 A kind of encrypted memory device and its encryption method based on Morse code

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101677399A (en) * 2008-09-18 2010-03-24 香港科技大学 Multimedia content encoding method and system based on stream cipher security encoding scheme
CN101980131A (en) * 2010-10-29 2011-02-23 东莞宇龙通信科技有限公司 An unlocking method, system and communication terminal
WO2015055147A1 (en) * 2013-10-17 2015-04-23 数高科技有限公司 Label, information verification system, and information verification method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105260632B (en) * 2015-10-16 2019-01-25 宇龙计算机通信科技(深圳)有限公司 A kind of method for authenticating and terminal
CN105302439A (en) * 2015-10-16 2016-02-03 宇龙计算机通信科技(深圳)有限公司 Shortcut operation method and terminal
CN105678130A (en) * 2015-12-31 2016-06-15 北京元心科技有限公司 Mobile terminal lock screen unlocking configuration method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101677399A (en) * 2008-09-18 2010-03-24 香港科技大学 Multimedia content encoding method and system based on stream cipher security encoding scheme
CN101980131A (en) * 2010-10-29 2011-02-23 东莞宇龙通信科技有限公司 An unlocking method, system and communication terminal
WO2015055147A1 (en) * 2013-10-17 2015-04-23 数高科技有限公司 Label, information verification system, and information verification method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110059505A (en) * 2019-03-18 2019-07-26 南京工业职业技术学院 A kind of encrypted memory device and its encryption method based on Morse code

Also Published As

Publication number Publication date
WO2017008633A1 (en) 2017-01-19
CN106326727B (en) 2019-07-19

Similar Documents

Publication Publication Date Title
EP2874383B1 (en) System and method for controlling slide operation auxiliary input in portable terminal devices
US10282526B2 (en) Generation of randomized passwords for one-time usage
CN107785021B (en) Voice input method, device, computer equipment and medium
TWI684886B (en) Method and device for generating security problems and identity verification
US20160202951A1 (en) Portable dialogue engine
CN103092500B (en) Unlocking screen method, touch screen and electronic equipment
US9449163B2 (en) Electronic device and method for logging in application program of the electronic device
US9767388B2 (en) Method and system for verification by reading
JP5807342B2 (en) Character recognition device and program
WO2016101817A1 (en) Method and device for operating form on mobile terminal
WO2019153587A1 (en) User identity authentication method and apparatus, computer device and storage medium
US9753973B2 (en) Method and system of searching note items
CN104346035A (en) Indicating automatically corrected words
EP2672372B1 (en) Information processing method and terminal device
KR102060818B1 (en) A Digital output method of handwritten text and mathematical expressions
CN104077065A (en) Method for displaying virtual keyboard by touch screen terminal and touch screen terminal
JP2013186720A (en) Character string selection device
CN106326727A (en) Method and equipment for identifying passwords
CN102207824A (en) Sliding pinyin input method based on touch screen device
JP2014194694A (en) Character input support program and character input support device
CN110010131B (en) Voice information processing method and device
JP2012093968A (en) Character recognition apparatus and character recognition method, recognition character correction apparatus and recognition character correction method and program
CN104199602A (en) Information processing method and electronic equipment
CN109033796B (en) Unlocking method based on key level amplitude, storage medium and mobile terminal
JP7069631B2 (en) Information processing equipment and information processing programs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant