A kind of cipher-code input method, device and electronics
Technical field
The invention belongs to password safety applications technical field, particularly relate to a kind of cipher-code input method and device.
Background technology
At present, numerical ciphers has become a part indispensable in user safety authentication, when carrying out user safety authentication to the terminating unit such as smart mobile phone input numerical ciphers, corresponding security measures generally need to be adopted to steal to prevent password from being peeped by other people.
Existing Password Input scheme by hiding the numerical ciphers after input, such as, adopts stain or star type symbol Alternative digital to carry out display etc., solves the safety problem that input cipher ring saves family password. But this kind of mode anti-peeps surreptitiously, and ability is limited, only can guarantee user input password after password safety, the password safety problem in input execution process cannot be solved, in Password Input process, user's password is very easily peeped deathwatch by other people and is got, therefore, this area needs the cipher-code input method providing a kind of security higher badly, solves the safety issue of user's password in input cryptographic processes.
Summary of the invention
In view of this, it is an object of the invention to provide a kind of cipher-code input method, device and electronics, it is intended to solve the safety issue of user's password in input cryptographic processes, thus promote the degree of safety of user's password.
For this reason, the present invention's openly following technical scheme:
A kind of cipher-code input method, is applied to electronics, and described method comprises:
Obtain the code characters that user currently inputs;
Whether the current input pattern judging described electronics is effectively input pattern;
If effectively inputting pattern, then based on described code characters priority input order record described in code characters;
If not being effectively input pattern, then abandon described code characters.
Aforesaid method, it is preferable that, whether the described current input pattern judging described electronics is effectively input pattern to comprise:
Judge whether current described electronics meets following condition: detect user's finger presses on Fingerprint Identification Unit, and active user's fingerprint is by checking; Wherein, described Fingerprint Identification Unit is integrated in described electronics in advance;
If met, then the current input pattern of described electronics is for effectively inputting pattern
If do not met, then the current input pattern of described electronics is invalid input pattern.
Aforesaid method, it is preferable that, also comprise:
According to the end of input condition preset, judge whether the Password Input process of user terminates; If terminate, then based on each code characters recorded priority input order splicing record each described in code characters, obtain the input password of user.
Aforesaid method, it is preferable that, also comprise:
Based on the benchmark password prestored, verify the legitimacy of described input password, or submit described input password to server.
A kind of cipher input, is applied to electronics, and described device comprises:
Code characters acquisition module, for obtaining the code characters that user currently inputs;
Judge module, for judging whether the current input pattern of described electronics is effectively input pattern;
Record module, for when judged result effectively inputs pattern, the priority based on described code characters inputs code characters described in order record;
Discard module, for when judged result is not effectively input pattern, abandoning described code characters.
Said apparatus, it is preferable that, described judgement module comprises:
Judging unit, for judging whether current described electronics meets following condition: detect user's finger presses at Fingerprint Identification Unit, and active user's fingerprint is by checking; Wherein, described Fingerprint Identification Unit is integrated in described electronics in advance;
First input pattern determining unit, for when judged result is for meeting, it is determined that the current input pattern going out described electronics is effective input pattern
2nd input pattern determining unit, for when judged result is not for meeting, it is determined that the current input pattern going out described electronics is invalid input pattern.
Said apparatus, it is preferable that, also comprise:
Input password acquisition module, for according to the end of input condition preset, judging whether the Password Input process of user terminates; And at the end of judging, based on each code characters recorded priority input order splicing record each described in code characters, obtain the input password of user.
Said apparatus, it is preferable that, also comprise:
Password checking or submission module, for based on the benchmark password prestored, verifying the legitimacy of described input password, or submit described input password to server.
A kind of electronics, comprises cipher input as above.
From above scheme, cipher-code input method disclosed in the present application, when getting the code characters that user currently inputs, by judging whether the current input pattern of described electronics is effectively input pattern, determine record or abandon described current password character. visible, the application is for the Password Input problem of electronics, introduce the input pattern of effective and non-effective/invalid two types, input in cryptographic processes user, electronics can carry out judging to identify based on to the input pattern adopted during each character of input, the each code characters realizing user being inputted carries out different treatment (record or abandon), thus, in the application, user is by carrying out connected applications to two kinds of input patterns, for input process produces the character of some non-genuine input, confuse with this and possible peep surreptitiously person, prevent from password from being peeped deathwatch in input process to get. thus present application addresses the safety problem of user's password in input cryptographic processes.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, it is briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only embodiments of the invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, it is also possible to obtain other accompanying drawing according to the accompanying drawing provided.
Fig. 1 is the cipher-code input method schema that the embodiment of the present invention one provides;
Fig. 2 is the determination strategy schematic diagram of two kinds of input patterns that the embodiment of the present invention one provides;
Fig. 3 is an application example figure of the application's method that the embodiment of the present invention one provides;
Fig. 4 is the cipher-code input method schema that the embodiment of the present invention two provides;
Fig. 5 is the cipher-code input method schema that the embodiment of the present invention three provides;
Fig. 6-Fig. 8 is the structural representation of the cipher input that the embodiment of the present invention four provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only the present invention's part embodiment, instead of whole embodiments. Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
For solving the safety issue of user's password in input cryptographic processes, the application is by introducing input pattern that is effective and invalid two types to electronics, realize inputting in cryptographic processes user, support that user by inputting the connected applications of pattern to two kinds, for input process produces the character of some non-genuine input, confuse with this and possible peep surreptitiously person, prevent password from being peeped deathwatch in input process and get. Hereinafter by multiple embodiment, the application's method will be described.
Embodiment one
The open a kind of cipher-code input method of the embodiment of the present invention one, described method can be applicable to the electronics such as smart mobile phone, panel computer, and with reference to figure 1, described method can comprise the following steps:
S101: obtain the code characters that user currently inputs.
Wherein, described code characters can be the various special symbols on numeral, letter or keyboard (such as underscore, round dot symbol) etc.
This step receives the current password character that user is inputted to electronics by device keyboard or the mode such as hand-written, and current password character described in buffer memory.
S102: whether the current input pattern judging described electronics is effectively input pattern.
The application introduces two kinds of input patterns to electronics: effectively input pattern and invalid input pattern, and the determination strategy of above two kinds of input patterns is provided based on fingerprint identification technology, wherein, with reference to figure 2, when user's finger presses is on the Fingerprint Identification Unit of electronics, and the fingerprint that pressing operation inputs (inputs fingerprint consistent with the fingerprint that user registers at electronics in advance by the legitimate verification of electronics, then by checking), then the present mode of electronics is for effectively inputting pattern, thus, during the finger presses Fingerprint Identification Unit of the legal registration of user, user can by effective typing to the code characters that electronics inputs, otherwise, if user's finger is not pressed against on Fingerprint Identification Unit, or the fingerprint inputted when being pressed against on Fingerprint Identification Unit is not by checking, then the present mode of electronics is invalid input pattern.
Based on this, in this step, specifically by judging whether electronics meets following condition, know whether its present mode is effectively input pattern: detect user's finger presses on Fingerprint Identification Unit, and active user's fingerprint is by checking.
In practical application, user can according to its use habit one or more checking fingerprint registered in advance, thus in input cryptographic processes, can according to the convenience demand of actual pressing operation, the finger corresponding to fingerprint of any one legal registration is selected to perform pressing operation, realize the input Schema control of electronics as effectively inputting pattern, and once user points disengaging Fingerprint Identification Unit, electronics enters invalid input pattern immediately, namely user by adopting, the finger of legal registration carries out pressing or withdrawing at Fingerprint Identification Unit, control electronics enters effective input pattern or invalid input pattern.
The enforcement of the application's method needs in advance an integrated Fingerprint Identification Unit in the electronic device, wherein, technician specifically can based on the ID (industrialdesign of electronics, industrial design) demand, and the security requirement of combining cipher input, the convenience demand etc. of user operation, Fingerprint Identification Unit integrated position in the electronic device is carried out layout, wherein, as a preferred version, the present embodiment adopts and Fingerprint Identification Unit is integrated in electronics back, this kind of layout type is that user operation Fingerprint Identification Unit is provided convenience, the crypticity of user's finger operation Fingerprint Identification Unit can be promoted simultaneously, thus improve the level of safety of user's password in input cryptographic processes further
S103: if effectively inputting pattern, then based on described code characters priority input order record described in code characters.
If it is determined that the present mode going out electronics is effective input pattern, namely user points and is currently pressed against on Fingerprint Identification Unit, and user fingerprints passes through legitimate verification, then the code characters of the current typing of user is effective, now, electronics inputs code characters described in order record based on the priority of this code characters, it is ensured that effective typing of described code characters, at the same time it is assured that the exactness of described code characters relative position in overall password.
S104: if not being effectively input pattern, then abandon described code characters.
If it is determined that the present mode going out electronics is invalid input pattern, then the code characters of the current typing of user is invalid, thus removes buffer memory, abandons described code characters.
Next, the present embodiment provides an embody rule example of the application's method.
With reference to figure 3, user is in input cryptographic processes, successively have input " 8112673 " seven bit digital altogether, wherein, only in input the 2nd, four, during seven bit digital, the finger presses of its legal registration is on the Fingerprint Identification Unit at electronics back, thus the code characters that final electronics is recorded is respectively the described 2nd, four, seven bit digital: " 1 ", " 2 ", " 3 ", and maintain the described 2nd when recording, four, the priority input order of seven bit digital, and all the other numerals namely first, three, five, six bit digital " 8 ", " 1 ", " 6 ", " 7 " are then abandoned by electronics as invalid input, even if thus other people peep and surreptitiously have input each numeral " 8112673 " in user's input process, also real password " 123 " cannot be learnt.
From above scheme, cipher-code input method disclosed in the present application, when getting the code characters that user currently inputs, by judging whether the current input pattern of described electronics is effectively input pattern, determine record or abandon described current password character. visible, the application is for the Password Input problem of electronics, introduce the input pattern of effective and non-effective/invalid two types, input in cryptographic processes user, electronics can carry out judging to identify based on to the input pattern adopted during each character of input, the each code characters realizing user being inputted carries out different treatment (record or abandon), thus, in the application, user is by carrying out connected applications to two kinds of input patterns, for input process produces the character of some non-genuine input, confuse with this and possible peep surreptitiously person, prevent from password from being peeped deathwatch in input process to get. thus present application addresses the safety problem of user's password in input cryptographic processes.
Embodiment two
The present embodiment two continues the scheme to embodiment one and supplements, and with reference to figure 4, described method can also comprise the following steps:
S105: according to the end of input condition preset, judge whether the Password Input process of user terminates; And at the end of judging, based on each code characters recorded priority input order splicing record each described in code characters, obtain the input password of user.
Wherein, described end of input condition can be specifically that user triggers corresponding conclusion button, as clicked input button or determine button, it is also possible to be exceed certain time length after user inputs code characters not have new character input etc.
When going out the Password Input end of processing of user according to described end of input condition judgment, electronics based on the priority input order of each code characters recorded, can splice each effective code characters of user's input, thus obtain the complete password of user's input.
Embodiment three
In the present embodiment, with reference to figure 5, described cipher-code input method can also comprise the following steps:
S106: based on the benchmark password prestored, verifies the legitimacy of described input password, or submits described input password to server.
When the priority input order based on each effective input character, after splicing the complete password that each effective character obtains user's input, the password of user's input according to current practical application scene, can be carried out respective handling by electronics.
If current scene is the safety certification scene performed by terminal, the scenes such as electronics are entered such as unlock screen, then electronics is by obtaining user's benchmark password registered in advance, and mated with described benchmark password by the password that user is inputted, verify that user inputs the exactness of password, and make respective response according to checking result; If current scene is the safety certification scene performed by server, such as, input bank card password etc. during shopping, then the password that user inputs need to be committed to respective server by electronics, completes the legal checking work of described input password by server.
Embodiment four
The open a kind of cipher input of the present embodiment four, cipher-code input method disclosed in described device and above each embodiment is corresponding.
Corresponding to embodiment one, with reference to figure 6, described device can comprise code characters acquisition module 100, judges module 200, record module 300 and discard module 400.
Code characters acquisition module 100, for obtaining the code characters that user currently inputs.
Judge module 200, for judging whether the current input pattern of described electronics is effectively input pattern.
Described judgement module 200 comprises judging unit, the first input pattern determining unit and the 2nd input pattern determining unit.
Judging unit, for judging whether current described electronics meets following condition: detect user's finger presses at Fingerprint Identification Unit, and active user's fingerprint is by checking; Wherein, described Fingerprint Identification Unit is integrated in described electronics in advance;
First input pattern determining unit, for when judged result is for meeting, it is determined that the current input pattern going out described electronics is effective input pattern
2nd input pattern determining unit, for when judged result is not for meeting, it is determined that the current input pattern going out described electronics is invalid input pattern.
Record module 300, for when judged result effectively inputs pattern, the priority based on described code characters inputs code characters described in order record.
Discard module 400, for when judged result is not effectively input pattern, abandoning described code characters.
Corresponding to embodiment two, with reference to figure 7, described cipher input can also comprise input password acquisition module 500, for according to the end of input condition preset, judging whether the Password Input process of user terminates; And at the end of judging, based on each code characters recorded priority input order splicing record each described in code characters, obtain the input password of user.
Corresponding to embodiment three, with reference to figure 8, described cipher input can also comprise password checking or submit module 600 to, for based on the benchmark password prestored, verifying the legitimacy of described input password, or submits described input password to server.
For cipher input disclosed in the embodiment of the present invention four, due to its with embodiment one to embodiment three disclosed in cipher-code input method corresponding, so what describe is fairly simple, relevant similarity refers to the explanation of cipher-code input method part in embodiment one to embodiment three, no longer describes in detail herein.
Embodiment five
The open a kind of electronics of the present embodiment five, described electronics can be specifically the equipment such as smart mobile phone, panel computer, and described electronics comprises a Fingerprint Identification Unit, and described electronics comprises the cipher input as embodiment four provides.
Based on described cipher input, described electronics can be user and provides two kinds of input patterns: effectively input pattern and invalid input pattern, in the process of input password, user is by carrying out connected applications to described two kinds of input patterns, for input process produces the character of some non-genuine input, confuse with this and possible peep surreptitiously person, prevent password from being peeped deathwatch in input process and get. Hereinafter by multiple embodiment, the application's method will be described.
It should be noted that, each embodiment in this specification sheets all adopts the mode gone forward one by one to describe, each embodiment emphasis illustrate be the difference with other embodiments, between each embodiment identical similar part mutually see.
For convenience of description, it is divided into various module or unit to describe respectively with function when describing above system or device. Certainly, the function of each unit can be realized in same or multiple software and/or hardware when implementing the application.
As seen through the above description of the embodiments, the technician of this area can be well understood to the application and can realize by the mode that software adds required general hardware platform. Based on such understanding, the technical scheme of the application in essence or says that part prior art contributed can embody with the form of software product, this computer software product can be stored in storage media, such as ROM/RAM, magnetic disc, CD etc., comprise some instructions with so that a computer equipment (can be Personal Computer, server, or the network equipment etc.) perform the method described in some part of each embodiment of the application or embodiment.
Finally, also it should be noted that, herein, the relational terms of such as first, second, third and fourth etc. and so on is only used for separating an entity or operation with another entity or operational zone, and not necessarily requires or imply to there is any this kind of actual relation or sequentially between these entities or operation. And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, so that comprise the process of a series of key element, method, article or equipment not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise the key element intrinsic for this kind of process, method, article or equipment. When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment comprising described key element and also there is other identical element.
The above is only the preferred embodiment of the present invention; it is noted that for those skilled in the art, under the premise without departing from the principles of the invention; can also making some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.