Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Password fuzzy input method and device

An input method and input device technology, applied in security devices, transmission systems, instruments, etc., can solve the problems of cracking static pictures of face photo input passwords, lack of concealment and reliability, and increased complexity, so as to reduce inspection Algorithmic instructions, good experience, and the effect of strengthening concealment

Active Publication Date: 2015-11-18
SMART ELECTRONICS IND DONG GUAN
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These methods have great deficiencies. Among them, the way of inputting by touching keys and drawing lines in Jiugongge is easy to be peeped by others and reveal the password, and the password input by taking pictures of faces is easy to be cracked by static pictures.
It can be seen that none of the above methods have sufficient concealment and reliability, and are easy to be cracked
[0003] In the prior art, there are many schemes for realizing fuzzy password input. In one scheme, prompt characters are displayed on the first key, and the user guesses the second key where the real password character is based on the prompt characters. Through this indirect In order to achieve the purpose of fuzzy input, the mapping relationship undoubtedly increases the complexity, especially in some time-limited input applications, this scheme is inefficient
[0004] In other ways, multiple characters are provided in the same button, one of which is the correct password character. Once the user selects the button, according to the set relationship, the correct character entered by the user can be confirmed, so as to realize the password verification. Although the fuzzy input realized in this way is intuitive to the user, its concealment is relatively insufficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password fuzzy input method and device
  • Password fuzzy input method and device
  • Password fuzzy input method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0053]Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be underst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a password fuzzy input method comprising the steps of: displaying a plurality of teletext regions by virtue of a user interface, wherein each teletext region has a mapping relationship with an information unit consisting of a plurality of information elements; detecting direction information of a gravity sensor, and changing the display view angles of the teletext regions in the user interface by following the changes of the direction information to ensure that the teletext regions show a plurality of teletext layers thereof in equally-spaced overlapping arrangement, and each teletext layer displays one of the information elements of the information unit in the teletext region where the teletext layer belongs to; and responding to a user defined instruction of any one of the teletext regions, and selecting the information unit mapped with the teletext region so as to verify whether the content of a corresponding position of a preset password is one of the information elements in the information unit. The present invention provides a corresponding password fuzzy input device at the same time. While improving the fuzzy degree of the password input process, the method provided by the present invention enhances the interactivity of the interface and improves the user experience.

Description

technical field [0001] The invention relates to electronic safety protection technology, in particular to a password fuzzy input method and a device for executing the method. Background technique [0002] With the development of society, various security issues continue to occur, and human security awareness continues to increase. Nowadays, mobile terminals such as smartphones and tablet computers are widely used, usually with power-on passwords and password locks for private files. The application of the password safe input method, and therefore the safe password input method becomes particularly important, and is gradually applied to all aspects of life and work. For example, in mobile terminals, a display screen based on touch feedback is usually provided, and passwords can be input by touching keys to input numbers and passwords, taking pictures of faces to input passwords, and drawing lines in Jiugongge. These methods all have great deficiencies. Among them, the way of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/36
CPCG06F21/31G06F21/36H04L63/0428H04L63/083G06F2221/2117H04W12/068
Inventor 郑犁
Owner SMART ELECTRONICS IND DONG GUAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products