Data processing method and terminal

A data processing and data input technology, applied in the field of information security, can solve problems such as poor security, and achieve the effect of improving security

Active Publication Date: 2016-07-13
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The inventor of the present invention found in the course of research and practice that patterns are often used as passwords in the prior art, and when a user moves his finger on the screen to input the pattern corresponding to the password, traces of finger movement will be left on the screen, and illegal users pass Observing the traces on the screen is easy to decipher the input password, therefore, the existing methods for processing data as passwords are less secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and terminal
  • Data processing method and terminal
  • Data processing method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are the embodiment of the present invention. Some examples, but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0053] The terms "first", "second" and "third" appearing in the specification, claims and drawings of the present invention are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For examp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a data processing method and a terminal, wherein the data processing method comprises the following steps: displaying a password setting interface on a touch screen; receiving at least two geometric patterns inputted by a user at a pattern password input area of the password setting interface, wherein the at least two geometric patterns include geometric patterns x and geometric patterns y with overlapped areas at placing positions; generating password setting records according to the at least two geometric patterns and storing the password setting records, wherein the password setting records record the at least two geometric patterns and also record the placing position of each geometric pattern in the at least two geometric patterns. When the technical scheme provided by the embodiment of the invention is adopted to process data as passwords, the set passwords cannot be decoded easily, so that the security of password setting is improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a data processing method and a terminal. Background technique [0002] With the rapid development and popularization of electronic technology, terminals such as mobile phones and computers have become indispensable tools in people's daily work and life. The user can not only use the terminal for voice communication or video communication, but also use the terminal for work or entertainment. Various information is recorded in the terminal, and encryption settings are usually performed on the terminal when the user uses the terminal. For example, a power-on password can be set when the terminal is started, a startup password can be set when a certain application or file is opened, and the like. [0003] The inventor of the present invention found in the course of research and practice that patterns are often used as passwords in the prior art. When the user moves his...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46
CPCG06F21/46
Inventor 朱忠磊
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products