Password input interface switching control method and device

A password input and interface switching technology, which is applied in the fields of information processing and information security protection, can solve problems such as leaking passwords, inefficiency, and increased complexity, and achieve the effects of improving the degree of ambiguity, making the process simple and controllable, and improving security

Active Publication Date: 2019-06-18
SMART ELECTRONICS IND DONG GUAN
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These methods have great deficiencies. Among them, the way of inputting by touching keys and drawing lines in Jiugongge is easy to be peeped by others and reveal the password, and the password input by taking pictures of faces is easy to be cracked by static pictures.
It can be seen that none of the above methods have sufficient concealment and reliability, and are easy to be cracked
[0003] In the prior art, there are many schemes for realizing fuzzy password input. In one scheme, prompt characters are displayed on the first key, and the user guesses the second key where the real password character is based on the prompt characters. Through this indirect In order to achieve the purpose of fuzzy input, the mapping relationship undoubtedly increases the complexity, especially in some time-limited input applications, this scheme is inefficient
[0004] In other ways, multiple characters are provided in the same button, one of which is the correct password character. Once the user selects the button, according to the set relationship, the correct character entered by the user can be confirmed, so as to realize the password verification. Although the fuzzy input realized in this way is intuitive to the user, its concealment is relatively insufficient
[0005] In addition, none of the solutions described in the above-mentioned prior art further blurs the password input, nor does it optimize the password verification process and the calling process of the corresponding password input method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password input interface switching control method and device
  • Password input interface switching control method and device
  • Password input interface switching control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The present invention will be further described below with reference to the accompanying drawings and exemplary embodiments, examples of which are shown in the accompanying drawings, wherein the same or similar reference numerals represent the same or similar elements or elements with the same or similar functions . The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. Also, detailed descriptions of known arts will be omitted if they are unnecessary to illustrate the features of the present invention.

[0067] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, ele...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information processing and information security protection, in particular to a switching control method and device for a password input interface.The method includes the steps that a user interface is monitored in real time to acquire current operating information on the user interface; when it is judged that the current operating information represents that current operation is located in a password input scene, a password generating module is awakened to display the password input interface, and the password input interface is used for displaying multiple image-text regions generated by the password generating module; a response to each time of selection of an information unit is made, the information unit is filtered to determine information elements in the information unit, and the information elements are displayed on corresponding password input positions in an implicit mode.By means of the switching control method and device, the fuzziness degree of the selected information elements and the password input fuzziness degree can be greatly increased, the security of the password setting / input verification process is improved accordingly, and corresponding optimization processing is conducted on the password verification processing process and the calling process of corresponding password input methods.

Description

【Technical field】 [0001] The invention relates to the technical fields of information processing and information security protection, in particular to a password input interface switching control method and device. 【Background technique】 [0002] With the development of society, various security issues continue to occur, and human security awareness continues to increase. Nowadays, mobile terminals such as smartphones and tablet computers are widely used, usually with power-on passwords and password locks for private files. The application of the password safe input method, and therefore the safe password input method becomes particularly important, and is gradually applied to all aspects of life and work. For example, in mobile terminals, a display screen based on touch feedback is usually provided, and passwords can be input by touching keys to input numbers and passwords, taking pictures of faces to input passwords, and drawing lines in Jiugongge. These methods all have ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/34
CPCG06F21/34
Inventor 郑犁
Owner SMART ELECTRONICS IND DONG GUAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products