Password verification method, terminal and computer readable storage medium
A password verification and password technology, applied in the field of terminals, computer-readable storage media, and password verification methods, can solve problems such as easy leakage of digital passwords, and achieve the effects of improving security and overcoming easy leakage.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0079] image 3 Schematic diagram of the implementation process of the password verification method proposed for the embodiment of the present invention Figure 1 ,Such as image 3 As shown, in an embodiment of the present invention, the method for terminal password verification may include the following steps:
[0080] Step 101, obtain a password input instruction, and obtain an input password in a pre-stored password input interface according to the password input instruction.
[0081] In an embodiment of the present invention, the above-mentioned terminal may first obtain a password input instruction, and then obtain an input password in a pre-stored password input interface according to the above-mentioned password input instruction.
[0082] It should be noted that, in the embodiment of the present invention, the above-mentioned terminal can be a terminal with a password verification function, and the above-mentioned terminal can be a variety of smart terminals with a t...
Embodiment 2
[0098] Based on the first embodiment above, Figure 7 Schematic diagram of the implementation process of the password verification method proposed for the embodiment of the present invention Figure three ,Such as Figure 7 As shown, in an embodiment of the present invention, the above method for establishing a pre-stored password input interface at the terminal may include the following steps:
[0099] Step 104a, acquire the pre-stored password display interface, and determine the number of characters corresponding to the pre-stored password display interface.
[0100] In an embodiment of the present invention, the above-mentioned terminal may first obtain the pre-stored password display interface, and determine the number of characters corresponding to the pre-stored password display interface.
[0101] It should be noted that, in the embodiment of the present invention, the above-mentioned terminal may pre-store the above-mentioned pre-stored password display interface fo...
Embodiment 3
[0112] Based on the second embodiment above, Figure 8 Schematic diagram of the implementation process of the password verification method proposed for the embodiment of the present invention Figure four ,Such as Figure 8 As shown, in the embodiment of the present invention, after the above-mentioned terminal establishes the pre-stored password input interface according to the displayed characters, that is, after step 104c, the method for the above-mentioned terminal to perform password verification may also include the following steps:
[0113] Step 104d: Establish a matching relationship between the password input interface and the password display interface according to the pre-stored password display interface and the pre-stored password input interface.
[0114] In an embodiment of the present invention, after the terminal establishes the pre-stored password input interface based on the displayed characters, it can establish a matching relationship between the password...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com