Password verification method, terminal and computer readable storage medium

A password verification and password technology, applied in the field of terminals, computer-readable storage media, and password verification methods, can solve problems such as easy leakage of digital passwords, and achieve the effects of improving security and overcoming easy leakage.

Inactive Publication Date: 2018-01-16
NUBIA TECHNOLOGY CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, an embodiment of the present invention provides a password verification method, a terminal, and a computer-readable storage medium, which can overcome the defect that digital passwords are easily leaked, thereby improving the security of the terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password verification method, terminal and computer readable storage medium
  • Password verification method, terminal and computer readable storage medium
  • Password verification method, terminal and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] image 3 Schematic diagram of the implementation process of the password verification method proposed for the embodiment of the present invention Figure 1 ,Such as image 3 As shown, in an embodiment of the present invention, the method for terminal password verification may include the following steps:

[0080] Step 101, obtain a password input instruction, and obtain an input password in a pre-stored password input interface according to the password input instruction.

[0081] In an embodiment of the present invention, the above-mentioned terminal may first obtain a password input instruction, and then obtain an input password in a pre-stored password input interface according to the above-mentioned password input instruction.

[0082] It should be noted that, in the embodiment of the present invention, the above-mentioned terminal can be a terminal with a password verification function, and the above-mentioned terminal can be a variety of smart terminals with a t...

Embodiment 2

[0098] Based on the first embodiment above, Figure 7 Schematic diagram of the implementation process of the password verification method proposed for the embodiment of the present invention Figure three ,Such as Figure 7 As shown, in an embodiment of the present invention, the above method for establishing a pre-stored password input interface at the terminal may include the following steps:

[0099] Step 104a, acquire the pre-stored password display interface, and determine the number of characters corresponding to the pre-stored password display interface.

[0100] In an embodiment of the present invention, the above-mentioned terminal may first obtain the pre-stored password display interface, and determine the number of characters corresponding to the pre-stored password display interface.

[0101] It should be noted that, in the embodiment of the present invention, the above-mentioned terminal may pre-store the above-mentioned pre-stored password display interface fo...

Embodiment 3

[0112] Based on the second embodiment above, Figure 8 Schematic diagram of the implementation process of the password verification method proposed for the embodiment of the present invention Figure four ,Such as Figure 8 As shown, in the embodiment of the present invention, after the above-mentioned terminal establishes the pre-stored password input interface according to the displayed characters, that is, after step 104c, the method for the above-mentioned terminal to perform password verification may also include the following steps:

[0113] Step 104d: Establish a matching relationship between the password input interface and the password display interface according to the pre-stored password display interface and the pre-stored password input interface.

[0114] In an embodiment of the present invention, after the terminal establishes the pre-stored password input interface based on the displayed characters, it can establish a matching relationship between the password...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a password verification method, a terminal and a computer readable storage medium. The password verification method comprises the steps that a password inputinstruction is acquired, and an input password is acquired according to the password input instruction; first position information corresponding to the input password is determined in a pre-stored password input interface, wherein one character in the input password corresponds to one piece of position information; the input password is verified according to the first position information, and a verification result is obtained. According to the password verification method, the safety of the terminal can be improved.

Description

technical field [0001] The present invention relates to terminal technology, in particular to a password verification method, a terminal and a computer-readable storage medium. Background technique [0002] With the continuous development of terminal technology, the functions and application scenarios of the terminal are also continuously expanding. Therefore, more and more user information is stored in the terminal. In order to protect the user information stored in the terminal, the terminal needs to set a corresponding password to verify the authority before viewing the information. Among the existing various forms of passwords, digital passwords are the most convenient and common, because compared with other forms of passwords, digital passwords are simpler and easier to remember. [0003] Since the digital password is composed of ten numbers from 0 to 9, and the arrangement of the numbers in the password input interface is relatively regular, when the terminal obtains ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/46
Inventor 张斌
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products