[go: up one dir, main page]

CN114564764A - Password input method, device, equipment and storage medium - Google Patents

Password input method, device, equipment and storage medium Download PDF

Info

Publication number
CN114564764A
CN114564764A CN202210184179.5A CN202210184179A CN114564764A CN 114564764 A CN114564764 A CN 114564764A CN 202210184179 A CN202210184179 A CN 202210184179A CN 114564764 A CN114564764 A CN 114564764A
Authority
CN
China
Prior art keywords
password
candidate
target
input
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210184179.5A
Other languages
Chinese (zh)
Inventor
公国玺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN202210184179.5A priority Critical patent/CN114564764A/en
Publication of CN114564764A publication Critical patent/CN114564764A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a password input method, a password input device, password input equipment and a storage medium. The method comprises the following steps: when a password input event is detected in a target application program, displaying a keyboard input interface; the keyboard input interface comprises candidate pictures, and the candidate pictures are associated with candidate character elements; acquiring a target picture selected from the candidate pictures; and determining a target character element according to the target picture based on the incidence relation between the candidate picture and the candidate character element, and taking the target character element as input password information. The embodiment of the invention can prevent the password information from being read maliciously and ensure the safety when the password is input.

Description

Password input method, device, equipment and storage medium
Technical Field
The present invention relates to the field of password protection technologies, and in particular, to a password input method, device, apparatus, and storage medium.
Background
With the popularization of online shopping and consumption, the public gradually forms the habit of online transaction. When the network transaction is carried out, the password input is inevitably required to be carried out by utilizing a virtual keyboard interface of the intelligent terminal.
However, this is in contrast to the high security password entry approaches in traditional offline transaction scenarios, such as physical password entry devices at bank counters. The security of the existing terminal for inputting the online password is low, and the password input by the user at the terminal is easily acquired by malicious programs and computer viruses in the terminal, so that the account and property security of the user is threatened.
Disclosure of Invention
The invention provides a password input method, a password input device, password input equipment and a storage medium, which are used for preventing password information from being read maliciously and ensuring the security when a password is input.
According to an aspect of the present invention, there is provided a password input method including:
when a password input event is detected in a target application program, displaying a keyboard input interface; the keyboard input interface comprises a candidate picture, and the candidate picture is associated with a candidate character element;
acquiring a target picture selected from the candidate pictures;
and determining a target character element according to the target picture based on the incidence relation between the candidate picture and the candidate character element, and taking the target character element as input password information.
According to another aspect of the present invention, there is provided a password input apparatus including:
the input interface display module is used for displaying a keyboard input interface when a password input event is detected in the target application program; the keyboard input interface comprises candidate pictures, and the candidate pictures are associated with candidate character elements;
the target picture acquisition module is used for acquiring a target picture selected from the candidate pictures;
and the password information determining module is used for determining a target character element according to the target picture based on the incidence relation between the candidate picture and the candidate character element, and taking the target character element as input password information.
According to another aspect of the present invention, there is provided an electronic apparatus including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to enable the at least one processor to perform a password entry method as described in any of the embodiments of the present invention.
According to another aspect of the present invention, there is provided a computer-readable storage medium storing computer instructions for causing a processor to implement a password input method according to any one of the embodiments of the present invention when the computer instructions are executed.
The embodiment of the invention replaces the characters in the password input keyboard with the pictures, establishes the association relationship between the pictures and the character elements, and can determine the password information represented by the target picture only under the condition of knowing the association relationship, thereby avoiding the password information from being read maliciously and ensuring the safety when the password is input.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present invention, nor do they necessarily limit the scope of the invention. Other features of the present invention will become apparent from the following description.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of a password input method according to an embodiment of the present invention;
FIG. 2 is a flowchart of a password input method according to another embodiment of the present invention
FIG. 3 is a schematic structural diagram of a password input device according to another embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device implementing an embodiment of the invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in other sequences than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Fig. 1 is a flowchart of a password input method according to an embodiment of the present invention, where the embodiment is applicable to a situation where a user inputs a password through a virtual keyboard, and the method can be executed by a password input device, which can be implemented in the form of hardware and/or software, and the device can be configured in an electronic device with corresponding data processing capability. As shown in fig. 1, the method includes:
s110, when a password input event is detected in the target application program, displaying a keyboard input interface; the keyboard input interface comprises candidate pictures, and the candidate pictures are associated with candidate character elements.
The target application program is an application program requiring a user to input various passwords, and the purpose of inputting the passwords can be identity authentication and the like in various scenes. The password input event is an event triggered after the user performs a corresponding operation, for example, the user clicks a 'payment order' by using payment software to input a payment password, and the input software unlocks the password when entering a certain program. The keyboard input interface in the invention can be a traditional 9-key or 26-key layout, so that users can have too strong sensory difference when using the password input method of the application. The candidate character elements may be characters that a conventional keyboard can support to input, such as elements of numbers, english letters, and the like.
Specifically, after a user triggers a password input event in a target application program, a keyboard input interface is displayed on a terminal screen where the target application program is installed. Different from the traditional keyboard input interface which directly displays characters, the keyboard input interface is displayed by replacing the characters with the candidate pictures, and the candidate pictures displayed in the input interface are not characters. Based on the display mode, even if a malicious program detects the input content of the user, the true password content input by the user cannot be determined, and only which picture is clicked can be known. For example, when the keyboard input interface of the numeric keyboard layout is presented to the user, 10 candidate pictures are provided, 10 corresponding candidate character elements are provided, and each candidate picture is associated with one candidate character element. When the user selects one of the pictures, only the method executor who has generated the keyboard layout can know the candidate characters associated with the candidate picture according to the association relationship between the candidate picture and the candidate keyboard elements when the keyboard layout is generated.
It should be noted that the candidate picture should show the information of the keyboard element associated with the candidate picture, for example, the candidate picture associated with the keyboard element "a" should contain a letter a in the picture content, so that the user can determine that the keyboard element actually associated with the picture is "a".
And S120, acquiring a target picture selected from the candidate pictures.
Specifically, after a keyboard input interface is displayed for a user, it is determined that the user clicks a candidate picture selected by a screen in the keyboard input interface, and the candidate picture selected by the user is taken as a target picture.
S130, determining a target character element according to the target picture based on the incidence relation between the candidate picture and the candidate character element, and taking the target character element as input password information.
Specifically, different candidate pictures have different attribute information, and the different candidate pictures and their associated candidate character elements may be distinguished based on the attribute information of the candidate pictures. After determining the attribute information of the picture, the unique candidate character associated with the attribute information may be determined according to the association relationship between the preset candidate picture and the candidate character element, and the candidate character is determined as a target character, which is the password information actually desired to be input by the user, and the candidate characters in the association relationship should be in one-to-one correspondence with the candidate picture. By such a password input and determination method, even if a malicious program acquires the contents clicked by the user, the password information actually input by the user cannot be determined according to the target picture selected by the user under the condition that the association relationship is not clear, so that the security during password input is improved.
For example, when the keyboard layout is a numeric keyboard layout, different pixel values may be set for 10 candidate pictures replacing 10 characters of 1 to 10, respectively, and its associated candidate character may be set for each pixel value, thereby generating an association relationship between the candidate pictures and the candidate characters. When the user clicks the candidate picture to determine the target picture, the candidate character associated with the target picture can be quickly determined according to the pixel value and the association relation of the target picture, so that the password information which the user actually wants to input is determined.
Optionally, the determining, based on the association relationship between the candidate picture and the candidate character element, the target character element according to the target picture includes:
acquiring a target picture name of the target picture; and determining candidate character elements associated with the target picture name based on the association relationship between the candidate pictures and the candidate character elements, and determining the associated candidate character elements as the target character elements.
Specifically, the candidate character associated with the target picture may be determined by using the picture name in the picture attribute information. The image names of other attribute information such as pixels, colors and sizes in the relative attribute information are undoubtedly higher in efficiency and strong in operability when different candidate images are distinguished and associated candidate elements are determined. Therefore, in the invention, when the association relationship is generated, the picture name can be used as the attribute information of the picture to be associated with the candidate character element, for example, the picture name "a" is associated with the candidate character element "1", and the picture name "B" is associated with the candidate character element "2".
The embodiment of the invention replaces the characters in the password input keyboard with the pictures, establishes the association relationship between the pictures and the character elements, and can determine the password information represented by the target picture only under the condition of knowing the association relationship, thereby avoiding the password information from being read maliciously and ensuring the security when the password is input.
Fig. 2 is a flowchart of a password input method according to another embodiment of the present invention, and the present embodiment is optimized and improved based on the above embodiment. As shown in fig. 2, the method includes:
s210, when a password input event is detected in the target application program, displaying a keyboard input interface; the keyboard input interface comprises a candidate picture, and the candidate picture is associated with a candidate character element.
And S220, acquiring a target picture selected from the candidate pictures.
And S230, determining a target character element according to the target picture based on the incidence relation between the candidate picture and the candidate character element, and taking the target character element as input password information.
S240, determining the playing state of the password input terminal for installing the target application program; displaying earphone connection prompt information under the condition that the password input terminal is in a play-out state; and under the condition that the password input terminal is in an earphone playing state, the password information is broadcasted in a voice mode.
The external playing state is a state of using an external player or a terminal with a player for sound public playing, and under the state, the password content of the voice broadcast is easily intercepted by other people.
Specifically, an auxiliary mode for assisting a disabled person or a visually impaired person in operating the terminal is gradually popularized in terminals such as mobile phones, and in the auxiliary mode, the terminal can automatically read contents such as interface characters and controls in mobile phone apps clicked by a user. When a user inputs a password in the auxiliary mode, the user needs to perform voice broadcasting on the password character actually input by the user to help disabled people or vision disorder to determine the input content of the user. The voice playing mode enables password information input by a user to be easily heard by other people nearby. Therefore, before the password information input by the user is broadcasted in a voice mode, the playing state of the password input terminal is detected, if the user is in the play-out state, the earphone connection prompt information is displayed, and the information can be in a voice content form; and under the condition that the password input terminal is in an earphone playing state, the password information is broadcasted in a voice mode. According to the method and the device, before the password information is broadcasted in a voice mode, the terminal broadcasting state is detected, the broadcasting is carried out in a safe mode, the earphone connection information is prompted in an unsafe mode, and the safety of inputting the password when the user starts the auxiliary mode is improved.
Optionally, the determining the play state of the password input terminal for installing the target application program includes:
playing the password information; monitoring environmental sound through a microphone; and if the monitored environmental sound comprises the password information, determining that the password input terminal is in an external playing state.
Specifically, for the determination of the playing state of the terminal, the current detection method in software can only determine whether an external audio playing device is connected, and cannot distinguish whether the external audio playing device is an earphone or a sound. Therefore, in order to further improve the detection accuracy of the playing state of the password input terminal, the invention can monitor the environmental sound through the microphone to determine whether the password information exists in the surrounding environmental sound, thereby effectively avoiding the situations that the user uses invalid external audio playing equipment to perform voice broadcast of the password information, and the user abandons the use of an earphone in the voice broadcast process, and the like.
S250, encrypting the password information through an asymmetric encryption algorithm; and sending the encrypted password information to a server for indicating the server to verify the encrypted password information.
Specifically, the password information input by the user is encrypted according to the prestored asymmetric encryption algorithm, and the asymmetric encryption has the advantage that even if a malicious program cracks the encryption algorithm, the encrypted password information cannot be decrypted according to the cracked encryption algorithm to obtain the password information, so that the safety of the password information after encryption is further improved. Meanwhile, an asymmetric decryption algorithm corresponding to the asymmetric encryption algorithm exists in the server, and the server can determine password information input by a user according to the asymmetric decryption algorithm and verify the password information.
In the embodiment of the invention, the playing state of the terminal is detected before the password information is broadcasted in a voice mode, the broadcast is carried out when the terminal is safe, and the earphone connection information is prompted when the terminal is not safe, so that the safety of inputting the password when a user starts the auxiliary mode is improved; the password information input by the user is encrypted by using the asymmetric encryption algorithm, so that the encrypted password information is prevented from being cracked by a malicious program which acquires the encryption algorithm.
Fig. 3 is a schematic structural diagram of a password input apparatus according to another embodiment of the present invention. As shown in fig. 3, the apparatus includes:
an input interface display module 310, configured to display a keyboard input interface when a password input event is detected in a target application; the keyboard input interface comprises candidate pictures, and the candidate pictures are associated with candidate character elements;
a target picture obtaining module 320, configured to obtain a target picture selected from the candidate pictures;
and the password information determining module 330 is configured to determine a target character element according to the target picture based on an association relationship between the candidate picture and the candidate character element, and use the target character element as input password information.
The password input device provided by the embodiment of the invention can execute the password input method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.
Optionally, the password information determining module is specifically configured to:
acquiring a target picture name of the target picture; and determining candidate character elements associated with the target picture name based on the association relationship between the candidate pictures and the candidate character elements, and determining the associated candidate character elements as the target character elements.
Optionally, the apparatus further includes a playing state monitoring module, where the playing state monitoring module includes:
a play state determination unit for determining a play state of a password input terminal in which the target application program is installed;
the prompt information display unit is used for displaying earphone connection prompt information under the condition that the password input terminal is in an external playing state;
and the password information broadcasting unit is used for broadcasting the password information in voice under the condition that the password input terminal is in an earphone playing state.
Optionally, the play state determining unit is specifically configured to:
playing the password information; monitoring environmental sound through a microphone; and if the monitored environmental sound comprises the password information, determining that the password input terminal is in an external playing state.
Optionally, the apparatus further includes a password information uploading module, configured to:
encrypting the password information through an asymmetric encryption algorithm; and sending the encrypted password information to a server for indicating the server to verify the encrypted password information.
The password input device further described can also execute the password input method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
FIG. 4 shows a schematic block diagram of an electronic device 40 that may be used to implement an embodiment of the invention. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital assistants, cellular phones, smart phones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 4, the electronic device 40 includes at least one processor 41, and a memory communicatively connected to the at least one processor 41, such as a Read Only Memory (ROM)42, a Random Access Memory (RAM)43, and the like, wherein the memory stores a computer program executable by the at least one processor, and the processor 41 may perform various suitable actions and processes according to the computer program stored in the Read Only Memory (ROM)42 or the computer program loaded from the storage unit 48 into the Random Access Memory (RAM) 43. In the RAM43, various programs and data required for operation of the electronic device 40 may also be stored. The processor 41, ROM42, and RAM43 are connected to each other by a bus 44. An input/output (I/O) interface 45 is also connected to bus 44.
A number of components in the electronic device 40 are connected to the I/O interface 45, including: an input unit 46 such as a keyboard, a mouse, etc.; an output unit 47 such as various types of displays, speakers, and the like; a storage unit 48 such as a magnetic disk, an optical disk, or the like; and a communication unit 49 such as a network card, modem, wireless communication transceiver, etc. The communication unit 49 allows the electronic device 40 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
Processor 41 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 41 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, or the like. Processor 41 performs the various methods and processes described above, such as a password entry method.
In some embodiments, the password entry method may be implemented as a computer program tangibly embodied in a computer-readable storage medium, such as storage unit 48. In some embodiments, part or all of the computer program may be loaded and/or installed onto electronic device 40 via ROM42 and/or communications unit 49. When the computer program is loaded into RAM43 and executed by processor 41, one or more steps of the password entry method described above may be performed. Alternatively, in other embodiments, processor 41 may be configured to perform the password entry method by any other suitable means (e.g., by way of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for implementing the methods of the present invention may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be performed. A computer program can execute entirely on a machine, partly on a machine, as a stand-alone software package partly on a machine and partly on a remote machine or entirely on a remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. A computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical host and VPS service are overcome.
It should be understood that various forms of the flows shown above, reordering, adding or deleting steps, may be used. For example, the steps described in the present invention may be executed in parallel, sequentially, or in different orders, and are not limited herein as long as the desired results of the technical solution of the present invention can be achieved.
The above-described embodiments should not be construed as limiting the scope of the invention. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A password input method, comprising:
when a password input event is detected in a target application program, displaying a keyboard input interface; the keyboard input interface comprises candidate pictures, and the candidate pictures are associated with candidate character elements;
acquiring a target picture selected from the candidate pictures;
and determining a target character element according to the target picture based on the incidence relation between the candidate picture and the candidate character element, and taking the target character element as input password information.
2. The method according to claim 1, wherein the determining a target character element according to the target picture based on the association relationship between the candidate picture and the candidate character element comprises:
acquiring a target picture name of the target picture;
and determining candidate character elements associated with the target picture name based on the association relationship between the candidate pictures and the candidate character elements, and determining the associated candidate character elements as the target character elements.
3. The method of claim 1, wherein the taking the target character element as the input password information further comprises:
determining a playing state of a password input terminal for installing the target application program;
displaying earphone connection prompt information under the condition that the password input terminal is in an external playing state;
and under the condition that the password input terminal is in an earphone playing state, the password information is broadcasted in a voice mode.
4. The method of claim 3, wherein determining the password entry terminal play state for installing the target application comprises:
playing the password information;
monitoring environmental sound through a microphone;
and if the monitored environmental sound comprises the password information, determining that the password input terminal is in an external playing state.
5. The method according to any one of claims 1-4, wherein the taking the target character element as input password information further comprises:
encrypting the password information through an asymmetric encryption algorithm; and sending the encrypted password information to a server for indicating the server to verify the encrypted password information.
6. A password input apparatus comprising:
the input interface display module is used for displaying a keyboard input interface when a password input event is detected in the target application program; the keyboard input interface comprises candidate pictures, and the candidate pictures are associated with candidate character elements;
the target picture acquisition module is used for acquiring a target picture selected from the candidate pictures;
and the password information determining module is used for determining a target character element according to the target picture based on the incidence relation between the candidate picture and the candidate character element, and taking the target character element as input password information.
7. The apparatus of claim 6, wherein the cryptographic information determination module is specifically configured to:
acquiring a target picture name of the target picture;
and determining candidate character elements associated with the target picture name based on the association relationship between the candidate pictures and the candidate character elements, and determining the associated candidate character elements as the target character elements.
8. The apparatus of claim 6, further comprising a play state monitoring module, the play state monitoring module comprising:
a play state determination unit for determining a play state of a password input terminal in which the target application program is installed;
the prompt information display unit is used for displaying the earphone connection prompt information under the condition that the password input terminal is in an external playing state;
and the password information broadcasting unit is used for broadcasting the password information in voice under the condition that the password input terminal is in an earphone playing state.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the password entry method of any of claims 1-5.
10. A computer-readable storage medium having stored thereon computer instructions for causing a processor to implement the password input method of any one of claims 1-5 when executed.
CN202210184179.5A 2022-02-23 2022-02-23 Password input method, device, equipment and storage medium Pending CN114564764A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210184179.5A CN114564764A (en) 2022-02-23 2022-02-23 Password input method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210184179.5A CN114564764A (en) 2022-02-23 2022-02-23 Password input method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114564764A true CN114564764A (en) 2022-05-31

Family

ID=81715802

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210184179.5A Pending CN114564764A (en) 2022-02-23 2022-02-23 Password input method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114564764A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114969698A (en) * 2022-06-29 2022-08-30 中国工商银行股份有限公司 Password input method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105657174A (en) * 2016-01-26 2016-06-08 努比亚技术有限公司 Voice converting method and terminal
CN106055260A (en) * 2016-06-03 2016-10-26 深圳市联谛信息无障碍有限责任公司 Screen reading method and device of secure keyboard
CN107563177A (en) * 2017-09-05 2018-01-09 深圳天珑无线科技有限公司 Cipher processing method, device and computer-readable recording medium
CN112149195A (en) * 2020-09-23 2020-12-29 深圳前海微众银行股份有限公司 Privacy protection method, device, equipment and computer readable storage medium
CN112788179A (en) * 2020-05-31 2021-05-11 深圳市睿耳电子有限公司 Adaptive adjustment method for playing volume of earphone and related device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105657174A (en) * 2016-01-26 2016-06-08 努比亚技术有限公司 Voice converting method and terminal
CN106055260A (en) * 2016-06-03 2016-10-26 深圳市联谛信息无障碍有限责任公司 Screen reading method and device of secure keyboard
CN107563177A (en) * 2017-09-05 2018-01-09 深圳天珑无线科技有限公司 Cipher processing method, device and computer-readable recording medium
CN112788179A (en) * 2020-05-31 2021-05-11 深圳市睿耳电子有限公司 Adaptive adjustment method for playing volume of earphone and related device
CN112149195A (en) * 2020-09-23 2020-12-29 深圳前海微众银行股份有限公司 Privacy protection method, device, equipment and computer readable storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114969698A (en) * 2022-06-29 2022-08-30 中国工商银行股份有限公司 Password input method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN113438355B (en) Communication method, device, equipment and storage medium based on cloud mobile phone
US10165002B2 (en) Identifying an imposter account in a social network
CN105100449B (en) A kind of picture sharing method and mobile terminal
WO2021244531A1 (en) Payment method and apparatus based on facial recognition
CN114513350B (en) Identity verification method, system and storage medium
CN112987942B (en) Method, device and system for inputting information by keyboard, electronic equipment and storage medium
US20180357404A1 (en) Information processing method and apparatus, and electronic device
CN116484421A (en) Protection method, device, equipment and storage medium for private information
CN114564764A (en) Password input method, device, equipment and storage medium
CN108108618A (en) The application interface detection method and device of forgery attack
CN115038062A (en) A Bluetooth authentication method, device and device
CN113836509A (en) Information acquisition method and device, electronic equipment and storage medium
JP6325654B2 (en) Network service providing apparatus, network service providing method, and program
CN114186993A (en) A digital currency transaction method and device
CN114143063A (en) Information processing method, information processing apparatus, electronic device, and storage medium
CN115019419B (en) Vehicle unlocking method, device, equipment and storage medium
CN112788603B (en) Verification code forwarding method, device, equipment and medium
CN106572462B (en) Method and device for sending alarm information
CN115859349B (en) Data desensitization method and device, electronic equipment and storage medium
US12045459B2 (en) Using a virtual keyboard to enter particular input
CN111259369A (en) Man-machine identity verification method and system
CN115242523B (en) Terminal using method, device, equipment and medium based on TEE system
US20220365794A1 (en) In-app password based log-in detection using user interface elements
CN111291369B (en) Information detection method and electronic equipment
CN116208963A (en) Login control method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination