CN114564764A - Password input method, device, equipment and storage medium - Google Patents
Password input method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN114564764A CN114564764A CN202210184179.5A CN202210184179A CN114564764A CN 114564764 A CN114564764 A CN 114564764A CN 202210184179 A CN202210184179 A CN 202210184179A CN 114564764 A CN114564764 A CN 114564764A
- Authority
- CN
- China
- Prior art keywords
- password
- candidate
- target
- input
- determining
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 238000004590 computer program Methods 0.000 claims description 16
- 230000007613 environmental effect Effects 0.000 claims description 8
- 238000012544 monitoring process Methods 0.000 claims description 7
- 238000004891 communication Methods 0.000 description 8
- 238000012545 processing Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000001953 sensory effect Effects 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000001771 impaired effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 208000029257 vision disease Diseases 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention discloses a password input method, a password input device, password input equipment and a storage medium. The method comprises the following steps: when a password input event is detected in a target application program, displaying a keyboard input interface; the keyboard input interface comprises candidate pictures, and the candidate pictures are associated with candidate character elements; acquiring a target picture selected from the candidate pictures; and determining a target character element according to the target picture based on the incidence relation between the candidate picture and the candidate character element, and taking the target character element as input password information. The embodiment of the invention can prevent the password information from being read maliciously and ensure the safety when the password is input.
Description
Technical Field
The present invention relates to the field of password protection technologies, and in particular, to a password input method, device, apparatus, and storage medium.
Background
With the popularization of online shopping and consumption, the public gradually forms the habit of online transaction. When the network transaction is carried out, the password input is inevitably required to be carried out by utilizing a virtual keyboard interface of the intelligent terminal.
However, this is in contrast to the high security password entry approaches in traditional offline transaction scenarios, such as physical password entry devices at bank counters. The security of the existing terminal for inputting the online password is low, and the password input by the user at the terminal is easily acquired by malicious programs and computer viruses in the terminal, so that the account and property security of the user is threatened.
Disclosure of Invention
The invention provides a password input method, a password input device, password input equipment and a storage medium, which are used for preventing password information from being read maliciously and ensuring the security when a password is input.
According to an aspect of the present invention, there is provided a password input method including:
when a password input event is detected in a target application program, displaying a keyboard input interface; the keyboard input interface comprises a candidate picture, and the candidate picture is associated with a candidate character element;
acquiring a target picture selected from the candidate pictures;
and determining a target character element according to the target picture based on the incidence relation between the candidate picture and the candidate character element, and taking the target character element as input password information.
According to another aspect of the present invention, there is provided a password input apparatus including:
the input interface display module is used for displaying a keyboard input interface when a password input event is detected in the target application program; the keyboard input interface comprises candidate pictures, and the candidate pictures are associated with candidate character elements;
the target picture acquisition module is used for acquiring a target picture selected from the candidate pictures;
and the password information determining module is used for determining a target character element according to the target picture based on the incidence relation between the candidate picture and the candidate character element, and taking the target character element as input password information.
According to another aspect of the present invention, there is provided an electronic apparatus including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to enable the at least one processor to perform a password entry method as described in any of the embodiments of the present invention.
According to another aspect of the present invention, there is provided a computer-readable storage medium storing computer instructions for causing a processor to implement a password input method according to any one of the embodiments of the present invention when the computer instructions are executed.
The embodiment of the invention replaces the characters in the password input keyboard with the pictures, establishes the association relationship between the pictures and the character elements, and can determine the password information represented by the target picture only under the condition of knowing the association relationship, thereby avoiding the password information from being read maliciously and ensuring the safety when the password is input.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present invention, nor do they necessarily limit the scope of the invention. Other features of the present invention will become apparent from the following description.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of a password input method according to an embodiment of the present invention;
FIG. 2 is a flowchart of a password input method according to another embodiment of the present invention
FIG. 3 is a schematic structural diagram of a password input device according to another embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device implementing an embodiment of the invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in other sequences than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Fig. 1 is a flowchart of a password input method according to an embodiment of the present invention, where the embodiment is applicable to a situation where a user inputs a password through a virtual keyboard, and the method can be executed by a password input device, which can be implemented in the form of hardware and/or software, and the device can be configured in an electronic device with corresponding data processing capability. As shown in fig. 1, the method includes:
s110, when a password input event is detected in the target application program, displaying a keyboard input interface; the keyboard input interface comprises candidate pictures, and the candidate pictures are associated with candidate character elements.
The target application program is an application program requiring a user to input various passwords, and the purpose of inputting the passwords can be identity authentication and the like in various scenes. The password input event is an event triggered after the user performs a corresponding operation, for example, the user clicks a 'payment order' by using payment software to input a payment password, and the input software unlocks the password when entering a certain program. The keyboard input interface in the invention can be a traditional 9-key or 26-key layout, so that users can have too strong sensory difference when using the password input method of the application. The candidate character elements may be characters that a conventional keyboard can support to input, such as elements of numbers, english letters, and the like.
Specifically, after a user triggers a password input event in a target application program, a keyboard input interface is displayed on a terminal screen where the target application program is installed. Different from the traditional keyboard input interface which directly displays characters, the keyboard input interface is displayed by replacing the characters with the candidate pictures, and the candidate pictures displayed in the input interface are not characters. Based on the display mode, even if a malicious program detects the input content of the user, the true password content input by the user cannot be determined, and only which picture is clicked can be known. For example, when the keyboard input interface of the numeric keyboard layout is presented to the user, 10 candidate pictures are provided, 10 corresponding candidate character elements are provided, and each candidate picture is associated with one candidate character element. When the user selects one of the pictures, only the method executor who has generated the keyboard layout can know the candidate characters associated with the candidate picture according to the association relationship between the candidate picture and the candidate keyboard elements when the keyboard layout is generated.
It should be noted that the candidate picture should show the information of the keyboard element associated with the candidate picture, for example, the candidate picture associated with the keyboard element "a" should contain a letter a in the picture content, so that the user can determine that the keyboard element actually associated with the picture is "a".
And S120, acquiring a target picture selected from the candidate pictures.
Specifically, after a keyboard input interface is displayed for a user, it is determined that the user clicks a candidate picture selected by a screen in the keyboard input interface, and the candidate picture selected by the user is taken as a target picture.
S130, determining a target character element according to the target picture based on the incidence relation between the candidate picture and the candidate character element, and taking the target character element as input password information.
Specifically, different candidate pictures have different attribute information, and the different candidate pictures and their associated candidate character elements may be distinguished based on the attribute information of the candidate pictures. After determining the attribute information of the picture, the unique candidate character associated with the attribute information may be determined according to the association relationship between the preset candidate picture and the candidate character element, and the candidate character is determined as a target character, which is the password information actually desired to be input by the user, and the candidate characters in the association relationship should be in one-to-one correspondence with the candidate picture. By such a password input and determination method, even if a malicious program acquires the contents clicked by the user, the password information actually input by the user cannot be determined according to the target picture selected by the user under the condition that the association relationship is not clear, so that the security during password input is improved.
For example, when the keyboard layout is a numeric keyboard layout, different pixel values may be set for 10 candidate pictures replacing 10 characters of 1 to 10, respectively, and its associated candidate character may be set for each pixel value, thereby generating an association relationship between the candidate pictures and the candidate characters. When the user clicks the candidate picture to determine the target picture, the candidate character associated with the target picture can be quickly determined according to the pixel value and the association relation of the target picture, so that the password information which the user actually wants to input is determined.
Optionally, the determining, based on the association relationship between the candidate picture and the candidate character element, the target character element according to the target picture includes:
acquiring a target picture name of the target picture; and determining candidate character elements associated with the target picture name based on the association relationship between the candidate pictures and the candidate character elements, and determining the associated candidate character elements as the target character elements.
Specifically, the candidate character associated with the target picture may be determined by using the picture name in the picture attribute information. The image names of other attribute information such as pixels, colors and sizes in the relative attribute information are undoubtedly higher in efficiency and strong in operability when different candidate images are distinguished and associated candidate elements are determined. Therefore, in the invention, when the association relationship is generated, the picture name can be used as the attribute information of the picture to be associated with the candidate character element, for example, the picture name "a" is associated with the candidate character element "1", and the picture name "B" is associated with the candidate character element "2".
The embodiment of the invention replaces the characters in the password input keyboard with the pictures, establishes the association relationship between the pictures and the character elements, and can determine the password information represented by the target picture only under the condition of knowing the association relationship, thereby avoiding the password information from being read maliciously and ensuring the security when the password is input.
Fig. 2 is a flowchart of a password input method according to another embodiment of the present invention, and the present embodiment is optimized and improved based on the above embodiment. As shown in fig. 2, the method includes:
s210, when a password input event is detected in the target application program, displaying a keyboard input interface; the keyboard input interface comprises a candidate picture, and the candidate picture is associated with a candidate character element.
And S220, acquiring a target picture selected from the candidate pictures.
And S230, determining a target character element according to the target picture based on the incidence relation between the candidate picture and the candidate character element, and taking the target character element as input password information.
S240, determining the playing state of the password input terminal for installing the target application program; displaying earphone connection prompt information under the condition that the password input terminal is in a play-out state; and under the condition that the password input terminal is in an earphone playing state, the password information is broadcasted in a voice mode.
The external playing state is a state of using an external player or a terminal with a player for sound public playing, and under the state, the password content of the voice broadcast is easily intercepted by other people.
Specifically, an auxiliary mode for assisting a disabled person or a visually impaired person in operating the terminal is gradually popularized in terminals such as mobile phones, and in the auxiliary mode, the terminal can automatically read contents such as interface characters and controls in mobile phone apps clicked by a user. When a user inputs a password in the auxiliary mode, the user needs to perform voice broadcasting on the password character actually input by the user to help disabled people or vision disorder to determine the input content of the user. The voice playing mode enables password information input by a user to be easily heard by other people nearby. Therefore, before the password information input by the user is broadcasted in a voice mode, the playing state of the password input terminal is detected, if the user is in the play-out state, the earphone connection prompt information is displayed, and the information can be in a voice content form; and under the condition that the password input terminal is in an earphone playing state, the password information is broadcasted in a voice mode. According to the method and the device, before the password information is broadcasted in a voice mode, the terminal broadcasting state is detected, the broadcasting is carried out in a safe mode, the earphone connection information is prompted in an unsafe mode, and the safety of inputting the password when the user starts the auxiliary mode is improved.
Optionally, the determining the play state of the password input terminal for installing the target application program includes:
playing the password information; monitoring environmental sound through a microphone; and if the monitored environmental sound comprises the password information, determining that the password input terminal is in an external playing state.
Specifically, for the determination of the playing state of the terminal, the current detection method in software can only determine whether an external audio playing device is connected, and cannot distinguish whether the external audio playing device is an earphone or a sound. Therefore, in order to further improve the detection accuracy of the playing state of the password input terminal, the invention can monitor the environmental sound through the microphone to determine whether the password information exists in the surrounding environmental sound, thereby effectively avoiding the situations that the user uses invalid external audio playing equipment to perform voice broadcast of the password information, and the user abandons the use of an earphone in the voice broadcast process, and the like.
S250, encrypting the password information through an asymmetric encryption algorithm; and sending the encrypted password information to a server for indicating the server to verify the encrypted password information.
Specifically, the password information input by the user is encrypted according to the prestored asymmetric encryption algorithm, and the asymmetric encryption has the advantage that even if a malicious program cracks the encryption algorithm, the encrypted password information cannot be decrypted according to the cracked encryption algorithm to obtain the password information, so that the safety of the password information after encryption is further improved. Meanwhile, an asymmetric decryption algorithm corresponding to the asymmetric encryption algorithm exists in the server, and the server can determine password information input by a user according to the asymmetric decryption algorithm and verify the password information.
In the embodiment of the invention, the playing state of the terminal is detected before the password information is broadcasted in a voice mode, the broadcast is carried out when the terminal is safe, and the earphone connection information is prompted when the terminal is not safe, so that the safety of inputting the password when a user starts the auxiliary mode is improved; the password information input by the user is encrypted by using the asymmetric encryption algorithm, so that the encrypted password information is prevented from being cracked by a malicious program which acquires the encryption algorithm.
Fig. 3 is a schematic structural diagram of a password input apparatus according to another embodiment of the present invention. As shown in fig. 3, the apparatus includes:
an input interface display module 310, configured to display a keyboard input interface when a password input event is detected in a target application; the keyboard input interface comprises candidate pictures, and the candidate pictures are associated with candidate character elements;
a target picture obtaining module 320, configured to obtain a target picture selected from the candidate pictures;
and the password information determining module 330 is configured to determine a target character element according to the target picture based on an association relationship between the candidate picture and the candidate character element, and use the target character element as input password information.
The password input device provided by the embodiment of the invention can execute the password input method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.
Optionally, the password information determining module is specifically configured to:
acquiring a target picture name of the target picture; and determining candidate character elements associated with the target picture name based on the association relationship between the candidate pictures and the candidate character elements, and determining the associated candidate character elements as the target character elements.
Optionally, the apparatus further includes a playing state monitoring module, where the playing state monitoring module includes:
a play state determination unit for determining a play state of a password input terminal in which the target application program is installed;
the prompt information display unit is used for displaying earphone connection prompt information under the condition that the password input terminal is in an external playing state;
and the password information broadcasting unit is used for broadcasting the password information in voice under the condition that the password input terminal is in an earphone playing state.
Optionally, the play state determining unit is specifically configured to:
playing the password information; monitoring environmental sound through a microphone; and if the monitored environmental sound comprises the password information, determining that the password input terminal is in an external playing state.
Optionally, the apparatus further includes a password information uploading module, configured to:
encrypting the password information through an asymmetric encryption algorithm; and sending the encrypted password information to a server for indicating the server to verify the encrypted password information.
The password input device further described can also execute the password input method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
FIG. 4 shows a schematic block diagram of an electronic device 40 that may be used to implement an embodiment of the invention. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital assistants, cellular phones, smart phones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 4, the electronic device 40 includes at least one processor 41, and a memory communicatively connected to the at least one processor 41, such as a Read Only Memory (ROM)42, a Random Access Memory (RAM)43, and the like, wherein the memory stores a computer program executable by the at least one processor, and the processor 41 may perform various suitable actions and processes according to the computer program stored in the Read Only Memory (ROM)42 or the computer program loaded from the storage unit 48 into the Random Access Memory (RAM) 43. In the RAM43, various programs and data required for operation of the electronic device 40 may also be stored. The processor 41, ROM42, and RAM43 are connected to each other by a bus 44. An input/output (I/O) interface 45 is also connected to bus 44.
A number of components in the electronic device 40 are connected to the I/O interface 45, including: an input unit 46 such as a keyboard, a mouse, etc.; an output unit 47 such as various types of displays, speakers, and the like; a storage unit 48 such as a magnetic disk, an optical disk, or the like; and a communication unit 49 such as a network card, modem, wireless communication transceiver, etc. The communication unit 49 allows the electronic device 40 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
In some embodiments, the password entry method may be implemented as a computer program tangibly embodied in a computer-readable storage medium, such as storage unit 48. In some embodiments, part or all of the computer program may be loaded and/or installed onto electronic device 40 via ROM42 and/or communications unit 49. When the computer program is loaded into RAM43 and executed by processor 41, one or more steps of the password entry method described above may be performed. Alternatively, in other embodiments, processor 41 may be configured to perform the password entry method by any other suitable means (e.g., by way of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for implementing the methods of the present invention may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be performed. A computer program can execute entirely on a machine, partly on a machine, as a stand-alone software package partly on a machine and partly on a remote machine or entirely on a remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. A computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical host and VPS service are overcome.
It should be understood that various forms of the flows shown above, reordering, adding or deleting steps, may be used. For example, the steps described in the present invention may be executed in parallel, sequentially, or in different orders, and are not limited herein as long as the desired results of the technical solution of the present invention can be achieved.
The above-described embodiments should not be construed as limiting the scope of the invention. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
1. A password input method, comprising:
when a password input event is detected in a target application program, displaying a keyboard input interface; the keyboard input interface comprises candidate pictures, and the candidate pictures are associated with candidate character elements;
acquiring a target picture selected from the candidate pictures;
and determining a target character element according to the target picture based on the incidence relation between the candidate picture and the candidate character element, and taking the target character element as input password information.
2. The method according to claim 1, wherein the determining a target character element according to the target picture based on the association relationship between the candidate picture and the candidate character element comprises:
acquiring a target picture name of the target picture;
and determining candidate character elements associated with the target picture name based on the association relationship between the candidate pictures and the candidate character elements, and determining the associated candidate character elements as the target character elements.
3. The method of claim 1, wherein the taking the target character element as the input password information further comprises:
determining a playing state of a password input terminal for installing the target application program;
displaying earphone connection prompt information under the condition that the password input terminal is in an external playing state;
and under the condition that the password input terminal is in an earphone playing state, the password information is broadcasted in a voice mode.
4. The method of claim 3, wherein determining the password entry terminal play state for installing the target application comprises:
playing the password information;
monitoring environmental sound through a microphone;
and if the monitored environmental sound comprises the password information, determining that the password input terminal is in an external playing state.
5. The method according to any one of claims 1-4, wherein the taking the target character element as input password information further comprises:
encrypting the password information through an asymmetric encryption algorithm; and sending the encrypted password information to a server for indicating the server to verify the encrypted password information.
6. A password input apparatus comprising:
the input interface display module is used for displaying a keyboard input interface when a password input event is detected in the target application program; the keyboard input interface comprises candidate pictures, and the candidate pictures are associated with candidate character elements;
the target picture acquisition module is used for acquiring a target picture selected from the candidate pictures;
and the password information determining module is used for determining a target character element according to the target picture based on the incidence relation between the candidate picture and the candidate character element, and taking the target character element as input password information.
7. The apparatus of claim 6, wherein the cryptographic information determination module is specifically configured to:
acquiring a target picture name of the target picture;
and determining candidate character elements associated with the target picture name based on the association relationship between the candidate pictures and the candidate character elements, and determining the associated candidate character elements as the target character elements.
8. The apparatus of claim 6, further comprising a play state monitoring module, the play state monitoring module comprising:
a play state determination unit for determining a play state of a password input terminal in which the target application program is installed;
the prompt information display unit is used for displaying the earphone connection prompt information under the condition that the password input terminal is in an external playing state;
and the password information broadcasting unit is used for broadcasting the password information in voice under the condition that the password input terminal is in an earphone playing state.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the password entry method of any of claims 1-5.
10. A computer-readable storage medium having stored thereon computer instructions for causing a processor to implement the password input method of any one of claims 1-5 when executed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210184179.5A CN114564764A (en) | 2022-02-23 | 2022-02-23 | Password input method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210184179.5A CN114564764A (en) | 2022-02-23 | 2022-02-23 | Password input method, device, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114564764A true CN114564764A (en) | 2022-05-31 |
Family
ID=81715802
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210184179.5A Pending CN114564764A (en) | 2022-02-23 | 2022-02-23 | Password input method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114564764A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114969698A (en) * | 2022-06-29 | 2022-08-30 | 中国工商银行股份有限公司 | Password input method and device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105657174A (en) * | 2016-01-26 | 2016-06-08 | 努比亚技术有限公司 | Voice converting method and terminal |
CN106055260A (en) * | 2016-06-03 | 2016-10-26 | 深圳市联谛信息无障碍有限责任公司 | Screen reading method and device of secure keyboard |
CN107563177A (en) * | 2017-09-05 | 2018-01-09 | 深圳天珑无线科技有限公司 | Cipher processing method, device and computer-readable recording medium |
CN112149195A (en) * | 2020-09-23 | 2020-12-29 | 深圳前海微众银行股份有限公司 | Privacy protection method, device, equipment and computer readable storage medium |
CN112788179A (en) * | 2020-05-31 | 2021-05-11 | 深圳市睿耳电子有限公司 | Adaptive adjustment method for playing volume of earphone and related device |
-
2022
- 2022-02-23 CN CN202210184179.5A patent/CN114564764A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105657174A (en) * | 2016-01-26 | 2016-06-08 | 努比亚技术有限公司 | Voice converting method and terminal |
CN106055260A (en) * | 2016-06-03 | 2016-10-26 | 深圳市联谛信息无障碍有限责任公司 | Screen reading method and device of secure keyboard |
CN107563177A (en) * | 2017-09-05 | 2018-01-09 | 深圳天珑无线科技有限公司 | Cipher processing method, device and computer-readable recording medium |
CN112788179A (en) * | 2020-05-31 | 2021-05-11 | 深圳市睿耳电子有限公司 | Adaptive adjustment method for playing volume of earphone and related device |
CN112149195A (en) * | 2020-09-23 | 2020-12-29 | 深圳前海微众银行股份有限公司 | Privacy protection method, device, equipment and computer readable storage medium |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114969698A (en) * | 2022-06-29 | 2022-08-30 | 中国工商银行股份有限公司 | Password input method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113438355B (en) | Communication method, device, equipment and storage medium based on cloud mobile phone | |
US10165002B2 (en) | Identifying an imposter account in a social network | |
CN105100449B (en) | A kind of picture sharing method and mobile terminal | |
WO2021244531A1 (en) | Payment method and apparatus based on facial recognition | |
CN114513350B (en) | Identity verification method, system and storage medium | |
CN112987942B (en) | Method, device and system for inputting information by keyboard, electronic equipment and storage medium | |
US20180357404A1 (en) | Information processing method and apparatus, and electronic device | |
CN116484421A (en) | Protection method, device, equipment and storage medium for private information | |
CN114564764A (en) | Password input method, device, equipment and storage medium | |
CN108108618A (en) | The application interface detection method and device of forgery attack | |
CN115038062A (en) | A Bluetooth authentication method, device and device | |
CN113836509A (en) | Information acquisition method and device, electronic equipment and storage medium | |
JP6325654B2 (en) | Network service providing apparatus, network service providing method, and program | |
CN114186993A (en) | A digital currency transaction method and device | |
CN114143063A (en) | Information processing method, information processing apparatus, electronic device, and storage medium | |
CN115019419B (en) | Vehicle unlocking method, device, equipment and storage medium | |
CN112788603B (en) | Verification code forwarding method, device, equipment and medium | |
CN106572462B (en) | Method and device for sending alarm information | |
CN115859349B (en) | Data desensitization method and device, electronic equipment and storage medium | |
US12045459B2 (en) | Using a virtual keyboard to enter particular input | |
CN111259369A (en) | Man-machine identity verification method and system | |
CN115242523B (en) | Terminal using method, device, equipment and medium based on TEE system | |
US20220365794A1 (en) | In-app password based log-in detection using user interface elements | |
CN111291369B (en) | Information detection method and electronic equipment | |
CN116208963A (en) | Login control method, device, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |