Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption processing method and device

A processing method and password technology, which is applied in the field of terminal interaction of password information, can solve problems such as passwords are easy to be stolen, and achieve the effect of improving security

Active Publication Date: 2018-11-06
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the object of the present invention is to provide a password processing method and device, which aims to solve the problem that the password is easy to be stolen due to the existence of an objective display link for each password character input by the user in the existing solution. Further enhance the security of password input

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption processing method and device
  • Encryption processing method and device
  • Encryption processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Embodiment 1 of the present invention discloses a cryptographic processing method, refer to figure 1 , the method may include the following steps:

[0045] S101: Receive a current character input by a user during a password input process, and store the current character.

[0046] S102: Displaying the set password hidden substitution symbol at a preset position, so as to realize hidden substitution display of the current character by using the password hidden substitution symbol.

[0047] In this embodiment, the preset position is specifically a password input edit box.

[0048] The hidden password substitution symbol can be various character patterns such as black solid dots and asterisk characters that can hide and protect the password characters input by the user.

[0049] When the user needs to enter the password in the password input edit box based on certain application requirements or service transaction requirements, during the entire password input process, th...

Embodiment 2

[0052] In the second embodiment, refer to figure 2 , the step S101 can be specifically implemented through the following steps:

[0053]S201: Receive the current character input by the user during the password input process, and store the current character in the first preset memory instead of the existing character in the first preset memory, the first preset memory The character content in is updated if and only when a character input event from the user is detected.

[0054] On this basis, as figure 2 As shown, the password processing method of the present application may also include:

[0055] S202: Receive the first display request sent by the user;

[0056] S203: Read characters in the first preset memory, and display the read characters.

[0057] In the process of inputting the password, the user often forgets which character has been input due to external interference, or is uncertain whether the currently input character is correct due to a mistake in clicking a...

Embodiment 3

[0065] In the second embodiment, refer to image 3 , the step S101 can be specifically implemented through the following steps:

[0066] S301: Receive the current characters input by the user during the password input process, and store the current characters in sequence in corresponding positions of the second preset memory according to the sequence of input time of each character in the password.

[0067] On this basis, as image 3 As shown, the password processing method of the present application may also include:

[0068] S302: Receive a second display request sent by the user;

[0069] S303: When the number of characters currently input by the user does not reach the total number of characters contained in the user password, according to the order of character input time, read and display the characters currently entered by the user in sequence from the second preset memory. all characters entered;

[0070] S304: When the number of characters currently input by the u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a code processing method and apparatus. When each character input by a user is received, the character input by the user can be hidden rather than displayed and a preset password hidden replacing character is directly displayed in a preset position and the input characters are not displayed; different from the prior art, when the password is input by the user, the characters input by the user are not objectively displayed but displayed in a replaced way of preset password hidden replacing characters such as black solid dots and asterisks, so password input by the user can be hidden and protected and safety of password input can be enhanced.

Description

technical field [0001] The invention belongs to the technical field of terminal interaction of password information, and in particular relates to a password processing method and device. Background technique [0002] At present, as an effective means to protect people's information security, the use of passwords has become an indispensable part of people's daily life. [0003] In the existing password input scheme, each time a character is entered, the character will be displayed in the password input edit box, and then when the display time reaches the preset time or the user enters a new character, the displayed input character will be replaced with Preset password hidden substitution characters, such as black solid dots or asterisk characters, etc., are used to hide and replace the characters entered by the user, which ensures the security of the user password to a certain extent. However, because the existing scheme has an objective display link for each character enter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/023G06F21/62
Inventor 黎广
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products