CN109214167B - Intelligent key safety equipment and key recovery method and storage medium thereof - Google Patents
Intelligent key safety equipment and key recovery method and storage medium thereof Download PDFInfo
- Publication number
- CN109214167B CN109214167B CN201810865334.3A CN201810865334A CN109214167B CN 109214167 B CN109214167 B CN 109214167B CN 201810865334 A CN201810865334 A CN 201810865334A CN 109214167 B CN109214167 B CN 109214167B
- Authority
- CN
- China
- Prior art keywords
- candidate word
- character
- key
- string
- matched
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
The invention discloses an intelligent secret key safety device and a secret key recovery method and a storage medium thereof, wherein the method comprises the following steps: acquiring a preset number of mnemonics; generating a key of the intelligent key safety equipment according to a preset number of mnemonics; wherein each mnemonic word is obtained by the following method: acquiring a character string input by a user, wherein the character string comprises one or more characters; judging whether a candidate word string matched with the character string exists in the database; and if so, determining the mnemonic words from the matched candidate word strings. The intelligent key safety device, the key recovery method and the storage medium thereof provided by the invention have the advantages that whether the candidate word string matched with the character string input by the user exists in the database or not is judged, if yes, the mnemonic words are determined from the matched candidate word string, and the user key is recovered according to the mnemonic words after the user inputs a preset number of mnemonic words, so that the user input is simplified, the input time is saved, and the efficiency is improved.
Description
Technical Field
The invention relates to the field of smart card mnemonics, in particular to smart key safety equipment, a key recovery method and a storage medium thereof.
Background
Currently, smart key security devices are used in various application scenarios, such as digital currency hardware wallets, where a user needs to enter a key or a mnemonic to recover the key when using the smart key security device. However, when the key is recovered, it is time-consuming and troublesome to input the mnemonic word through the keyboard of the smart key security device.
Disclosure of Invention
In order to overcome the defects of the prior art, an object of the present invention is to provide a key recovery method for a smart key security device, so as to solve the problem that it is time-consuming and troublesome to input a mnemonic in the conventional key recovery method.
The second objective of the present invention is to provide a smart key security device to solve the problem that it is time-consuming and troublesome to input mnemonics in the conventional key recovery method.
One of the purposes of the invention is realized by adopting the following technical scheme:
a key recovery method of a smart key security device comprises the following steps:
acquiring a preset number of mnemonics;
generating a key of the intelligent key safety equipment according to the predetermined number of mnemonics;
wherein each said mnemonic is obtained by:
acquiring a character string input by a user, wherein the character string comprises one or more characters;
judging whether a candidate word string matched with the character string exists in a database;
and if so, determining the mnemonic word from the matched candidate word string.
Further, after the step of judging whether the candidate word string matching the character string exists in the database, the method further includes:
if not, refusing to accept the user to continue inputting.
Further, the determining the mnemonic word from the matched candidate word string comprises:
if only one candidate word string matched with the character string exists in the database, determining the candidate word string as the mnemonic word, and displaying the mnemonic word in an input box;
if a plurality of candidate word strings matched with the character strings exist in the database, displaying the plurality of matched candidate word strings, determining the candidate word strings selected by the user as the mnemonic words and displaying the mnemonic words in an input box, or receiving characters continuously input by the user to form new character strings and judging whether the candidate word strings matched with the new character strings exist in the database.
Further, the displaying a plurality of the matched candidate word strings comprises:
and if the character string input by the user reaches the preset length, displaying a plurality of matched candidate word strings and displaying one of the matched candidate word strings in an input box, wherein one of the matched candidate word strings is a first matched candidate word string obtained by arranging the plurality of matched candidate word strings according to a preset rule.
Further, the preset rule is the usage frequency of the candidate word string or the sequence of the next letter of the character string in the plurality of candidate word strings in a character table.
Further, the displaying the mnemonic word in an input box comprises:
and displaying the character string in the mnemonic word in an input box in a way of distinguishing the character string from the rest characters.
Further, before the determining whether the candidate word string matching the character string exists in the database, the method further includes:
and displaying the characters input by the user in an input box, wherein each character in the character string corresponds to the preset number of times that the user presses a character key within the preset time.
Further, after the step of judging whether the candidate word string matching the character string exists in the database, the method further includes:
if not, the screen prompts an input error; or
Automatically deleting the last character in the character string; or
And replacing the last character in the character string with a new character to obtain a new character string, and judging whether a candidate word string matched with the new character string exists in the database, wherein the new character is other characters on a character key corresponding to the last character.
The second purpose of the invention is realized by adopting the following technical scheme:
a smart key security device comprising: a processor;
a memory; and a program, wherein the program is stored in the memory and configured to be executed by the processor, the program, when executed by the processor, implementing the method described above.
The invention also relates to a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the above-mentioned method.
Compared with the prior art, the invention has the beneficial effects that: by judging whether a candidate word string matched with the character string input by the user exists in the database or not, if yes, determining mnemonics from the matched candidate word string, and after the user inputs a preset number of mnemonics, recovering the user key according to the mnemonics, the user input is simplified, the input time is saved, and the efficiency is improved.
Drawings
Fig. 1 is a flowchart of a key recovery method of an intelligent key security device according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a smart key security device according to an embodiment of the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and the detailed description, and it should be noted that any combination of the embodiments or technical features described below can be used to form a new embodiment without conflict.
As shown in fig. 1, a key recovery method for a smart key security device according to an embodiment of the present invention includes:
acquiring a preset number of mnemonics; and generating the key of the intelligent key safety device according to the predetermined number of mnemonics.
In one embodiment, the predetermined number of mnemonics may be multiple, and the user may select to backup different numbers of mnemonics, for example, 12, 16 or 24 mnemonics, when setting the key, where the different numbers of mnemonics correspond to different keys, and the greater the number of mnemonics, the higher the security strength. When the user recovers the key, a predetermined number of mnemonic words are required to be input, and after the input is finished, the intelligent key safety equipment recovers the key according to the preset corresponding rule of the mnemonic words and the key. It is to be understood that the predetermined number of mnemonics may also be singular.
Wherein each mnemonic word is obtained by the following method:
step S101: a character string input by a user is obtained, and the character string comprises one or more characters.
Preferably, the characters input by the user are displayed in the input box, wherein each character in the character string corresponds to a preset number of times that the user presses the character key within a preset time. The characters can be letters, numbers, wildcards and the like, for example, the letters are used as characters, a user inputs the characters through a keyboard on the intelligent key safety device, and the keyboard on the intelligent key safety device can be set as a Sudoku keyboard. For example, when a user needs to input letters, the [ abc ] key on the nine-square keyboard is pressed, the letter a is displayed in the input box of the smart key security device, if the [ abc ] key is pressed again within 1 second, the letter a displayed in the input box is changed into the letter b, if the [ abc ] key is pressed three times within 1 second, the letter c is displayed, and if the [ abc ] key is pressed more than 1 second, the second letter a is displayed.
Step S102: and judging whether a candidate word string matched with the character string exists in a database.
Specifically, the smart key security device stores a database, and when a user inputs a character such as a letter on the smart key security device, it is detected whether a word having the same initial or first half as the input character string exists in the database, and the word is a candidate word string.
Step S103: and if so, determining the mnemonic word from the matched candidate word string.
Preferably, the steps include:
step S201: and if only one candidate word string matched with the character string exists in the database, determining the candidate word string as the mnemonic word, and displaying the mnemonic word in an input box.
For example, when the user inputs three characters "abi", and only "availability" is detected in the candidate word string with the first three letters "abi" in the database, the "availability" is directly displayed in the input box, and a confirmation key is displayed, and after the user presses the confirmation key, the user can continue to input the initial letter of the next word.
Step S202: if a plurality of candidate word strings matched with the character strings exist in the database, displaying the plurality of matched candidate word strings, determining the candidate word strings selected by the user as the mnemonic words and displaying the mnemonic words in an input box, or receiving characters continuously input by the user to form new character strings and judging whether the candidate word strings matched with the new character strings exist in the database.
For example, when the user inputs two characters of "yo", three candidate word strings of which the first two letters are "yo", namely "you", "youth" and "you" are detected in the database, the three candidate word strings are displayed on the screen of the smart key security device, if the user selects one of the candidate word strings, the smart key security device displays the selected candidate word string in the input box, and the user can continue to input the initial letter of the next word after pressing the confirmation key; if the user continues to input the next character, the smart key security device re-matches the newly input character string.
Preferably, when a plurality of candidate word strings are displayed on the screen, the user may select one of the candidate word strings as a mnemonic word through a selection key on the smart key security device, and may select a corresponding mnemonic word to be displayed in the input box according to a preset number of times that the user presses the selection key, for example, a down-flipping key is arranged on the smart key security device, and a next candidate word string is correspondingly selected by pressing the down-flipping key once.
Preferably, if the character string input by the user reaches a preset length, displaying a plurality of the matched candidate word strings and displaying one of the matched candidate word strings in an input box, where one of the matched candidate word strings is a first matched candidate word string obtained by arranging the plurality of matched candidate word strings according to a preset rule. For example, if the preset length is set to 3 characters, the user inputs 3 characters and there are multiple matching word candidate strings, and one of the matching word candidate strings is displayed in the input box. Further, the character string in the mnemonic word may be displayed in the input box separately from the remaining characters, for example, underlining may be added to a character position other than the already input character string of the mnemonic word, or the remaining characters may be displayed in a different color from the already input character string. Or the rest candidate word strings can be hidden and displayed, and the rest candidate word strings are selected by the selection keys, so that only the selected candidate word strings are displayed.
Preferably, the predetermined rule is the frequency of use of the candidate word string or the order of the next letter of the character string in the plurality of candidate word strings in the character table. For example, when the input character string reaches the preset length and a plurality of candidate word strings exist, the candidate word strings are sorted according to the sorting of letters behind the input character string in the alphabet or according to the use frequency of the candidate word strings, the first sorted candidate word string is used as a mnemonic word to be displayed in the input box, and the rest matched words are used as alternative words to be hidden and displayed.
In the key recovery method for the smart key security device provided by this embodiment, whether a candidate word string matching a character string input by a user exists in the database is determined, if yes, a mnemonic word is determined from the matched candidate word string, and after a predetermined number of mnemonic words are input by the user, the user key is recovered according to the mnemonic word, so that the user input is simplified, the input time is saved, and the efficiency is improved.
Preferably, with reference to fig. 1, on the basis of the foregoing embodiment, after the step S102, the method further includes:
step S104: if not, refusing to accept the user to continue inputting.
Specifically, each time a user additionally inputs a character, the intelligent key security device matches the character string in the input box, and when no matched candidate word string exists, the user is prompted to input an error and cannot continue inputting.
In another embodiment, on the basis of step S102, the method further includes: if not, the screen prompts an input error; or automatically deleting the last character in the character string; or replacing the last character in the character string with a new character to obtain a new character string, and judging whether a candidate word string matched with the new character string exists in the database, wherein the new character is other characters on a character key corresponding to the last character. For example, when the user has entered two letters "yo" in the input box and pressed the [ pqrs ] key three times for the letter "r" on the Sudoku keyboard, the smart key security device detects that there is no word in the database that matches "yor," may simply display an entry error on the screen, ask the user to re-enter, may automatically delete the last letter "r," or determines that the user has pressed the letter key a number of times incorrectly, automatically replaces "r" with "q" on the same letter key, forms a new string of characters "yoq," and re-determines whether there is a candidate word string in the database that matches "yoq.
In the key recovery method for the intelligent key security device provided by this embodiment, whether a candidate word string matching a character string input by a user exists in the database is determined, if yes, a mnemonic word is determined from the matching candidate word string, if not, the user is refused to accept the continuous input, and the user key is recovered according to the input mnemonic word, so that the user input is simplified, the input time is saved, and the efficiency is improved.
As shown in fig. 2, the smart key security device provided in the embodiment of the present invention includes: a processor 11, a memory 12, and a program, wherein the program is stored in the memory 12 and configured to be executed by the processor 11, the program, when executed by the processor, implementing the key recovery method of the smart key security device described above.
The smart key security device in this embodiment and the method in the foregoing embodiment are based on two aspects of the same inventive concept, and the method implementation process has been described in detail in the foregoing, so that those skilled in the art can clearly understand the implementation process of the electronic device in this embodiment according to the foregoing description, and for the sake of brevity of the description, details are not repeated here.
From the above description of the embodiments, it is clear to those skilled in the art that the present invention can be implemented by software plus necessary general hardware platform. Based on this understanding, the technical solutions of the present invention may be embodied in the form of software products, which essentially or partially contribute to the prior art. The invention also relates to a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., on which a computer program is stored which, when executed by a processor, implements the above-described method.
The intelligent key safety device, the key recovery method and the storage medium thereof provided by the invention have the advantages that whether the candidate word string matched with the character string input by the user exists in the database or not is judged, if yes, the mnemonic words are determined from the matched candidate word string, and the user key is recovered according to the mnemonic words after the user inputs a preset number of mnemonic words, so that the user input is simplified, the input time is saved, and the efficiency is improved.
The above embodiments are only preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, and any insubstantial changes and substitutions made by those skilled in the art based on the present invention are within the protection scope of the present invention.
Claims (8)
1. A key recovery method for a smart key security device, comprising:
acquiring a preset number of mnemonics;
generating a key of the intelligent key safety equipment according to the predetermined number of mnemonics;
wherein each said mnemonic is obtained by:
acquiring a character string input by a user, wherein the character string comprises one or more characters;
displaying the characters input by the user in an input box, wherein each character in the character string corresponds to the preset number of times that the user presses a character key within preset time;
judging whether a candidate word string matched with the character string exists in a database;
if yes, determining the mnemonic word from the matched candidate word string;
if not, the screen prompts an input error; or
Automatically deleting the last character in the character string; or
And replacing the last character in the character string with a new character to obtain a new character string, and judging whether a candidate word string matched with the new character string exists in the database, wherein the new character is other characters on a character key corresponding to the last character.
2. The key recovery method for smart key security devices of claim 1, wherein said determining whether the candidate word string matching the character string exists in the database further comprises:
if not, refusing to accept the user to continue inputting.
3. The key recovery method for smart key security devices of claim 1, wherein the determining the mnemonic word from the matching candidate word string comprises:
if only one candidate word string matched with the character string exists in the database, determining the candidate word string as the mnemonic word, and displaying the mnemonic word in an input box;
if a plurality of candidate word strings matched with the character strings exist in the database, displaying the plurality of matched candidate word strings, determining the candidate word strings selected by the user as the mnemonic words and displaying the mnemonic words in an input box, or receiving characters continuously input by the user to form new character strings and judging whether the candidate word strings matched with the new character strings exist in the database.
4. The key recovery method of smart key security device of claim 3, wherein said displaying a plurality of said matching word candidate strings comprises:
and if the character string input by the user reaches the preset length, displaying a plurality of matched candidate word strings and displaying one of the matched candidate word strings in an input box, wherein one of the matched candidate word strings is a first matched candidate word string obtained by arranging the plurality of matched candidate word strings according to a preset rule.
5. The key recovery method for smart key security devices of claim 4, wherein the predetermined rule is the frequency of use of the candidate word string or the order of the next letter of the character string in a plurality of candidate word strings in a character table.
6. The key recovery method of smart key security device of claim 3, wherein said displaying the mnemonic in an input box comprises:
and displaying the character string in the mnemonic word in an input box in a way of distinguishing the character string from the rest characters.
7. A smart key security device, comprising: a processor;
a memory; and a program, wherein the program is stored in the memory and configured to be executed by the processor, the program when executed by the processor implementing the method of any of claims 1-6.
8. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-6.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810865334.3A CN109214167B (en) | 2018-08-01 | 2018-08-01 | Intelligent key safety equipment and key recovery method and storage medium thereof |
PCT/CN2019/091933 WO2020024720A1 (en) | 2018-08-01 | 2019-06-19 | Smart key security device and key recovery method for same, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810865334.3A CN109214167B (en) | 2018-08-01 | 2018-08-01 | Intelligent key safety equipment and key recovery method and storage medium thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109214167A CN109214167A (en) | 2019-01-15 |
CN109214167B true CN109214167B (en) | 2021-04-16 |
Family
ID=64987864
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810865334.3A Active CN109214167B (en) | 2018-08-01 | 2018-08-01 | Intelligent key safety equipment and key recovery method and storage medium thereof |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109214167B (en) |
WO (1) | WO2020024720A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109214167B (en) * | 2018-08-01 | 2021-04-16 | 深圳市文鼎创数据科技有限公司 | Intelligent key safety equipment and key recovery method and storage medium thereof |
CN109934587A (en) * | 2019-03-12 | 2019-06-25 | 南京智可佳网络科技有限公司 | A kind of encryption currency hardware wallet of combination image scanning and identification technology realization |
CN110570194A (en) * | 2019-08-30 | 2019-12-13 | 新明华区块链技术(深圳)有限公司 | hardware wallet recovery method and device and hardware wallet |
EP4311162A4 (en) * | 2021-08-20 | 2024-10-09 | Samsung Electronics Co., Ltd. | ELECTRONIC DEVICE FOR GENERATING MNEMONIC WORDS OF A PRIVATE KEY AND METHOD FOR OPERATING THE ELECTRONIC DEVICE |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6131102A (en) * | 1998-06-15 | 2000-10-10 | Microsoft Corporation | Method and system for cost computation of spelling suggestions and automatic replacement |
CN1670723A (en) * | 2004-03-16 | 2005-09-21 | 微软公司 | Systems and methods for improved spell checking |
CN101194256A (en) * | 2004-11-12 | 2008-06-04 | 谷歌公司 | Method and system for autocompletion for languages having ideographs and phonetic characters |
CN101408879A (en) * | 2008-11-19 | 2009-04-15 | 张琼 | Method and system for searching product based on search engine |
CN102163198A (en) * | 2010-02-24 | 2011-08-24 | 北京搜狗科技发展有限公司 | A method and a system for providing new or popular terms |
US8793265B2 (en) * | 2007-09-12 | 2014-07-29 | Samsung Electronics Co., Ltd. | Method and system for selecting personalized search engines for accessing information |
CN105027040A (en) * | 2013-01-21 | 2015-11-04 | 要点科技印度私人有限公司 | Text input system and method |
US9262512B2 (en) * | 2013-05-31 | 2016-02-16 | International Business Machines Corporation | Providing search suggestions from user selected data sources for an input string |
CN106325488A (en) * | 2015-07-09 | 2017-01-11 | 北京搜狗科技发展有限公司 | Input method, input device, server and input system |
CN107453862A (en) * | 2017-05-15 | 2017-12-08 | 杭州复杂美科技有限公司 | Private key generation storage and the scheme used |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100325136A1 (en) * | 2009-06-23 | 2010-12-23 | Microsoft Corporation | Error tolerant autocompletion |
CN107623664B (en) * | 2016-07-15 | 2020-07-31 | 阿里巴巴集团控股有限公司 | Password input method and device |
US20180115520A1 (en) * | 2016-10-20 | 2018-04-26 | IsoNetic, Inc. | Dark virtual private networks and secure services |
CN107480986B (en) * | 2017-08-14 | 2019-08-09 | 飞天诚信科技股份有限公司 | A kind of method and hardware wallet using hardware realization digital cash wallet |
CN109214167B (en) * | 2018-08-01 | 2021-04-16 | 深圳市文鼎创数据科技有限公司 | Intelligent key safety equipment and key recovery method and storage medium thereof |
-
2018
- 2018-08-01 CN CN201810865334.3A patent/CN109214167B/en active Active
-
2019
- 2019-06-19 WO PCT/CN2019/091933 patent/WO2020024720A1/en active Application Filing
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6131102A (en) * | 1998-06-15 | 2000-10-10 | Microsoft Corporation | Method and system for cost computation of spelling suggestions and automatic replacement |
CN1670723A (en) * | 2004-03-16 | 2005-09-21 | 微软公司 | Systems and methods for improved spell checking |
CN101194256A (en) * | 2004-11-12 | 2008-06-04 | 谷歌公司 | Method and system for autocompletion for languages having ideographs and phonetic characters |
US8793265B2 (en) * | 2007-09-12 | 2014-07-29 | Samsung Electronics Co., Ltd. | Method and system for selecting personalized search engines for accessing information |
CN101408879A (en) * | 2008-11-19 | 2009-04-15 | 张琼 | Method and system for searching product based on search engine |
CN102163198A (en) * | 2010-02-24 | 2011-08-24 | 北京搜狗科技发展有限公司 | A method and a system for providing new or popular terms |
CN105027040A (en) * | 2013-01-21 | 2015-11-04 | 要点科技印度私人有限公司 | Text input system and method |
US9262512B2 (en) * | 2013-05-31 | 2016-02-16 | International Business Machines Corporation | Providing search suggestions from user selected data sources for an input string |
CN106325488A (en) * | 2015-07-09 | 2017-01-11 | 北京搜狗科技发展有限公司 | Input method, input device, server and input system |
CN107453862A (en) * | 2017-05-15 | 2017-12-08 | 杭州复杂美科技有限公司 | Private key generation storage and the scheme used |
Also Published As
Publication number | Publication date |
---|---|
WO2020024720A1 (en) | 2020-02-06 |
CN109214167A (en) | 2019-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109214167B (en) | Intelligent key safety equipment and key recovery method and storage medium thereof | |
AU2014391959B2 (en) | Password verification device and password verification method | |
US20200034845A1 (en) | Keystroke analysis | |
US8538403B2 (en) | Method and apparatus for disambiguating an emergency call attempt during password entry for unlocking a mobile device | |
CN109687975B (en) | Method and device for realizing off-line initialization of hardware wallet | |
US10496804B2 (en) | Fingerprint authentication method and system, and terminal supporting fingerprint authentication | |
CN106708799B (en) | Text error correction method and device and terminal | |
CN107679059B (en) | Service template matching method and device, computer equipment and storage medium | |
US20130222253A1 (en) | Input device and method for protecting input information from exposure | |
CN101976430A (en) | Method for generating picture verification codes and system thereof | |
CN103943110A (en) | Control method, device and electronic equipment | |
CN104951679A (en) | Unlocking method and unlocking device of terminal equipment | |
CN109002698B (en) | Safe input method and device for user password | |
CN106021504A (en) | Character string fuzzy matching method and apparatus | |
KR960011770A (en) | Pattern Recognition Method and Apparatus and Pattern Data Processing Apparatus | |
CN109450646B (en) | Verification request processing method and system | |
CA2006230C (en) | Method and apparatus for validating character strings | |
CN117291149A (en) | Rarely used word decoding method and device, electronic equipment and storage medium | |
CN104915128A (en) | Logo-combined screen unlocking method and device | |
CN109376545A (en) | Method for secret protection and device | |
CN113138702B (en) | Information processing method, device, electronic equipment and storage medium | |
CN109376516A (en) | More fingerprint typings and authentication method, device, electronic equipment and storage medium | |
CN105373568A (en) | Method and device for automatically learning question answers | |
EP2306758A1 (en) | Method and apparatus for unlocking a mobile communication device | |
JP2010134766A (en) | Document data processing apparatus and program thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |