[go: up one dir, main page]

CN109214167B - Intelligent key safety equipment and key recovery method and storage medium thereof - Google Patents

Intelligent key safety equipment and key recovery method and storage medium thereof Download PDF

Info

Publication number
CN109214167B
CN109214167B CN201810865334.3A CN201810865334A CN109214167B CN 109214167 B CN109214167 B CN 109214167B CN 201810865334 A CN201810865334 A CN 201810865334A CN 109214167 B CN109214167 B CN 109214167B
Authority
CN
China
Prior art keywords
candidate word
character
key
string
matched
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810865334.3A
Other languages
Chinese (zh)
Other versions
CN109214167A (en
Inventor
陈柳章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Excelsecu Data Technology Co Ltd
Original Assignee
Shenzhen Excelsecu Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Excelsecu Data Technology Co Ltd filed Critical Shenzhen Excelsecu Data Technology Co Ltd
Priority to CN201810865334.3A priority Critical patent/CN109214167B/en
Publication of CN109214167A publication Critical patent/CN109214167A/en
Priority to PCT/CN2019/091933 priority patent/WO2020024720A1/en
Application granted granted Critical
Publication of CN109214167B publication Critical patent/CN109214167B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

The invention discloses an intelligent secret key safety device and a secret key recovery method and a storage medium thereof, wherein the method comprises the following steps: acquiring a preset number of mnemonics; generating a key of the intelligent key safety equipment according to a preset number of mnemonics; wherein each mnemonic word is obtained by the following method: acquiring a character string input by a user, wherein the character string comprises one or more characters; judging whether a candidate word string matched with the character string exists in the database; and if so, determining the mnemonic words from the matched candidate word strings. The intelligent key safety device, the key recovery method and the storage medium thereof provided by the invention have the advantages that whether the candidate word string matched with the character string input by the user exists in the database or not is judged, if yes, the mnemonic words are determined from the matched candidate word string, and the user key is recovered according to the mnemonic words after the user inputs a preset number of mnemonic words, so that the user input is simplified, the input time is saved, and the efficiency is improved.

Description

Intelligent key safety equipment and key recovery method and storage medium thereof
Technical Field
The invention relates to the field of smart card mnemonics, in particular to smart key safety equipment, a key recovery method and a storage medium thereof.
Background
Currently, smart key security devices are used in various application scenarios, such as digital currency hardware wallets, where a user needs to enter a key or a mnemonic to recover the key when using the smart key security device. However, when the key is recovered, it is time-consuming and troublesome to input the mnemonic word through the keyboard of the smart key security device.
Disclosure of Invention
In order to overcome the defects of the prior art, an object of the present invention is to provide a key recovery method for a smart key security device, so as to solve the problem that it is time-consuming and troublesome to input a mnemonic in the conventional key recovery method.
The second objective of the present invention is to provide a smart key security device to solve the problem that it is time-consuming and troublesome to input mnemonics in the conventional key recovery method.
One of the purposes of the invention is realized by adopting the following technical scheme:
a key recovery method of a smart key security device comprises the following steps:
acquiring a preset number of mnemonics;
generating a key of the intelligent key safety equipment according to the predetermined number of mnemonics;
wherein each said mnemonic is obtained by:
acquiring a character string input by a user, wherein the character string comprises one or more characters;
judging whether a candidate word string matched with the character string exists in a database;
and if so, determining the mnemonic word from the matched candidate word string.
Further, after the step of judging whether the candidate word string matching the character string exists in the database, the method further includes:
if not, refusing to accept the user to continue inputting.
Further, the determining the mnemonic word from the matched candidate word string comprises:
if only one candidate word string matched with the character string exists in the database, determining the candidate word string as the mnemonic word, and displaying the mnemonic word in an input box;
if a plurality of candidate word strings matched with the character strings exist in the database, displaying the plurality of matched candidate word strings, determining the candidate word strings selected by the user as the mnemonic words and displaying the mnemonic words in an input box, or receiving characters continuously input by the user to form new character strings and judging whether the candidate word strings matched with the new character strings exist in the database.
Further, the displaying a plurality of the matched candidate word strings comprises:
and if the character string input by the user reaches the preset length, displaying a plurality of matched candidate word strings and displaying one of the matched candidate word strings in an input box, wherein one of the matched candidate word strings is a first matched candidate word string obtained by arranging the plurality of matched candidate word strings according to a preset rule.
Further, the preset rule is the usage frequency of the candidate word string or the sequence of the next letter of the character string in the plurality of candidate word strings in a character table.
Further, the displaying the mnemonic word in an input box comprises:
and displaying the character string in the mnemonic word in an input box in a way of distinguishing the character string from the rest characters.
Further, before the determining whether the candidate word string matching the character string exists in the database, the method further includes:
and displaying the characters input by the user in an input box, wherein each character in the character string corresponds to the preset number of times that the user presses a character key within the preset time.
Further, after the step of judging whether the candidate word string matching the character string exists in the database, the method further includes:
if not, the screen prompts an input error; or
Automatically deleting the last character in the character string; or
And replacing the last character in the character string with a new character to obtain a new character string, and judging whether a candidate word string matched with the new character string exists in the database, wherein the new character is other characters on a character key corresponding to the last character.
The second purpose of the invention is realized by adopting the following technical scheme:
a smart key security device comprising: a processor;
a memory; and a program, wherein the program is stored in the memory and configured to be executed by the processor, the program, when executed by the processor, implementing the method described above.
The invention also relates to a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the above-mentioned method.
Compared with the prior art, the invention has the beneficial effects that: by judging whether a candidate word string matched with the character string input by the user exists in the database or not, if yes, determining mnemonics from the matched candidate word string, and after the user inputs a preset number of mnemonics, recovering the user key according to the mnemonics, the user input is simplified, the input time is saved, and the efficiency is improved.
Drawings
Fig. 1 is a flowchart of a key recovery method of an intelligent key security device according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a smart key security device according to an embodiment of the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and the detailed description, and it should be noted that any combination of the embodiments or technical features described below can be used to form a new embodiment without conflict.
As shown in fig. 1, a key recovery method for a smart key security device according to an embodiment of the present invention includes:
acquiring a preset number of mnemonics; and generating the key of the intelligent key safety device according to the predetermined number of mnemonics.
In one embodiment, the predetermined number of mnemonics may be multiple, and the user may select to backup different numbers of mnemonics, for example, 12, 16 or 24 mnemonics, when setting the key, where the different numbers of mnemonics correspond to different keys, and the greater the number of mnemonics, the higher the security strength. When the user recovers the key, a predetermined number of mnemonic words are required to be input, and after the input is finished, the intelligent key safety equipment recovers the key according to the preset corresponding rule of the mnemonic words and the key. It is to be understood that the predetermined number of mnemonics may also be singular.
Wherein each mnemonic word is obtained by the following method:
step S101: a character string input by a user is obtained, and the character string comprises one or more characters.
Preferably, the characters input by the user are displayed in the input box, wherein each character in the character string corresponds to a preset number of times that the user presses the character key within a preset time. The characters can be letters, numbers, wildcards and the like, for example, the letters are used as characters, a user inputs the characters through a keyboard on the intelligent key safety device, and the keyboard on the intelligent key safety device can be set as a Sudoku keyboard. For example, when a user needs to input letters, the [ abc ] key on the nine-square keyboard is pressed, the letter a is displayed in the input box of the smart key security device, if the [ abc ] key is pressed again within 1 second, the letter a displayed in the input box is changed into the letter b, if the [ abc ] key is pressed three times within 1 second, the letter c is displayed, and if the [ abc ] key is pressed more than 1 second, the second letter a is displayed.
Step S102: and judging whether a candidate word string matched with the character string exists in a database.
Specifically, the smart key security device stores a database, and when a user inputs a character such as a letter on the smart key security device, it is detected whether a word having the same initial or first half as the input character string exists in the database, and the word is a candidate word string.
Step S103: and if so, determining the mnemonic word from the matched candidate word string.
Preferably, the steps include:
step S201: and if only one candidate word string matched with the character string exists in the database, determining the candidate word string as the mnemonic word, and displaying the mnemonic word in an input box.
For example, when the user inputs three characters "abi", and only "availability" is detected in the candidate word string with the first three letters "abi" in the database, the "availability" is directly displayed in the input box, and a confirmation key is displayed, and after the user presses the confirmation key, the user can continue to input the initial letter of the next word.
Step S202: if a plurality of candidate word strings matched with the character strings exist in the database, displaying the plurality of matched candidate word strings, determining the candidate word strings selected by the user as the mnemonic words and displaying the mnemonic words in an input box, or receiving characters continuously input by the user to form new character strings and judging whether the candidate word strings matched with the new character strings exist in the database.
For example, when the user inputs two characters of "yo", three candidate word strings of which the first two letters are "yo", namely "you", "youth" and "you" are detected in the database, the three candidate word strings are displayed on the screen of the smart key security device, if the user selects one of the candidate word strings, the smart key security device displays the selected candidate word string in the input box, and the user can continue to input the initial letter of the next word after pressing the confirmation key; if the user continues to input the next character, the smart key security device re-matches the newly input character string.
Preferably, when a plurality of candidate word strings are displayed on the screen, the user may select one of the candidate word strings as a mnemonic word through a selection key on the smart key security device, and may select a corresponding mnemonic word to be displayed in the input box according to a preset number of times that the user presses the selection key, for example, a down-flipping key is arranged on the smart key security device, and a next candidate word string is correspondingly selected by pressing the down-flipping key once.
Preferably, if the character string input by the user reaches a preset length, displaying a plurality of the matched candidate word strings and displaying one of the matched candidate word strings in an input box, where one of the matched candidate word strings is a first matched candidate word string obtained by arranging the plurality of matched candidate word strings according to a preset rule. For example, if the preset length is set to 3 characters, the user inputs 3 characters and there are multiple matching word candidate strings, and one of the matching word candidate strings is displayed in the input box. Further, the character string in the mnemonic word may be displayed in the input box separately from the remaining characters, for example, underlining may be added to a character position other than the already input character string of the mnemonic word, or the remaining characters may be displayed in a different color from the already input character string. Or the rest candidate word strings can be hidden and displayed, and the rest candidate word strings are selected by the selection keys, so that only the selected candidate word strings are displayed.
Preferably, the predetermined rule is the frequency of use of the candidate word string or the order of the next letter of the character string in the plurality of candidate word strings in the character table. For example, when the input character string reaches the preset length and a plurality of candidate word strings exist, the candidate word strings are sorted according to the sorting of letters behind the input character string in the alphabet or according to the use frequency of the candidate word strings, the first sorted candidate word string is used as a mnemonic word to be displayed in the input box, and the rest matched words are used as alternative words to be hidden and displayed.
In the key recovery method for the smart key security device provided by this embodiment, whether a candidate word string matching a character string input by a user exists in the database is determined, if yes, a mnemonic word is determined from the matched candidate word string, and after a predetermined number of mnemonic words are input by the user, the user key is recovered according to the mnemonic word, so that the user input is simplified, the input time is saved, and the efficiency is improved.
Preferably, with reference to fig. 1, on the basis of the foregoing embodiment, after the step S102, the method further includes:
step S104: if not, refusing to accept the user to continue inputting.
Specifically, each time a user additionally inputs a character, the intelligent key security device matches the character string in the input box, and when no matched candidate word string exists, the user is prompted to input an error and cannot continue inputting.
In another embodiment, on the basis of step S102, the method further includes: if not, the screen prompts an input error; or automatically deleting the last character in the character string; or replacing the last character in the character string with a new character to obtain a new character string, and judging whether a candidate word string matched with the new character string exists in the database, wherein the new character is other characters on a character key corresponding to the last character. For example, when the user has entered two letters "yo" in the input box and pressed the [ pqrs ] key three times for the letter "r" on the Sudoku keyboard, the smart key security device detects that there is no word in the database that matches "yor," may simply display an entry error on the screen, ask the user to re-enter, may automatically delete the last letter "r," or determines that the user has pressed the letter key a number of times incorrectly, automatically replaces "r" with "q" on the same letter key, forms a new string of characters "yoq," and re-determines whether there is a candidate word string in the database that matches "yoq.
In the key recovery method for the intelligent key security device provided by this embodiment, whether a candidate word string matching a character string input by a user exists in the database is determined, if yes, a mnemonic word is determined from the matching candidate word string, if not, the user is refused to accept the continuous input, and the user key is recovered according to the input mnemonic word, so that the user input is simplified, the input time is saved, and the efficiency is improved.
As shown in fig. 2, the smart key security device provided in the embodiment of the present invention includes: a processor 11, a memory 12, and a program, wherein the program is stored in the memory 12 and configured to be executed by the processor 11, the program, when executed by the processor, implementing the key recovery method of the smart key security device described above.
The smart key security device in this embodiment and the method in the foregoing embodiment are based on two aspects of the same inventive concept, and the method implementation process has been described in detail in the foregoing, so that those skilled in the art can clearly understand the implementation process of the electronic device in this embodiment according to the foregoing description, and for the sake of brevity of the description, details are not repeated here.
From the above description of the embodiments, it is clear to those skilled in the art that the present invention can be implemented by software plus necessary general hardware platform. Based on this understanding, the technical solutions of the present invention may be embodied in the form of software products, which essentially or partially contribute to the prior art. The invention also relates to a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., on which a computer program is stored which, when executed by a processor, implements the above-described method.
The intelligent key safety device, the key recovery method and the storage medium thereof provided by the invention have the advantages that whether the candidate word string matched with the character string input by the user exists in the database or not is judged, if yes, the mnemonic words are determined from the matched candidate word string, and the user key is recovered according to the mnemonic words after the user inputs a preset number of mnemonic words, so that the user input is simplified, the input time is saved, and the efficiency is improved.
The above embodiments are only preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, and any insubstantial changes and substitutions made by those skilled in the art based on the present invention are within the protection scope of the present invention.

Claims (8)

1. A key recovery method for a smart key security device, comprising:
acquiring a preset number of mnemonics;
generating a key of the intelligent key safety equipment according to the predetermined number of mnemonics;
wherein each said mnemonic is obtained by:
acquiring a character string input by a user, wherein the character string comprises one or more characters;
displaying the characters input by the user in an input box, wherein each character in the character string corresponds to the preset number of times that the user presses a character key within preset time;
judging whether a candidate word string matched with the character string exists in a database;
if yes, determining the mnemonic word from the matched candidate word string;
if not, the screen prompts an input error; or
Automatically deleting the last character in the character string; or
And replacing the last character in the character string with a new character to obtain a new character string, and judging whether a candidate word string matched with the new character string exists in the database, wherein the new character is other characters on a character key corresponding to the last character.
2. The key recovery method for smart key security devices of claim 1, wherein said determining whether the candidate word string matching the character string exists in the database further comprises:
if not, refusing to accept the user to continue inputting.
3. The key recovery method for smart key security devices of claim 1, wherein the determining the mnemonic word from the matching candidate word string comprises:
if only one candidate word string matched with the character string exists in the database, determining the candidate word string as the mnemonic word, and displaying the mnemonic word in an input box;
if a plurality of candidate word strings matched with the character strings exist in the database, displaying the plurality of matched candidate word strings, determining the candidate word strings selected by the user as the mnemonic words and displaying the mnemonic words in an input box, or receiving characters continuously input by the user to form new character strings and judging whether the candidate word strings matched with the new character strings exist in the database.
4. The key recovery method of smart key security device of claim 3, wherein said displaying a plurality of said matching word candidate strings comprises:
and if the character string input by the user reaches the preset length, displaying a plurality of matched candidate word strings and displaying one of the matched candidate word strings in an input box, wherein one of the matched candidate word strings is a first matched candidate word string obtained by arranging the plurality of matched candidate word strings according to a preset rule.
5. The key recovery method for smart key security devices of claim 4, wherein the predetermined rule is the frequency of use of the candidate word string or the order of the next letter of the character string in a plurality of candidate word strings in a character table.
6. The key recovery method of smart key security device of claim 3, wherein said displaying the mnemonic in an input box comprises:
and displaying the character string in the mnemonic word in an input box in a way of distinguishing the character string from the rest characters.
7. A smart key security device, comprising: a processor;
a memory; and a program, wherein the program is stored in the memory and configured to be executed by the processor, the program when executed by the processor implementing the method of any of claims 1-6.
8. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-6.
CN201810865334.3A 2018-08-01 2018-08-01 Intelligent key safety equipment and key recovery method and storage medium thereof Active CN109214167B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810865334.3A CN109214167B (en) 2018-08-01 2018-08-01 Intelligent key safety equipment and key recovery method and storage medium thereof
PCT/CN2019/091933 WO2020024720A1 (en) 2018-08-01 2019-06-19 Smart key security device and key recovery method for same, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810865334.3A CN109214167B (en) 2018-08-01 2018-08-01 Intelligent key safety equipment and key recovery method and storage medium thereof

Publications (2)

Publication Number Publication Date
CN109214167A CN109214167A (en) 2019-01-15
CN109214167B true CN109214167B (en) 2021-04-16

Family

ID=64987864

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810865334.3A Active CN109214167B (en) 2018-08-01 2018-08-01 Intelligent key safety equipment and key recovery method and storage medium thereof

Country Status (2)

Country Link
CN (1) CN109214167B (en)
WO (1) WO2020024720A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109214167B (en) * 2018-08-01 2021-04-16 深圳市文鼎创数据科技有限公司 Intelligent key safety equipment and key recovery method and storage medium thereof
CN109934587A (en) * 2019-03-12 2019-06-25 南京智可佳网络科技有限公司 A kind of encryption currency hardware wallet of combination image scanning and identification technology realization
CN110570194A (en) * 2019-08-30 2019-12-13 新明华区块链技术(深圳)有限公司 hardware wallet recovery method and device and hardware wallet
EP4311162A4 (en) * 2021-08-20 2024-10-09 Samsung Electronics Co., Ltd. ELECTRONIC DEVICE FOR GENERATING MNEMONIC WORDS OF A PRIVATE KEY AND METHOD FOR OPERATING THE ELECTRONIC DEVICE

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6131102A (en) * 1998-06-15 2000-10-10 Microsoft Corporation Method and system for cost computation of spelling suggestions and automatic replacement
CN1670723A (en) * 2004-03-16 2005-09-21 微软公司 Systems and methods for improved spell checking
CN101194256A (en) * 2004-11-12 2008-06-04 谷歌公司 Method and system for autocompletion for languages having ideographs and phonetic characters
CN101408879A (en) * 2008-11-19 2009-04-15 张琼 Method and system for searching product based on search engine
CN102163198A (en) * 2010-02-24 2011-08-24 北京搜狗科技发展有限公司 A method and a system for providing new or popular terms
US8793265B2 (en) * 2007-09-12 2014-07-29 Samsung Electronics Co., Ltd. Method and system for selecting personalized search engines for accessing information
CN105027040A (en) * 2013-01-21 2015-11-04 要点科技印度私人有限公司 Text input system and method
US9262512B2 (en) * 2013-05-31 2016-02-16 International Business Machines Corporation Providing search suggestions from user selected data sources for an input string
CN106325488A (en) * 2015-07-09 2017-01-11 北京搜狗科技发展有限公司 Input method, input device, server and input system
CN107453862A (en) * 2017-05-15 2017-12-08 杭州复杂美科技有限公司 Private key generation storage and the scheme used

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100325136A1 (en) * 2009-06-23 2010-12-23 Microsoft Corporation Error tolerant autocompletion
CN107623664B (en) * 2016-07-15 2020-07-31 阿里巴巴集团控股有限公司 Password input method and device
US20180115520A1 (en) * 2016-10-20 2018-04-26 IsoNetic, Inc. Dark virtual private networks and secure services
CN107480986B (en) * 2017-08-14 2019-08-09 飞天诚信科技股份有限公司 A kind of method and hardware wallet using hardware realization digital cash wallet
CN109214167B (en) * 2018-08-01 2021-04-16 深圳市文鼎创数据科技有限公司 Intelligent key safety equipment and key recovery method and storage medium thereof

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6131102A (en) * 1998-06-15 2000-10-10 Microsoft Corporation Method and system for cost computation of spelling suggestions and automatic replacement
CN1670723A (en) * 2004-03-16 2005-09-21 微软公司 Systems and methods for improved spell checking
CN101194256A (en) * 2004-11-12 2008-06-04 谷歌公司 Method and system for autocompletion for languages having ideographs and phonetic characters
US8793265B2 (en) * 2007-09-12 2014-07-29 Samsung Electronics Co., Ltd. Method and system for selecting personalized search engines for accessing information
CN101408879A (en) * 2008-11-19 2009-04-15 张琼 Method and system for searching product based on search engine
CN102163198A (en) * 2010-02-24 2011-08-24 北京搜狗科技发展有限公司 A method and a system for providing new or popular terms
CN105027040A (en) * 2013-01-21 2015-11-04 要点科技印度私人有限公司 Text input system and method
US9262512B2 (en) * 2013-05-31 2016-02-16 International Business Machines Corporation Providing search suggestions from user selected data sources for an input string
CN106325488A (en) * 2015-07-09 2017-01-11 北京搜狗科技发展有限公司 Input method, input device, server and input system
CN107453862A (en) * 2017-05-15 2017-12-08 杭州复杂美科技有限公司 Private key generation storage and the scheme used

Also Published As

Publication number Publication date
WO2020024720A1 (en) 2020-02-06
CN109214167A (en) 2019-01-15

Similar Documents

Publication Publication Date Title
CN109214167B (en) Intelligent key safety equipment and key recovery method and storage medium thereof
AU2014391959B2 (en) Password verification device and password verification method
US20200034845A1 (en) Keystroke analysis
US8538403B2 (en) Method and apparatus for disambiguating an emergency call attempt during password entry for unlocking a mobile device
CN109687975B (en) Method and device for realizing off-line initialization of hardware wallet
US10496804B2 (en) Fingerprint authentication method and system, and terminal supporting fingerprint authentication
CN106708799B (en) Text error correction method and device and terminal
CN107679059B (en) Service template matching method and device, computer equipment and storage medium
US20130222253A1 (en) Input device and method for protecting input information from exposure
CN101976430A (en) Method for generating picture verification codes and system thereof
CN103943110A (en) Control method, device and electronic equipment
CN104951679A (en) Unlocking method and unlocking device of terminal equipment
CN109002698B (en) Safe input method and device for user password
CN106021504A (en) Character string fuzzy matching method and apparatus
KR960011770A (en) Pattern Recognition Method and Apparatus and Pattern Data Processing Apparatus
CN109450646B (en) Verification request processing method and system
CA2006230C (en) Method and apparatus for validating character strings
CN117291149A (en) Rarely used word decoding method and device, electronic equipment and storage medium
CN104915128A (en) Logo-combined screen unlocking method and device
CN109376545A (en) Method for secret protection and device
CN113138702B (en) Information processing method, device, electronic equipment and storage medium
CN109376516A (en) More fingerprint typings and authentication method, device, electronic equipment and storage medium
CN105373568A (en) Method and device for automatically learning question answers
EP2306758A1 (en) Method and apparatus for unlocking a mobile communication device
JP2010134766A (en) Document data processing apparatus and program thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant