After years of development, mobile phone unlocking has become a variety of ways, including password unlocking, pattern unlocking, fingerprint unlocking and other unlocking methods. In the era of feature phones, many mobile phones have a PIN code set by default. Every time you turn on the phone, you have to enter the PIN code to enter the phone interface. This is the earliest form of mobile phone unlocking. But after the birth of touch-screen phones, the ways to unlock phones have become more diversified, with the emergence of sliding unlock and pattern unlock. Most pattern unlocks rely on the nine points of the Jiugong grid to draw different patterns for identity authentication. In fact, the Jiugong grid has certain restrictions. Android's Jiugong grid password can be regarded as a path in a 3×3 dot matrix. As long as you do not pass through repeated points when drawing, and do not skip points that must be passed on the way, then this path is almost omnipotent. For a simple example, if you connect from the point in the upper left corner to the point in the upper right corner, the middle point will be automatically added to the path. But there is another interesting situation. If the middle point has been used before, then this point can be skipped. If your imagination is rich enough, there are 389,112 ways to unlock the pattern, which is absolutely safe for ordinary users, so this unlocking method is widely used. As for the digital password, if it is an early iPhone, the password is set to four digits, that is, from 0000 to 9999, there are 10,000 possibilities, which is less secure than the nine-square grid. Later, the digital password evolved to six digits, that is, from 000000 to 999999, there are 1,000,000 possibilities, and the difficulty of cracking has increased. However, research shows that no matter whether it is a digital password or a nine-square grid unlocked by a pattern, humans can never change their "laziness" habit and usually set a simpler unlocking method. The human brain is inherently unable to generate random content. No matter how hard you rack your brains to set a password, there will always be loopholes. |
<<: To all Android engineers: The trouble of not having technical depth
Zhihu original question: In addition to the more ...
In this article, Li Jiaoshou analyzes: After chan...
Last year, the BAT giants had high hopes for mini...
If you want to do your work well, you must first ...
This article provides a brief analysis of Xiaohon...
Friends who are familiar with Baidu ocpc know tha...
I am money See more articles about I Am Money The...
[[122186]] On November 4, people familiar with th...
Why do you want to use Weibo? 1: Importance When ...
The first part [User Mind Insights] mainly discus...
Everyone is familiar with WeChat mini-programs . ...
Two friends told me about some of their confusion...
This article explains in detail the routines from...
[51CTO.com original article] Currently, we are in...
[[201429]] Preface Demand is temporary, only chan...