[go: up one dir, main page]

CN109993009A - A kind of Implementation Technology of mobile phone safe input key - Google Patents

A kind of Implementation Technology of mobile phone safe input key Download PDF

Info

Publication number
CN109993009A
CN109993009A CN201910176284.2A CN201910176284A CN109993009A CN 109993009 A CN109993009 A CN 109993009A CN 201910176284 A CN201910176284 A CN 201910176284A CN 109993009 A CN109993009 A CN 109993009A
Authority
CN
China
Prior art keywords
key
input
prompt
user
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910176284.2A
Other languages
Chinese (zh)
Inventor
胡振生
杨保宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Chubi Technology Co ltd
Original Assignee
Quark Chain Technology (shenzhen) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Quark Chain Technology (shenzhen) Co Ltd filed Critical Quark Chain Technology (shenzhen) Co Ltd
Priority to CN201910176284.2A priority Critical patent/CN109993009A/en
Publication of CN109993009A publication Critical patent/CN109993009A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

The invention discloses a kind of Implementation Technologies of mobile phone safe input key, comprising the following steps: when user needs to input key, opens key input pattern;Encryption processor generates key distribution table at random, is shown on key prompt screen and main screen, user can reset or refresh manually;After user views the key distribution table generated at random, brain prompts the prompt of screen to expect the key to be exported according to key;User clicks blank key in the main interface key not prompted, and completes key input;The key of input is sent to encryption processor by main system.A kind of Implementation Technology of mobile phone safe input key of the present invention, all input contents of user are all completed in main system screen, the content of input can not be identified other application interception, and perception of the completely isolated operating system of this method to input content, the safety that ensure that key brings better prospect of the application.

Description

A kind of Implementation Technology of mobile phone safe input key
Technical field
The present invention relates to mobile phone keys to input field, in particular to a kind of technology realization side of mobile phone safe input key Method.
Background technique
With the rapid development of society, the horizontal continuous raising of people's lives, mobile phone have become needed for people's life Essential product, and the awareness of safety of people is also in the continuous improvement, in order to protect the individual privacy being stored on mobile phone, people Take the mode of key and protect oneself mobile phone private, but existing mobile phone lacks under the mode that key inputs Protection to input content, Android operation system application between can call, can with screenshotss and monitoring other application, be easy There is the case where input key is intercepted, be unsatisfactory for the requirement of people, for this purpose, it is proposed that a kind of input of mobile phone safe is close The Implementation Technology of key.
Summary of the invention
The main purpose of the present invention is to provide a kind of Implementation Technologies of mobile phone safe input key, can effectively solve Certainly the problems in background technique.
To achieve the above object, the technical scheme adopted by the invention is as follows:
A kind of Implementation Technology of mobile phone safe input key, comprising the following steps:
(1), when user needs to input key, key input pattern is opened;
(2), encryption processor generates distribution table at random, is shown on key prompt screen and main screen, user can be with hand Dynamic resetting refreshes;
(3), after user views the distribution table generated at random, brain prompts the prompt of screen to expect exporting according to key Key;
(4), user operates in the main interface not prompted, and completes key input;
(5), the key inputted is sent to encryption processor by main system, and encryption processor identification judges whether key is defeated Enter correct.
Preferably, in the step (1), there are three types of input content to hold a concurrent post mode, including pure digi-tal for key input pattern The corresponding sequencing model of corresponding default mode, mnemonic word and general random character number corresponding press input mode.
Preferably, in the step (2), it is blank key on main screen, shows main screen overhead on key prompt screen Content corresponding to white key, key prompt screen prompt are set according to encryption level, can choose primary fixed random prompt Or primary random prompt is carried out when inputting every time;
Preferably, in the step (3), key can be one in pure digi-tal, mnemonic word and general random character number Kind is a variety of, and wherein pure digi-tal includes but do not limit to and Arabic numerals and English digital.
Preferably, in the step (4), the corresponding default mode of the pure digi-tal is the random distribution of number, operation Process are as follows: user clicks blank key in the main interface key not prompted, and completes key input.
Preferably, in the step (4), the corresponding sequencing model of the mnemonic word is that one group of mnemonic word random sequence mentions Show, operating process are as follows: user has the blank key of color tips to be ranked up in main interface dragging, completes key input.
Preferably, in the step (4), the general random character number is corresponding to press input mode, operates Journey are as follows: input can all have the string table of random alignment every time, and user clicks the dragging of character start of string in main screen any position, Focus starts to convert in table, transforms to user and needs user's release character string after the character inputted that key input can be completed.
Compared with prior art, the invention has the following beneficial effects: the positions that user's input content only has blank key Information makes Host Systems that can not spy upon the cipher key content of user's input without the content information of key, and input content includes defeated Enter position and the number of key, and the content inputted is provided to encryption processor to be parsed into true password and be tested Card, it is more safe, and also all input contents of user are all completed in the screen of main system, even if other application may intercept But can not identify the content of input, only interception input content while be truncated to prompt full content can just crack it is close Key, perception of the completely isolated operating system of key input pattern that the present invention designs to input content, ensure that the safety of key.
Detailed description of the invention
Fig. 1 is the overall structure flow chart for the Implementation Technology that a kind of mobile phone safe of the present invention inputs key.
Fig. 2 is the main screen input behaviour that a kind of mobile phone safe of the present invention inputs figure pattern in the Implementation Technology of key Mapping.
Fig. 3 is the key prompting screen of the middle figure pattern for the Implementation Technology that a kind of mobile phone safe of the present invention inputs key Curtain figure.
Fig. 4 is the main screen that a kind of mobile phone safe of the present invention inputs mnemonic word sequencing model in the Implementation Technology of key Input operation diagram.
Fig. 5 is that the key of mnemonic word sequencing model in a kind of Implementation Technology of mobile phone safe input key of the present invention mentions Show screen map.
Specific embodiment
To be easy to understand the technical means, the creative features, the aims and the efficiencies achieved by the present invention, below with reference to Specific embodiment, the present invention is further explained.
Embodiment 1
(1), when user needs to input key, pure digi-tal key input pattern, i.e. default mode, digital random point are opened Cloth;
(2), encryption processor generates key distribution table at random, is shown on key prompt screen and main screen, Yong Huke To reset or refresh manually, it is blank key on main screen, is shown on main screen corresponding to blank key on key prompt screen Content, key prompt screen prompt sets according to encryption level, can choose primary fixed random prompt or input every time Shi Jinhang is once prompted at random;
(3), after user views the key distribution table generated at random, brain prompts the prompt of screen to expect wanting according to key The key of output, key select pure digi-tal, and middle number includes but do not limit to and Arabic numerals and English digital;
(4), user clicks blank key in the main interface key not prompted, and completes key input;
(5), the key inputted is sent to encryption processor by main system, and encryption processor identification judges whether key is defeated Enter correct.
Embodiment 2
(1), when user needs to input key, mnemonic word key input pattern, i.e. sequencing model are opened;
(2), encryption processor generates mnemonic word distribution table at random, is shown on key prompt screen and main screen, user It can reset or refresh manually, be blank key on main screen, show that blank key institute is right on main screen on key prompt screen The content answered, key prompt screen prompt are set according to encryption level, can choose primary fixed random prompt or defeated every time It is fashionable to carry out primary random prompt;
(3), after user views the mnemonic word distribution table generated at random, brain is expected exporting according to the prompt of the small screen Key;
(4), one group of mnemonic word random sequence prompt in main interface, user main interface dragging have the blank of color tips by Key is ranked up, and key input can be completed;
(5), the key inputted is sent to encryption processor by main system, and encryption processor identification judges whether key is defeated Enter correct.
Embodiment 3
(1), when user needs to input key, general random character digital cipher input pattern is opened, that is, presses dragging mould Formula;
(2), encryption processor generates character string distribution table at random, is shown on key prompt screen and main screen, user It can reset or refresh manually, be blank key on main screen, show that blank key institute is right on main screen on key prompt screen The content answered, key prompt screen prompt are set according to encryption level, can choose primary fixed random prompt or defeated every time It is fashionable to carry out primary random prompt;
(3), after user views the string table generated at random, brain prompts the prompt of screen to expect wanting defeated according to key Key out;
(4), user clicks the dragging of character start of string in main screen any position, and focus starts to convert in table, transforms to use Family needs user's release character string after the string table inputted that the input of character string key can be completed;
(5), the key inputted is sent to encryption processor by main system, and encryption processor identification judges whether key is defeated Enter correct.
It can be by it should be noted that the present invention is the Implementation Technology that a kind of mobile phone safe inputs key, when use Corresponding input pattern, i.e. content corresponding to embodiment 1, embodiment 2 and embodiment 3 are selected according to a Man's Demands, is inputted close When key, key prompt screen and main screen are shown on mobile phone, but are located at different interfaces, in main interface in user's input Hold and only have the location information of blank key without the content information of key, makes Host Systems that can not spy upon the key of user's input Content, input content includes position and the number of input key, and the content inputted is provided to encryption processor to solve True password is analysed into be verified, it is more safe, and also all input contents of user are all completed in the screen of main system, Even if other application is truncated to prompt while may intercepting but can not identify the content of input, only interception input content Full content could breaking cryptographic keys, sense of the completely isolated operating system of key input pattern that the present invention designs to input content Know, ensure that the safety of key.
The above shows and describes the basic principles and main features of the present invention and the advantages of the present invention.The technology of the industry Personnel are it should be appreciated that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this The principle of invention, without departing from the spirit and scope of the present invention, various changes and improvements may be made to the invention, these changes Change and improvement all fall within the protetion scope of the claimed invention.The claimed scope of the invention by appended claims and its Equivalent thereof.

Claims (7)

1. a kind of Implementation Technology of mobile phone safe input key, it is characterised in that: the following steps are included:
(1), when user needs to input key, key input pattern is opened;
(2), encryption processor generates distribution table at random, is shown on key prompt screen and main screen, user can weigh manually It sets or refreshes;
(3), after user views the distribution table generated at random, brain is expected being exported close according to the prompt of key prompt screen Key;
(4), user operates in the main interface not prompted, and completes key input;
(5), the key inputted is sent to encryption processor by main system, and encryption processor identification judges whether key inputs just Really.
2. a kind of Implementation Technology of mobile phone safe input key according to claim 1, it is characterised in that: the step Suddenly in (1), there are three types of input content to hold a concurrent post mode, including the corresponding default mode of pure digi-tal, mnemonic word for key input pattern Corresponding sequencing model and general random character number corresponding press input mode.
3. a kind of Implementation Technology of mobile phone safe input key according to claim 1, it is characterised in that: the step Suddenly in (2), it is blank key on main screen, shows content corresponding to blank key on main screen on key prompt screen, it is close Key prompt screen prompt is set according to encryption level, is carried out when can choose primary fixed random prompt or every time input primary Random prompt.
4. a kind of Implementation Technology of mobile phone safe input key according to claim 1, it is characterised in that: the step Suddenly in (3), key can be one of pure digi-tal, mnemonic word and general random character number or a variety of, wherein pure digi-tal packet It includes but does not limit to and Arabic numerals and English digital.
5. a kind of Implementation Technology of mobile phone safe input key according to claim 2, it is characterised in that: the step Suddenly in (4), the corresponding default mode of the pure digi-tal is the random distribution of number, operating process are as follows: user is not prompting Main interface key in click blank key, complete key input.
6. a kind of Implementation Technology of mobile phone safe input key according to claim 2, it is characterised in that: the step Suddenly in (4), the corresponding sequencing model of the mnemonic word is one group of mnemonic word random sequence prompt, operating process are as follows: Yong Hu Main interface dragging has the blank key of color tips to be ranked up, and completes key input.
7. a kind of Implementation Technology of mobile phone safe input key according to claim 2, it is characterised in that: the step Suddenly in (4), the general random character number is corresponding to press input mode, operating process are as follows: every time input can all have with The string table of machine arrangement, user click the dragging of character start of string in main screen any position, and focus starts to convert in table, convert User, which unclamps character string, after needing the character inputted to user can be completed key input.
CN201910176284.2A 2019-03-08 2019-03-08 A kind of Implementation Technology of mobile phone safe input key Pending CN109993009A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910176284.2A CN109993009A (en) 2019-03-08 2019-03-08 A kind of Implementation Technology of mobile phone safe input key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910176284.2A CN109993009A (en) 2019-03-08 2019-03-08 A kind of Implementation Technology of mobile phone safe input key

Publications (1)

Publication Number Publication Date
CN109993009A true CN109993009A (en) 2019-07-09

Family

ID=67129611

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910176284.2A Pending CN109993009A (en) 2019-03-08 2019-03-08 A kind of Implementation Technology of mobile phone safe input key

Country Status (1)

Country Link
CN (1) CN109993009A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112084511A (en) * 2020-08-27 2020-12-15 欧菲微电子技术有限公司 Encryption method and device of service life information, storage medium and electronic equipment
CN117596086A (en) * 2024-01-19 2024-02-23 广东海洋大学 Commodity data encryption transmission method and system based on supply chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5379057A (en) * 1988-11-14 1995-01-03 Microslate, Inc. Portable computer with touch screen and computer system employing same
US20080307067A1 (en) * 2007-06-09 2008-12-11 Pavel Cisler System Connections and User Interfaces
JP2013168128A (en) * 2012-01-18 2013-08-29 Ricoh Co Ltd Electronic apparatus, information processing system, information management device, information processing method, and information processing program
CN104700049A (en) * 2015-03-23 2015-06-10 李健 Password protection method of achieving separation of password character display and input operations

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5379057A (en) * 1988-11-14 1995-01-03 Microslate, Inc. Portable computer with touch screen and computer system employing same
US20080307067A1 (en) * 2007-06-09 2008-12-11 Pavel Cisler System Connections and User Interfaces
JP2013168128A (en) * 2012-01-18 2013-08-29 Ricoh Co Ltd Electronic apparatus, information processing system, information management device, information processing method, and information processing program
CN104700049A (en) * 2015-03-23 2015-06-10 李健 Password protection method of achieving separation of password character display and input operations

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
XIEDANTIBU: "android仿iPhone滚轮控件实现及源码分析", 《HTTPS://BLOG.CSDN.NET/XIEDANTIBU/ARTICLE/DETAILS/7592005》 *
傲慢的上校: "android仿iPhone滚轮控件实现及源码分析(一)", 《HTTPS://BLOG.CSDN.NET/LILU_LEO/ARTICLE/DETAILS/7397697》 *
迷途D书童: "android仿iPhone滚轮控件实现及源码分析(一)", 《HTTPS://WWW.OSCHINA.NET/QUESTION/157182_46392》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112084511A (en) * 2020-08-27 2020-12-15 欧菲微电子技术有限公司 Encryption method and device of service life information, storage medium and electronic equipment
CN117596086A (en) * 2024-01-19 2024-02-23 广东海洋大学 Commodity data encryption transmission method and system based on supply chain
CN117596086B (en) * 2024-01-19 2024-04-05 广东海洋大学 A method and system for encrypting and transmitting commodity data based on supply chain

Similar Documents

Publication Publication Date Title
CN105991670B (en) Data sharing method, data sharing device and terminal
CN103118031B (en) Method for logging in application account and electronic equipment
CN104063169B (en) Unlocking method based on touch screen
WO2011015301A1 (en) Method for encoded input and control by means of fingerprint
US20140245457A1 (en) Method and device for initiating privacy mode of data processing apparatus
CN106200891A (en) The display method of user interface, Apparatus and system
CN103559451A (en) Method and device for protecting and displaying privacy information
CN106778208A (en) The access processing method and device of application program
CN109993009A (en) A kind of Implementation Technology of mobile phone safe input key
CN102930194A (en) Data security operating system and method based on authority management and control
US8640252B2 (en) Obfuscating entry of sensitive information
CN102209137A (en) Private account system of mobile terminal private account system and realization method
CN105898054A (en) Verification-based message display method and communication terminal
CN106650514A (en) Secure input system and method based on TrustZone technology
CN101655768A (en) Anti-peep password input method
US20140325677A1 (en) Optical security enhancement device
CN104915128A (en) Logo-combined screen unlocking method and device
CN106709310A (en) Virtual reality system interface login method and device
CN110188578A (en) A kind of method and apparatus of automatic shield information
CN108711057A (en) A kind of method that smartwatch supports payment
CN101382975A (en) Method for inputting password
CN108833116B (en) Electronic signature method
CN104933346B (en) A kind of unlocking method and device based on Logo
CN104618558B (en) A kind of terminal
Alsuhibany A Camouflage Text‐Based Password Approach for Mobile Devices against Shoulder‐Surfing Attack

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20191210

Address after: Room a7212, floor 7, building 9, Changsha Zhongdian Software Park, No. 39, Jianshan Road, high tech Development Zone, Changsha City, Hunan Province

Applicant after: Hunan keyin special zone blockchain Technology Co.,Ltd.

Address before: 518000 No. 12, science and technology south twelve Road, Guangdong Hainan street, Shenzhen, Guangdong, 1202

Applicant before: QUARK CHAIN TECHNOLOGY (SHENZHEN) Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200218

Address after: Room 1635, T3, T4 and podium, Binjiang financial center, No. 112, chazi Shandong Road, guanshaling street, Yuelu District, Changsha City, Hunan Province

Applicant after: Hunan ChuBi Technology Co.,Ltd.

Address before: Room a7212, floor 7, building 9, Changsha Zhongdian Software Park, No. 39, Jianshan Road, high tech Development Zone, Changsha City, Hunan Province

Applicant before: Hunan keyin special zone blockchain Technology Co.,Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20190709

RJ01 Rejection of invention patent application after publication