A kind of Implementation Technology of mobile phone safe input key
Technical field
The present invention relates to mobile phone keys to input field, in particular to a kind of technology realization side of mobile phone safe input key
Method.
Background technique
With the rapid development of society, the horizontal continuous raising of people's lives, mobile phone have become needed for people's life
Essential product, and the awareness of safety of people is also in the continuous improvement, in order to protect the individual privacy being stored on mobile phone, people
Take the mode of key and protect oneself mobile phone private, but existing mobile phone lacks under the mode that key inputs
Protection to input content, Android operation system application between can call, can with screenshotss and monitoring other application, be easy
There is the case where input key is intercepted, be unsatisfactory for the requirement of people, for this purpose, it is proposed that a kind of input of mobile phone safe is close
The Implementation Technology of key.
Summary of the invention
The main purpose of the present invention is to provide a kind of Implementation Technologies of mobile phone safe input key, can effectively solve
Certainly the problems in background technique.
To achieve the above object, the technical scheme adopted by the invention is as follows:
A kind of Implementation Technology of mobile phone safe input key, comprising the following steps:
(1), when user needs to input key, key input pattern is opened;
(2), encryption processor generates distribution table at random, is shown on key prompt screen and main screen, user can be with hand
Dynamic resetting refreshes;
(3), after user views the distribution table generated at random, brain prompts the prompt of screen to expect exporting according to key
Key;
(4), user operates in the main interface not prompted, and completes key input;
(5), the key inputted is sent to encryption processor by main system, and encryption processor identification judges whether key is defeated
Enter correct.
Preferably, in the step (1), there are three types of input content to hold a concurrent post mode, including pure digi-tal for key input pattern
The corresponding sequencing model of corresponding default mode, mnemonic word and general random character number corresponding press input mode.
Preferably, in the step (2), it is blank key on main screen, shows main screen overhead on key prompt screen
Content corresponding to white key, key prompt screen prompt are set according to encryption level, can choose primary fixed random prompt
Or primary random prompt is carried out when inputting every time;
Preferably, in the step (3), key can be one in pure digi-tal, mnemonic word and general random character number
Kind is a variety of, and wherein pure digi-tal includes but do not limit to and Arabic numerals and English digital.
Preferably, in the step (4), the corresponding default mode of the pure digi-tal is the random distribution of number, operation
Process are as follows: user clicks blank key in the main interface key not prompted, and completes key input.
Preferably, in the step (4), the corresponding sequencing model of the mnemonic word is that one group of mnemonic word random sequence mentions
Show, operating process are as follows: user has the blank key of color tips to be ranked up in main interface dragging, completes key input.
Preferably, in the step (4), the general random character number is corresponding to press input mode, operates
Journey are as follows: input can all have the string table of random alignment every time, and user clicks the dragging of character start of string in main screen any position,
Focus starts to convert in table, transforms to user and needs user's release character string after the character inputted that key input can be completed.
Compared with prior art, the invention has the following beneficial effects: the positions that user's input content only has blank key
Information makes Host Systems that can not spy upon the cipher key content of user's input without the content information of key, and input content includes defeated
Enter position and the number of key, and the content inputted is provided to encryption processor to be parsed into true password and be tested
Card, it is more safe, and also all input contents of user are all completed in the screen of main system, even if other application may intercept
But can not identify the content of input, only interception input content while be truncated to prompt full content can just crack it is close
Key, perception of the completely isolated operating system of key input pattern that the present invention designs to input content, ensure that the safety of key.
Detailed description of the invention
Fig. 1 is the overall structure flow chart for the Implementation Technology that a kind of mobile phone safe of the present invention inputs key.
Fig. 2 is the main screen input behaviour that a kind of mobile phone safe of the present invention inputs figure pattern in the Implementation Technology of key
Mapping.
Fig. 3 is the key prompting screen of the middle figure pattern for the Implementation Technology that a kind of mobile phone safe of the present invention inputs key
Curtain figure.
Fig. 4 is the main screen that a kind of mobile phone safe of the present invention inputs mnemonic word sequencing model in the Implementation Technology of key
Input operation diagram.
Fig. 5 is that the key of mnemonic word sequencing model in a kind of Implementation Technology of mobile phone safe input key of the present invention mentions
Show screen map.
Specific embodiment
To be easy to understand the technical means, the creative features, the aims and the efficiencies achieved by the present invention, below with reference to
Specific embodiment, the present invention is further explained.
Embodiment 1
(1), when user needs to input key, pure digi-tal key input pattern, i.e. default mode, digital random point are opened
Cloth;
(2), encryption processor generates key distribution table at random, is shown on key prompt screen and main screen, Yong Huke
To reset or refresh manually, it is blank key on main screen, is shown on main screen corresponding to blank key on key prompt screen
Content, key prompt screen prompt sets according to encryption level, can choose primary fixed random prompt or input every time
Shi Jinhang is once prompted at random;
(3), after user views the key distribution table generated at random, brain prompts the prompt of screen to expect wanting according to key
The key of output, key select pure digi-tal, and middle number includes but do not limit to and Arabic numerals and English digital;
(4), user clicks blank key in the main interface key not prompted, and completes key input;
(5), the key inputted is sent to encryption processor by main system, and encryption processor identification judges whether key is defeated
Enter correct.
Embodiment 2
(1), when user needs to input key, mnemonic word key input pattern, i.e. sequencing model are opened;
(2), encryption processor generates mnemonic word distribution table at random, is shown on key prompt screen and main screen, user
It can reset or refresh manually, be blank key on main screen, show that blank key institute is right on main screen on key prompt screen
The content answered, key prompt screen prompt are set according to encryption level, can choose primary fixed random prompt or defeated every time
It is fashionable to carry out primary random prompt;
(3), after user views the mnemonic word distribution table generated at random, brain is expected exporting according to the prompt of the small screen
Key;
(4), one group of mnemonic word random sequence prompt in main interface, user main interface dragging have the blank of color tips by
Key is ranked up, and key input can be completed;
(5), the key inputted is sent to encryption processor by main system, and encryption processor identification judges whether key is defeated
Enter correct.
Embodiment 3
(1), when user needs to input key, general random character digital cipher input pattern is opened, that is, presses dragging mould
Formula;
(2), encryption processor generates character string distribution table at random, is shown on key prompt screen and main screen, user
It can reset or refresh manually, be blank key on main screen, show that blank key institute is right on main screen on key prompt screen
The content answered, key prompt screen prompt are set according to encryption level, can choose primary fixed random prompt or defeated every time
It is fashionable to carry out primary random prompt;
(3), after user views the string table generated at random, brain prompts the prompt of screen to expect wanting defeated according to key
Key out;
(4), user clicks the dragging of character start of string in main screen any position, and focus starts to convert in table, transforms to use
Family needs user's release character string after the string table inputted that the input of character string key can be completed;
(5), the key inputted is sent to encryption processor by main system, and encryption processor identification judges whether key is defeated
Enter correct.
It can be by it should be noted that the present invention is the Implementation Technology that a kind of mobile phone safe inputs key, when use
Corresponding input pattern, i.e. content corresponding to embodiment 1, embodiment 2 and embodiment 3 are selected according to a Man's Demands, is inputted close
When key, key prompt screen and main screen are shown on mobile phone, but are located at different interfaces, in main interface in user's input
Hold and only have the location information of blank key without the content information of key, makes Host Systems that can not spy upon the key of user's input
Content, input content includes position and the number of input key, and the content inputted is provided to encryption processor to solve
True password is analysed into be verified, it is more safe, and also all input contents of user are all completed in the screen of main system,
Even if other application is truncated to prompt while may intercepting but can not identify the content of input, only interception input content
Full content could breaking cryptographic keys, sense of the completely isolated operating system of key input pattern that the present invention designs to input content
Know, ensure that the safety of key.
The above shows and describes the basic principles and main features of the present invention and the advantages of the present invention.The technology of the industry
Personnel are it should be appreciated that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this
The principle of invention, without departing from the spirit and scope of the present invention, various changes and improvements may be made to the invention, these changes
Change and improvement all fall within the protetion scope of the claimed invention.The claimed scope of the invention by appended claims and its
Equivalent thereof.