Unlock instant, AI-driven research and patent intelligence for your innovation.

Password protection method

A password protection and password technology, applied in the direction of instruments, digital data authentication, electronic digital data processing, etc., can solve problems such as password leakage

Inactive Publication Date: 2009-11-25
HONG FU JIN PRECISION IND (SHENZHEN) CO LTD +1
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above methods all have a common feature, that is, as long as others see the user inputting the password completely, the password will be leaked.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password protection method
  • Password protection method
  • Password protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In this embodiment, by setting a plurality of invisible input areas on the touch screen, when inputting a password, the input button is not real, and the original screen is maintained. Password input is performed by operating a plurality of invisible input areas that the user himself knows. In this way, even if other people see the user's operations, they don't know that those operations are password input actions, which effectively protects the password from being leaked.

[0020] Please also see figure 1 , which are respectively a flow chart of the steps of a password protection method in a preferred embodiment, including the following steps:

[0021] Step S21, setting multiple input areas on the touch screen. When entering the password, the multiple input areas do not display position marks, such as keeping the original screen or displaying a screen that has nothing to do with the position of the input area, as if providing multiple invisible input buttons. Such as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a password protection method, which comprises the following steps of: setting a plurality of invisible input areas on a touch screen; detecting the touch operation of users in the input areas, and generating an input message; and comparing the input message with a preset password massage, and carrying out password authentification. When a password is input, the input areas do not display position marks by the password protection method, and the users can carry out invisible password input on the touch screen so as to effectively reduce the probability of password disclosure.

Description

technical field [0001] The invention relates to a password protection method, in particular to a password protection method for an electronic device with a touch screen. Background technique [0002] With the digitization of information, the password protection of information becomes more and more important. The most common password input method is to perform simple key input through a plurality of preset number or letter keys. Compare the input information with the preset password data for password verification. [0003] The above-mentioned keys include keys of a physical keyboard and virtual keys displayed on a touch screen. In order not to be peeped at the password, the information arrangement of each button in some input devices appears randomly, which increases the difficulty of peeping at the password to a certain extent. [0004] However, all of the above methods have a common feature, that is, as long as others see the user inputting the password completely, the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/041G06F21/00
CPCG06F3/04883G06F21/36
Inventor 戴龙
Owner HONG FU JIN PRECISION IND (SHENZHEN) CO LTD