Supercharge Your Innovation With Domain-Expert AI Agents!

Mobile terminal and password input method thereof

A mobile terminal, password input technology, applied in the fields of instruments, digital data processing, computer security devices, etc., can solve the problems of password leakage, password being peeped by others, etc., to achieve the effect of protecting interests

Inactive Publication Date: 2011-07-06
HUIZHOU TCL MOBILE COMM CO LTD
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when using the keyboard keys of a mobile terminal to enter a password in a public place, the entered password may be peeped by other people, or may be photographed by a monitoring device, which may cause the problem of leakage of important passwords

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal and password input method thereof
  • Mobile terminal and password input method thereof
  • Mobile terminal and password input method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The invention provides a mobile terminal, which can be various electronic devices such as a mobile phone or a personal digital assistant (PDA).

[0023] see figure 1 , figure 1 According to a schematic diagram of some functional modules of a mobile terminal according to an embodiment of the present invention, the mobile terminal includes a keyboard module and a mapping module. The main function of the keyboard module is to provide a first keyboard and a second keyboard, and the first keyboard and the second keyboard can be virtual keyboards or physical keyboards.

[0024] The key layout of the first keyboard may be a common mobile phone keyboard layout. For example, the first keyboard includes three rows of number keys, wherein the number keys in the first row are 1, 2, 3, the number keys in the second row are 4, 5, 6, and the number keys in the third row are 7, 8, 9. The first keyboard corresponds to a first password, wherein the first password is the real password ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a mobile terminal and a password input method thereof. The password input method of the mobile terminal comprises the following steps: a, providing a first password and a mapping relationship of a keyboard; b, mapping the first password into a second password according to the mapping relationship of the keyboard; c. providing a second keyboard and inputting a second password according to the second keyboard; and d, restoring the second keyboard into the first password according to the mapping relationship of the keyboard. According to the mobile terminal and the password input method of the mobile terminal, the first password can be prevented from being easily peeped by others or shot by monitoring equipment, and the like due to direct input, so that the benefits of users can be protected.

Description

technical field [0001] The invention relates to a mobile terminal password input method and a mobile terminal. Background technique [0002] With the development of mobile communication devices and wireless services, it has become more and more extensive to carry out wireless services through various mobile terminals (such as mobile phones, personal digital assistants, etc.). For example, users can conduct business transactions through various mobile terminals using various mobile financial services such as Wireless Application Protocol (WAP) banking, SIM Tool Kit (SIM Tool Kit) banking, or SMS banking. [0003] Among them, when a user conducts a business transaction through a mobile terminal, the user is usually required to input an account number and a password to ensure the legality of the transaction and ensure the normal progress of the transaction. Most of the password input methods of existing mobile terminals are to open the submit password box, click the keyboard b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/04G06F21/83
Inventor 金鑫王颖轩
Owner HUIZHOU TCL MOBILE COMM CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More