Dynamic decryption method used for mobile terminal, and mobile terminal

A mobile terminal, dynamic technology, applied in branch equipment, electrical components, telephone communication, etc., can solve unavoidable problems, reduce the probability of password leakage, prevent passwords from being peeped by others, and improve security.

Inactive Publication Date: 2014-07-09
BYD CO LTD
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this technology only rearranges the input characters, and the display of each character is still very clear, and it still cannot avoid the direct viewing of the input password by people who are close

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic decryption method used for mobile terminal, and mobile terminal
  • Dynamic decryption method used for mobile terminal, and mobile terminal
  • Dynamic decryption method used for mobile terminal, and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0021] In describing the present invention, it should be understood that the terms "center", "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", " The orientations or positional relationships indicated by "vertical", "horizontal", "top", "bottom", "inner" and "outer" are based on the orientations or positional relationships shown in the drawings, and are only for the convenience of describing the present invention and Simplified descriptions, rather than indicating or implying that the device or element refe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention proposes a dynamic decryption method used for a mobile terminal. The method includes the following steps: detecting whether a password input interface is entered; if so, further judging whether at least one character input button is triggered; if so, further detecting a fixed-character region corresponding to the triggered character input button; obtaining dynamic characters corresponding to fixed characters according to the fixed-character region until an input completion instruction is received so as to obtain an input dynamic-character sequence; judging whether the dynamic-character sequence matches a preset password; and if the dynamic-character sequence matches the preset password, unlocking the mobile terminal. The dynamic decryption method used for the mobile terminal is capable of preventing effectively that the password is peeped by others so that password leakage is prevented and thus the security of the mobile terminal is improved. The invention also proposes the mobile terminal.

Description

technical field [0001] The invention relates to the technical field of mobile terminals, in particular to a dynamic decryption method for a mobile terminal and the mobile terminal. Background technique [0002] The mobile phone password is used to prevent the operator from turning on the mobile phone or operating certain applications of the mobile phone when the mobile phone is not used by the owner. There are generally two settings for current mobile phone passwords: 1. Use numbers or text as passwords, such as figure 2 As shown, this method requires the user to input a string of letters or numbers each time before operating the mobile phone, so as to achieve the encryption function. 2. Use a specific connection pattern as a password. In this method, the user sets a certain pattern in advance, and the user is required to draw the same pattern to unlock when unlocking. [0003] At present, the above two encryption schemes can easily lead to leaks in public places. For exa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04M1/2745
Inventor 贺琼英
Owner BYD CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products