Supercharge Your Innovation With Domain-Expert AI Agents!

Encrypted data input method and encrypted data input device

A technology for encrypting data and input method, applied in the field of communication, can solve the problem of inability to ensure the security of data input, and achieve the effect of improving security and solving security

Inactive Publication Date: 2016-08-24
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide an encrypted data input method and device that can improve data input security; to solve the technical problem that existing encrypted data input methods and devices cannot ensure data input security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted data input method and encrypted data input device
  • Encrypted data input method and encrypted data input device
  • Encrypted data input method and encrypted data input device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] Please refer to figure 1 , figure 1 It is a flow chart of the first preferred embodiment of the encrypted data input method of the present invention. The encrypted data input method of this preferred embodiment includes:

[0027] Step S101, acquiring the first fingerprint input by the user;

[0028] Step S102, obtain the corresponding encryption algorithm in the database according to the first fingerprint, and generate a random number, wherein the random number has multiple digits;

[0029] Step S103, displaying the random number;

[0030] Step S104, receiving encrypted data input by the user, wherein the encrypted data is calculated by the user based on random numbers, original data and a preset encryption algorithm.

[0031] The specific flow of each step of the encrypted data input method in this preferred embodiment will be described in detail below.

[0032] In step S101, the terminal acquires a first fingerprint input by a user. The terminal obtains the firs...

Embodiment 2

[0043] Please refer to figure 2 , figure 2 It is a flow chart of the second preferred embodiment of the encrypted data input method of the present invention. The encrypted data input method of this preferred embodiment includes:

[0044] Step S201, acquiring the first fingerprint input by the user;

[0045] Step S202, judging whether the first fingerprint matches the second fingerprint in the database;

[0046] Step S203, if the first fingerprint does not match the second fingerprint in step S202, prompting the user to input wrong fingerprint;

[0047] Step S204, if the first fingerprint matches the second fingerprint in step S202, then obtain the encryption algorithm corresponding to the second fingerprint, and generate a random number, wherein the random number is a multi-digit number;

[0048] Step S205, displaying the random number;

[0049] Step S206, receiving the encrypted data input by the user, wherein the encrypted data is calculated by the user according to the...

Embodiment 3

[0076] Please refer to image 3 , image 3 It is a structural diagram of the first preferred embodiment of the encrypted data input device of the present invention. The encrypted data input device 30 of this preferred embodiment includes a first fingerprint acquisition module 301 , an encryption algorithm and random number acquisition module 302 , a random number display module 303 and an encrypted data receiving module 304 . Wherein, the first fingerprint acquisition module 301 is used to acquire the first fingerprint input by the user; the encryption algorithm and random number acquisition module 302 is used to acquire the corresponding encryption algorithm in the database according to the first fingerprint, and generate a random number, wherein the random number is Multiple digits; the random number display module 303 is used to display the random number; the encrypted data receiving module 304 is used to receive the encrypted data input by the user, wherein the encrypted ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encrypted data input method and an encrypted data input device. The method comprises the following steps: acquiring a first fingerprint input by a user; acquiring a corresponding encryption algorithm in a database according to the fingerprint, and generating a random number, wherein the random number is a multi-digit number; displaying the random number; and receiving encrypted data input by the user, wherein the encrypted data is calculated by the user according to the random number, original number and a preset encryption algorithm. According to the encrypted data input method and the encrypted data input device of the invention, data is encrypted using a random number, and as the random number is uncertain and there are a great variety of encryption algorithms related to the random number, the security of data input is improved.

Description

technical field [0001] The invention relates to the communication field, in particular to an encrypted data input method and device. Background technique [0002] With the development of smart phones, large-screen mobile phones are becoming more and more popular and have become a trend. Large-screen mobile phones have advantages in reading and video games, and can bring people a good visual experience. However, the problem of how to effectively ensure the security of mobile phone information also arises. [0003] Due to the large screen of a large-screen mobile phone, information leakage may occur when users operate on it. For example, it is easy for the user to see the password by others during the password input process, which will lead to the disclosure of the password. The existing technology cannot ensure the input security of important data such as passwords, however, once these important data are leaked, the personal privacy and interests of users will be seriously ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/14H04L9/06
CPCH04L9/14H04L9/0656
Inventor 曾元清
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More