Cross-platform security keyboard realization method for mobile terminal

A security keyboard and mobile terminal technology, applied in the input/output process of data processing, instruments, electrical digital data processing, etc., can solve problems such as difficult to guess content, improve security, etc., achieve high code reuse rate and ensure security Sexuality, the effect of increasing flexibility

Active Publication Date: 2017-03-22
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, even if a hacker can monitor the keylogger, it will be difficult to guess the conte...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0036] The cross-platform security keyboard implementation method of the mobile terminal in the present embodiment comprises the following steps:

[0037] Step 1. Draw a secure keyboard layout on the native side and realize basic functions such as keyboard display, closing, and switching:

[0038] Among them, the Android system implements the layout and functions of the secure keyboard with the methods corresponding to android native, and provides an interface for javascript calls; the IOS system uses the methods corresponding to IOS native to realize the layout and functions of the secure keyboard, and provides an interface for javascript calls. Android and IOS provide the same calling interface and parameters for javascript.

[0039] Correspondingly, the security keyboard implemented on the native side includes a numeric keyboard, an alphabetic keyboard, and a symbolic keyboard. Both the alphabetic keyboard and the numeric keyboard support two modes: random sequence and fixe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of mobile terminals and the internet, and discloses a cross-platform security keyboard realization method for a mobile terminal. The cross-platform realization of a security keyboard is supported, two forms of a fixed keyboard and a random keyboard are supported at the same time, and the flexibility is high. The method comprises the steps that A, a security keyboard layout is drawn at a native end and basic functions of the keyboard are realized; B, the native end packages a method interface kb1 for a javascript end to call the native security keyboard; C, functions and interfaces of the native end are packaged into an SDK for application engineering; D, the javascript end packages an interface function kb2 for calling the security keyboard in the SDK of the native end, wherein the interface function kb2 is used for starting the security keyboard of the native end; E, an Html page generates an input box, a click event of an id selector of the input box is bound, and the interface function kb2 defined in the step D is called in the event; and F, the javascript end packages a method kbCallback for calling back a javascript by the native end.

Description

technical field [0001] The invention relates to the technical fields of mobile terminals and the Internet, in particular to a method for realizing a cross-platform security keyboard of a mobile terminal. Background technique [0002] With the rapid popularization of mobile payment, how to ensure the security of user information has become more and more important. In payment, financial, and personal information-sensitive systems, important personal information of users, such as payment passwords and ID numbers, need to be prioritized for security protection. [0003] However, the default keyboard input of the system can be recorded by malicious software and calculate the input value of the user, thereby leaking sensitive information and causing heavy losses. Therefore, when inputting sensitive information, abandoning the third-party input method and implementing a custom input keyboard can avoid many security risks. [0004] There are two kinds of security keyboards: self-d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/44G06F3/0488G06F21/83
CPCG06F3/04886G06F9/451G06F21/83
Inventor 王艳艳何娟
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products