Mobile phone password protection system based on hidden code identification and implicit transformation
A password protection and password technology, applied in internal/peripheral computer component protection, digital data authentication, branch office equipment, etc., can solve the problems of anti-peeping and anti-cracking that cannot reach the password system
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027] figure 1 As shown, the embodiment of the present invention provides a mobile phone password protection system based on hidden code identification and implicit transformation, including a password input module, a button behavior information collection module, a hidden code definition module, a hidden code identification module, and an implicit transformation definition module. module, an implicit conversion module, a password combination module, and a password verification module, wherein: the button behavior information collection module obtains the button code and button behavior information when entering a password from the password input module, and the hidden code recognition module according to the button Behavior information automatically forms a hidden password by the coded value of the hidden code defined in the hidden code definition module, and the implicit transformation strategy defined in the implicit transformation module automatically forms a hidden passwo...
Embodiment 2
[0038] This embodiment is aimed at a mobile phone with a 3D-touch screen. On the basis of embodiment 1, the password input tactile feedback module also feeds back the size of the button pressure to the user's finger; the information collected by the button behavior information collection module also includes the pressure of each button when entering the password; The hidden code module also utilizes the pressure of the key to automatically form the hidden password of the pressure code, and the position of the pressure code in the final password and its encoded value are also predefined in the hidden code definition module, and can also be determined by The user re-customizes; the password verification module also verifies the pressure code: all numbers and their order in the final password are correct, and when the time code, angle code, and pressure code are all from the hidden password module, judge The final password is correct; otherwise, it is judged that the final passwo...
Embodiment 3
[0040] This embodiment is aimed at the application requirements of a mobile phone without a 3D-touch screen but wishing to have a pressure code. On the basis of Embodiment 2, the pressure of the button is judged by identifying the contact area between the finger and the screen of the mobile phone based on the principle that the larger the contact area between the finger and the screen of the mobile phone is, the hidden pressure code is automatically formed. sex code.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
