Unlock instant, AI-driven research and patent intelligence for your innovation.

Mobile phone password protection system based on hidden code identification and implicit transformation

A password protection and password technology, applied in internal/peripheral computer component protection, digital data authentication, branch office equipment, etc., can solve the problems of anti-peeping and anti-cracking that cannot reach the password system

Active Publication Date: 2019-12-20
SHANGHAI 01 POWER TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its shortcoming is that the input password can still be obtained through peeping, taking pictures, etc., and can pass verification after inputting, thus failing to achieve the purpose of anti-peeping and anti-cracking of the password system itself

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone password protection system based on hidden code identification and implicit transformation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] figure 1 As shown, the embodiment of the present invention provides a mobile phone password protection system based on hidden code identification and implicit transformation, including a password input module, a button behavior information collection module, a hidden code definition module, a hidden code identification module, and an implicit transformation definition module. module, an implicit conversion module, a password combination module, and a password verification module, wherein: the button behavior information collection module obtains the button code and button behavior information when entering a password from the password input module, and the hidden code recognition module according to the button Behavior information automatically forms a hidden password by the coded value of the hidden code defined in the hidden code definition module, and the implicit transformation strategy defined in the implicit transformation module automatically forms a hidden passwo...

Embodiment 2

[0038] This embodiment is aimed at a mobile phone with a 3D-touch screen. On the basis of embodiment 1, the password input tactile feedback module also feeds back the size of the button pressure to the user's finger; the information collected by the button behavior information collection module also includes the pressure of each button when entering the password; The hidden code module also utilizes the pressure of the key to automatically form the hidden password of the pressure code, and the position of the pressure code in the final password and its encoded value are also predefined in the hidden code definition module, and can also be determined by The user re-customizes; the password verification module also verifies the pressure code: all numbers and their order in the final password are correct, and when the time code, angle code, and pressure code are all from the hidden password module, judge The final password is correct; otherwise, it is judged that the final passwo...

Embodiment 3

[0040] This embodiment is aimed at the application requirements of a mobile phone without a 3D-touch screen but wishing to have a pressure code. On the basis of Embodiment 2, the pressure of the button is judged by identifying the contact area between the finger and the screen of the mobile phone based on the principle that the larger the contact area between the finger and the screen of the mobile phone is, the hidden pressure code is automatically formed. sex code.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cell phone password protection system based on implicit code identification and implicit conversion. The cell phone password protection system comprises steps that a key pressing behavior information acquisition module is used to acquire a key pressing code and key pressing behavior information during input of a password from a password input module, and an implicit identification module is used to generate an implicit password according to a coded value of an implicit code defined by an implicit code definition module, and an implicit conversion module is used for the automatic implicit conversion of the key pressing codes acquired by the information acquisition module according to an implicit conversion strategy defined by the implicit conversion definition module, and a password combination module is used to combine the implicit password and the password after the implicit conversion automatically to form a final password according to self-defined strategies in the implicit code definition module and the implicit conversion definition module, and a password verification module is used to verify the validity of the final password. The cell phone password protection system is capable of solving safety problems of a cell phone password system such as peeping and cracking.

Description

technical field [0001] The invention relates to a password protection system, in particular to a mobile phone password protection system based on hidden code identification and implicit transformation. Background technique [0002] Password, as the patron saint of information security, is an important guarantee for property protection and information security. At present, the widely used password systems mainly include digital passwords and biological information passwords such as fingerprints, facial recognition, and DNA. Traditional digital passwords are very easy to be peeped and used by others, resulting in property loss and personal information theft cases are not uncommon. Mobile phones have become a part of people's lives, and they are often used to store personal information, shop online, etc. Therefore, the security of the mobile phone password system is very important. At present, even though pattern passwords and fingerprint passwords have been used in mobile p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/725G06F21/46G06F21/83
CPCG06F21/46G06F21/83H04M1/72454H04M1/72463H04M1/72484
Inventor 杨熠欣
Owner SHANGHAI 01 POWER TECH