Unlock instant, AI-driven research and patent intelligence for your innovation.

Technical implementation method for safely inputting secret key into mobile phone

A mobile phone security and implementation method technology, applied in internal/peripheral computer component protection, telephone communication, digital data authentication, etc., can solve problems such as interception of input keys, and achieve the effect of ensuring security

Pending Publication Date: 2019-07-09
湖南楚璧科技有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of society and the continuous improvement of people's living standards, mobile phones have become an essential product for people's daily life, and people's safety awareness is also constantly improving. In order to protect personal privacy stored on mobile phones, people A key is used to protect the privacy of your mobile phone, but the existing mobile phone lacks protection for the input content in the mode of key input. Android operating system applications can be called, screenshots and other applications can be monitored, which is prone to The situation that the input key is intercepted does not meet people's requirements for use. For this reason, we propose a technical implementation method for mobile phone security input key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Technical implementation method for safely inputting secret key into mobile phone
  • Technical implementation method for safely inputting secret key into mobile phone
  • Technical implementation method for safely inputting secret key into mobile phone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] (1) When the user needs to enter the key, turn on the pure digital key input mode, that is, the default mode, and the numbers are randomly distributed;

[0026] (2) The encryption processor randomly generates a key distribution table, which is displayed on the key prompt screen and the main screen, and the user can manually reset or refresh. The main screen is blank keys, and the key prompt screen displays blank keys on the main screen For the corresponding content, the key prompt screen prompts are set according to the encryption level, and you can choose a fixed random prompt or a random prompt every time you enter;

[0027] (3) After the user views the randomly generated button distribution table, the brain thinks of the key to be output according to the prompt on the key prompt screen. The key selects pure numbers, and the middle numbers include but are not limited to Arabic numbers and English numbers;

[0028] (4), the user clicks a blank button among the buttons ...

Embodiment 2

[0031] (1) When the user needs to enter the key, turn on the mnemonic key input mode, that is, the sorting mode;

[0032] (2) The encryption processor randomly generates a mnemonic distribution table, which is displayed on the key prompt screen and the main screen, and the user can manually reset or refresh. The main screen is blank, and the key prompt screen displays the The content corresponding to the blank key, the key prompt screen prompt is set according to the encryption level, you can choose a fixed random prompt or a random prompt every time you enter;

[0033] (3) After the user views the randomly generated mnemonic distribution table, the brain thinks of the key to be output according to the prompts on the small screen;

[0034] (4) On the main interface, a set of mnemonic words will be prompted in random order. The user can drag the blank buttons with color prompts on the main interface to sort them, and then complete the key input;

[0035] (5) The input key is s...

Embodiment 3

[0037] (1) When the user needs to input the key, turn on the universal random character number key input mode, that is, press and drag the mode;

[0038] (2). The encryption processor randomly generates a character string distribution table, which is displayed on the key prompt screen and the main screen. The user can manually reset or refresh. The main screen is a blank button, and the key prompt screen displays a blank key The content corresponding to the key, the key prompt screen prompt is set according to the encryption level, you can choose a fixed random prompt or a random prompt every time you enter;

[0039] (3) After the user views the randomly generated string table, the brain thinks of the key to be output according to the prompt on the key prompt screen;

[0040] (4) The user clicks the string anywhere on the main screen to start dragging, and the focus in the table starts to change. After changing to the string table that the user needs to input, the user release...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a technical implementation method for safely inputting a secret key into a mobile phone, which comprises the following steps of: when a user needs to input the secret key, starting a secret key input mode; the encryption processor randomly generates a key distribution table and displays the key distribution table on the key prompt screen and the main screen, and a user canmanually reset or refresh the key distribution table; after the user checks the randomly generated key distribution table, the brain imagines the key to be output according to the prompt of the key prompt screen; a user clicks a blank key in the main interface keys without prompt to complete key input; an input key is sent to the encryption processor through the main system. According to the technical implementation method for safely inputting the secret key through the mobile phone, all input contents of a user are completed on a main system screen, even if other applications intercept, the input contents cannot be recognized, the method completely isolates perception of an operation system on the input contents, the safety of the secret key is guaranteed, and a better use prospect is brought.

Description

technical field [0001] The invention relates to the field of mobile phone key input, in particular to a technical realization method for safe key input by mobile phone. Background technique [0002] With the rapid development of society and the continuous improvement of people's living standards, mobile phones have become an essential product for people's daily life, and people's safety awareness is also constantly improving. In order to protect personal privacy stored on mobile phones, people A key is used to protect the privacy of your mobile phone, but the existing mobile phone lacks protection for the input content in the mode of key input. Android operating system applications can be called, screenshots and other applications can be monitored, which is prone to The situation that the input key is intercepted does not meet people's requirements for use. For this reason, we propose a technical implementation method for securely entering the key in a mobile phone. Conten...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/84G06F21/36H04M1/725H04M1/72403
CPCG06F21/84G06F21/36H04M1/72403H04M1/72448
Inventor 胡振生杨保宇
Owner 湖南楚璧科技有限公司