Technical implementation method for safely inputting secret key into mobile phone
A mobile phone security and implementation method technology, applied in internal/peripheral computer component protection, telephone communication, digital data authentication, etc., can solve problems such as interception of input keys, and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0025] (1) When the user needs to enter the key, turn on the pure digital key input mode, that is, the default mode, and the numbers are randomly distributed;
[0026] (2) The encryption processor randomly generates a key distribution table, which is displayed on the key prompt screen and the main screen, and the user can manually reset or refresh. The main screen is blank keys, and the key prompt screen displays blank keys on the main screen For the corresponding content, the key prompt screen prompts are set according to the encryption level, and you can choose a fixed random prompt or a random prompt every time you enter;
[0027] (3) After the user views the randomly generated button distribution table, the brain thinks of the key to be output according to the prompt on the key prompt screen. The key selects pure numbers, and the middle numbers include but are not limited to Arabic numbers and English numbers;
[0028] (4), the user clicks a blank button among the buttons ...
Embodiment 2
[0031] (1) When the user needs to enter the key, turn on the mnemonic key input mode, that is, the sorting mode;
[0032] (2) The encryption processor randomly generates a mnemonic distribution table, which is displayed on the key prompt screen and the main screen, and the user can manually reset or refresh. The main screen is blank, and the key prompt screen displays the The content corresponding to the blank key, the key prompt screen prompt is set according to the encryption level, you can choose a fixed random prompt or a random prompt every time you enter;
[0033] (3) After the user views the randomly generated mnemonic distribution table, the brain thinks of the key to be output according to the prompts on the small screen;
[0034] (4) On the main interface, a set of mnemonic words will be prompted in random order. The user can drag the blank buttons with color prompts on the main interface to sort them, and then complete the key input;
[0035] (5) The input key is s...
Embodiment 3
[0037] (1) When the user needs to input the key, turn on the universal random character number key input mode, that is, press and drag the mode;
[0038] (2). The encryption processor randomly generates a character string distribution table, which is displayed on the key prompt screen and the main screen. The user can manually reset or refresh. The main screen is a blank button, and the key prompt screen displays a blank key The content corresponding to the key, the key prompt screen prompt is set according to the encryption level, you can choose a fixed random prompt or a random prompt every time you enter;
[0039] (3) After the user views the randomly generated string table, the brain thinks of the key to be output according to the prompt on the key prompt screen;
[0040] (4) The user clicks the string anywhere on the main screen to start dragging, and the focus in the table starts to change. After changing to the string table that the user needs to input, the user release...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


