Anti-peeping secret key input method for mobile phone

An input method and anti-peeping technology, applied in the direction of internal/peripheral computer component protection, digital data authentication, etc., can solve the problems of poor convenience and security, achieve high security, reduce the risk of key eavesdropping, and improve convenience sexual effect

Pending Publication Date: 2019-12-03
XIDIAN UNIV
View PDF13 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the above-mentioned defects in the prior art, and provide a key input method for mobile phone anti-peeping, aiming to solve the technical problem of poor convenience and security of mobile phone key input in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-peeping secret key input method for mobile phone
  • Anti-peeping secret key input method for mobile phone
  • Anti-peeping secret key input method for mobile phone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Below in conjunction with accompanying drawing and specific embodiment, the present invention is described in further detail:

[0026] refer to figure 1 , the present invention comprises the following steps:

[0027] Step 1) divide the mobile phone keyboard, such as figure 2 Shown:

[0028] Divide the mobile phone keyboard into the first number set key (1) composed of number keys 1-5, the second number set key (2) composed of number keys 6-0, and the first letter set composed of letter keys a-e Set key (3), the second letter set key (4) made up of letter keys f~j, the third letter set key (5) made up of letter keys k~o, the fourth letter set key made up of letter keys p~t Letter set key (6) and the fifth letter set key (7) composed of letter keys u~z, special symbol set key (8) composed of all special symbol keys, confirmation key, forward key, backward key and delete key The modification set key (9) that key is formed, and the different characters on each key in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anti-peeping secret key input method for a mobile phone, which aims to avoid secret key leakage caused by peeping when a mobile phone user uses the mobile phone to input a secret key in a public occasion. The method comprises the following implementation steps: dividing keys on a mobile phone keyboard into a plurality of set keys; the mobile phone user selecting a set keyaccording to a secret key which needs to be input by himself / herself; representing a Morse code of a random character of the set key selected by the user through mobile phone vibration; the user determining the number of character position cyclic backward movement times according to the number of mobile phone vibration times and inputs a secret key; and judging whether the secret key reaches themaximum digit or not, if so, completing secret key input, and otherwise, inputting the next secret key. The mobile phone keys are rearranged and the mobile phone vibration prompt is used for assistingthe user to input the secret key, so that the secret key is prevented from being leaked due to peeping of the keyboard when the secret key is input, any additional auxiliary equipment is not needed,and the safety and convenience are ensured.

Description

technical field [0001] The invention belongs to the technical field of security key input, and relates to a key input method of an intelligent terminal device, in particular to a key input method for preventing peeping of mobile phones. Background technique [0002] As the functions of mobile phones are becoming more and more abundant in our daily life, mobile payment methods such as Alipay and WeChat Pay that use mobile phones for key input have been born. The behavior of mobile phone key input through mobile payment can be seen everywhere in life. The simple and fast way has brought a lot of convenience to the lives of ordinary people. In the mobile payment scenario, people mainly use the security keyboard to manually enter the key to complete the transfer or payment. However, when people use the security keyboard to enter the key in public places, it is very likely that the key will be leaked. For example, some criminals will steal the key by peeping at the mobile phone ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/45G06F21/84
CPCG06F21/45G06F21/84
Inventor 兰博文刘志宏曾勇罗维东万欣宜马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products