Unlock instant, AI-driven research and patent intelligence for your innovation.

Keyboard generation method, security information input method and device, mobile terminal

A technology of security information and generating device, applied in the field of network security, can solve problems such as inability to completely solve risks, and achieve the effect of increasing difficulty

Active Publication Date: 2021-05-18
BEIJING HAITAI FANGYUAN HIGH TECH
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although many applications adopt custom random layout keyboards to solve such problems and reduce risks, such solutions cannot completely solve the existence of risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Keyboard generation method, security information input method and device, mobile terminal
  • Keyboard generation method, security information input method and device, mobile terminal
  • Keyboard generation method, security information input method and device, mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0091] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0092] Before discussing the example embodiments in greater detail, it should be mentioned that the specific structural and functional details of some example embodiments disclosed herein are merely representative and are for purposes of describing example embodiments of the invention. Purpose. This invention may, however, be embodied in many alternative forms and should not be construed as limited to only the embodiments set forth herein.

[0093] It will be understood that although the terms "first", "second", etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, withou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a keyboard generation method for security information input, a mobile terminal-based security information input method and device, and a mobile terminal. Wherein, the method for generating a keyboard for safety information input: determine the keys included in the keyboard used as safety information input; divide the keys into a first key set and a second key set; wherein, when the first When the first element in a key set is clicked, the second element corresponding to the first element is determined according to the preset rules, and the key information of the second element is read; the keyboard is drawn and displayed. The invention divides a certain number of key positions on the keyboard to form a dislocation relationship, prevents others from peeping and memorizing personal password information, and at the same time increases the difficulty for malicious programs to monitor key position input.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a keyboard generation method for security information input, a mobile terminal-based security information input method and device, and a mobile terminal. Background technique [0002] At present, when important information or relatively sensitive information is input on a mobile device, there is a risk of being spied on by others or stolen by a malicious program, for example, a mobile device based on an Android system. Although many applications solve such problems and reduce risks by customizing keyboards with random layouts, such solutions cannot completely solve the existence of risks. Contents of the invention [0003] In order to overcome the above-mentioned problems in the prior art at least to a certain extent, the present invention provides a method for generating a keyboard for inputting security information, a method and device for inputting security informat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/023
CPCG06F3/0238
Inventor 刘阔李鹏坤安晓江
Owner BEIJING HAITAI FANGYUAN HIGH TECH