Cipher safety inputting method of intelligent communication terminal

An intelligent communication terminal and password security technology, which is applied in the field of password security input of intelligent communication terminals, can solve the problems of key interception and user privacy threat, and achieve the effects of ensuring security, easy implementation and avoiding theft.

Inactive Publication Date: 2007-01-10
尹赞 +1
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the currently popular method of password verification for intelligent communication terminals is that when the user is prompted to enter a password, when the user performs a password input operation, the operation of the key is easily intercepted by these malicious programs, which poses a great threat to the user's personal privacy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher safety inputting method of intelligent communication terminal
  • Cipher safety inputting method of intelligent communication terminal
  • Cipher safety inputting method of intelligent communication terminal

Examples

Experimental program
Comparison scheme
Effect test

example

[0059] Example: A user uses a mobile phone to inquire about mobile phone bills

[0060] 1. The user uses the mobile phone to check the call charge

[0061] 2. After the user enters some query information, the system prompts the user to enter a 5-digit password (for example, the user wants to enter the password "62F34")

[0062] 3. A password prompt input box and

[0063] 12 (3×4) squares appear on the dynamic password input interface, and 0~9 numbers are randomly distributed among them.

[0064] (Refer to the attached picture "Schematic Diagram 1") The cursor stays on the first frame on the upper left

[0065] b Redefine the key-value interface and randomly regenerate each key with a new corresponding relationship on the interface.

[0066] For example, "key 6" on the display screen corresponds to key "key 5" on the mobile phone (see accompanying drawing "schematic diagram 2")

[0067] (Step 3 is completed" and the dynamic key-value arrangement interface appears)

[0068]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention reduces existent safety snag of intelligent communication terminal inputting code through 'direction key select input code' and 'key place redefinition inputting code' etc method in intelligent. The present invention can combine with existing variety encryption technique, wireless communications transmission technique to ensure user input data security and prevent input data illegally used, capable of being used in intelligent communication terminal code inputting field.

Description

technical field [0001] The invention relates to a password input method for an intelligent communication terminal. Background technique [0002] Communication technology is changing with each passing day, and new types of intelligent communication terminals, such as: mobile phones, PDAs, PDAs, etc., are constantly upgrading and upgrading, and new communication terminals are also emerging, followed by viruses, Trojan horse programs, and monitoring programs for intelligent communication terminals. The emergence of even hacker attacks. However, the current popular smart communication terminal input password verification method is that when the user is prompted to input the password, when the user performs the input password operation, the operation of the key is easily intercepted by these malicious programs, which brings great threats to the user's personal privacy. Contents of the invention [0003] The purpose of the present invention is to provide a safe and reliable pas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/023G06F3/033G06F21/36
Inventor 尹赞雷石平
Owner 尹赞
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products