CN102117393A - Mobile terminal and password input method thereof - Google Patents

Mobile terminal and password input method thereof Download PDF

Info

Publication number
CN102117393A
CN102117393A CN2011100006485A CN201110000648A CN102117393A CN 102117393 A CN102117393 A CN 102117393A CN 2011100006485 A CN2011100006485 A CN 2011100006485A CN 201110000648 A CN201110000648 A CN 201110000648A CN 102117393 A CN102117393 A CN 102117393A
Authority
CN
China
Prior art keywords
keyboard
password
portable terminal
input method
cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011100006485A
Other languages
Chinese (zh)
Inventor
金鑫
王颖轩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou TCL Mobile Communication Co Ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN2011100006485A priority Critical patent/CN102117393A/en
Publication of CN102117393A publication Critical patent/CN102117393A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Input From Keyboards Or The Like (AREA)

Abstract

The embodiment of the invention provides a mobile terminal and a password input method thereof. The password input method of the mobile terminal comprises the following steps: a, providing a first password and a mapping relationship of a keyboard; b, mapping the first password into a second password according to the mapping relationship of the keyboard; c. providing a second keyboard and inputting a second password according to the second keyboard; and d, restoring the second keyboard into the first password according to the mapping relationship of the keyboard. According to the mobile terminal and the password input method of the mobile terminal, the first password can be prevented from being easily peeped by others or shot by monitoring equipment, and the like due to direct input, so that the benefits of users can be protected.

Description

Portable terminal cipher-code input method and portable terminal
Technical field
The present invention relates to a kind of portable terminal cipher-code input method and portable terminal.
Background technology
Along with the development of mobile communication equipment and wireless traffic, carry out wireless traffic more and more widely by various portable terminals (for example: mobile phone, personal digital assistant etc.).For example: the user can use WAP (wireless application protocol) by various portable terminals, and (Wireless Application Protocol, WAP) business transaction is carried out in various mobile financial services such as bank, user identification application development instrument (SIM Tool Kit) bank or note bank.
Wherein, when the user carries out business transaction by portable terminal, require the user to input number of the account and the legitimacy of password usually, guarantee to conclude the business and normally carry out to guarantee to conclude the business.The password input mode majority of existing portable terminal is to open to submit the password box mouth to, clicks the keyboard of portable terminal by the user, the numeral that input is corresponding or alphabetical, treat that input is finished after, click acknowledgement key to submit password to.
Yet when utilizing the keyboard input password of portable terminal in public, the password of being inputed may be spied on by other people, or monitored device is captured, may cause the problem that important password is revealed thus.
Summary of the invention
The portable terminal of technical matters prior art to be solved by this invention causes the password leakage easily when password is imported.
The technical scheme that the present invention adopts for the technical solution problem provides a kind of portable terminal cipher-code input method, and this portable terminal cipher-code input method may further comprise the steps:
Step a provides one first password and keyboard map relation;
Step b according to this keyboard map relation, is mapped as second password with this first password;
Step c provides one second keyboard, and utilizes this second keyboard to input this second password;
Steps d according to this keyboard map relation, is reduced to this first password with this second password.
According to one preferred embodiment of the present invention, before step a, comprise that further the prompting user inputs password.
According to one preferred embodiment of the present invention, in step a, at first be set by the user keyboard map relation, preserve this keyboard map relation after setting then.
According to one preferred embodiment of the present invention, be set by the user keyboard map relation and comprise step: at first, start the keyboard map change; Secondly, import the button of needs change successively according to prompting; Then, according to the prompting character of the actual mapping of input successively; Further, the character that shines upon according to prompting input reality once more; At last, preserve new mapping relations.
According to one preferred embodiment of the present invention, in step c, when this second password of input, provide the input cipher mode, this second password is occurred with encrypted form.
According to one preferred embodiment of the present invention, after steps d, comprise further according to this keyboard map relation one first keyboard is provided that the key arrangement of this first keyboard is different from the key arrangement of this second keyboard.
The present invention provides a kind of portable terminal for another technical scheme that the technical solution problem adopts, this portable terminal comprises: a Keysheet module, this Keysheet module provides one first keyboard and second keyboard, and the key arrangement of the key arrangement of this first keyboard and this second keyboard is different; And a mapping block, this mapping block is set up mapping relations between this first keyboard and second keyboard.
According to one preferred embodiment of the present invention, this portable terminal is mobile phone or personal digital assistant.
According to one preferred embodiment of the present invention, this first keyboard and this second keyboard are the virtual key keyboard.
In portable terminal cipher-code input method of the present invention and the portable terminal; by second password after the input mapping; but not directly input the first original password; thereby avoid this first password to be spied on by others easily or the captured equivalent risk of monitored device, further can protect user's interests because of directly importing.
Description of drawings
Fig. 1 is the partial function module diagram of portable terminal according to an embodiment of the invention;
Fig. 2 is the process flow diagram of cipher-code input method according to an embodiment of the invention.
Embodiment
The invention provides a kind of portable terminal, this portable terminal can be various electronic such as mobile phone or PDA(Personal Digital Assistant).
See also Fig. 1, Fig. 1 is according to the partial function module diagram that is the portable terminal of one embodiment of the invention, and this portable terminal comprises Keysheet module and mapping block.The main effect of this Keysheet module provides first keyboard and second keyboard, and this first keyboard and this second keyboard can be the virtual key keyboard, also can be the physical button keyboard.
The key arrangement of this first keyboard can be common keyboard layout of mobile phone.For example, this first keyboard comprises three row's digital keys, and wherein first row's digital keys is that 1,2,3, the second row's digital keys are that 4,5,6, the three row's digital keys are 7,8,9.Corresponding one first password of this first keyboard, wherein this first password is the real password that the user need express.
The key arrangement of this second keyboard is different with the key arrangement of this first keyboard, but has mapping relations each other, and these mapping relations can be to set in advance in this portable terminal, also can be afterwards by user-defined.For example, according to mapping relations, first row's digital keys of this second keyboard is that 9,6,3, the second row's digital keys are that 8,5,2, the three row's digital keys are 7,4,1.Therefore, when first password that utilizes this first keyboard to express as the user is 123456, then when utilizing this second keyboard to input second password, only need input 963852.That is to say that this first password can directly not imported by this first keyboard and this second keyboard, therefore can not spied on by other people or monitored device captured.
The main effect of this mapping block provides above-mentioned mapping relations, sets up mapping relations between this first keyboard and second keyboard.
Particularly, all corresponding key-press event (key event) of common one-touch, mobile-terminal platform can receive key-press event, and receive corresponding key assignments, for example on the BREW mobile-terminal platform, key assignments is a sexadecimal number, and the key assignments as 0~9 is 0xE021~0xE02A.After being activated as this mapping block, mobile-terminal platform is done corresponding conversion and is sent to application program again when receiving a certain key assignments.Corresponding to the first above-mentioned keyboard and the key arrangement example of second keyboard, user key-press " 1 ", mobile-terminal platform will be received key assignments 0xE021, be converted into 0xE02A and then it be dealt into the application program that receives password, be user key-press " 1 " and in the application program the actual key assignments of receiving be the key assignments of " 9 ", then be input as " 9 ", concrete mapping relations are as shown in the table:
Actual key assignments Corresponding button The mapping key assignments Actual input button
0xE021 0 0xE021 0
0xE022 1 0xE02A 9
0xE023 2 0xE027 6
0xE024 3 0xE024 3
0xE025 4 0xE029 8
0xE026 5 0xE026 5
0xE027 6 0xE023 2
0xE028 7 0xE028 7
0xE029 8 0xE025 4
0xE02A 9 0xE021 9
Wherein, when the user needs self-defined mapping relations, can realize: at first, start mapping block and carry out the keyboard map change by following steps; Secondly, import the button of needs change successively according to prompting; Then, according to the prompting character of the actual mapping of input successively; Further, the character that shines upon according to prompting input reality once more; At last, preserve new mapping relations.
See also Fig. 2, Fig. 2 is the process flow diagram of portable terminal cipher-code input method according to an embodiment of the invention.This portable terminal cipher-code input method may further comprise the steps:
Step S11, the prompting user inputs password; This prompting can also can come from application program from mobile-terminal platform.
Step S12 provides one first password and keyboard map relation; This first password is the real password that the user need express.Wherein, when providing this keyboard map to concern, at first, start the keyboard map change; Secondly, import the button of needs change successively according to prompting; Then, according to the prompting character of the actual mapping of input successively; Further, the character that shines upon according to prompting input reality once more; At last, preserve new mapping relations.
Step S13 according to this keyboard map relation, is mapped as second password with this first password; According to mapping relations, this second password should be different from this first password, and this second password will be directly visible to protect this first password as the password of direct input.
Step S14 provides one second keyboard, and utilizes this second keyboard to input this second password; Wherein, the mapping relations of this second keyboard and first keyboard can not repeat them here with reference to the actual key assignments and the description of shining upon key assignments of above-mentioned portable terminal.Wherein, when this second password of input, provide the input cipher mode, this second password is occurred with encrypted form, for example this second password appears on the display screen with the form of asterisk (*).
Step S15 according to this keyboard map relation, is reduced to this first password with this second password.
Step S16 provides first keyboard; After the password input process finishes, continue to be returned to normal first keyboard of key arrangement, after this Shu Ru content will be expressly to show.
In portable terminal cipher-code input method of the present invention and the portable terminal; by second password after the input mapping; but not directly input the first original password; thereby avoid this first password to be spied on by others easily or the captured equivalent risk of monitored device, further can protect user's interests because of directly importing.
The above only is embodiments of the invention; be not so limit claim of the present invention; every equivalent structure or equivalent flow process conversion that utilizes instructions of the present invention and accompanying drawing content to be done; or directly or indirectly be used in other relevant technical fields, all in like manner be included in the scope of patent protection of the present invention.

Claims (9)

1. a portable terminal cipher-code input method is characterized in that, this portable terminal cipher-code input method may further comprise the steps:
Step a provides one first password and keyboard map relation;
Step b according to this keyboard map relation, is mapped as second password with this first password;
Step c provides one second keyboard, and utilizes this second keyboard to input this second password;
Steps d according to this keyboard map relation, is reduced to this first password with this second password.
2. portable terminal cipher-code input method according to claim 1 is characterized in that, before step a, comprises that further the prompting user inputs password.
3. portable terminal cipher-code input method according to claim 1 is characterized in that, in step a, at first is set by the user keyboard map relation, preserves this keyboard map relation after setting then.
4. portable terminal cipher-code input method according to claim 3 is characterized in that, is set by the user keyboard map relation and comprises step: at first, start the keyboard map change; Secondly, import the button of needs change successively according to prompting; Then, according to the prompting character of the actual mapping of input successively; Further, the character that shines upon according to prompting input reality once more; At last, preserve new mapping relations.
5. portable terminal cipher-code input method according to claim 1 is characterized in that, in step c, when this second password of input, provides the input cipher mode, and this second password is occurred with encrypted form.
6. portable terminal cipher-code input method according to claim 1 is characterized in that, after steps d, comprises further according to this keyboard map relation one first keyboard is provided that the key arrangement of this first keyboard is different from the key arrangement of this second keyboard.
7. a portable terminal is characterized in that, this portable terminal comprises:
One Keysheet module, this Keysheet module provide one first keyboard and second keyboard, and the key arrangement of the key arrangement of this first keyboard and this second keyboard is different; And
One mapping block, this mapping block is set up mapping relations between this first keyboard and second keyboard.
8. portable terminal according to claim 7 is characterized in that, this portable terminal is mobile phone or personal digital assistant.
9. portable terminal according to claim 7 is characterized in that, this first keyboard and this second keyboard are the virtual key keyboard.
CN2011100006485A 2011-01-04 2011-01-04 Mobile terminal and password input method thereof Pending CN102117393A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100006485A CN102117393A (en) 2011-01-04 2011-01-04 Mobile terminal and password input method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100006485A CN102117393A (en) 2011-01-04 2011-01-04 Mobile terminal and password input method thereof

Publications (1)

Publication Number Publication Date
CN102117393A true CN102117393A (en) 2011-07-06

Family

ID=44216157

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100006485A Pending CN102117393A (en) 2011-01-04 2011-01-04 Mobile terminal and password input method thereof

Country Status (1)

Country Link
CN (1) CN102117393A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880305A (en) * 2012-09-24 2013-01-16 广东欧珀移动通信有限公司 Keyboard input encryption method and mobile terminal thereof
CN103853992A (en) * 2012-11-30 2014-06-11 国际商业机器公司 Method and device for receiving privacy-sensitive information input
CN104573476A (en) * 2013-10-09 2015-04-29 纬创资通股份有限公司 Electronic equipment and method for preventing password information from being peeped
WO2015078184A1 (en) * 2013-11-29 2015-06-04 天地融科技股份有限公司 Password input method and system
CN105335633A (en) * 2015-10-08 2016-02-17 广东欧珀移动通信有限公司 Mobile terminal anti-peeping method and mobile terminal
CN105787351A (en) * 2016-02-29 2016-07-20 宇龙计算机通信科技(深圳)有限公司 Password input control method and intelligent terminal
CN106027804A (en) * 2016-07-19 2016-10-12 努比亚技术有限公司 Unlocking method and unlocking apparatus of mobile terminal
CN106022017A (en) * 2016-05-06 2016-10-12 平安科技(深圳)有限公司 A method, a device and a system realizing password input via a virtual keyboard
CN106127062A (en) * 2016-06-23 2016-11-16 北京小米移动软件有限公司 unlocking method and device
CN106709294A (en) * 2015-11-12 2017-05-24 北京搜狗科技发展有限公司 User authentication method and apparatus
CN106778377A (en) * 2015-11-25 2017-05-31 中兴通讯股份有限公司 A kind of cipher-code input method and terminal
CN107657187A (en) * 2017-09-29 2018-02-02 百富计算机技术(深圳)有限公司 A kind of keyboard and input method and system applied to android system
CN108205617A (en) * 2016-12-19 2018-06-26 北京小米移动软件有限公司 Defend the method and device of password theft
CN109416715A (en) * 2016-07-20 2019-03-01 华为技术有限公司 A kind of method and terminal device of safety input password
CN111949957A (en) * 2020-08-11 2020-11-17 深圳传音控股股份有限公司 Privacy protection method, device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1892542A (en) * 2005-07-08 2007-01-10 尹赞 Cipher safety inputting method of intelligent communication terminal
CN101813992A (en) * 2010-05-07 2010-08-25 深圳视融达科技有限公司 Touch screen and password-inputting method thereof
CN101840270A (en) * 2010-04-28 2010-09-22 钱袋网(北京)信息技术有限公司 Password input method, equipment and communication terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1892542A (en) * 2005-07-08 2007-01-10 尹赞 Cipher safety inputting method of intelligent communication terminal
CN101840270A (en) * 2010-04-28 2010-09-22 钱袋网(北京)信息技术有限公司 Password input method, equipment and communication terminal
CN101813992A (en) * 2010-05-07 2010-08-25 深圳视融达科技有限公司 Touch screen and password-inputting method thereof

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880305A (en) * 2012-09-24 2013-01-16 广东欧珀移动通信有限公司 Keyboard input encryption method and mobile terminal thereof
CN103853992A (en) * 2012-11-30 2014-06-11 国际商业机器公司 Method and device for receiving privacy-sensitive information input
CN104573476A (en) * 2013-10-09 2015-04-29 纬创资通股份有限公司 Electronic equipment and method for preventing password information from being peeped
CN104573476B (en) * 2013-10-09 2017-09-29 纬创资通股份有限公司 Prevent electronic equipment and method that encrypted message is peeped
WO2015078184A1 (en) * 2013-11-29 2015-06-04 天地融科技股份有限公司 Password input method and system
CN105335633A (en) * 2015-10-08 2016-02-17 广东欧珀移动通信有限公司 Mobile terminal anti-peeping method and mobile terminal
CN105335633B (en) * 2015-10-08 2018-01-26 广东欧珀移动通信有限公司 A kind of mobile terminal glance prevention method and mobile terminal
CN106709294B (en) * 2015-11-12 2020-07-21 北京搜狗科技发展有限公司 User authentication method and device
CN106709294A (en) * 2015-11-12 2017-05-24 北京搜狗科技发展有限公司 User authentication method and apparatus
CN106778377A (en) * 2015-11-25 2017-05-31 中兴通讯股份有限公司 A kind of cipher-code input method and terminal
CN105787351A (en) * 2016-02-29 2016-07-20 宇龙计算机通信科技(深圳)有限公司 Password input control method and intelligent terminal
CN106022017A (en) * 2016-05-06 2016-10-12 平安科技(深圳)有限公司 A method, a device and a system realizing password input via a virtual keyboard
CN106022017B (en) * 2016-05-06 2019-07-02 平安科技(深圳)有限公司 The methods, devices and systems of Password Input are realized by dummy keyboard
CN106127062A (en) * 2016-06-23 2016-11-16 北京小米移动软件有限公司 unlocking method and device
CN106027804A (en) * 2016-07-19 2016-10-12 努比亚技术有限公司 Unlocking method and unlocking apparatus of mobile terminal
CN106027804B (en) * 2016-07-19 2020-11-27 泾县谷声信息科技有限公司 Unlocking method and unlocking device of mobile terminal
CN109416715A (en) * 2016-07-20 2019-03-01 华为技术有限公司 A kind of method and terminal device of safety input password
CN108205617A (en) * 2016-12-19 2018-06-26 北京小米移动软件有限公司 Defend the method and device of password theft
CN107657187A (en) * 2017-09-29 2018-02-02 百富计算机技术(深圳)有限公司 A kind of keyboard and input method and system applied to android system
CN111949957A (en) * 2020-08-11 2020-11-17 深圳传音控股股份有限公司 Privacy protection method, device and storage medium

Similar Documents

Publication Publication Date Title
CN102117393A (en) Mobile terminal and password input method thereof
US8478255B2 (en) Portable terminal device, address book transfer device, information display method and address book transfer method used in portable terminal device, and computer program
CA2969493C (en) System and method for enabling secure authentication
CN108769027B (en) Secure communication method, device, mobile terminal and storage medium
CN108012268A (en) A kind of mobile phone terminal SIM card and the method for safe handling App, medium
CN103971239A (en) Verification method and device
CN107086984A (en) A kind of method, terminal and server for obtaining and generating identifying code
CN104462949B (en) The call method and device of a kind of plug-in unit
CN101482962A (en) Service data processing terminal and service data processing method
CN105577375B (en) Identity verification method and device
CN103488922A (en) Method and equipment for providing verification code
CN102571359A (en) Method for certificating cloud desktop based on smart card
CN101790166A (en) Digital signing method based on mobile phone intelligent card
WO2017035945A1 (en) Method, device and system for marking conversation caller
CN102202297A (en) Method and device for encrypting mobile terminals
CN108573169A (en) Nearest task list display methods and device, storage medium, electronic equipment
CN104281272A (en) Password input processing method and device
CN104090688A (en) Password input method and device for mobile terminal
CN106851613A (en) Service request method, the verification method of business handling number and its terminal
WO2011108004A1 (en) Authentication method and device
CN201974884U (en) Vehicle-mounted system
CN108512803A (en) Remind the method and device of change account bound phone number
CN111242768A (en) Credit card information security obtaining method, device and system
CN101369895B (en) Method and mobile terminal for establishing connection with PC terminal
CN103281186A (en) Dynamic token based on Android system as well as transaction system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110706