CN102880305A - Keyboard input encryption method and mobile terminal thereof - Google Patents
Keyboard input encryption method and mobile terminal thereof Download PDFInfo
- Publication number
- CN102880305A CN102880305A CN2012103563540A CN201210356354A CN102880305A CN 102880305 A CN102880305 A CN 102880305A CN 2012103563540 A CN2012103563540 A CN 2012103563540A CN 201210356354 A CN201210356354 A CN 201210356354A CN 102880305 A CN102880305 A CN 102880305A
- Authority
- CN
- China
- Prior art keywords
- key
- function key
- keyboard
- user
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a keyboard input encryption method and terminal equipment thereof. The mobile terminal comprises an encryption setting module, a resetting encryption setting module, an encryption input module and a central processing unit. The method comprises the following steps of: (a) detecting whether a user presses a functional key, and if the user presses the functional key, executing the next step, otherwise, ending the detection; (b) judging a mode of the current user input keyboard by a system, if the mode is a common mode, directly outputting a typed functional key value through a keyboard, and if the mode is an encryption input mode, executing the next step; (c) judging whether the typed functional key value is exchanged with a key value of another functional key during encryption, if so, executing the next step, otherwise, directly outputting the functional key value; and (d) outputting the exchanged key value, and returning to the step (a). Aiming at a situation that a user uses mobile phone application to input sensitive information under a complicated environment, the encryption security of an input method is realized; a phenomenon that sensitive information acquired by the user is pried is avoided; fund loss of the user is prevented; and therefore, the user can securely execute relevant operation with a mobile phone, and the security of the mobile phone is also improved.
Description
Technical field
The present invention relates to a kind of keyboard and input method for password, particularly relate to a kind of keyboard input encryption method and portable terminal thereof for portable terminal.
Background technology
The development of intelligence giant-screen mobile phone has brought good user to experience, and has also promoted the application of various mobile Internets simultaneously.Wherein be no lack of some shopping Net silver class mobile phones and use, such as Alipay, Mobile banking etc.When the user concludes the business, if in the environment of more complicated, be easy to be spied upon the operation of keyboard click, thereby obtain user's account and password, use these softwares to bring potential potential safety hazard to the user.
Summary of the invention
The object of the invention is to overcome the deficiencies in the prior art, a kind of keyboard input encryption method and portable terminal thereof are provided, the user can be when the input privacy information, select encryption mode, thereby can't obtain correct information so that spy upon user keyboard operation person, guarantee the safety of customer transaction and fund.
In order to achieve the above object, the technical solution used in the present invention is a kind of keyboard input encryption method, be used for portable terminal, described portable terminal comprises that encryption arranges module, resetting to encrypt arranges module, encryption load module and CPU (central processing unit), and described method comprises
Encrypt setting, arbitrary function key that the user drags on the keyboard is placed on another function key, and the transposing of the key assignments of two function keys is clicked and preserved;
Reset to encrypt arrange, select the replacement Encryption Options, then system automatically removes last time and encrypts, and the arbitrary function key that is dragged on the keyboard by the user is placed on another function key, and the transposing of the key assignments of two function keys is clicked and preserved;
The user keys in the function key key assignments, and system automatically detects the active user and has or not and select to encrypt input pattern, and the function key of pressing has or not and change, and the key assignments after the then keyboard output transposing is arranged, otherwise output function key key assignments.
Further, described keyboard is numeric keypad, alphabetic keypad or QWERTY full keyboard.
Further, described function key is the combination of numeral, letter or number and letter.
Further, described function key key assignments transposing comprises a pair or more of function key key assignments transposing.
Further, described system automatically detects function key that the active user presses and has or not to change and comprise:
A. detecting the user and whether press function key, is then to carry out next step, otherwise detection of end;
B. the pattern of active user's input keyboard is judged by system, and general mode then keyboard is directly exported key entry function key key assignments, encrypts input pattern and then carries out next step;
C. the function key of judge keying in whether when encryption arranges and the key assignments of another function key exchange, be then to carry out next step, otherwise directly export this function key key assignments;
D. the key assignments after the output transposing returns step a.
A kind of portable terminal, described portable terminal comprises:
Encryption arranges module, is used for encrypting arranging, and arbitrary function key that the user drags on the keyboard is placed on another function key, and the transposing of the key assignments of two function keys is clicked and is saved to CPU (central processing unit);
Resetting to encrypt arranges module, and being used for resetting encrypting arranges, and selects the replacement Encryption Options, then system removes encryption last time automatically, and the arbitrary function key that is dragged on the keyboard by the user is placed on another function key, and the transposing of the key assignments of two function keys is clicked and is saved to CPU (central processing unit);
Encrypt load module, be used for selecting when the user need to encrypt input, select this module then with encryption mode output, otherwise keyboard exports with general mode, and the result is sent to CPU (central processing unit);
CPU (central processing unit) is used for the user and keys in the function key key assignments, and system automatically detects the active user and has or not and select to encrypt input pattern, and the function key of pressing has or not and change, and the key assignments after the then keyboard output transposing is arranged, otherwise output function key key assignments.
Further, described central location comprises:
Storer is used for storage encryption and module is set and resets and encrypt the function key that the module setting is set and exchange key assignments;
Detecting unit is used for receiving the function key of encrypting the load module input, and detects the user and whether press function key, and the result is sent to the first judging unit;
The first judging unit, be used for pattern general mode that the user judges active user's input keyboard then keyboard directly export and key in the function key key assignments, encrypt input pattern and then send to the second judging unit;
The second judging unit, whether the function key of be used for to judge keying in exchanges with the key assignments of another function key when encryption arranges, and is the key assignments of then carrying out after output is changed, otherwise directly exports this function key key assignments;
Further, output unit is used for output and keys in the function key key assignments.
Further, described portable terminal comprises mobile phone, E-book reader, computer, MP3, MP4 player.
Compared with prior art, the invention has the beneficial effects as follows: for using mobile phone to use the situation of carrying out the sensitive information input under user's complex environment, the cryptographic security of input method is provided, avoid spying upon the user and obtain sensitive information, avoid causing the fund loss to the user, so that the user uses mobile phone to carry out associative operation is safer, also promoted the security of mobile phone.
Description of drawings
Fig. 1 is method flow diagram of the present invention;
Fig. 2 is principle of the invention block diagram;
Fig. 3 is CPU (central processing unit) theory diagram of the present invention;
Fig. 4 is embodiment of the invention schematic diagram.
Embodiment
Be elaborated with reference to accompanying drawing below in conjunction with embodiment, in order to technical characterictic of the present invention and advantage are carried out more deep annotation.
A kind of keyboard input encryption method is used for portable terminal, described portable terminal comprise encrypt module is set, resetting to encrypt arranges module, encrypts load module and CPU (central processing unit), described method comprises,
Encrypt setting, arbitrary function key that the user drags on the keyboard is placed on another function key, and the transposing of the key assignments of two function keys is clicked and preserved;
Reset to encrypt arrange, select the replacement Encryption Options, then system automatically removes last time and encrypts, and the arbitrary function key that is dragged on the keyboard by the user is placed on another function key, and the transposing of the key assignments of two function keys is clicked and preserved;
The user keys in the function key key assignments, and system automatically detects the active user and has or not and select to encrypt input pattern, and the function key of pressing has or not and change, and the key assignments after the then keyboard output transposing is arranged, otherwise output function key key assignments.
Further, described keyboard is numeric keypad, alphabetic keypad or QWERTY full keyboard.
Further, described function key is the combination of numeral, letter or number and letter.
Further, described function key key assignments transposing comprises a pair or more of function key key assignments transposing.
Method flow diagram of the present invention as shown in Figure 1, described system automatically detects function key that the active user presses and has or not to change and comprise:
A. detecting the user and whether press function key, is then to carry out next step, otherwise detection of end;
B. the pattern of active user's input keyboard is judged by system, and general mode then keyboard is directly exported key entry function key key assignments, returns step a, encrypts input pattern and then carries out next step;
C. the function key of judge keying in whether when encryption arranges and the key assignments of another function key exchange, be then to carry out next step, otherwise directly export this function key key assignments, return step a;
D. the key assignments after the output transposing returns step a.
The theory structure block diagram of portable terminal of the present invention as shown in Figure 2, a kind of portable terminal, described portable terminal comprises:
Encryption arranges module, is used for encrypting arranging, and arbitrary function key that the user drags on the keyboard is placed on another function key, and the transposing of the key assignments of two function keys is clicked and is saved to CPU (central processing unit);
Resetting to encrypt arranges module, and being used for resetting encrypting arranges, and selects the replacement Encryption Options, then system removes encryption last time automatically, and the arbitrary function key that is dragged on the keyboard by the user is placed on another function key, and the transposing of the key assignments of two function keys is clicked and is saved to CPU (central processing unit);
Encrypt load module, be used for selecting when the user need to encrypt input, select this module then with encryption mode output, otherwise keyboard exports with general mode, and the result is sent to CPU (central processing unit);
CPU (central processing unit) is used for the user and keys in the function key key assignments, and system automatically detects the active user and has or not and select to encrypt input pattern, and the function key of pressing has or not and change, and the key assignments after the then keyboard output transposing is arranged, otherwise output function key key assignments.
CPU (central processing unit) theory structure block diagram of the present invention as shown in Figure 2, described central location comprises:
Storer is used for storage encryption and module is set and resets and encrypt the function key that the module setting is set and exchange key assignments;
Detecting unit is used for receiving the function key of encrypting the load module input, and detects the user and whether press function key, and the result is sent to the first judging unit;
The first judging unit, be used for pattern general mode that the user judges active user's input keyboard then keyboard directly export and key in the function key key assignments, encrypt input pattern and then send to the second judging unit;
The second judging unit, whether the function key of be used for to judge keying in exchanges with the key assignments of another function key when encryption arranges, and is the key assignments of then carrying out after output is changed, otherwise directly exports this function key key assignments;
Further, output unit is used for output and keys in the function key key assignments.
Further, described portable terminal comprises mobile phone, E-book reader, computer, MP3, MP4 player.
The specific embodiments of the invention schematic diagram as shown in Figure 4, can be when inputting sensitive information (account and password) the user, select encryption mode, thereby can't obtain correct information so that spy upon user keyboard operation person, guaranteed the safety of customer transaction and fund.Should encipherment scheme initiatively be set by the user, then when the input sensitive information, select encryption mode, can in input process, use the encipherment scheme of setting, guaranteed to input the leakage hidden danger that causes of spying on of also avoiding user on every side correct the time.
Encrypt to arrange: the setting of encipherment scheme is initiatively finished by the user, and the user can select simple or complicated scheme simultaneously, and this scheme has unpredictability, avoids encipherment scheme itself to be guessed and cause and divulge a secret.The user opens input method and uses, and provides two encipherment schemes that option is set, and comprises encipherment scheme, replacement encipherment scheme are set.Encipherment scheme being set the user is provided two kinds of keyboards---numeric keypad and alphabetic keypad, the user can be placed on other numerals (letter) arbitrarily dragging certain numeral (letter) on the keyboard, can realize the transposing of two buttons, clicks to get final product after preserving.In case after setting is finished, the user can't check it oneself is how encipherment scheme is set.If forget, can only select the encipherment scheme of resetting, the encipherment scheme that arranges before emptying.The numeric keypad of encipherment scheme arranges schematic diagram such as Fig. 4.
The user during sensitive information, clicks encryption mode in input in ejecting input method, this moment, the user can input according to the encipherment scheme of before setting.Such as input 1, what reality represented is 9, because both are changed in encipherment scheme, only knows that the user has inputted 1 and spy upon the user, thereby can't obtain accurate information.
Encipherment scheme provided by the present invention determines by the user, and other people can't predict this scheme in advance, and the user can determine the complicated and simple of this scheme simultaneously, can only change a pair of button or many to button, calls according to actual password situation.
Above content is in conjunction with concrete optimal way further description made for the present invention, should not assert that implementation of the present invention is confined to above explanation.For those skilled in the art, without departing from the inventive concept of the premise, can also make some simple deduction or replace, within the protection domain that the claim that all should be considered as being submitted to by the present invention is determined.
Claims (8)
1. keyboard input encryption method is used for portable terminal, it is characterized in that, described portable terminal comprise encrypt module is set, resetting to encrypt arranges module, encrypts load module and CPU (central processing unit), described method comprises,
Encrypt setting, arbitrary function key that the user drags on the keyboard is placed on another function key, and the transposing of the key assignments of two function keys is clicked and preserved;
Reset to encrypt arrange, select the replacement Encryption Options, then system automatically removes last time and encrypts, and the arbitrary function key that is dragged on the keyboard by the user is placed on another function key, and the transposing of the key assignments of two function keys is clicked and preserved;
The user keys in the function key key assignments, and system automatically detects the active user and has or not and select to encrypt input pattern, and the function key of pressing has or not and change, and the key assignments after the then keyboard output transposing is arranged, otherwise output function key key assignments.
2. keyboard according to claim 1 is inputted encryption method, and it is characterized in that: described keyboard is numeric keypad, alphabetic keypad or QWERTY full keyboard.
3. keyboard according to claim 2 is inputted encryption method, it is characterized in that: described function key is the combination of numeral, letter or number and letter.
4. keyboard according to claim 3 is inputted encryption method, it is characterized in that: described function key key assignments transposing comprises a pair or more of function key key assignments transposing.
5. keyboard according to claim 4 input encryption method is characterized in that, described system automatically detects function key that the active user presses and has or not to change and comprise:
A. detecting the user and whether press function key, is then to carry out next step, otherwise detection of end;
B. the pattern of active user's input keyboard is judged by system, and general mode then keyboard is directly exported key entry function key key assignments, encrypts input pattern and then carries out next step;
C. the function key of judge keying in whether when encryption arranges and the key assignments of another function key exchange, be then to carry out next step, otherwise directly export this function key key assignments;
D. the key assignments after the output transposing returns step a.
One kind according to claim 1-5 in the portable terminal of each described keyboard input encryption method, it is characterized in that, described portable terminal comprises:
Encryption arranges module, is used for encrypting arranging, and arbitrary function key that the user drags on the keyboard is placed on another function key, and the transposing of the key assignments of two function keys is clicked and is saved to CPU (central processing unit);
Resetting to encrypt arranges module, and being used for resetting encrypting arranges, and selects the replacement Encryption Options, then system removes encryption last time automatically, and the arbitrary function key that is dragged on the keyboard by the user is placed on another function key, and the transposing of the key assignments of two function keys is clicked and is saved to CPU (central processing unit);
Encrypt load module, be used for selecting when the user need to encrypt input, select this module then with encryption mode output, otherwise keyboard exports with general mode, and the result is sent to CPU (central processing unit);
CPU (central processing unit) is used for the user and keys in the function key key assignments, and system automatically detects the active user and has or not and select to encrypt input pattern, and the function key of pressing has or not and change, and the key assignments after the then keyboard output transposing is arranged, otherwise output function key key assignments.
7. portable terminal according to claim 6 is characterized in that, described central location comprises:
Storer is used for storage encryption and module is set and resets and encrypt the function key that the module setting is set and exchange key assignments;
Detecting unit is used for receiving the function key of encrypting the load module input, and detects the user and whether press function key, and the result is sent to the first judging unit;
The first judging unit, be used for pattern general mode that the user judges active user's input keyboard then keyboard directly export and key in the function key key assignments, encrypt input pattern and then send to the second judging unit;
The second judging unit, whether the function key of be used for to judge keying in exchanges with the key assignments of another function key when encryption arranges, and is the key assignments of then carrying out after output is changed, otherwise directly exports this function key key assignments;
Output unit is used for output and keys in the function key key assignments.
8. portable terminal according to claim 7, it is characterized in that: described portable terminal comprises mobile phone, E-book reader, computer, MP3, MP4 player.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012103563540A CN102880305A (en) | 2012-09-24 | 2012-09-24 | Keyboard input encryption method and mobile terminal thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012103563540A CN102880305A (en) | 2012-09-24 | 2012-09-24 | Keyboard input encryption method and mobile terminal thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102880305A true CN102880305A (en) | 2013-01-16 |
Family
ID=47481665
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012103563540A Pending CN102880305A (en) | 2012-09-24 | 2012-09-24 | Keyboard input encryption method and mobile terminal thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102880305A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103853993A (en) * | 2014-03-26 | 2014-06-11 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN104580160A (en) * | 2014-12-16 | 2015-04-29 | 上海天奕达电子科技有限公司 | Information interaction method and system |
CN104834840A (en) * | 2014-07-03 | 2015-08-12 | 中国人民解放军92728部队 | Password protection method based on mapping drifting technology |
CN105094355A (en) * | 2014-04-29 | 2015-11-25 | 联发科技(新加坡)私人有限公司 | Input method and related electronic device |
CN105430022A (en) * | 2015-12-31 | 2016-03-23 | 宇龙计算机通信科技(深圳)有限公司 | Data input control method and terminal equipment |
CN105739714A (en) * | 2016-01-20 | 2016-07-06 | 吴永 | Encrypted digital keyboard and encryption method |
CN107657187A (en) * | 2017-09-29 | 2018-02-02 | 百富计算机技术(深圳)有限公司 | A kind of keyboard and input method and system applied to android system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1871578A (en) * | 2003-10-24 | 2006-11-29 | 诺基亚有限公司 | Method for shifting a shortcut in an electronic device, a display unit of the device, and an electronic device |
CN1892542A (en) * | 2005-07-08 | 2007-01-10 | 尹赞 | Cipher safety inputting method of intelligent communication terminal |
CN201773387U (en) * | 2009-10-19 | 2011-03-23 | 华为终端有限公司 | Mobile terminal |
CN102117393A (en) * | 2011-01-04 | 2011-07-06 | 惠州Tcl移动通信有限公司 | Mobile terminal and password input method thereof |
-
2012
- 2012-09-24 CN CN2012103563540A patent/CN102880305A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1871578A (en) * | 2003-10-24 | 2006-11-29 | 诺基亚有限公司 | Method for shifting a shortcut in an electronic device, a display unit of the device, and an electronic device |
CN1892542A (en) * | 2005-07-08 | 2007-01-10 | 尹赞 | Cipher safety inputting method of intelligent communication terminal |
CN201773387U (en) * | 2009-10-19 | 2011-03-23 | 华为终端有限公司 | Mobile terminal |
CN102117393A (en) * | 2011-01-04 | 2011-07-06 | 惠州Tcl移动通信有限公司 | Mobile terminal and password input method thereof |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103853993A (en) * | 2014-03-26 | 2014-06-11 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN103853993B (en) * | 2014-03-26 | 2017-12-29 | 联想(北京)有限公司 | A kind of information processing method and electronic equipment |
CN105094355A (en) * | 2014-04-29 | 2015-11-25 | 联发科技(新加坡)私人有限公司 | Input method and related electronic device |
CN105094355B (en) * | 2014-04-29 | 2018-03-27 | 联发科技(新加坡)私人有限公司 | Input method and related electronic device |
CN104834840A (en) * | 2014-07-03 | 2015-08-12 | 中国人民解放军92728部队 | Password protection method based on mapping drifting technology |
CN104834840B (en) * | 2014-07-03 | 2018-05-08 | 中国人民解放军92728部队 | Cipher code protection method based on mapping drift technology |
CN104580160A (en) * | 2014-12-16 | 2015-04-29 | 上海天奕达电子科技有限公司 | Information interaction method and system |
CN105430022A (en) * | 2015-12-31 | 2016-03-23 | 宇龙计算机通信科技(深圳)有限公司 | Data input control method and terminal equipment |
CN105430022B (en) * | 2015-12-31 | 2019-10-11 | 宇龙计算机通信科技(深圳)有限公司 | A kind of data input control method and terminal device |
CN105739714A (en) * | 2016-01-20 | 2016-07-06 | 吴永 | Encrypted digital keyboard and encryption method |
CN105739714B (en) * | 2016-01-20 | 2018-08-17 | 吴永 | A kind of encryption numeric keypad and encryption method |
CN107657187A (en) * | 2017-09-29 | 2018-02-02 | 百富计算机技术(深圳)有限公司 | A kind of keyboard and input method and system applied to android system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102880305A (en) | Keyboard input encryption method and mobile terminal thereof | |
CN103065080B (en) | A kind of application program login method and device | |
CA2969493C (en) | System and method for enabling secure authentication | |
JP5808482B2 (en) | User terminal and payment system | |
CN104270517B (en) | Information ciphering method and mobile terminal | |
EP2650808A1 (en) | Method for integrating account management function in input method software | |
CN101794365B (en) | The method of safely inputting information and mobile terminal on mobile terminals | |
CN103971071B (en) | Computer network system for preventing input data from being recorded | |
CN105391678A (en) | Computer network system with single key fast and safe login function | |
WO2017084572A1 (en) | Encryption method for clear-text passwords | |
CN106951219A (en) | A kind of frame display methods and device | |
CN104732387A (en) | Electronic transaction between a mobile device, a touch panel device and a server | |
CN104636917A (en) | Mobile payment system and method with secure payment function | |
CN204069000U (en) | Mobile encrypted authenticate device | |
CN106203176A (en) | A kind of application encryption method and device | |
CN105204755A (en) | Soft keyboard operation method and terminal | |
CN105556893A (en) | Secure access of mobile devices using passwords | |
CN106851613A (en) | Service request method, the verification method of business handling number and its terminal | |
CN107563209A (en) | Touch-screen PIN input methods and device based on Android | |
CN201773387U (en) | Mobile terminal | |
CN106407847A (en) | Unlocking method and apparatus | |
CN108932441A (en) | The operation method and computing device of safety keyboard system, safety keyboard | |
JP2012194648A (en) | Authentication server, authentication system and authentication method of server | |
CN103942484A (en) | Security auxiliary device using mobile phone as carrier and identity authentication method | |
KR101319941B1 (en) | User authentication system by using touch pattern |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130116 |