CN111125797A - Mobile equipment and safe input method thereof - Google Patents

Mobile equipment and safe input method thereof Download PDF

Info

Publication number
CN111125797A
CN111125797A CN201911338119.9A CN201911338119A CN111125797A CN 111125797 A CN111125797 A CN 111125797A CN 201911338119 A CN201911338119 A CN 201911338119A CN 111125797 A CN111125797 A CN 111125797A
Authority
CN
China
Prior art keywords
input
user
touch screen
less
input interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911338119.9A
Other languages
Chinese (zh)
Inventor
钱京
崔可
尤洪松
何碧波
底明辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Hengbao Intelligent System Technology Co Ltd
Original Assignee
Jiangsu Hengbao Intelligent System Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hengbao Intelligent System Technology Co Ltd filed Critical Jiangsu Hengbao Intelligent System Technology Co Ltd
Priority to CN201911338119.9A priority Critical patent/CN111125797A/en
Publication of CN111125797A publication Critical patent/CN111125797A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Abstract

The application discloses a mobile device and a safe input method thereof, wherein the method comprises the following steps: judging a region with less use of the touch screen; in response to invocation of the input interface, the input interface is displayed in the less-used area. Through the method and the device, the balanced abrasion of the touch screen can be realized, the password is different through inputting every time by the user, the problem that the password is stolen is solved, the safe unlocking of the touch screen is ensured, and meanwhile, the use habit and the use experience of the user are considered.

Description

Mobile equipment and safe input method thereof
Technical Field
The present application relates to the field of computers, and in particular, to a mobile device and a secure input method thereof.
Background
With the popularization and application of information technology, smart phones, tablet computers, and other mobile computing devices go deep into every corner in people's work and life. Some tasks may not pose a serious security risk, such as taking a picture with a camera of a mobile device. However, some tasks may pose security risks, such as using a mobile device to access an online banking transaction website to perform mobile payments.
The existing mobile device usually adopts a touch screen form to display and input information, for example, a password is often input through the touch screen, so as to complete functions of unlocking, mobile payment and the like. To ensure security, one solution is to require the password to have a minimum length (e.g., at least 8 characters) and/or a required entropy (e.g., having at least one letter and at least one number).
However, many users are unable to remember cumbersome passwords, eventually choose relatively simple passwords, and may be easily broken or otherwise guessed by brute force attacks. This is particularly true for mobile device users because the physical or virtual (on-screen) keyboard form factor is small in mobile devices, making password entry tedious and laborious. Further, the touch screen of the mobile device is worn to different degrees because the surface of the touch screen of the mobile device is marked after long-term touch. This situation may also lead to problems of password leakage or uneven wear of the touch screen.
Disclosure of Invention
Based on this, the application provides a secure input method suitable for a touch screen of a mobile device, which solves the problems in the prior art.
The application requests to protect a safe input method, which comprises the following steps: judging a region with less use of the touch screen; in response to invocation of the input interface, the input interface is displayed in the less-used area.
Preferably, when the input interface inputs the password information, the user is prompted to input the passwords according to a specific sequence according to the use habits of the user.
Preferably, wherein the usage habits of the user are obtained from user modeling.
Preferably, the display input interface is initially displayed in a less used area of the touch screen, and the user moves the display input interface along with the user when the user moves the hand.
Preferably, the position of the touch screen displaying the input keyboard each time is recorded, the position information of the displayed input keyboard is counted every preset time, and the areas of the display screen displaying the input keyboard less are judged, wherein the areas are the areas which are used less.
The application also claims a mobile device comprising the following components: a touch screen for displaying information and receiving input; the processor is used for judging a region which is less used by the touch screen; in response to the invocation of the input interface, the touch screen is caused to display the input interface in a less used area.
Preferably, when the password information is input on the input interface of the touch screen, the user is prompted to input the passwords in a specific order according to the use habits of the user.
Preferably, wherein the usage habits of the user are obtained from user modeling.
Preferably, the display input interface is initially displayed in a less used area of the touch screen, and the user moves the display input interface along with the user when the user moves the hand.
Preferably, the position of the input keyboard displayed each time is recorded, and the use frequency of the regions is judged to be less than the threshold value every predetermined time, and the regions less than the threshold value are regions less frequently used.
Through the method and the device, the balanced abrasion of the touch screen can be realized, the password is different through inputting every time by the user, the problem that the password is stolen is solved, the safe unlocking of the touch screen is ensured, and meanwhile, the use habit and the use experience of the user are considered.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a system configuration diagram of a mobile device of the present application.
Fig. 2 is a method flow diagram of a secure input method of a mobile device of the present application.
Detailed Description
The technical solutions in the embodiments of the present application are clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The present application provides a mobile device, as shown in fig. 1, the mobile device 100 includes the following components: a touch screen 110 and a processor 120, wherein:
the touch screen 110 is used for displaying information and receiving input, wherein a specific hardware structure of the touch screen 110 may be implemented by using a commercially available touch screen, which is not described herein again.
And the processor 120 is connected with the touch screen 110 and is used for judging a less-used area of the touch screen and responding to the calling of the input interface so that the touch screen displays the input interface in the less-used area.
Wherein the mobile device 100 performs the working method in the embodiments described below.
Example one
As shown in fig. 2, the secure input method of the present application includes the following steps:
step S210, judging a less used area of the touch screen;
recording the position of the touch screen displaying the input keyboard each time, counting the position information of the displayed input keyboard every preset time, and judging which areas of the display screen display the input keyboard less, wherein the areas are the areas which are used less.
Step S220, responding to the calling of the input interface, and displaying the input interface in a less used area;
when the system of the mobile device issues a command to invoke an input interface, the input interface is displayed in a less used area.
The less used regions in step S210 may be sorted, and the least used region may be selected for display in the input interface.
Example two
Further, on the basis of the first embodiment, the method further includes the following steps:
when the password information is input on the input interface, prompting the user to input the password according to a specific sequence according to the use habit of the user.
Specifically, after the less-used area on the touch screen displays the input interface, the user performs input. And responding to the instruction of inputting the password information, and prompting the user to input the passwords according to the fixed sequence according to the use habit of the user.
For example, if the user is accustomed to the right hand-held screen, the user is prompted that all passwords need to be fixed to enter a certain letter on the left side of the input interface, for example, the password is 1234, the user is prompted that each password needs to be entered before 0 on the left side of the input interface, and the password becomes 01020304.
The using habits of the user are obtained according to user modeling, and the user modeling comprises the following steps:
step P1, recognizing and recording the input mode of the user;
including the main area input by the user, the input frequency, the use duration and other information.
And step P2, inputting the input mode of the user into the modeling tool to obtain the use habit of the user.
The modeling tool is established in advance and comprises the following steps:
step M1, pre-constructing a user use habit library;
and the user use habit library stores a large amount of use habit preference information of the users.
Step M2, extracting the habit library used by the user;
and extracting required information from the user use habit library. For example by age or frequency of use.
Step M4, mining the frequent mode used by the user;
and mining frequent patterns of the use habits of the users from the extracted information. Such as a left-hand mode, a right-hand mode, etc.
Step M5, generating association rules according to the mined frequent patterns, wherein the statistical user use habits and the generated association rules form a user model;
taking the left-handed mode as an example, an association rule is generated for the mode according to the usage habit of the user, for example, a rule that the left-side input exceeds a predetermined threshold value.
EXAMPLE III
The display of the input interface and the working method for inputting the password are described through the first embodiment and the second embodiment, and further, after the input interface is initially displayed in an area which is less used by the touch screen, the application further includes a third embodiment that the input interface is displayed along with the movement of the user when the user moves the hand.
The processor detects the operation of a finger of a user on the touch screen, calculates the pressing time length of the finger when the finger pressing operation is detected, and displays an input interface at the current position of the finger when the time length threshold value is met.
Further, the processor can detect the number of fingers, judge the specific positions of the fingers and display the input interface according to the specific position distribution of the fingers. For example, when it is determined that the finger is 4 fingers, the position of the middle finger is determined, and the input interface is displayed in accordance with the position of the middle finger.
Specifically, the storage medium can be a general-purpose storage medium, such as a removable disk, a hard disk, or the like, and when a computer program on the storage medium is executed, the method for issuing an eSIM certificate online can be performed.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments provided in the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus once an item is defined in one figure, it need not be further defined and explained in subsequent figures, and moreover, the terms "first", "second", "third", etc. are used merely to distinguish one description from another and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the present disclosure, which should be construed in light of the above teachings. Are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A secure input method comprising the steps of:
judging a region with less use of the touch screen;
in response to invocation of the input interface, the input interface is displayed in the less-used area.
2. The security input method of claim 1, wherein the user is prompted to input the passwords in a specific order according to the user's usage habits when inputting the password information in the input interface.
3. The secure input method of claim 2, wherein the usage habits of the user are obtained from user modeling.
4. The security input method of claim 1, wherein the display input interface follows user movement of the display input interface as the user moves after being initially displayed in a less used area of the touch screen.
5. The security input method of claim 1, wherein the position of the touch screen displaying the input keypad each time is recorded, and the position information of the displayed input keypad is counted every predetermined time to determine which regions of the display screen display less the displayed input keypad, which are less used regions.
6. A mobile device comprising the following components:
a touch screen for displaying information and receiving input;
the processor is used for judging a region which is less used by the touch screen; in response to the invocation of the input interface, the touch screen is caused to display the input interface in a less used area.
7. The mobile device of claim 6, wherein when the password information is input through the input interface of the touch screen, the user is prompted to input the passwords in a specific order according to the user's usage habits.
8. The mobile device of claim 6, wherein the usage habits of the user are obtained from user modeling.
9. The mobile device of claim 6, wherein the display input interface follows user movement as the user moves after being initially displayed in the less used area of the touch screen.
10. The mobile device of claim 6, wherein the location of each time the input keyboard is displayed is recorded, and at predetermined intervals, it is determined which regions are used less frequently than a threshold, and the regions less frequently used are regions less frequently used.
CN201911338119.9A 2019-12-23 2019-12-23 Mobile equipment and safe input method thereof Pending CN111125797A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911338119.9A CN111125797A (en) 2019-12-23 2019-12-23 Mobile equipment and safe input method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911338119.9A CN111125797A (en) 2019-12-23 2019-12-23 Mobile equipment and safe input method thereof

Publications (1)

Publication Number Publication Date
CN111125797A true CN111125797A (en) 2020-05-08

Family

ID=70501240

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911338119.9A Pending CN111125797A (en) 2019-12-23 2019-12-23 Mobile equipment and safe input method thereof

Country Status (1)

Country Link
CN (1) CN111125797A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150100911A1 (en) * 2013-10-08 2015-04-09 Dao Yin Gesture responsive keyboard and interface
US20180095603A1 (en) * 2015-04-13 2018-04-05 International Business Machines Corporation Management of a touchscreen interface of a device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150100911A1 (en) * 2013-10-08 2015-04-09 Dao Yin Gesture responsive keyboard and interface
US20180095603A1 (en) * 2015-04-13 2018-04-05 International Business Machines Corporation Management of a touchscreen interface of a device

Similar Documents

Publication Publication Date Title
US9760707B2 (en) Unlocking electronic devices using touchscreen input gestures
US9038166B2 (en) Method and apparatus for authenticating password of user terminal
US9430144B1 (en) Unlocking electronic devices with touchscreen input gestures
JP2014512041A (en) System and method for secure data entry fields
CN106959841A (en) The call method and device of function in a kind of application
US10664084B2 (en) Systems and methods for increased security in authentication code entry for touch-sensitive screen enabled devices
CN105677182A (en) Information processing method and terminal
CN104598786B (en) A kind of cipher-code input method and device
CN106355059A (en) Password input method and terminal
CN103543951A (en) Electronic device with touch screen and unlocking method thereof
CN102880305A (en) Keyboard input encryption method and mobile terminal thereof
CN104077065A (en) Method for displaying virtual keyboard by touch screen terminal and touch screen terminal
EP2924549A1 (en) Input method and apparatus of touch screen electronic device
Sen et al. Inferring smartphone keypress via smartwatch inertial sensing
CN110658976A (en) Touch track display method and electronic equipment
CN111125797A (en) Mobile equipment and safe input method thereof
US20210165567A1 (en) System and method for a keypad on a touch screen device
US20210390177A1 (en) Emulator Detection Through User Interactions
KR101362839B1 (en) method of displaying mouse cursor
CN110087235B (en) Identity authentication method and device, and identity authentication method and device adjustment method and device
CN105320906B (en) The method and apparatus of information of mobile terminal safeguard protection
EP3460699A1 (en) Systems and methods for increased security in authentication code entry for touch-sensitive screen enabled devices
US20190073117A1 (en) Virtual keyboard key selections based on continuous slide gestures
CN106557260B (en) Handwriting input method and device
TW201001223A (en) Input method of hand-drawn graphical password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination