CN1892542A - Cipher safety inputting method of intelligent communication terminal - Google Patents

Cipher safety inputting method of intelligent communication terminal Download PDF

Info

Publication number
CN1892542A
CN1892542A CNA200510082967XA CN200510082967A CN1892542A CN 1892542 A CN1892542 A CN 1892542A CN A200510082967X A CNA200510082967X A CN A200510082967XA CN 200510082967 A CN200510082967 A CN 200510082967A CN 1892542 A CN1892542 A CN 1892542A
Authority
CN
China
Prior art keywords
key assignments
character
key
communication terminal
intelligent communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200510082967XA
Other languages
Chinese (zh)
Inventor
尹赞
雷石平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA200510082967XA priority Critical patent/CN1892542A/en
Publication of CN1892542A publication Critical patent/CN1892542A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Input From Keyboards Or The Like (AREA)

Abstract

The present invention reduces existent safety snag of intelligent communication terminal inputting code through 'direction key select input code' and 'key place redefinition inputting code' etc method in intelligent. The present invention can combine with existing variety encryption technique, wireless communications transmission technique to ensure user input data security and prevent input data illegally used, capable of being used in intelligent communication terminal code inputting field.

Description

The cipher safety inputting method of intelligent communication terminal
Technical field
The present invention relates to the cipher-code input method of intelligent communication terminal.
Background technology
The intelligent communication terminal that mechanics of communication is with rapid changepl. never-ending changes and improvements, novel, as: mobile phone, palm PC, PDA etc., function constantly upgrades, and new communicating terminal also continues to bring out, the thing followed is virus, the trojan horse program of intelligent communication terminal, the appearance of watchdog routine, even assault.Yet the method for at present popular intelligent communication terminal input password authentification be the user when prompting requires the input password, when importing Password Operations, the processing ease of its button is intercepted and captured by these rogue programs, brings great threat for user's individual privacy.
Summary of the invention
The object of the present invention is to provide a kind of cipher-code input method of safe and reliable intelligent communication terminal.
For achieving the above object, the present invention is divided into to following two steps and comes complete operation:
Step 1 display screen shows key assignments dynamic arrangement interface.
Step 2 is selected code characters and is determined from key assignments is arranged.
Step 1 described " display screen shows key assignments dynamic arrangement interface " comprises following method
Distributed mode is arranged in b1, the zone: key assignments occurs in the viewing area of a regulation at random, and the position NULI character of can having vacant position in the zone occurs.
Arrange b2, fixed position: key assignments is transposition demonstration at random in a fixing position.
Method (b1), (b2) in,
Key assignments in the display screen interface " 1 " can be represented " No. 1 key " on the intelligent communication terminal, is character " 1 "
Key assignments in the display screen interface " 2 " can be represented " No. 2 keys " on the intelligent communication terminal, is character " 2 " and reaches " a, b, c "
Key assignments in the display screen interface " 3 " can be represented " No. 3 keys " on the intelligent communication terminal, is character " 3 " and reaches " d, e, f "
Key assignments in the display screen interface " 4 " can be represented " No. 4 keys " on the intelligent communication terminal, is character " 4 " and reaches " g, h, i "
Key assignments in the display screen interface " 5 " can be represented " No. 5 keys " on the intelligent communication terminal, is character " 5 " and reaches " j, k, l "
Key assignments in the display screen interface " 6 " can be represented " No. 6 keys " on the intelligent communication terminal, is character " 6 " and reaches " m, n, o "
Key assignments in the display screen interface " 7 " can be represented " No. 7 keys " on the intelligent communication terminal, is character " 7 " and reaches " p, q, r, s "
Key assignments in the display screen interface " 8 " can be represented " No. 8 keys " on the intelligent communication terminal, is character " 8 " and reaches " t, u, v "
Key assignments in the display screen interface " 9 " can be represented " No. 9 keys " on the intelligent communication terminal, is character " 9 " and reaches " w, x, y, z "
Key assignments in the display screen interface " 0 " can be represented " No. 0 key " on the intelligent communication terminal, is character " 0 ")
The concrete setting of the corresponding relation of (on the intelligent communication terminal with display screen on) and program is relevant between concrete key assignments.
Step 2 described " selecting code characters and definite from key assignments is arranged " comprises the following steps
C1, directionkeys are selected, and promptly direction of passage key moving cursor is to the code characters of choosing of password key assignments position;
Confirm the input of this code characters then
This step user can click the code characters of choosing on the corresponding key assignments by the directionkeys on the touch-screen.
This step user can have the voice command of directivity connotation by phonetic entry, controls cursor and moves on the code characters it is chosen.
C2, contraposition key are selected, and promptly use the button identical with the password present position to choose the character in the key assignments on the display screen;
This step user can click the code characters of choosing on the corresponding key assignments by the button on the touch-screen.
This step user can choose character in certain key assignments of display screen by the voice command that phonetic entry has a key assignments connotation.
The input step of c3, the input step that repeats c1 or repetition c2.
Password is submitted in the input of c4, the above-mentioned code characters of affirmation to.
Above-mentioned b1, b2, c1, c2, the logical relation of c3 is please consulted accompanying drawing " process flow diagram 1 " and " process flow diagram 2 " respectively.
Method (b1), (b2) in,
According to the actual size of display screen, can be with " numeral ", " letter ", and " special character ", " control character " is shown as one page separately, selects the corresponding page by page turning key.Also can be with " numeral ", " letter ", " special character ", " control character " distribute simultaneously and are presented in the key assignments of one page.
The concrete display mode of key assignments and the actual needs of program can carry out multiple mode and set.
Method (b1), (b2) in,
During input (voice, touch-screen, button input) letter " z " or " s ", may have options button four times, perhaps the situation of phonetic entry occurs as and reduces the possibility that password is cracked, and can carry out the adjustment of key assignments corresponding relation according to actual needs, for example:
Key assignments in the display screen interface " 1 " can be represented " No. 1 key " on the intelligent communication terminal, and expression character " 1 " reaches " a, b, c "
Key assignments in the display screen interface " 2 " can be represented " No. 2 keys " on the intelligent communication terminal, and expression character " 2 " reaches " d, e, f "
Key assignments in the display screen interface " 3 " can be represented " No. 3 keys " on the intelligent communication terminal, and expression character " 3 " reaches " g, h, i "
Key assignments in the display screen interface " 4 " can be represented " No. 4 keys " on the intelligent communication terminal, and expression character " 4 " reaches " j, k, l "
Key assignments in the display screen interface " 5 " can be represented " No. 5 keys " on the intelligent communication terminal, and expression character " 5 " reaches " m, n, o "
Key assignments in the display screen interface " 6 " can be represented " No. 6 keys " on the intelligent communication terminal, and expression character " 6 " reaches " p, q, r "
Key assignments in the display screen interface " 7 " can be represented " No. 7 keys " on the intelligent communication terminal, and expression character " 7 " reaches " s, t, u "
Key assignments in the display screen interface " 8 " can be represented " No. 8 keys " on the intelligent communication terminal, and expression numeral " 8 " reaches " v, w, x "
Key assignments in the display screen interface " 9 " can be represented " No. 9 keys " on the intelligent communication terminal, and expression numeral " 9 " reaches " y, z "
Key assignments in the display screen interface " 0 " can be represented " No. 0 key " on the intelligent communication terminal, expression numeral " 0 "
Method (b1), (b2) in,
" display screen shows key assignments dynamic arrangement interface "
Can regenerate once by character of every input, also can when switching input method, regenerate once,
Also can once import remaining unchanged in the cryptographic processes, can design adjustment according to actual needs.
Step (c1), (c2) in, the changeable key assignments input method status of user is finished various characters, special character, and the input of control character.
Character refers to: English alphabet, arabic numeral, other symbols
Control character refers to: direction moves, and current input is determined in cancellation input, finishes input, re-enters etc. on intelligent communication terminal by the predefined special operational function of program.
Special character refers to: special character refers to the character of non-alphanumeric
Beneficial effect
The method of operating of user cipher input that the present invention is perfect avoids encrypted message to be stolen, and has ensured userspersonal information's safety.Because method is simple, effective, enforcement is easy, can replace traditional input method of intelligent communication terminal, be widely used.
Specific embodiment
Below in conjunction with drawings and Examples the present invention is described further again:
Example: the user uses mobile phone to carry out the mobile phone charge inquiry
1, the user uses the mobile phones enquiring telephone expenses
2, after the user imported some Query Informations, the system prompt user inputed 5 passwords (for example the user wants to input password " 62F34 ")
3, eject on the mobile phone password prompt input frame and
Occur (3 * 4) 12 grids on a dynamic password inputting interface interface, 0 ~ 9 numeral is randomly dispersed in wherein.
(referring to accompanying drawing " synoptic diagram 1 ") cursor rests on upper left first lattice
B redefines on the interface, key assignments interface and at random each key is regenerated new corresponding relation.
For example " 6 key " on the display screen is corresponding is button " 5 key " (referring to accompanying drawing " synoptic diagram 2 ") on the mobile phone
(step 3 is finished " dynamic key assignments occurs and arrange the interface)
4, a user's direction of passage key, the position of moving cursor, choose the grid at " 6 " place, confirm that the input b user of this code characters learns by the key assignments corresponding relation of pointing out on the display screen by " acknowledgement key " then, " 6 key " on the display screen is corresponding is button " 5 key " on the mobile phone, that is to say, want input digit " 6 ", can finish input by the button on the mobile phone " 5 key "
5, a display screen regenerates dynamic password inputting interface (repeating step 3)
The interface can not regenerate yet, level of security according to the actual requirements and deciding
The b display screen regenerates and redefines key assignments interface (repeating step 3)
The interface can not regenerate yet, level of security according to the actual requirements and deciding
6, repeating step 4, the user finishes the input of numeral " 2 "
Step 6 has been finished the input of character " 2 "
7, the user is switched input method, switches to the English alphabet input state
A user's direction of passage key, the position of moving cursor, choose the grid at " F " place, press " affirmation " key three times then, the input b user who finishes this code characters learns that by the key assignments corresponding relation of pointing out on the display screen what " 6 key " was corresponding is " 1 key ", that is to say, want input character " F ", can finish input 3 times by " 5 key "
Step 7 has been finished the input of character " F "
8, the user is switched input method, switches to digital input state
Repeating step 4, the user finishes the input of character " 3 "
9, repeating step 4, the user finishes the input of character " 4 "
10, select display screen " to finish " key, finish the password input.
(finish step 4 ~ 10 " selects code characters, determines input ")
11, the authentication password correctness is if the password input error is got back to step 2. and then logged off above 3 times as the continous cipher input error.
12, the authentication password correctness if the password input is correct, then enters the telephone expenses inquiry system.
The cipher-code input method of intelligent communication terminal provided by the invention, can with existing multiple encryption technology, the wireless communication transmission technology combines, and can be useful for current GSM, GPRS, CDMA, 3G, WiFi (802.11b) and communication network such as bluetooth.Existing potential safety hazard when the present invention has greatly reduced intelligent communication terminal input password, but its application may be not limited to above unlisted wireless network and UMTS on the horizon (being called for short 3G) technology.

Claims (8)

1, the cipher safety inputting method of intelligent communication terminal is characterized in that, when requiring to input password or under the state of request input password, takes following steps:
A1, display screen show key assignments dynamic arrangement interface.
A2, from key assignments is arranged, select code characters and determine.
2, the cipher safety inputting method of intelligent communication terminal according to claim 1 is characterized in that, described key assignments refers to the set that shows a plurality of characters on a button simultaneously, can comprise one or more character in the key assignments.
3, the cipher safety inputting method of intelligent communication terminal according to claim 1 is characterized in that, described character comprises: numeral, letter, special character, control character.
4, the cipher safety inputting method of intelligent communication terminal according to claim 1 is characterized in that, described key assignments is arranged and is divided into:
Distributed mode is arranged in b1, the zone;
Arrange b2, fixed position.
Cipher safety inputting method according to claim 1 or 4 described intelligent communication terminals is characterized in that, distributed mode is arranged (b1) and be meant that key assignments occurs at random in the viewing area of a regulation in the described zone, and the position NULI character of can having vacant position in the zone occurs.According to the actual size of display screen, can be with " numeral ", " letter ", and " special character ", " control character " is shown as one page separately, selects the corresponding page by page turning key.Also can be with " numeral ", " letter ", " special character ", " control character " distribute simultaneously and are presented in some key assignments of one page.
According to the cipher safety inputting method of claim 1 or 4 described intelligent communication terminals, it is characterized in that 5, described fixed position is arranged (b2) and is meant, key assignments is transposition demonstration at random in a fixing position.According to the actual size of display screen, can be with " numeral ", " letter ", and " special character ", " control character " is shown as one page separately, selects the corresponding page by page turning key.Also can be with " numeral ", " letter ", " special character ", " control character " distribute simultaneously and are presented in the key assignments of one page.
6, the cipher safety inputting method of intelligent communication terminal according to claim 1 is characterized in that, the mode of code characters is divided into four kinds in the described selection key assignments:
C1, directionkeys are selected, and promptly direction of passage key moving cursor is to the code characters of choosing of password key assignments position;
C2, contraposition key are selected, and promptly use the button identical with the password present position to choose the character in the key assignments on the display screen;
C3, touch-screen select, can be divided into that (c1) directionkeys is selected and (c2) the contraposition key select two kinds of input modes, promptly use (c1) and mode (c2) on display screen, to put and choose code characters;
C4, voice selecting, can be divided into that (c1) directionkeys is selected and (c2) the contraposition key select two kinds of input modes, promptly use (c1) and mode (c2) to choose code characters by phonetic entry.
Promptly use the mode of (c1), have the voice command of directivity connotation, control cursor and move on the code characters it is chosen by phonetic entry.Perhaps use the mode of (c1), the voice command that phonetic entry has a key assignments connotation is chosen the character in certain key assignments of display screen.
7, the cipher safety inputting method of intelligent communication terminal according to claim 1 is characterized in that, code characters and definite method of operating are divided into three kinds in the described selection key assignments:
D1, key assignments interface dynamic random are arranged once, imported whole code characters after, determine input;
D2, choose a code characters, the key assignments interface again random alignment once or the key assignments interface remain unchanged and do not carry out permutatation.Repeat to determine input after being operated to of word selected whole code characters;
D3, according to the position corresponding, key position relation with the display screen character, select code characters on the display screen by the key assignments of selecting same position, determine then to import.
8, the cipher safety inputting method of intelligent communication terminal according to claim 1 is characterized in that, described intelligent communication terminal comprises: mobile phone, palm PC, PDA (personal digital assistant) or other have the intelligent terminal of communication function.
CNA200510082967XA 2005-07-08 2005-07-08 Cipher safety inputting method of intelligent communication terminal Pending CN1892542A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA200510082967XA CN1892542A (en) 2005-07-08 2005-07-08 Cipher safety inputting method of intelligent communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA200510082967XA CN1892542A (en) 2005-07-08 2005-07-08 Cipher safety inputting method of intelligent communication terminal

Publications (1)

Publication Number Publication Date
CN1892542A true CN1892542A (en) 2007-01-10

Family

ID=37597461

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200510082967XA Pending CN1892542A (en) 2005-07-08 2005-07-08 Cipher safety inputting method of intelligent communication terminal

Country Status (1)

Country Link
CN (1) CN1892542A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102063188A (en) * 2011-01-10 2011-05-18 北京天地融科技有限公司 Electronic signature tool and data input method thereof
CN102117393A (en) * 2011-01-04 2011-07-06 惠州Tcl移动通信有限公司 Mobile terminal and password input method thereof
CN101383833B (en) * 2008-10-24 2012-09-05 飞天诚信科技股份有限公司 Apparatus and method for enhancing PIN code input security of intelligent cipher key apparatus
CN102880305A (en) * 2012-09-24 2013-01-16 广东欧珀移动通信有限公司 Keyboard input encryption method and mobile terminal thereof
CN103853992A (en) * 2012-11-30 2014-06-11 国际商业机器公司 Method and device for receiving privacy-sensitive information input
WO2015054934A1 (en) * 2013-10-17 2015-04-23 东莞盛世科技电子实业有限公司 Authentication apparatus and authentication method
WO2015161565A1 (en) * 2014-04-24 2015-10-29 东莞盛世科技电子实业有限公司 Password verification device and password verification method
CN105787335A (en) * 2016-02-25 2016-07-20 东莞盛世科技电子实业有限公司 Switching control method and device for password input interface
CN105786382A (en) * 2016-02-25 2016-07-20 东莞盛世科技电子实业有限公司 Password input method and device based on direction recognition
CN106445389A (en) * 2016-10-13 2017-02-22 成都中科创达软件有限公司 Communication terminal key input control method and device and communication terminal
CN107122041A (en) * 2017-03-22 2017-09-01 广州阿里巴巴文学信息技术有限公司 Cipher-code input method, equipment, client device and virtual reality device
CN107203282A (en) * 2017-06-27 2017-09-26 厦门大学嘉庚学院 The cipher-code input method encoded based on UNICODE

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101383833B (en) * 2008-10-24 2012-09-05 飞天诚信科技股份有限公司 Apparatus and method for enhancing PIN code input security of intelligent cipher key apparatus
CN102117393A (en) * 2011-01-04 2011-07-06 惠州Tcl移动通信有限公司 Mobile terminal and password input method thereof
CN102063188A (en) * 2011-01-10 2011-05-18 北京天地融科技有限公司 Electronic signature tool and data input method thereof
CN102880305A (en) * 2012-09-24 2013-01-16 广东欧珀移动通信有限公司 Keyboard input encryption method and mobile terminal thereof
CN103853992A (en) * 2012-11-30 2014-06-11 国际商业机器公司 Method and device for receiving privacy-sensitive information input
US9881146B2 (en) 2013-10-17 2018-01-30 Smart Electronic Industrial (Dong Guan) Co., Ltd. Authenticating device and authenticating method
WO2015054934A1 (en) * 2013-10-17 2015-04-23 东莞盛世科技电子实业有限公司 Authentication apparatus and authentication method
RU2665222C2 (en) * 2013-10-17 2018-08-28 Смарт Электроник Индастриал (Дун Гуань) Ко., Лтд. Authenticity confirmation device and authenticity confirmation method
WO2015161565A1 (en) * 2014-04-24 2015-10-29 东莞盛世科技电子实业有限公司 Password verification device and password verification method
CN105786382A (en) * 2016-02-25 2016-07-20 东莞盛世科技电子实业有限公司 Password input method and device based on direction recognition
CN105787335A (en) * 2016-02-25 2016-07-20 东莞盛世科技电子实业有限公司 Switching control method and device for password input interface
CN105787335B (en) * 2016-02-25 2019-06-18 东莞盛世科技电子实业有限公司 Interface for password input method for handover control and device
CN106445389A (en) * 2016-10-13 2017-02-22 成都中科创达软件有限公司 Communication terminal key input control method and device and communication terminal
CN107122041A (en) * 2017-03-22 2017-09-01 广州阿里巴巴文学信息技术有限公司 Cipher-code input method, equipment, client device and virtual reality device
CN107203282A (en) * 2017-06-27 2017-09-26 厦门大学嘉庚学院 The cipher-code input method encoded based on UNICODE

Similar Documents

Publication Publication Date Title
CN1892542A (en) Cipher safety inputting method of intelligent communication terminal
CN1476721A (en) Projector for projecting password
CN101296457A (en) Screen operation method and device
CN102880398B (en) A kind of mobile phone unlock method and mobile phone based on random digit array
CN104008346B (en) The method and apparatus of the privacy mode of log-on data processing equipment
CN101980131A (en) Unlocking method, system and communication terminal
CN1675852A (en) Compound portable computing device with dual portion keyboard coupled over a wireless link
CN1564992A (en) Application level access privilege to a storage area on a computer device
CN1716979A (en) Utilize the unlock method of simplified pin code
CN1528066A (en) Apparatus and method for performing KASUMI ciphering
CN1933425A (en) Module and method for realizing equipment access interface, equipment access system and method
CN1859317A (en) Method and system for sharing presented information
CN105549826A (en) Mobile terminal and locking method of slide page thereof
CN101388059A (en) Screen key entry system for preventing trojan program and method thereof
CN101840270A (en) Password input method, equipment and communication terminal
CN101382975B (en) Method for inputting password
US20210150043A1 (en) Swappable double layer barcode
CN101561714A (en) Group password input method
CN1274169C (en) Method for limiting illegal mobile telephone
CN1812620A (en) Method for realizing right discriminating to network by terminal in CDMA network
CN1667637A (en) Method and apparatus for integrating fingerprint identification during computer booting on computer motherboard
CN102156544B (en) Multimodality code-word disorderly combined password input device
CN100347715C (en) Information processing method
CN1320798C (en) Cipher key creating and distributing method and the computer network system therewith
CN2836094Y (en) Universal serial bus transmission device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication