CN103076988A - Password input method and device - Google Patents

Password input method and device Download PDF

Info

Publication number
CN103076988A
CN103076988A CN2012105878121A CN201210587812A CN103076988A CN 103076988 A CN103076988 A CN 103076988A CN 2012105878121 A CN2012105878121 A CN 2012105878121A CN 201210587812 A CN201210587812 A CN 201210587812A CN 103076988 A CN103076988 A CN 103076988A
Authority
CN
China
Prior art keywords
code keypad
password
input
user
keyboard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012105878121A
Other languages
Chinese (zh)
Inventor
曲焕文
陈泽瀛
于卫国
楚洪武
宁刚
张慧聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHINAUMS Co Ltd
Original Assignee
CHINAUMS Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHINAUMS Co Ltd filed Critical CHINAUMS Co Ltd
Priority to CN2012105878121A priority Critical patent/CN103076988A/en
Publication of CN103076988A publication Critical patent/CN103076988A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Input From Keyboards Or The Like (AREA)

Abstract

The invention provides a password input method and device. When an input focus is positioned in a password input frame, a password keyboard embedded in a user interface is activated and displayed, and a password input by a user is obtained through the password keyboard. According to the password input method and device, since the password input by the user is obtained through the password keyboard embedded in the user interface, the occurrence that the password is obtained by a Trojan horse program through the methods of intercepting input of a hardware keyboard, screen shooting of a software keyboard and the like is avoided, as the password keyboard is embedded inside the user interface, essentially the password keyboard is seen as a part of the user interface, a system incident can not be triggered, and the password can not be stolen even by a fishing program. By the adoption of the password input method and device, the safety of password input is improved.

Description

A kind of cipher-code input method and device
Technical field
The present invention relates to the Ciphor safety technology field, relate in particular to a kind of cipher-code input method and device.
Background technology
Bank card password is highstrung private information, in various payment systems, all needs bank card password is done careful protection.
In vogue along with ecommerce, the trade deal on the network has become a kind of current popular method of commerce, and the terminal devices such as mobile phone, computer are as the mobile payment instrument of an opening, ATM and POS machine side face more security threat relatively.
The inventor finds in realizing process of the present invention: may implanted trojan horse program and the fishing program of stealing bank card password in user's mobile phone or the computer.
Summary of the invention
The invention provides a kind of cipher-code input method and device, the problem of easily being stolen by wooden horse, fishing supervisor at the password of the terminal devices such as mobile phone, computer input in order to solve the user, its technical scheme is as follows:
A kind of cipher-code input method comprises:
When input focus was positioned at the Password Input frame, activation was embedded in the code keypad of user interface inside and shows described code keypad;
Obtain the password of user's input by described code keypad.
Preferably, said method also comprises: when activation is embedded in the code keypad of user interface inside, and the shielding harness keyboard.
Preferably, said method also comprises: when described code keypad is activated, the button of described code keypad is carried out random alignment.
Preferably, said method also comprises: be encrypted by the password of RSA asymmetric encryption mode to user's input.
Preferably, said method also comprises: the putting in order of password that the user who obtains inputs upset, with described the putting in order of form record of chained list.
Preferably, described code keypad is responded the user to the click of described code keypad button by voice signal.
Preferably, described activation is embedded in the code keypad of user interface inside and shows that described code keypad is specially:
Call the code keypad of single frames layout Frame Layout the inside, so that described code keypad appears in one's mind on user interface, described Frame Layout is positioned on the interface of the keyboard that need to access to your password.
A kind of cipher input comprises: active module, display module and acquisition module;
Described active module is used for activating the code keypad that is embedded in user interface inside when input focus is positioned at the Password Input frame;
Described display module is used for showing described code keypad when described code keypad is activated;
Described acquisition module is used for obtaining the password that the user inputs by described code keypad.
Preferably, said apparatus also comprises: shroud module;
Described shroud module is used for when activation is embedded in the code keypad of user interface inside the shielding harness keyboard.
Preferably, said apparatus also comprises: arrange module;
Described arrangement module is used for when described code keypad is activated, and the button of described code keypad is carried out random alignment.
Cipher-code input method provided by the invention and device, when input focus was positioned at the Password Input frame, activation was embedded in the code keypad of user interface inside and shows described code keypad, obtained the password of user's input by code keypad.Because cipher-code input method provided by the invention and device obtain the password of user's input by the code keypad that is embedded in user interface inside, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss, and, because code keypad is embedded in user interface inside, a part of regarding in essence user interface as, it can the triggering system event, therefore, the fishing program also just can't snatch password, the security that cipher-code input method provided by the invention and device have improved Password Input.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, the below will do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art, apparently, accompanying drawing in the following describes only is embodiments of the invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to the accompanying drawing that provides other accompanying drawing.
The schematic flow sheet of the cipher-code input method that Fig. 1 provides for the embodiment of the invention one;
The schematic flow sheet of the cipher-code input method that Fig. 2 provides for the embodiment of the invention two;
The schematic flow sheet of the cipher-code input method that Fig. 3 provides for the embodiment of the invention three;
The structural representation of the code keypad that Fig. 4 provides for the embodiment of the invention three;
The schematic flow sheet of the cipher-code input method that Fig. 5 provides for the embodiment of the invention four;
The chain sheet form schematic diagram of the password that Fig. 6 provides for the embodiment of the invention four;
The structural representation of the cipher input that Fig. 7 provides for the embodiment of the invention five;
The structural representation of the cipher input that Fig. 8 provides for the embodiment of the invention six;
The structural representation of the cipher input that Fig. 9 provides for the embodiment of the invention seven;
The structural representation of the cipher input that Figure 10 provides for the embodiment of the invention eight.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that obtains under the creative work prerequisite.
Embodiment one
The embodiment of the invention one provides a kind of cipher-code input method, and Fig. 1 is the schematic flow sheet of the method, and the method can comprise:
S11: when input focus is positioned at the Password Input frame, activate the code keypad and the display password keyboard that are embedded in user interface inside.
S12: the password that obtains user's input by code keypad.
The cipher-code input method that the embodiment of the invention one provides, obtain the password of user's input by the code keypad that is embedded in user interface inside, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss.And, because the code keypad in the embodiment of the invention one is embedded in user interface inside, a part of regarding in essence user interface as, it can the triggering system event, be when code keypad shows, when hide the variation that can not cause system state, and the mode that the fishing program snatches password is: the monitoring system event, carry out Password Input in case find the system call keyboard, the system of hiding keyboard, the display false keyboard snatches password, because the code keypad of the embodiment of the invention can not cause the variation of system state, therefore, the fishing program also just can't snatch password.The cipher-code input method that the embodiment of the invention one provides has improved the security of Password Input.
Embodiment two
The embodiment of the invention two provides a kind of cipher-code input method, and Fig. 2 is the schematic flow sheet of the method, and the method can comprise:
S21: when input focus is positioned at the Password Input frame, activate the code keypad and the display password keyboard that are embedded in user interface inside.
S22: shielding harness keyboard.
Wherein, system's keyboard can comprise: system's soft keyboard and system hardware keyboard.
S23: the password that obtains user's input by code keypad.
The cipher-code input method that the embodiment of the invention two provides, obtain the password of user's input by the code keypad that is embedded in user interface inside, and, when code keypad is activated, with system's keyboard shielding, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss, simultaneously, avoided the maloperation of user for system's keyboard.And, because the code keypad in the embodiment of the invention two is embedded in user interface inside, regard in essence the part of user interface as, it can the triggering system event, and therefore, the fishing program also just can't snatch password.The cipher-code input method that the embodiment of the invention two provides has improved the security of Password Input.
Embodiment three
The embodiment of the invention three provides a kind of cipher-code input method, and Fig. 3 is the schematic flow sheet of the method, and the method can comprise:
S31: when input focus is positioned at the Password Input frame, activate the code keypad and the display password keyboard that are embedded in user interface inside.
S32: the button of code keypad is carried out random alignment.
In order to improve the security of Password Input, when code keypad is activated demonstration, the order of code keypad button is carried out random alignment, code keypad is activated when showing at every turn, all will carry out random alignment to the order of code keypad button.
S33: shielding harness keyboard.
Wherein, system's keyboard can comprise: system's soft keyboard and system hardware keyboard.
S34: the password that obtains user's input by code keypad.
The button of code keypad monitoring users receives the also password of recording user input.In the present embodiment, as shown in Figure 4, be attached to when code keypad is activated on the Password Input frame, the user shows an asterisk " * " in the corresponding Password Input frame behind password of code keypad input, and the Password Input frame is not preserved true password.
S35: be encrypted by the password of RSA asymmetric encryption mode to user's input.
In the present embodiment, the password of by RSA asymmetric encryption mode the user being inputted is encrypted and is specially: a RSA PKI is sent to code keypad, make code keypad utilize this RSA PKI that the password of user's input is carried out rsa encryption.Encrypted message after encrypting is sent to background server be decrypted, in order to ensure the safety of password in Internet Transmission, the private key corresponding with the RSA PKI is positioned over background server.In the present embodiment, can adopt the PKCS1 filling algorithm to be encrypted.
The cipher-code input method that the embodiment of the invention three provides, obtain the password of user's input by the code keypad that is embedded in user interface inside, and, when code keypad is activated, with system's keyboard shielding, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss, simultaneously, avoided the maloperation of user for system's keyboard.And, because the code keypad in the embodiment of the invention three is embedded in user interface inside, a part of regarding in essence user interface as, it can the triggering system event, be when code keypad shows, when hides the variation that can not cause system state, therefore, fishing program also just can't snatch password.The cipher-code input method that the embodiment of the invention three provides has improved the security of Password Input.In addition, to the random alignment of code keypad button and the user is inputted password be encrypted, further improved the security of Password Input.
Embodiment four
The embodiment of the invention four provides a kind of cipher-code input method, and Fig. 5 is the schematic flow sheet of the method, and the method can comprise:
S41: when input focus is positioned at the Password Input frame, activate the code keypad and the display password keyboard that are embedded in user interface inside.
In the present embodiment, code keypad and display password keyboard that activation is embedded in user interface inside are specially: the code keypad that calls single frames layout Frame Layout the inside, code keypad is appeared in one's mind on user interface, wherein, Frame Layout is positioned on the interface of the keyboard that need to access to your password.
S42: the button of code keypad is carried out random alignment.
In order to improve the security of Password Input, when code keypad is activated demonstration, the order of code keypad button is carried out random alignment.
S43: shielding harness keyboard.
Wherein, system's keyboard can comprise: system's soft keyboard and system hardware keyboard.
S44: the password that obtains user's input by code keypad.
In the present embodiment, when the user clicks button on the code keypad and carries out the input of password, the various show states of cancellation code keypad button make code keypad not make vision to user's operation and respond, and code keypad is only responded the user to the click of code keypad button by voice signal.
S45: satisfy when pre-conditioned, hide code keypad.
In the present embodiment, the pre-conditioned definite button that can click for the user code keypad, certainly, this enforcement is not limited thereto, and pre-conditionedly also can be other, as: the Password Length of user's input reaches preset value.
S46: the putting in order of password that the user who obtains inputs upset, with described the putting in order of form record of chained list.
In order to prevent that trojan horse program from carrying out internal memory scanning, the code keypad in the present embodiment is not preserved continous cipher expressly, but by the form of chained list password is dispersed in the internal memory, and the chain sheet form of password as shown in Figure 6.And the code keypad that causes security breaches, the present embodiment to provide in order to prevent the developer from obtaining the password plaintext does not provide and obtains password interface expressly.
The cipher-code input method that the embodiment of the invention four provides, obtain the password of user's input by the code keypad that is embedded in user interface inside, and, when code keypad is activated, with system's keyboard shielding, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss, simultaneously, avoided the maloperation of user for system's keyboard.And, because the code keypad in the embodiment of the invention four is embedded in user interface inside, a part of regarding in essence user interface as, it can the triggering system event, be when code keypad shows, when hides the variation that can not cause system state, therefore, fishing program also just can't snatch password.The cipher-code input method that the embodiment of the invention four provides has improved the security of Password Input.In addition, deposit the password of user input in internal memory so that trojan horse program is difficult to snatch password by the mode of scanning internal memory with the form of chained list, further improved the security of Password Input.
Embodiment five
The embodiment of the invention five provides a kind of cipher input, and Fig. 7 is the structural representation of this cipher input, and this device can comprise: active module 11, display module 12 and acquisition module 13.Wherein:
Active module 11 is used for activating the code keypad that is embedded in user interface inside when input focus is positioned at the Password Input frame.Display module 12 is used for when code keypad is activated, and shows the code keypad that active module 11 activates.Acquisition module 13 is used for obtaining the password that the user inputs by code keypad.
The cipher input that the embodiment of the invention five provides, obtain the password of user's input by the code keypad that is embedded in user interface inside, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss.And, because the code keypad in the embodiment of the invention five is embedded in user interface inside, regard in essence the part of user interface as, it can the triggering system event, and therefore, the fishing program also just can't snatch password.The cipher-code input method that the embodiment of the invention five provides has improved the security of Password Input.
Embodiment six
The embodiment of the invention six provides a kind of cipher input, and Fig. 8 is the structural representation of this cipher input, and this device can comprise: active module 21, display module 22, shroud module 23 and acquisition module 24.Wherein:
Active module 21 is used for activating the code keypad that is embedded in user interface inside when input focus is positioned at the Password Input frame.Display module 22 is used for when code keypad is activated, and shows the code keypad that active module 21 activates.Shroud module 23 is used for when code keypad is activated, the shielding harness keyboard, and wherein, system's keyboard can comprise system's soft keyboard and system hardware keyboard.Acquisition module 24 is used for obtaining the password that the user inputs by code keypad.
The cipher-code input method that the embodiment of the invention six provides, obtain the password of user's input by the code keypad that is embedded in user interface inside, and, when code keypad is activated, with system's keyboard shielding, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss, simultaneously, avoided the maloperation of user for system's keyboard.And, because the code keypad in the embodiment of the invention six is embedded in user interface inside, regard in essence the part of user interface as, it can the triggering system event, and therefore, the fishing program also just can't snatch password.The cipher-code input method that the embodiment of the invention six provides has improved the security of Password Input.
Embodiment seven
The embodiment of the invention seven provides a kind of cipher input, and Fig. 9 is the structural representation of this cipher input, and this device can comprise: active module 31, display module 32, arrangement module 33, shroud module 34, acquisition module 35 and encrypting module 36.Wherein:
Active module 31 is used for activating the code keypad that is embedded in user interface inside when input focus is positioned at the Password Input frame.Display module 32 is used for when code keypad is activated, and shows the code keypad that active module 11 activates.Arrange module 33, be used for when code keypad is activated demonstration, the button of code keypad is carried out random alignment.Shroud module 34 is used for the shielding harness keyboard, and wherein, system's keyboard can comprise system's soft keyboard and system hardware keyboard.Acquisition module 35 is used for obtaining the password that the user inputs by code keypad.Encrypting module 36 is used for being encrypted by the password of RSA asymmetric encryption mode to user's input.
The cipher-code input method that the embodiment of the invention seven provides, obtain the password of user's input by the code keypad that is embedded in user interface inside, and, when code keypad is activated, with system's keyboard shielding, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss, simultaneously, avoided the maloperation of user for system's keyboard.And, because the code keypad in the embodiment of the invention seven is embedded in user interface inside, regard in essence the part of user interface as, it can the triggering system event, and therefore, the fishing program also just can't snatch password.The cipher-code input method that the embodiment of the invention seven provides has improved the security of Password Input.In addition, to the random alignment of code keypad button and the user is inputted password be encrypted, further improved the security of Password Input.
Embodiment eight
The embodiment of the invention eight provides a kind of cipher input, and Figure 10 is the structural representation of this cipher input, and this device can comprise: active module 41, display module 42, arrangement module 43, shroud module 44, acquisition module 45 and logging modle 46.Wherein:
Active module 41 is used for activating the code keypad that is embedded in user interface inside when input focus is positioned at the Password Input frame.Display module 42 is used for when code keypad is activated, and shows the code keypad that active module 41 activates.Arrange module 43, be used for when code keypad is activated demonstration, the button of code keypad is carried out random alignment.Shroud module 44 is used for the shielding harness keyboard, and wherein, system's keyboard can comprise system's soft keyboard and system hardware keyboard.Acquisition module 45 is used for obtaining the password that the user inputs by code keypad.Logging modle 46, the putting in order of password that is used for the user's input that will obtain upset, and puts in order with the form record of chained list.
In the present embodiment, when the user clicks button on the code keypad and carries out the input of password, the various show states of cancellation code keypad button make code keypad not make vision to user's operation and respond, and code keypad is only responded the user to the click of code keypad button by voice signal.
The cipher input that the embodiment of the invention provides can also comprise: hide module.Hide module, be used for when satisfying when pre-conditioned hiding code keypad.Wherein, the pre-conditioned definite button that can click for the user code keypad, certainly, this enforcement is not limited thereto, and pre-conditionedly also can be other, as: the Password Length of user's input reaches preset value.
Further, active module 41 can comprise: activate submodule.Activate submodule, be used for calling the code keypad of single frames layout Frame Layout the inside, so that described code keypad appears in one's mind on user interface, described Frame Layout is positioned on the interface of the keyboard that need to access to your password.
The cipher-code input method that the embodiment of the invention eight provides, obtain the password of user's input by the code keypad that is embedded in user interface inside, and, when code keypad is activated, with system's keyboard shielding, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss, simultaneously, avoided the maloperation of user for system's keyboard.And, because the code keypad in the embodiment of the invention eight is embedded in user interface inside, a part of regarding in essence user interface as, it can the triggering system event, be when code keypad shows, when hides the variation that can not cause system state, therefore, fishing program also just can't snatch password.The cipher-code input method that the embodiment of the invention eight provides has improved the security of Password Input.In addition, deposit the password of user input in internal memory so that trojan horse program is difficult to snatch password by the mode of scanning internal memory with the form of chained list, further improved the security of Password Input.
For the convenience of describing, be divided into various unit with function when describing above device and describe respectively.Certainly, when enforcement is of the present invention, can in same or a plurality of softwares and/or hardware, realize the function of each unit.
As seen through the above description of the embodiments, those skilled in the art can be well understood to the present invention and can realize by the mode that software adds essential general hardware platform.Based on such understanding, the part that technical scheme of the present invention contributes to prior art in essence in other words can embody with the form of software product, this computer software product can be stored in the storage medium, such as ROM/RAM, magnetic disc, CD etc., comprise that some instructions are with so that a computer equipment (can be personal computer, server, the perhaps network equipment etc.) carry out the described method of some part of each embodiment of the present invention or embodiment.
Each embodiment in this instructions all adopts the mode of going forward one by one to describe, and identical similar part is mutually referring to getting final product between each embodiment, and each embodiment stresses is difference with other embodiment.Especially, for device embodiment, because its basic simlarity is in embodiment of the method, so describe fairly simplely, relevant part gets final product referring to the part explanation of embodiment of the method.System embodiment described above only is schematic, wherein said unit as the separating component explanation can or can not be physically to separate also, the parts that show as the unit can be or can not be physical locations also, namely can be positioned at a place, perhaps also can be distributed on a plurality of network element.Can select according to the actual needs wherein some or all of module to realize the purpose of the present embodiment scheme.Those of ordinary skills namely can understand and implement in the situation that do not pay creative work.
The present invention can be used in numerous general or special purpose computingasystem environment or the configuration.For example: personal computer, server computer, handheld device or portable set, plate equipment, multicomputer system, the system based on microprocessor, set top box, programmable consumer-elcetronics devices, network PC, small-size computer, mainframe computer, comprise distributed computing environment of above any system or equipment etc.
The present invention can describe in the general context of the computer executable instructions of being carried out by computing machine, for example program module.Usually, program module comprises the routine carrying out particular task or realize particular abstract data type, program, object, assembly, data structure etc.Also can in distributed computing environment, put into practice the present invention, in these distributed computing environment, be executed the task by the teleprocessing equipment that is connected by communication network.In distributed computing environment, program module can be arranged in the local and remote computer-readable storage medium that comprises memory device.
The above only is the specific embodiment of the present invention; should be pointed out that for those skilled in the art, under the prerequisite that does not break away from the principle of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (10)

1. a cipher-code input method is characterized in that, comprising:
When input focus was positioned at the Password Input frame, activation was embedded in the code keypad of user interface inside and shows described code keypad;
Obtain the password of user's input by described code keypad.
2. method according to claim 1 is characterized in that, also comprises: when activation is embedded in the code keypad of user interface inside, and the shielding harness keyboard.
3. method according to claim 1 is characterized in that, also comprises: when described code keypad is activated, the button of described code keypad is carried out random alignment.
4. method according to claim 1 is characterized in that, also comprises: be encrypted by the password of RSA asymmetric encryption mode to user's input.
5. method according to claim 1 is characterized in that, also comprises: the putting in order of password that the user who obtains inputs upset, with described the putting in order of form record of chained list.
6. method according to claim 1 is characterized in that, described code keypad is responded the user to the click of described code keypad button by voice signal.
7. method according to claim 1 is characterized in that, described activation is embedded in the code keypad of user interface inside and shows that described code keypad is specially:
Call the code keypad of single frames layout Frame Layout the inside, so that described code keypad appears in one's mind on user interface, described Frame Layout is positioned on the interface of the keyboard that need to access to your password.
8. a cipher input is characterized in that, comprising: active module, display module and acquisition module;
Described active module is used for activating the code keypad that is embedded in user interface inside when input focus is positioned at the Password Input frame;
Described display module is used for showing described code keypad when described code keypad is activated;
Described acquisition module is used for obtaining the password that the user inputs by described code keypad.
9. device according to claim 8 is characterized in that, also comprises: shroud module;
Described shroud module is used for when activation is embedded in the code keypad of user interface inside the shielding harness keyboard.
10. device according to claim 8 is characterized in that, also comprises: arrange module;
Described arrangement module is used for when described code keypad is activated, and the button of described code keypad is carried out random alignment.
CN2012105878121A 2012-12-28 2012-12-28 Password input method and device Pending CN103076988A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012105878121A CN103076988A (en) 2012-12-28 2012-12-28 Password input method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012105878121A CN103076988A (en) 2012-12-28 2012-12-28 Password input method and device

Publications (1)

Publication Number Publication Date
CN103076988A true CN103076988A (en) 2013-05-01

Family

ID=48153528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012105878121A Pending CN103076988A (en) 2012-12-28 2012-12-28 Password input method and device

Country Status (1)

Country Link
CN (1) CN103076988A (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281186A (en) * 2013-05-08 2013-09-04 上海众人网络安全技术有限公司 Dynamic token based on Android system as well as transaction system and method
CN104462904A (en) * 2014-12-16 2015-03-25 上海斐讯数据通信技术有限公司 Method and system for processing inputted information
CN105141631A (en) * 2015-09-21 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Terminal, server and account security login method, device and system
CN105447378A (en) * 2014-08-27 2016-03-30 阿里巴巴集团控股有限公司 Password generation method and device
CN105554010A (en) * 2015-12-28 2016-05-04 上海瀚银信息技术有限公司 Password encryption method and system and intelligent terminal
CN105653994A (en) * 2016-02-22 2016-06-08 浪潮通用软件有限公司 Method for preventing memory password from leakage
CN105809019A (en) * 2016-03-15 2016-07-27 青岛海信移动通信技术股份有限公司 Method and device for Android terminal to start input method keyboard
CN105844180A (en) * 2016-03-15 2016-08-10 青岛海信移动通信技术股份有限公司 Starting method and device of input method keyboard
CN105868653A (en) * 2016-03-29 2016-08-17 山东华芯富创电子科技有限公司 Password input method and device
CN106325573A (en) * 2015-06-24 2017-01-11 西藏丹贝投资有限公司 Display device having touch function and terminal equipment including display device
CN106446630A (en) * 2016-09-12 2017-02-22 努比亚技术有限公司 Code information input device, method and mobile terminal
CN106485170A (en) * 2015-09-02 2017-03-08 阿里巴巴集团控股有限公司 A kind of data inputting method and device
CN106600854A (en) * 2016-12-14 2017-04-26 艾体威尔电子技术(北京)有限公司 System and method for SE terminal of POS to take over password keyboard of Android screen
CN106778224A (en) * 2016-12-29 2017-05-31 Tcl集团股份有限公司 The control method and system of a kind of Password Input, mobile terminal
CN106845282A (en) * 2017-01-06 2017-06-13 奇酷互联网络科技(深圳)有限公司 Mobile terminal and its method of controlling security and device
CN106991306A (en) * 2017-03-17 2017-07-28 维沃移动通信有限公司 A kind of method and mobile terminal for inputting password
CN107368184A (en) * 2017-05-12 2017-11-21 阿里巴巴集团控股有限公司 Cipher-code input method and device in a kind of virtual reality scenario
CN107589833A (en) * 2017-08-08 2018-01-16 阿里巴巴集团控股有限公司 Safety protecting method, device and VR terminal devices based on VR scenes
CN108664804A (en) * 2018-05-22 2018-10-16 深圳乐信软件技术有限公司 A kind of input method of information, device, terminal and storage medium
CN114911356A (en) * 2022-03-30 2022-08-16 中金金融认证中心有限公司 Password input method and system based on Hongmon system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558377A (en) * 2004-02-12 2004-12-29 平 刘 Peep proof cipher keyboard
CN101021756A (en) * 2007-03-05 2007-08-22 郭文 Dynamic displaying cipher keboard
CN101043334A (en) * 2005-12-23 2007-09-26 国际商业机器公司 Method and device of encryption and data certification and decryption and data authenticity validating
CN101183412A (en) * 2006-11-13 2008-05-21 思科技术公司 Method for secure data entry in an application
WO2009016070A1 (en) * 2007-07-27 2009-02-05 International Business Machines Corporation Transparent aware data transformation at file system level
CN101401341A (en) * 2005-11-18 2009-04-01 安全第一公司 Secure data parser method and system
CN101986670A (en) * 2009-07-29 2011-03-16 上海瀚银信息技术有限公司 Method for protecting password input security at mobile phone by using password keyboard
CN102393886A (en) * 2011-06-29 2012-03-28 北京数码视讯科技股份有限公司 Safety control method of mobile terminal, device and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558377A (en) * 2004-02-12 2004-12-29 平 刘 Peep proof cipher keyboard
CN101401341A (en) * 2005-11-18 2009-04-01 安全第一公司 Secure data parser method and system
CN101043334A (en) * 2005-12-23 2007-09-26 国际商业机器公司 Method and device of encryption and data certification and decryption and data authenticity validating
CN101183412A (en) * 2006-11-13 2008-05-21 思科技术公司 Method for secure data entry in an application
CN101021756A (en) * 2007-03-05 2007-08-22 郭文 Dynamic displaying cipher keboard
WO2009016070A1 (en) * 2007-07-27 2009-02-05 International Business Machines Corporation Transparent aware data transformation at file system level
CN101986670A (en) * 2009-07-29 2011-03-16 上海瀚银信息技术有限公司 Method for protecting password input security at mobile phone by using password keyboard
CN102393886A (en) * 2011-06-29 2012-03-28 北京数码视讯科技股份有限公司 Safety control method of mobile terminal, device and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王灵芝 等: "拼音派(pie):拼音软键盘的再设计和用户绩效评估", 《第八届和谐人机环境联合学术会议(HHME2012) 论文集 CHCI》 *

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281186A (en) * 2013-05-08 2013-09-04 上海众人网络安全技术有限公司 Dynamic token based on Android system as well as transaction system and method
CN105447378A (en) * 2014-08-27 2016-03-30 阿里巴巴集团控股有限公司 Password generation method and device
CN105447378B (en) * 2014-08-27 2018-07-13 阿里巴巴集团控股有限公司 A kind of method for generating cipher code and device
CN104462904A (en) * 2014-12-16 2015-03-25 上海斐讯数据通信技术有限公司 Method and system for processing inputted information
CN106325573A (en) * 2015-06-24 2017-01-11 西藏丹贝投资有限公司 Display device having touch function and terminal equipment including display device
WO2017036345A1 (en) * 2015-09-02 2017-03-09 阿里巴巴集团控股有限公司 Information input method and device
CN106485170A (en) * 2015-09-02 2017-03-08 阿里巴巴集团控股有限公司 A kind of data inputting method and device
CN105141631A (en) * 2015-09-21 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Terminal, server and account security login method, device and system
CN105141631B (en) * 2015-09-21 2019-06-11 宇龙计算机通信科技(深圳)有限公司 The methods, devices and systems that a kind of terminal, server and account safety log in
CN105554010A (en) * 2015-12-28 2016-05-04 上海瀚银信息技术有限公司 Password encryption method and system and intelligent terminal
CN105653994A (en) * 2016-02-22 2016-06-08 浪潮通用软件有限公司 Method for preventing memory password from leakage
CN105844180A (en) * 2016-03-15 2016-08-10 青岛海信移动通信技术股份有限公司 Starting method and device of input method keyboard
CN105809019A (en) * 2016-03-15 2016-07-27 青岛海信移动通信技术股份有限公司 Method and device for Android terminal to start input method keyboard
CN105868653A (en) * 2016-03-29 2016-08-17 山东华芯富创电子科技有限公司 Password input method and device
CN106446630A (en) * 2016-09-12 2017-02-22 努比亚技术有限公司 Code information input device, method and mobile terminal
CN106446630B (en) * 2016-09-12 2020-05-22 努比亚技术有限公司 Password information input device and method and mobile terminal
CN106600854B (en) * 2016-12-14 2019-03-01 艾体威尔电子技术(北京)有限公司 The code keyboard system and method for the SE pipe nipple Android screen of POS machine
CN106600854A (en) * 2016-12-14 2017-04-26 艾体威尔电子技术(北京)有限公司 System and method for SE terminal of POS to take over password keyboard of Android screen
CN106778224A (en) * 2016-12-29 2017-05-31 Tcl集团股份有限公司 The control method and system of a kind of Password Input, mobile terminal
CN106845282A (en) * 2017-01-06 2017-06-13 奇酷互联网络科技(深圳)有限公司 Mobile terminal and its method of controlling security and device
CN106991306A (en) * 2017-03-17 2017-07-28 维沃移动通信有限公司 A kind of method and mobile terminal for inputting password
CN106991306B (en) * 2017-03-17 2019-08-20 维沃移动通信有限公司 A kind of method and mobile terminal inputting password
US10788891B2 (en) 2017-05-12 2020-09-29 Alibaba Group Holding Limited Method and device for inputting password in virtual reality scene
US10649520B2 (en) 2017-05-12 2020-05-12 Alibaba Group Holding Limited Method and device for inputting password in virtual reality scene
CN107368184A (en) * 2017-05-12 2017-11-21 阿里巴巴集团控股有限公司 Cipher-code input method and device in a kind of virtual reality scenario
US10901498B2 (en) 2017-05-12 2021-01-26 Advanced New Technologies Co., Ltd. Method and device for inputting password in virtual reality scene
US11061468B2 (en) 2017-05-12 2021-07-13 Advanced New Technologies Co., Ltd. Method and device for inputting password in virtual reality scene
CN107589833A (en) * 2017-08-08 2018-01-16 阿里巴巴集团控股有限公司 Safety protecting method, device and VR terminal devices based on VR scenes
CN108664804A (en) * 2018-05-22 2018-10-16 深圳乐信软件技术有限公司 A kind of input method of information, device, terminal and storage medium
CN114911356A (en) * 2022-03-30 2022-08-16 中金金融认证中心有限公司 Password input method and system based on Hongmon system

Similar Documents

Publication Publication Date Title
CN103076988A (en) Password input method and device
Srinivas et al. Government regulations in cyber security: Framework, standards and recommendations
Dunphy et al. A closer look at recognition-based graphical passwords on mobile devices
CN101529366B (en) Identification and visualization of trusted user interface objects
CN106575334A (en) Accessing a secured software application
CN108769027B (en) Secure communication method, device, mobile terminal and storage medium
CN110492990A (en) Private key management method, apparatus and system under block chain scene
CN103929307A (en) Password input method, intelligent secret key device and client device
CN109644196A (en) Message protection
EP3176779B1 (en) Systems and methods for sensitive audio zone rearrangement
CN109858274A (en) The method and apparatus that message is shown
Kuribara et al. Vibrainput: Two-step pin entry system based on vibration and visual information
CN103795849B (en) The device and method of operation are performed for private contact in portable terminal
CN107657187A (en) A kind of keyboard and input method and system applied to android system
CN103873521A (en) Cloud architecture-based mobile phone privacy file protection system and method
CN117751551A (en) System and method for secure internet communications
CN106789051B (en) method, device and computing equipment for protecting files
CN105320868A (en) Application encryption method and mobile terminal
Frankland et al. Side channels, compromising emanations and surveillance: Current and future technologies
CN111177770B (en) Sensitive information protection method, mobile equipment and storage device
US9760696B2 (en) Secure physical authentication input with personal display or sound device
CN108696355B (en) Method and system for preventing head portrait of user from being embezzled
KR20180129302A (en) Method for executing of security keyboard, apparatus and system for executing the method
Kaminski Calling a truce to the crypto wars: why congress and tech companies must work together to introduce new solutions and legislation to regulate encryption
Le Bouder et al. Theoretical security evaluation of the Human Semantic Authentication protocol

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20130501

RJ01 Rejection of invention patent application after publication