CN103076988A - Password input method and device - Google Patents
Password input method and device Download PDFInfo
- Publication number
- CN103076988A CN103076988A CN2012105878121A CN201210587812A CN103076988A CN 103076988 A CN103076988 A CN 103076988A CN 2012105878121 A CN2012105878121 A CN 2012105878121A CN 201210587812 A CN201210587812 A CN 201210587812A CN 103076988 A CN103076988 A CN 103076988A
- Authority
- CN
- China
- Prior art keywords
- code keypad
- password
- input
- user
- keyboard
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Input From Keyboards Or The Like (AREA)
Abstract
The invention provides a password input method and device. When an input focus is positioned in a password input frame, a password keyboard embedded in a user interface is activated and displayed, and a password input by a user is obtained through the password keyboard. According to the password input method and device, since the password input by the user is obtained through the password keyboard embedded in the user interface, the occurrence that the password is obtained by a Trojan horse program through the methods of intercepting input of a hardware keyboard, screen shooting of a software keyboard and the like is avoided, as the password keyboard is embedded inside the user interface, essentially the password keyboard is seen as a part of the user interface, a system incident can not be triggered, and the password can not be stolen even by a fishing program. By the adoption of the password input method and device, the safety of password input is improved.
Description
Technical field
The present invention relates to the Ciphor safety technology field, relate in particular to a kind of cipher-code input method and device.
Background technology
Bank card password is highstrung private information, in various payment systems, all needs bank card password is done careful protection.
In vogue along with ecommerce, the trade deal on the network has become a kind of current popular method of commerce, and the terminal devices such as mobile phone, computer are as the mobile payment instrument of an opening, ATM and POS machine side face more security threat relatively.
The inventor finds in realizing process of the present invention: may implanted trojan horse program and the fishing program of stealing bank card password in user's mobile phone or the computer.
Summary of the invention
The invention provides a kind of cipher-code input method and device, the problem of easily being stolen by wooden horse, fishing supervisor at the password of the terminal devices such as mobile phone, computer input in order to solve the user, its technical scheme is as follows:
A kind of cipher-code input method comprises:
When input focus was positioned at the Password Input frame, activation was embedded in the code keypad of user interface inside and shows described code keypad;
Obtain the password of user's input by described code keypad.
Preferably, said method also comprises: when activation is embedded in the code keypad of user interface inside, and the shielding harness keyboard.
Preferably, said method also comprises: when described code keypad is activated, the button of described code keypad is carried out random alignment.
Preferably, said method also comprises: be encrypted by the password of RSA asymmetric encryption mode to user's input.
Preferably, said method also comprises: the putting in order of password that the user who obtains inputs upset, with described the putting in order of form record of chained list.
Preferably, described code keypad is responded the user to the click of described code keypad button by voice signal.
Preferably, described activation is embedded in the code keypad of user interface inside and shows that described code keypad is specially:
Call the code keypad of single frames layout Frame Layout the inside, so that described code keypad appears in one's mind on user interface, described Frame Layout is positioned on the interface of the keyboard that need to access to your password.
A kind of cipher input comprises: active module, display module and acquisition module;
Described active module is used for activating the code keypad that is embedded in user interface inside when input focus is positioned at the Password Input frame;
Described display module is used for showing described code keypad when described code keypad is activated;
Described acquisition module is used for obtaining the password that the user inputs by described code keypad.
Preferably, said apparatus also comprises: shroud module;
Described shroud module is used for when activation is embedded in the code keypad of user interface inside the shielding harness keyboard.
Preferably, said apparatus also comprises: arrange module;
Described arrangement module is used for when described code keypad is activated, and the button of described code keypad is carried out random alignment.
Cipher-code input method provided by the invention and device, when input focus was positioned at the Password Input frame, activation was embedded in the code keypad of user interface inside and shows described code keypad, obtained the password of user's input by code keypad.Because cipher-code input method provided by the invention and device obtain the password of user's input by the code keypad that is embedded in user interface inside, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss, and, because code keypad is embedded in user interface inside, a part of regarding in essence user interface as, it can the triggering system event, therefore, the fishing program also just can't snatch password, the security that cipher-code input method provided by the invention and device have improved Password Input.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, the below will do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art, apparently, accompanying drawing in the following describes only is embodiments of the invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to the accompanying drawing that provides other accompanying drawing.
The schematic flow sheet of the cipher-code input method that Fig. 1 provides for the embodiment of the invention one;
The schematic flow sheet of the cipher-code input method that Fig. 2 provides for the embodiment of the invention two;
The schematic flow sheet of the cipher-code input method that Fig. 3 provides for the embodiment of the invention three;
The structural representation of the code keypad that Fig. 4 provides for the embodiment of the invention three;
The schematic flow sheet of the cipher-code input method that Fig. 5 provides for the embodiment of the invention four;
The chain sheet form schematic diagram of the password that Fig. 6 provides for the embodiment of the invention four;
The structural representation of the cipher input that Fig. 7 provides for the embodiment of the invention five;
The structural representation of the cipher input that Fig. 8 provides for the embodiment of the invention six;
The structural representation of the cipher input that Fig. 9 provides for the embodiment of the invention seven;
The structural representation of the cipher input that Figure 10 provides for the embodiment of the invention eight.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that obtains under the creative work prerequisite.
Embodiment one
The embodiment of the invention one provides a kind of cipher-code input method, and Fig. 1 is the schematic flow sheet of the method, and the method can comprise:
S11: when input focus is positioned at the Password Input frame, activate the code keypad and the display password keyboard that are embedded in user interface inside.
S12: the password that obtains user's input by code keypad.
The cipher-code input method that the embodiment of the invention one provides, obtain the password of user's input by the code keypad that is embedded in user interface inside, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss.And, because the code keypad in the embodiment of the invention one is embedded in user interface inside, a part of regarding in essence user interface as, it can the triggering system event, be when code keypad shows, when hide the variation that can not cause system state, and the mode that the fishing program snatches password is: the monitoring system event, carry out Password Input in case find the system call keyboard, the system of hiding keyboard, the display false keyboard snatches password, because the code keypad of the embodiment of the invention can not cause the variation of system state, therefore, the fishing program also just can't snatch password.The cipher-code input method that the embodiment of the invention one provides has improved the security of Password Input.
Embodiment two
The embodiment of the invention two provides a kind of cipher-code input method, and Fig. 2 is the schematic flow sheet of the method, and the method can comprise:
S21: when input focus is positioned at the Password Input frame, activate the code keypad and the display password keyboard that are embedded in user interface inside.
S22: shielding harness keyboard.
Wherein, system's keyboard can comprise: system's soft keyboard and system hardware keyboard.
S23: the password that obtains user's input by code keypad.
The cipher-code input method that the embodiment of the invention two provides, obtain the password of user's input by the code keypad that is embedded in user interface inside, and, when code keypad is activated, with system's keyboard shielding, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss, simultaneously, avoided the maloperation of user for system's keyboard.And, because the code keypad in the embodiment of the invention two is embedded in user interface inside, regard in essence the part of user interface as, it can the triggering system event, and therefore, the fishing program also just can't snatch password.The cipher-code input method that the embodiment of the invention two provides has improved the security of Password Input.
Embodiment three
The embodiment of the invention three provides a kind of cipher-code input method, and Fig. 3 is the schematic flow sheet of the method, and the method can comprise:
S31: when input focus is positioned at the Password Input frame, activate the code keypad and the display password keyboard that are embedded in user interface inside.
S32: the button of code keypad is carried out random alignment.
In order to improve the security of Password Input, when code keypad is activated demonstration, the order of code keypad button is carried out random alignment, code keypad is activated when showing at every turn, all will carry out random alignment to the order of code keypad button.
S33: shielding harness keyboard.
Wherein, system's keyboard can comprise: system's soft keyboard and system hardware keyboard.
S34: the password that obtains user's input by code keypad.
The button of code keypad monitoring users receives the also password of recording user input.In the present embodiment, as shown in Figure 4, be attached to when code keypad is activated on the Password Input frame, the user shows an asterisk " * " in the corresponding Password Input frame behind password of code keypad input, and the Password Input frame is not preserved true password.
S35: be encrypted by the password of RSA asymmetric encryption mode to user's input.
In the present embodiment, the password of by RSA asymmetric encryption mode the user being inputted is encrypted and is specially: a RSA PKI is sent to code keypad, make code keypad utilize this RSA PKI that the password of user's input is carried out rsa encryption.Encrypted message after encrypting is sent to background server be decrypted, in order to ensure the safety of password in Internet Transmission, the private key corresponding with the RSA PKI is positioned over background server.In the present embodiment, can adopt the PKCS1 filling algorithm to be encrypted.
The cipher-code input method that the embodiment of the invention three provides, obtain the password of user's input by the code keypad that is embedded in user interface inside, and, when code keypad is activated, with system's keyboard shielding, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss, simultaneously, avoided the maloperation of user for system's keyboard.And, because the code keypad in the embodiment of the invention three is embedded in user interface inside, a part of regarding in essence user interface as, it can the triggering system event, be when code keypad shows, when hides the variation that can not cause system state, therefore, fishing program also just can't snatch password.The cipher-code input method that the embodiment of the invention three provides has improved the security of Password Input.In addition, to the random alignment of code keypad button and the user is inputted password be encrypted, further improved the security of Password Input.
Embodiment four
The embodiment of the invention four provides a kind of cipher-code input method, and Fig. 5 is the schematic flow sheet of the method, and the method can comprise:
S41: when input focus is positioned at the Password Input frame, activate the code keypad and the display password keyboard that are embedded in user interface inside.
In the present embodiment, code keypad and display password keyboard that activation is embedded in user interface inside are specially: the code keypad that calls single frames layout Frame Layout the inside, code keypad is appeared in one's mind on user interface, wherein, Frame Layout is positioned on the interface of the keyboard that need to access to your password.
S42: the button of code keypad is carried out random alignment.
In order to improve the security of Password Input, when code keypad is activated demonstration, the order of code keypad button is carried out random alignment.
S43: shielding harness keyboard.
Wherein, system's keyboard can comprise: system's soft keyboard and system hardware keyboard.
S44: the password that obtains user's input by code keypad.
In the present embodiment, when the user clicks button on the code keypad and carries out the input of password, the various show states of cancellation code keypad button make code keypad not make vision to user's operation and respond, and code keypad is only responded the user to the click of code keypad button by voice signal.
S45: satisfy when pre-conditioned, hide code keypad.
In the present embodiment, the pre-conditioned definite button that can click for the user code keypad, certainly, this enforcement is not limited thereto, and pre-conditionedly also can be other, as: the Password Length of user's input reaches preset value.
S46: the putting in order of password that the user who obtains inputs upset, with described the putting in order of form record of chained list.
In order to prevent that trojan horse program from carrying out internal memory scanning, the code keypad in the present embodiment is not preserved continous cipher expressly, but by the form of chained list password is dispersed in the internal memory, and the chain sheet form of password as shown in Figure 6.And the code keypad that causes security breaches, the present embodiment to provide in order to prevent the developer from obtaining the password plaintext does not provide and obtains password interface expressly.
The cipher-code input method that the embodiment of the invention four provides, obtain the password of user's input by the code keypad that is embedded in user interface inside, and, when code keypad is activated, with system's keyboard shielding, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss, simultaneously, avoided the maloperation of user for system's keyboard.And, because the code keypad in the embodiment of the invention four is embedded in user interface inside, a part of regarding in essence user interface as, it can the triggering system event, be when code keypad shows, when hides the variation that can not cause system state, therefore, fishing program also just can't snatch password.The cipher-code input method that the embodiment of the invention four provides has improved the security of Password Input.In addition, deposit the password of user input in internal memory so that trojan horse program is difficult to snatch password by the mode of scanning internal memory with the form of chained list, further improved the security of Password Input.
Embodiment five
The embodiment of the invention five provides a kind of cipher input, and Fig. 7 is the structural representation of this cipher input, and this device can comprise: active module 11, display module 12 and acquisition module 13.Wherein:
The cipher input that the embodiment of the invention five provides, obtain the password of user's input by the code keypad that is embedded in user interface inside, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss.And, because the code keypad in the embodiment of the invention five is embedded in user interface inside, regard in essence the part of user interface as, it can the triggering system event, and therefore, the fishing program also just can't snatch password.The cipher-code input method that the embodiment of the invention five provides has improved the security of Password Input.
Embodiment six
The embodiment of the invention six provides a kind of cipher input, and Fig. 8 is the structural representation of this cipher input, and this device can comprise: active module 21, display module 22, shroud module 23 and acquisition module 24.Wherein:
The cipher-code input method that the embodiment of the invention six provides, obtain the password of user's input by the code keypad that is embedded in user interface inside, and, when code keypad is activated, with system's keyboard shielding, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss, simultaneously, avoided the maloperation of user for system's keyboard.And, because the code keypad in the embodiment of the invention six is embedded in user interface inside, regard in essence the part of user interface as, it can the triggering system event, and therefore, the fishing program also just can't snatch password.The cipher-code input method that the embodiment of the invention six provides has improved the security of Password Input.
Embodiment seven
The embodiment of the invention seven provides a kind of cipher input, and Fig. 9 is the structural representation of this cipher input, and this device can comprise: active module 31, display module 32, arrangement module 33, shroud module 34, acquisition module 35 and encrypting module 36.Wherein:
The cipher-code input method that the embodiment of the invention seven provides, obtain the password of user's input by the code keypad that is embedded in user interface inside, and, when code keypad is activated, with system's keyboard shielding, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss, simultaneously, avoided the maloperation of user for system's keyboard.And, because the code keypad in the embodiment of the invention seven is embedded in user interface inside, regard in essence the part of user interface as, it can the triggering system event, and therefore, the fishing program also just can't snatch password.The cipher-code input method that the embodiment of the invention seven provides has improved the security of Password Input.In addition, to the random alignment of code keypad button and the user is inputted password be encrypted, further improved the security of Password Input.
Embodiment eight
The embodiment of the invention eight provides a kind of cipher input, and Figure 10 is the structural representation of this cipher input, and this device can comprise: active module 41, display module 42, arrangement module 43, shroud module 44, acquisition module 45 and logging modle 46.Wherein:
In the present embodiment, when the user clicks button on the code keypad and carries out the input of password, the various show states of cancellation code keypad button make code keypad not make vision to user's operation and respond, and code keypad is only responded the user to the click of code keypad button by voice signal.
The cipher input that the embodiment of the invention provides can also comprise: hide module.Hide module, be used for when satisfying when pre-conditioned hiding code keypad.Wherein, the pre-conditioned definite button that can click for the user code keypad, certainly, this enforcement is not limited thereto, and pre-conditionedly also can be other, as: the Password Length of user's input reaches preset value.
Further, active module 41 can comprise: activate submodule.Activate submodule, be used for calling the code keypad of single frames layout Frame Layout the inside, so that described code keypad appears in one's mind on user interface, described Frame Layout is positioned on the interface of the keyboard that need to access to your password.
The cipher-code input method that the embodiment of the invention eight provides, obtain the password of user's input by the code keypad that is embedded in user interface inside, and, when code keypad is activated, with system's keyboard shielding, therefore, the generation of having avoided trojan horse program to intercept and capture these situations of password by modes such as the input of intercepting hardware keyboards, soft keyboard screenshotss, simultaneously, avoided the maloperation of user for system's keyboard.And, because the code keypad in the embodiment of the invention eight is embedded in user interface inside, a part of regarding in essence user interface as, it can the triggering system event, be when code keypad shows, when hides the variation that can not cause system state, therefore, fishing program also just can't snatch password.The cipher-code input method that the embodiment of the invention eight provides has improved the security of Password Input.In addition, deposit the password of user input in internal memory so that trojan horse program is difficult to snatch password by the mode of scanning internal memory with the form of chained list, further improved the security of Password Input.
For the convenience of describing, be divided into various unit with function when describing above device and describe respectively.Certainly, when enforcement is of the present invention, can in same or a plurality of softwares and/or hardware, realize the function of each unit.
As seen through the above description of the embodiments, those skilled in the art can be well understood to the present invention and can realize by the mode that software adds essential general hardware platform.Based on such understanding, the part that technical scheme of the present invention contributes to prior art in essence in other words can embody with the form of software product, this computer software product can be stored in the storage medium, such as ROM/RAM, magnetic disc, CD etc., comprise that some instructions are with so that a computer equipment (can be personal computer, server, the perhaps network equipment etc.) carry out the described method of some part of each embodiment of the present invention or embodiment.
Each embodiment in this instructions all adopts the mode of going forward one by one to describe, and identical similar part is mutually referring to getting final product between each embodiment, and each embodiment stresses is difference with other embodiment.Especially, for device embodiment, because its basic simlarity is in embodiment of the method, so describe fairly simplely, relevant part gets final product referring to the part explanation of embodiment of the method.System embodiment described above only is schematic, wherein said unit as the separating component explanation can or can not be physically to separate also, the parts that show as the unit can be or can not be physical locations also, namely can be positioned at a place, perhaps also can be distributed on a plurality of network element.Can select according to the actual needs wherein some or all of module to realize the purpose of the present embodiment scheme.Those of ordinary skills namely can understand and implement in the situation that do not pay creative work.
The present invention can be used in numerous general or special purpose computingasystem environment or the configuration.For example: personal computer, server computer, handheld device or portable set, plate equipment, multicomputer system, the system based on microprocessor, set top box, programmable consumer-elcetronics devices, network PC, small-size computer, mainframe computer, comprise distributed computing environment of above any system or equipment etc.
The present invention can describe in the general context of the computer executable instructions of being carried out by computing machine, for example program module.Usually, program module comprises the routine carrying out particular task or realize particular abstract data type, program, object, assembly, data structure etc.Also can in distributed computing environment, put into practice the present invention, in these distributed computing environment, be executed the task by the teleprocessing equipment that is connected by communication network.In distributed computing environment, program module can be arranged in the local and remote computer-readable storage medium that comprises memory device.
The above only is the specific embodiment of the present invention; should be pointed out that for those skilled in the art, under the prerequisite that does not break away from the principle of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.
Claims (10)
1. a cipher-code input method is characterized in that, comprising:
When input focus was positioned at the Password Input frame, activation was embedded in the code keypad of user interface inside and shows described code keypad;
Obtain the password of user's input by described code keypad.
2. method according to claim 1 is characterized in that, also comprises: when activation is embedded in the code keypad of user interface inside, and the shielding harness keyboard.
3. method according to claim 1 is characterized in that, also comprises: when described code keypad is activated, the button of described code keypad is carried out random alignment.
4. method according to claim 1 is characterized in that, also comprises: be encrypted by the password of RSA asymmetric encryption mode to user's input.
5. method according to claim 1 is characterized in that, also comprises: the putting in order of password that the user who obtains inputs upset, with described the putting in order of form record of chained list.
6. method according to claim 1 is characterized in that, described code keypad is responded the user to the click of described code keypad button by voice signal.
7. method according to claim 1 is characterized in that, described activation is embedded in the code keypad of user interface inside and shows that described code keypad is specially:
Call the code keypad of single frames layout Frame Layout the inside, so that described code keypad appears in one's mind on user interface, described Frame Layout is positioned on the interface of the keyboard that need to access to your password.
8. a cipher input is characterized in that, comprising: active module, display module and acquisition module;
Described active module is used for activating the code keypad that is embedded in user interface inside when input focus is positioned at the Password Input frame;
Described display module is used for showing described code keypad when described code keypad is activated;
Described acquisition module is used for obtaining the password that the user inputs by described code keypad.
9. device according to claim 8 is characterized in that, also comprises: shroud module;
Described shroud module is used for when activation is embedded in the code keypad of user interface inside the shielding harness keyboard.
10. device according to claim 8 is characterized in that, also comprises: arrange module;
Described arrangement module is used for when described code keypad is activated, and the button of described code keypad is carried out random alignment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012105878121A CN103076988A (en) | 2012-12-28 | 2012-12-28 | Password input method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012105878121A CN103076988A (en) | 2012-12-28 | 2012-12-28 | Password input method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103076988A true CN103076988A (en) | 2013-05-01 |
Family
ID=48153528
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012105878121A Pending CN103076988A (en) | 2012-12-28 | 2012-12-28 | Password input method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103076988A (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103281186A (en) * | 2013-05-08 | 2013-09-04 | 上海众人网络安全技术有限公司 | Dynamic token based on Android system as well as transaction system and method |
CN104462904A (en) * | 2014-12-16 | 2015-03-25 | 上海斐讯数据通信技术有限公司 | Method and system for processing inputted information |
CN105141631A (en) * | 2015-09-21 | 2015-12-09 | 宇龙计算机通信科技(深圳)有限公司 | Terminal, server and account security login method, device and system |
CN105447378A (en) * | 2014-08-27 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Password generation method and device |
CN105554010A (en) * | 2015-12-28 | 2016-05-04 | 上海瀚银信息技术有限公司 | Password encryption method and system and intelligent terminal |
CN105653994A (en) * | 2016-02-22 | 2016-06-08 | 浪潮通用软件有限公司 | Method for preventing memory password from leakage |
CN105809019A (en) * | 2016-03-15 | 2016-07-27 | 青岛海信移动通信技术股份有限公司 | Method and device for Android terminal to start input method keyboard |
CN105844180A (en) * | 2016-03-15 | 2016-08-10 | 青岛海信移动通信技术股份有限公司 | Starting method and device of input method keyboard |
CN105868653A (en) * | 2016-03-29 | 2016-08-17 | 山东华芯富创电子科技有限公司 | Password input method and device |
CN106325573A (en) * | 2015-06-24 | 2017-01-11 | 西藏丹贝投资有限公司 | Display device having touch function and terminal equipment including display device |
CN106446630A (en) * | 2016-09-12 | 2017-02-22 | 努比亚技术有限公司 | Code information input device, method and mobile terminal |
CN106485170A (en) * | 2015-09-02 | 2017-03-08 | 阿里巴巴集团控股有限公司 | A kind of data inputting method and device |
CN106600854A (en) * | 2016-12-14 | 2017-04-26 | 艾体威尔电子技术(北京)有限公司 | System and method for SE terminal of POS to take over password keyboard of Android screen |
CN106778224A (en) * | 2016-12-29 | 2017-05-31 | Tcl集团股份有限公司 | The control method and system of a kind of Password Input, mobile terminal |
CN106845282A (en) * | 2017-01-06 | 2017-06-13 | 奇酷互联网络科技(深圳)有限公司 | Mobile terminal and its method of controlling security and device |
CN106991306A (en) * | 2017-03-17 | 2017-07-28 | 维沃移动通信有限公司 | A kind of method and mobile terminal for inputting password |
CN107368184A (en) * | 2017-05-12 | 2017-11-21 | 阿里巴巴集团控股有限公司 | Cipher-code input method and device in a kind of virtual reality scenario |
CN107589833A (en) * | 2017-08-08 | 2018-01-16 | 阿里巴巴集团控股有限公司 | Safety protecting method, device and VR terminal devices based on VR scenes |
CN108664804A (en) * | 2018-05-22 | 2018-10-16 | 深圳乐信软件技术有限公司 | A kind of input method of information, device, terminal and storage medium |
CN114911356A (en) * | 2022-03-30 | 2022-08-16 | 中金金融认证中心有限公司 | Password input method and system based on Hongmon system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1558377A (en) * | 2004-02-12 | 2004-12-29 | 平 刘 | Peep proof cipher keyboard |
CN101021756A (en) * | 2007-03-05 | 2007-08-22 | 郭文 | Dynamic displaying cipher keboard |
CN101043334A (en) * | 2005-12-23 | 2007-09-26 | 国际商业机器公司 | Method and device of encryption and data certification and decryption and data authenticity validating |
CN101183412A (en) * | 2006-11-13 | 2008-05-21 | 思科技术公司 | Method for secure data entry in an application |
WO2009016070A1 (en) * | 2007-07-27 | 2009-02-05 | International Business Machines Corporation | Transparent aware data transformation at file system level |
CN101401341A (en) * | 2005-11-18 | 2009-04-01 | 安全第一公司 | Secure data parser method and system |
CN101986670A (en) * | 2009-07-29 | 2011-03-16 | 上海瀚银信息技术有限公司 | Method for protecting password input security at mobile phone by using password keyboard |
CN102393886A (en) * | 2011-06-29 | 2012-03-28 | 北京数码视讯科技股份有限公司 | Safety control method of mobile terminal, device and system |
-
2012
- 2012-12-28 CN CN2012105878121A patent/CN103076988A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1558377A (en) * | 2004-02-12 | 2004-12-29 | 平 刘 | Peep proof cipher keyboard |
CN101401341A (en) * | 2005-11-18 | 2009-04-01 | 安全第一公司 | Secure data parser method and system |
CN101043334A (en) * | 2005-12-23 | 2007-09-26 | 国际商业机器公司 | Method and device of encryption and data certification and decryption and data authenticity validating |
CN101183412A (en) * | 2006-11-13 | 2008-05-21 | 思科技术公司 | Method for secure data entry in an application |
CN101021756A (en) * | 2007-03-05 | 2007-08-22 | 郭文 | Dynamic displaying cipher keboard |
WO2009016070A1 (en) * | 2007-07-27 | 2009-02-05 | International Business Machines Corporation | Transparent aware data transformation at file system level |
CN101986670A (en) * | 2009-07-29 | 2011-03-16 | 上海瀚银信息技术有限公司 | Method for protecting password input security at mobile phone by using password keyboard |
CN102393886A (en) * | 2011-06-29 | 2012-03-28 | 北京数码视讯科技股份有限公司 | Safety control method of mobile terminal, device and system |
Non-Patent Citations (1)
Title |
---|
王灵芝 等: "拼音派(pie):拼音软键盘的再设计和用户绩效评估", 《第八届和谐人机环境联合学术会议(HHME2012) 论文集 CHCI》 * |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103281186A (en) * | 2013-05-08 | 2013-09-04 | 上海众人网络安全技术有限公司 | Dynamic token based on Android system as well as transaction system and method |
CN105447378A (en) * | 2014-08-27 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Password generation method and device |
CN105447378B (en) * | 2014-08-27 | 2018-07-13 | 阿里巴巴集团控股有限公司 | A kind of method for generating cipher code and device |
CN104462904A (en) * | 2014-12-16 | 2015-03-25 | 上海斐讯数据通信技术有限公司 | Method and system for processing inputted information |
CN106325573A (en) * | 2015-06-24 | 2017-01-11 | 西藏丹贝投资有限公司 | Display device having touch function and terminal equipment including display device |
WO2017036345A1 (en) * | 2015-09-02 | 2017-03-09 | 阿里巴巴集团控股有限公司 | Information input method and device |
CN106485170A (en) * | 2015-09-02 | 2017-03-08 | 阿里巴巴集团控股有限公司 | A kind of data inputting method and device |
CN105141631A (en) * | 2015-09-21 | 2015-12-09 | 宇龙计算机通信科技(深圳)有限公司 | Terminal, server and account security login method, device and system |
CN105141631B (en) * | 2015-09-21 | 2019-06-11 | 宇龙计算机通信科技(深圳)有限公司 | The methods, devices and systems that a kind of terminal, server and account safety log in |
CN105554010A (en) * | 2015-12-28 | 2016-05-04 | 上海瀚银信息技术有限公司 | Password encryption method and system and intelligent terminal |
CN105653994A (en) * | 2016-02-22 | 2016-06-08 | 浪潮通用软件有限公司 | Method for preventing memory password from leakage |
CN105844180A (en) * | 2016-03-15 | 2016-08-10 | 青岛海信移动通信技术股份有限公司 | Starting method and device of input method keyboard |
CN105809019A (en) * | 2016-03-15 | 2016-07-27 | 青岛海信移动通信技术股份有限公司 | Method and device for Android terminal to start input method keyboard |
CN105868653A (en) * | 2016-03-29 | 2016-08-17 | 山东华芯富创电子科技有限公司 | Password input method and device |
CN106446630A (en) * | 2016-09-12 | 2017-02-22 | 努比亚技术有限公司 | Code information input device, method and mobile terminal |
CN106446630B (en) * | 2016-09-12 | 2020-05-22 | 努比亚技术有限公司 | Password information input device and method and mobile terminal |
CN106600854B (en) * | 2016-12-14 | 2019-03-01 | 艾体威尔电子技术(北京)有限公司 | The code keyboard system and method for the SE pipe nipple Android screen of POS machine |
CN106600854A (en) * | 2016-12-14 | 2017-04-26 | 艾体威尔电子技术(北京)有限公司 | System and method for SE terminal of POS to take over password keyboard of Android screen |
CN106778224A (en) * | 2016-12-29 | 2017-05-31 | Tcl集团股份有限公司 | The control method and system of a kind of Password Input, mobile terminal |
CN106845282A (en) * | 2017-01-06 | 2017-06-13 | 奇酷互联网络科技(深圳)有限公司 | Mobile terminal and its method of controlling security and device |
CN106991306A (en) * | 2017-03-17 | 2017-07-28 | 维沃移动通信有限公司 | A kind of method and mobile terminal for inputting password |
CN106991306B (en) * | 2017-03-17 | 2019-08-20 | 维沃移动通信有限公司 | A kind of method and mobile terminal inputting password |
US10788891B2 (en) | 2017-05-12 | 2020-09-29 | Alibaba Group Holding Limited | Method and device for inputting password in virtual reality scene |
US10649520B2 (en) | 2017-05-12 | 2020-05-12 | Alibaba Group Holding Limited | Method and device for inputting password in virtual reality scene |
CN107368184A (en) * | 2017-05-12 | 2017-11-21 | 阿里巴巴集团控股有限公司 | Cipher-code input method and device in a kind of virtual reality scenario |
US10901498B2 (en) | 2017-05-12 | 2021-01-26 | Advanced New Technologies Co., Ltd. | Method and device for inputting password in virtual reality scene |
US11061468B2 (en) | 2017-05-12 | 2021-07-13 | Advanced New Technologies Co., Ltd. | Method and device for inputting password in virtual reality scene |
CN107589833A (en) * | 2017-08-08 | 2018-01-16 | 阿里巴巴集团控股有限公司 | Safety protecting method, device and VR terminal devices based on VR scenes |
CN108664804A (en) * | 2018-05-22 | 2018-10-16 | 深圳乐信软件技术有限公司 | A kind of input method of information, device, terminal and storage medium |
CN114911356A (en) * | 2022-03-30 | 2022-08-16 | 中金金融认证中心有限公司 | Password input method and system based on Hongmon system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103076988A (en) | Password input method and device | |
Srinivas et al. | Government regulations in cyber security: Framework, standards and recommendations | |
Dunphy et al. | A closer look at recognition-based graphical passwords on mobile devices | |
CN101529366B (en) | Identification and visualization of trusted user interface objects | |
CN106575334A (en) | Accessing a secured software application | |
CN108769027B (en) | Secure communication method, device, mobile terminal and storage medium | |
CN110492990A (en) | Private key management method, apparatus and system under block chain scene | |
CN103929307A (en) | Password input method, intelligent secret key device and client device | |
CN109644196A (en) | Message protection | |
EP3176779B1 (en) | Systems and methods for sensitive audio zone rearrangement | |
CN109858274A (en) | The method and apparatus that message is shown | |
Kuribara et al. | Vibrainput: Two-step pin entry system based on vibration and visual information | |
CN103795849B (en) | The device and method of operation are performed for private contact in portable terminal | |
CN107657187A (en) | A kind of keyboard and input method and system applied to android system | |
CN103873521A (en) | Cloud architecture-based mobile phone privacy file protection system and method | |
CN117751551A (en) | System and method for secure internet communications | |
CN106789051B (en) | method, device and computing equipment for protecting files | |
CN105320868A (en) | Application encryption method and mobile terminal | |
Frankland et al. | Side channels, compromising emanations and surveillance: Current and future technologies | |
CN111177770B (en) | Sensitive information protection method, mobile equipment and storage device | |
US9760696B2 (en) | Secure physical authentication input with personal display or sound device | |
CN108696355B (en) | Method and system for preventing head portrait of user from being embezzled | |
KR20180129302A (en) | Method for executing of security keyboard, apparatus and system for executing the method | |
Kaminski | Calling a truce to the crypto wars: why congress and tech companies must work together to introduce new solutions and legislation to regulate encryption | |
Le Bouder et al. | Theoretical security evaluation of the Human Semantic Authentication protocol |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130501 |
|
RJ01 | Rejection of invention patent application after publication |