[go: up one dir, main page]

CN110941352A - Keyboard generation method, security information input method and device and mobile terminal - Google Patents

Keyboard generation method, security information input method and device and mobile terminal Download PDF

Info

Publication number
CN110941352A
CN110941352A CN201911188051.0A CN201911188051A CN110941352A CN 110941352 A CN110941352 A CN 110941352A CN 201911188051 A CN201911188051 A CN 201911188051A CN 110941352 A CN110941352 A CN 110941352A
Authority
CN
China
Prior art keywords
keyboard
key position
key
information
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911188051.0A
Other languages
Chinese (zh)
Other versions
CN110941352B (en
Inventor
刘阔
李鹏坤
安晓江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Haitai Fangyuan High Technology Co Ltd
Original Assignee
Beijing Haitai Fangyuan High Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Haitai Fangyuan High Technology Co Ltd filed Critical Beijing Haitai Fangyuan High Technology Co Ltd
Priority to CN201911188051.0A priority Critical patent/CN110941352B/en
Publication of CN110941352A publication Critical patent/CN110941352A/en
Application granted granted Critical
Publication of CN110941352B publication Critical patent/CN110941352B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
    • G06F3/0238Programmable keyboards

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Input From Keyboards Or The Like (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention relates to a keyboard generation method for safety information input, a safety information input method and device based on a mobile terminal and the mobile terminal. The keyboard generation method for inputting the safety information comprises the steps of determining key positions contained in a keyboard used for inputting the safety information; dividing the key into a first set of keys and a second set of keys; when a first element in the first key position set is clicked, determining a second element corresponding to the first element according to a preset rule, and reading key position information of the second element; drawing and displaying the keyboard. The invention divides a certain number of key positions on the keyboard to form a dislocation relation, prevents other people from peeping and remembering personal password information, and simultaneously improves the difficulty of monitoring key position input by malicious programs.

Description

Keyboard generation method, security information input method and device and mobile terminal
Technical Field
The invention relates to the technical field of network security, in particular to a keyboard generation method for security information input, a security information input method and device based on a mobile terminal and the mobile terminal.
Background
Currently, when important information or sensitive information is input on a mobile device, there is a risk of being snooped by others or being stolen by a malicious program, for example, a mobile device based on an Android system. Although many applications adopt a customized random layout keyboard to solve the problem and reduce the risk, such a solution cannot completely solve the risk.
Disclosure of Invention
In order to overcome the problems in the prior art at least to a certain extent, the invention provides a keyboard generation method for inputting security information, a security information input method and device based on a mobile terminal and the mobile terminal.
In a first aspect, a keyboard generation method for inputting secure information provided in an embodiment of the present invention includes the following steps:
determining key positions contained in a keyboard for inputting as safety information;
dividing the key into a first set of keys and a second set of keys; when a first element in the first key position set is clicked, determining a second element corresponding to the first element according to a preset rule, and reading key position information of the second element;
drawing and displaying the keyboard.
According to the embodiment of the invention, the specific implementation manner of the keyboard generation method for safety information input comprises the following steps:
the preset rules are as follows: in the first key position set, the key positions represented by every two elements are appointed to form a dislocation pair; when one element in the dislocation pair is clicked, key position information of the other element in the dislocation pair is read.
According to the embodiment of the invention, the specific implementation manner of the keyboard generation method for safety information input comprises the following steps:
the preset rules are as follows: randomly arranging elements in the first key position set into K1, K2, K3, …, K (i-1), Ki, …, K (n-1) and K (n), wherein n is the number of all elements in the first key position set, and i and n are natural numbers; and when the element K (i-1) is clicked, reading key position information of the element Ki, wherein the element K (i-1) and the element Ki form a dislocation relation.
According to the specific implementation manner of the keyboard generation method for inputting the safety information, before drawing the keyboard, the method further comprises the following steps:
the keys in the first set of keys and the second set of keys are arranged randomly.
According to a specific implementation manner of the keyboard generation method for inputting secure information in the embodiment of the present invention, after determining key positions included in the keyboard for inputting secure information, the method further includes:
the key positions are arranged randomly.
According to the specific implementation manner of the keyboard generation method for safety information input in the embodiment of the invention, the drawing and displaying of the keyboard comprises the following steps:
drawing a first key display in the first key set, wherein the first key display comprises a main display and a corner mark display; the main display is the key position information of the current key position, and the corner mark is the key position information of the other key position which forms a dislocation relation with the corner mark;
and drawing a second key position display in the second key position set, wherein the second key position display is the corresponding key position information.
The specific implementation manner of the keyboard generation method for the safety information input according to the embodiment of the invention comprises the following steps,
the ratio of the number of keys in the first set of keys to the total number of keys included in the keyboard does not exceed a given threshold.
In a second aspect, an embodiment of the present invention provides a keyboard generation apparatus for inputting secure information, including:
a key position determination module for determining key positions included in a keyboard for inputting as security information;
a dividing module for dividing the key into a first set of keys and a second set of keys; when a first element in the first key position set is clicked, determining a second element corresponding to the first element according to a preset rule, and reading key position information of the second element;
and the display module is used for drawing and displaying the keyboard.
The embodiment of the invention provides a specific implementation manner of a keyboard generation device for safety information input, which comprises the following steps:
the first rule setting module is used for appointing that the key positions represented by every two elements form a dislocation pair in the first key position set; when one element in the dislocation pair is clicked, key position information of the other element in the dislocation pair is read.
The embodiment of the invention provides a specific implementation manner of a keyboard generation device for safety information input, which comprises the following steps:
the second rule setting module randomly arranges the elements in the first key position set into K1, K2, K3, …, K (i-1), Ki, …, K (n-1) and K (n), wherein n is the number of all the elements in the first key position set, and i and n are natural numbers; reading key position information of the element Ki when the element K (i-1) is clicked; the element K (i-1) and the element Ki form a dislocation relation.
In a specific implementation manner of the keyboard generation apparatus for inputting security information according to the embodiment of the present invention, the dividing module and the display module are further connected to each other:
and the first arranging module is used for randomly arranging the keys in the first key position set and the second key position set.
A specific implementation manner of the keyboard generation apparatus for inputting secure information provided in the embodiment of the present invention further includes, between the key position determination module and the dividing module:
and the second arrangement module is used for randomly arranging the key positions.
In an embodiment of the present invention, in a specific implementation manner of a keyboard generation apparatus for inputting security information, a display module further includes:
the first drawing unit is used for drawing a first key position display in the first key position set, and the first key position display comprises a main display and a corner mark display; the main display is the key position information of the current key position, and the corner mark is the key position information of the other key position which forms a dislocation relation with the corner mark;
and the second drawing unit is used for drawing a second key position display in the second key position set, and the second key position display is the corresponding key position information.
A specific implementation manner of a keyboard generation apparatus for inputting secure information according to an embodiment of the present invention includes,
the ratio of the number of keys in the first set of keys to the total number of keys included in the keyboard does not exceed a given threshold.
In a third aspect, an embodiment of the present invention provides a mobile terminal, including:
at least one processing device; and the number of the first and second groups,
a memory communicatively coupled to the at least one processing device; wherein,
the memory stores instructions executable by the at least one processing device to enable the at least one processing device to perform any of the aforementioned keyboard generation methods for secure information input.
In a fourth aspect, an embodiment of the present invention provides a security information input method based on a mobile terminal, including the following steps:
the mobile terminal receives an instruction for opening a safety information input mode and opens and displays a safety keyboard;
receiving security information input based on a security keyboard;
and analyzing the safety information.
The embodiment of the invention provides a specific implementation mode of a safety information input method based on a mobile terminal, which comprises the following steps:
the security keyboard is generated as follows: determining key positions contained in a keyboard for inputting as safety information; dividing the key locations into a first set of key locations and a second set of key locations; in the first key position set, the key positions represented by every two elements are appointed to form a dislocation pair; when one element in the dislocation pair is clicked, key position information of the other element in the dislocation pair is read; or the elements in the first key position set are randomly arranged into K1, K2, K3, …, K (i-1), Ki, …, K (n-1) and K (n), wherein n is the number of all the elements in the first key position set, and i and n are natural numbers; reading key position information of the element Ki when the element K (i-1) is clicked; the element K (i-1) and the element Ki form a dislocation relation; drawing and displaying the keyboard.
The embodiment of the invention provides a specific implementation mode of a safety information input method based on a mobile terminal, which comprises the following steps:
the security information is analyzed as follows: judging whether the current key position is the key position in the first key position set, if so, reading key position information of another key position in a dislocation relation formed by the current key position, and analyzing; if not, reading the key position information of the current key position and analyzing.
The embodiment of the invention provides a specific implementation mode of a security information input method based on a mobile terminal, which comprises the following steps,
the first key position set is randomly divided or designated by a user;
the misalignment relationship is a random pairing or is specified by the user.
In a fifth aspect, an embodiment of the present invention provides a security information input device based on a mobile terminal, including:
the mobile terminal receives an instruction for opening the safety information input mode and opens and displays a safety keyboard;
the receiving module receives safety information input based on a safety keyboard;
and the analysis module is used for analyzing the safety information.
In a specific implementation manner of the security information input device based on the mobile terminal provided in the embodiment of the present invention, the opening module further includes:
the security keyboard is generated as follows: determining key positions contained in a keyboard for inputting as safety information; dividing the key locations into a first set of key locations and a second set of key locations; in the first key position set, the key positions represented by every two elements are appointed to form a dislocation pair; when one element in the dislocation pair is clicked, key position information of the other element in the dislocation pair is read; or the elements in the first key position set are randomly arranged into K1, K2, K3, …, K (i-1), Ki, …, K (n-1) and K (n), wherein n is the number of all the elements in the first key position set, and i and n are natural numbers; reading key position information of the element Ki when the element K (i-1) is clicked;
drawing and displaying the keyboard.
In a specific implementation manner of the security information input device based on the mobile terminal provided in the embodiment of the present invention, the parsing module further includes:
the security information is analyzed as follows: judging whether the current key position is the key position in the first key position set, if so, reading key position information of another key position in a dislocation relation formed by the current key position, and analyzing; if not, reading the key position information of the current key position and analyzing.
The embodiment of the invention provides a specific implementation mode of a safety information input device based on a mobile terminal, which comprises the following steps:
the first key position set is randomly divided or designated by a user;
the misalignment relationship is a random pairing or is specified by the user.
In a sixth aspect, an embodiment of the present invention provides a mobile terminal, including:
at least one processing device; and the number of the first and second groups,
a memory communicatively coupled to the at least one processing device; wherein,
the memory stores instructions executable by the at least one processing device to enable the at least one processing device to perform any of the mobile terminal based security information input methods described above.
In a seventh aspect, an embodiment of the present invention provides a non-transitory computer-readable storage medium, including a non-transitory computer-readable storage medium storing computer instructions for enabling at least one processing device to execute any one of the foregoing keyboard generation methods for secure information input.
In an eighth aspect, an embodiment of the present invention provides a non-transitory computer-readable storage medium, including computer instructions for enabling at least one processing device to execute any one of the foregoing mobile terminal-based security information input methods.
The invention divides a certain number of key positions on the keyboard to form a dislocation relation, prevents other people from peeping and remembering personal password information, and simultaneously improves the difficulty of monitoring key position input by malicious programs. Specifically, the method comprises the following steps:
dividing a keyboard used as safety information input into two key position sets, namely a first key position set and a second key position set, wherein every two key positions in the first key position set form a dislocation pair; and when one element in the dislocation pair is clicked, reading key position information of the other element in the dislocation pair. That is, when a legal user inputs a password or other security information and some keys of the keyboard are clicked, the key information corresponding to the other key in the corresponding misalignment pair is actually input.
Or the elements in the first key position set are randomly arranged into K1, K2, K3, …, K (i-1), Ki, …, K (n-1) and K (n), wherein n is the number of all the elements in the first key position set, and i and n are natural numbers; and when the element K (i-1) is clicked, reading key position information of the element Ki, wherein the element K (i-1) and the element Ki form a dislocation relation.
It can be seen from the above analysis that the method provided by the embodiment of the present invention implements secure input of personal information by parsing received information according to a keyboard mapping different from a keyboard layout. In the prior art, some programs for monitoring, for example, hook functions therein, can intercept key position information, but the information is not information analyzed in the background, or information actually typed by a user, so that the user can safely input confidential information such as an account number, a password, an identity card and the like when using various tasks of a mobile phone, without worrying about stealing of the information, and the security of using the mobile terminal is greatly improved. In addition, other people cannot acquire the information actually input by the user by observing the current keyboard layout, so that the condition that other people acquire the information actually input by the user by observing the key position clicked by the user is avoided, and the safety is further improved.
In a preferred embodiment of the present invention, the random arrangement of key locations can further enhance the security of the security information input. The random arrangement may be before the first key location set is divided, or after the first key location set is divided, which is not limited in the present invention.
In the preferred embodiment of the present invention, the number of the keys in the first set of keys is limited, for example, the number of the keys in the first set of keys is not more than half of the total number of the keys in the keyboard, so the reason for this arrangement is to prevent the defects that the user input is difficult or visually obstructed due to too many dislocated keys, and to ensure the safe input while considering both the user input efficiency and the input experience.
In a preferred embodiment of the present invention, the first key display in the first set of keys comprises a main display and a superscript display; the main display is the key position information of the current key position, and the corner mark is the key position information of the other key position which forms a dislocation relation with the corner mark; the second key in the second set of keys is displayed as its corresponding key information. By the method, the user can be effectively prompted to input the dislocation information.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flowchart illustrating steps of a keyboard generation method for secure information entry according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating steps of a keyboard generation method for secure information entry according to another embodiment of the present invention;
FIG. 3 is a flowchart illustrating steps of a keyboard generation method for secure information entry according to another embodiment of the present invention;
FIG. 4 is a flow chart of example steps of a keyboard generation method for secure information entry;
fig. 5 is a schematic diagram of a keyboard generated by the keyboard generation method for security information input.
FIG. 6 is a block diagram of a keyboard generation apparatus for secure information input according to an embodiment of the present invention;
FIG. 7 is a block diagram of a keyboard generation apparatus for secure information input according to another embodiment of the present invention;
FIG. 8 is a block diagram of a keyboard generation apparatus for secure information input according to another embodiment of the present invention;
FIG. 9 is a block diagram of a mobile terminal according to an embodiment of the present invention;
FIG. 10 is a flowchart illustrating steps of an embodiment of a security information input method based on a mobile terminal according to the present invention;
fig. 11 is a block diagram of a mobile terminal-based security information input method apparatus according to the present invention.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Before discussing exemplary embodiments in greater detail, it should be noted that the specific structural and functional details disclosed herein of some exemplary embodiments are merely representative and are provided for purposes of describing exemplary embodiments of the present invention. The present invention may, however, be embodied in many alternate forms and should not be construed as limited to only the embodiments set forth herein.
It will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element may be termed a second element, and, similarly, a second element may be termed a first element, without departing from the scope of example embodiments. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Referring to fig. 1, fig. 1 is a flowchart illustrating steps of a keyboard generation method for security information input according to an embodiment of the present invention, including the following steps:
in step S110, key positions included in the keyboard for input as security information are determined.
The keyboard adopted by the embodiment is not a universal keyboard configured by the mobile terminal. But rather a specially configured keyboard, preferably a "soft keyboard," depending on the currently launched application. The keyboard can trigger a remote server to configure and display through the starting of a local application program, and can also be autonomously configured on a local mobile terminal by a user. In either way, the key positions of the keyboard required for inputting the safety information need to be clear.
Step S120, dividing the keys into a first set of keys and a second set of keys; when a first element in the first key position set is clicked, a second element corresponding to the first element is determined according to a preset rule, and key position information of the second element is read.
In the step, a keyboard input as safety information is divided into two key position sets, a first key position set and a second key position set, and when a first element in the first key position set is clicked, a second element corresponding to the first element is determined according to a preset rule, and key position information of the second element is read; that is, when a legal user inputs a password or other security information and some keys of the keyboard are clicked, the key information corresponding to another key is actually input. The key position information can be coding information of each key position in the keyboard.
It can be seen from the above analysis that the method provided by the embodiment of the present invention implements secure input of personal information by parsing received information according to a keyboard mapping different from a keyboard layout. In the prior art, some programs for monitoring, for example, hook functions therein, can intercept key position information, but the information is not information analyzed in the background, or information actually typed by a user, so that the user can safely input confidential information such as an account number, a password, an identity card and the like when using various tasks of a mobile phone, without worrying about stealing of the information, and the security of using the mobile terminal is greatly improved. In addition, other people cannot acquire the information actually input by the user by observing the current keyboard layout, so that the condition that other people acquire the information actually input by the user by observing the key position clicked by the user is avoided, and the safety is further improved.
And step S130, drawing and displaying the keyboard.
And after each key position in the first key position set and the second key position set is determined, keyboard drawing can be carried out, and the drawn keyboard is displayed in the mobile terminal.
In this embodiment, this step may be accomplished by two steps, namely the rendering of the key in the first set of key keys and the rendering of the key in the second set of key keys,
1) drawing a first key display in the first key set, wherein the first key display comprises a main display and a corner mark display; the main display is the key position information of the current key position, and the corner mark is the key position information of the other key position which forms a dislocation relation with the corner mark;
2) and drawing a second key position display in the second key position set, wherein the second key position display is the corresponding key position information.
Obviously, the two steps are parallel and have no sequential relation in time sequence.
It should be noted that, in practical implementation, the ratio of the number of key bits in the first set of key bits to the total number of key bits included in the keyboard does not exceed a given threshold, for example, does not exceed 1/2, and of course, other thresholds may also be adopted, which is not limited in the present invention. The reason for setting in this way is that the defects that the user input is difficult or the vision is obstructed because of too many dislocation key positions can be prevented, and the user input efficiency and the input experience are both considered while the safe input is ensured.
Referring to fig. 2, fig. 2 is a flowchart illustrating steps of a keyboard generation method for inputting secure information according to another embodiment of the present invention, including the following steps:
s210, key positions included in the keyboard for input as security information are determined.
S220, the key positions are randomly arranged.
S230, dividing the key positions into a first key position set and a second key position set; in the first key position set, the key positions represented by every two elements are appointed to form a dislocation pair; when one element in the dislocation pair is clicked, key position information of the other element in the dislocation pair is read.
And S240, drawing and displaying the keyboard.
In this embodiment, the security of information input is further enhanced by increasing the random arrangement of key positions. The random arrangement of the key positions may be before the first key position set is divided, or after the first key position set is divided, although the former is adopted in the embodiment, the invention is not limited to this.
Referring to fig. 3, fig. 3 is a flowchart illustrating steps of a keyboard generation method for inputting secure information according to another embodiment of the present invention, including the following steps:
s310, key positions included in the keyboard for input as security information are determined.
S320, randomly arranging the key positions.
S330, randomly arranging the elements in the first key position set into K1, K2, K3, …, K (i-1), Ki, …, K (n-1) and K (n), wherein n is the number of all the elements in the first key position set, and i and n are natural numbers; reading key position information of the element Ki when the element K (i-1) is clicked; the element K (i-1) and the element Ki form a dislocation relation.
In practical implementation, the ratio of the number of key bits in the first set of key bits to the total number of key bits included in the keyboard does not exceed a given threshold, for example, the threshold may be 1, and of course, other thresholds may also be adopted, which is not limited in the present invention. The reason for this is that all the keys can be dislocated, further ensuring that the user can input confidential information such as account number, password and ID card safely when using each task of the mobile phone, and greatly improving the security of using the mobile terminal.
And S340, drawing and displaying the keyboard.
An example of a keyboard generation method for secure information input is given below in conjunction with fig. 4, comprising the steps of:
in step S410, when the user needs to input personal password information, key positions included in the keyboard for input as security information are determined.
Step S420, the key positions are randomly arranged.
Step S430, dividing all the key positions into a first key position set and a second key position set, and randomly extracting a part of the key positions in the first key position set to be mutually staggered; in particular to a method for preparing a high-performance nano-silver alloy,
randomly extracting a part (the extracted quantity cannot exceed half of the total key position) from all the key position numbers and character lists needing to be drawn and placing the part into a first set A to be dislocated, and randomly extracting a part of key position information which is consistent with the size of the first set A and does not contain the first set A and placing the part into a second set B to be dislocated.
And step S440, drawing and displaying the keyboard.
When the keyboard is drawn, reading corresponding key position information in a first set A and a first set B to be dislocated for drawing, firstly judging whether the current key position exists in the first set A, if so, reading the information in a corresponding second set B, and labeling the corresponding information in the second set B at the lower right corner of the current key position until all random key position information is drawn.
And when the keyboard is drawn, the corresponding key position information with dislocation is marked on the lower right corner of the key position with dislocation.
When the user clicks the keyboard, firstly judging whether the current key position is a random key position, if so, reading the dislocated key position information, otherwise, normally reading the normal key position information.
Referring to fig. 5, fig. 5 is a schematic diagram of a keyboard generated by the keyboard generation method for inputting security information. When the user inputs the input, capturing and monitoring the input, judging whether the currently input characters are in the first set or the second set, if so, exchanging the characters at the same coordinate position with the corresponding set to finish the dislocation reduction processing, otherwise, directly inputting the original input information. For example: the first set is { t,3,6,9, m }, and the second set is { w,7,8,0, x }; when t,3 is clicked, the actual input information is w,7, so when the user needs to obtain test123, the actual input information is wesw127, and the result is subjected to dislocation restoration processing to obtain test 123.
Referring to fig. 6, it is a block diagram of a keyboard generation apparatus for inputting secure information according to an embodiment of the present invention, the keyboard generation apparatus includes:
a key position determining module 60 for determining key positions included in the keyboard for inputting as security information.
The keyboard adopted by the embodiment is not a universal keyboard configured by the mobile terminal. But rather a specially configured keyboard, preferably a "soft keyboard," depending on the currently launched application. The keyboard can trigger a remote server to configure and display through the starting of a local application program, and can also be autonomously configured on a local mobile terminal by a user. In either way, the key positions of the keyboard required for inputting the safety information need to be clear.
A dividing module 61, which divides the keys into a first set of keys and a second set of keys; when a first element in the first key position set is clicked, determining a second element corresponding to the first element according to a preset rule, and reading key position information of the second element;
in the step, a keyboard input as safety information is divided into two key position sets, a first key position set and a second key position set, and when a first element in the first key position set is clicked, a second element corresponding to the first element is determined according to a preset rule, and key position information of the second element is read; that is, when a legal user inputs a password or other security information and some keys of the keyboard are clicked, the key information corresponding to another key is actually input. The key position information can be coding information of each key position in the keyboard.
It can be seen from the above analysis that the method provided by the embodiment of the present invention implements secure input of personal information by parsing received information according to a keyboard mapping different from a keyboard layout. In the prior art, some programs for monitoring, for example, hook functions therein, can intercept key position information, but the information is not information analyzed in the background, or information actually typed by a user, so that the user can safely input confidential information such as an account number, a password, an identity card and the like when using various tasks of a mobile phone, without worrying about stealing of the information, and the security of using the mobile terminal is greatly improved. In addition, other people cannot acquire the information actually input by the user by observing the current keyboard layout, so that the condition that other people acquire the information actually input by the user by observing the key position clicked by the user is avoided, and the safety is further improved.
And the display module 62 is used for drawing and displaying the keyboard.
And after each key position in the first key position set and the second key position set is determined, keyboard drawing can be carried out, and the drawn keyboard is displayed in the mobile terminal.
In this embodiment, the module may further include a first drawing unit 621 and a second drawing unit 622 for performing the drawing of the key in the first set of key bits and the drawing of the key in the second set of key bits, wherein:
a first rendering unit 621, configured to render a first key display in the first set of key locations, the first key display including a main display and a logo display; the main display is the key position information of the current key position, and the corner mark is the key position information of the other key position which forms a dislocation relation with the corner mark;
and a second rendering unit 622 for rendering a second key display of the second set of key keys, the second key display being its corresponding key information.
Obviously, the two drawing units are parallel and have no precedence relationship in the time sequence of function implementation.
It should be noted that, in practical implementation, the ratio of the number of key bits in the first set of key bits to the total number of key bits included in the keyboard does not exceed a given threshold, for example, does not exceed 1/2, and of course, other thresholds may also be adopted, which is not limited in the present invention. The reason for setting in this way is that the defects that the user input is difficult or the vision is obstructed because of too many dislocation key positions can be prevented, and the user input efficiency and the input experience are both considered while the safe input is ensured.
Referring to fig. 7, fig. 7 is a block diagram of a keyboard generation apparatus for inputting secure information according to another embodiment of the present invention, including:
a key position determining module 70 for determining key positions included in the keyboard for inputting as security information.
And an arranging module 71 for randomly arranging the key positions.
A dividing module 72 for dividing the keys into a first set of keys and a second set of keys; in the first key position set, the key positions represented by every two elements are appointed to form a dislocation pair; when one element in the dislocation pair is clicked, key position information of the other element in the dislocation pair is read.
And the display module 73 is used for drawing and displaying the keyboard.
In this embodiment, the security of information input is further enhanced by increasing the random arrangement of key positions. The random arrangement of the key positions may be before the first key position set is divided, or after the first key position set is divided, although the former is adopted in the embodiment, the invention is not limited to this.
Referring to fig. 8, fig. 8 is a block diagram of a keyboard generation apparatus for inputting secure information according to another embodiment of the present invention, including:
a key position determining module 80 for determining key positions included in the keyboard for inputting as security information.
And an arranging module 81 for randomly arranging the key positions.
A dividing module 82, configured to randomly arrange elements in the first key location set into K1, K2, K3, …, K (i-1), Ki, …, K (n-1), and K (n), where n is the number of all elements in the first key location set, and i and n are both natural numbers; reading key position information of the element Ki when the element K (i-1) is clicked; the element K (i-1) and the element Ki form a dislocation relation.
In practical implementation, the ratio of the number of key bits in the first set of key bits to the total number of key bits included in the keyboard does not exceed a given threshold, for example, the threshold may be 1, and of course, other thresholds may also be adopted, which is not limited in the present invention. The reason for this is that all the keys can be dislocated, further ensuring that the user can input confidential information such as account number, password and ID card safely when using each task of the mobile phone, and greatly improving the security of using the mobile terminal.
And the display module 83 is used for drawing and displaying the keyboard.
In one embodiment, the keyboard generation method for secure information input may be implemented by a local mobile terminal, that is, may be implemented by locally installing a plug-in for keyboard generation. The mobile terminal includes:
at least one processing device; and the number of the first and second groups,
a memory communicatively coupled to the at least one processing device; wherein,
the memory stores instructions executable by the at least one processing device to enable the at least one processing device to perform any of the foregoing keyboard generation methods for secure information entry.
Referring to fig. 9, fig. 9 shows a block diagram of the structure of the local mobile terminal described above. As shown in fig. 9, the mobile terminal 90 may include a processing device (e.g., central processing unit, graphics processor, etc.) 901 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)902 or a program loaded from a storage device 908 into a Random Access Memory (RAM) 903. In the RAM903, various programs and data necessary for the operation of the mobile terminal 90 are also stored. The processing apparatus 901, the ROM902, and the RAM903 are connected to each other through a bus 904. An input/output (I/O) interface 905 is also connected to bus 904.
Generally, the following devices may be connected to the I/O interface 905: input devices 906 including, for example, a touch screen, touch pad, keyboard, mouse, image sensor, microphone, accelerometer, gyroscope, etc.; an output device 907 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 908 including, for example, magnetic tape, hard disk, etc.; and a communication device 909. The communication means 909 may allow the mobile terminal 90 to perform wireless or wired communication with other devices to exchange data.
On the other hand, the invention also discloses a safety information input method based on the mobile terminal, and the method can be independently completed through the local mobile terminal.
Referring to fig. 10, fig. 10 is a flowchart illustrating steps of an embodiment of a security information input method based on a mobile terminal according to the present invention, including the following steps:
step S1010, the mobile terminal receives the instruction of opening the safety information input mode and opens and displays the safety keyboard.
Step S1020, receiving security information input based on the security keypad.
And step S1030, analyzing the safety information.
It should be noted that, in one embodiment, the security keyboard is generated as follows: determining key positions contained in a keyboard for inputting as safety information; dividing the key locations into a first set of key locations and a second set of key locations; in the first key position set, the key positions represented by every two elements are appointed to form a dislocation pair; when one element in the dislocation pair is clicked, key position information of the other element in the dislocation pair is read; or the elements in the first key position set are randomly arranged into K1, K2, K3, …, K (i-1), Ki, …, K (n-1) and K (n), wherein n is the number of all the elements in the first key position set, and i and n are natural numbers; reading key position information of the element Ki when the element K (i-1) is clicked; the element K (i-1) and the element Ki form a dislocation relation; drawing and displaying the keyboard.
It should be noted that, in one embodiment, the security information is parsed as: judging whether the current key position is the key position in the first key position set, if so, reading key position information of another key position in a dislocation relation formed by the current key position, and analyzing; if not, reading the key position information of the current key position and analyzing.
It should be noted that, in one embodiment, the first set of key locations is randomly divided or designated by the user; meanwhile, the misalignment relationship may also be random pairing or specified by a user.
Referring to fig. 11, fig. 11 is a block diagram of a mobile terminal-based security information input method apparatus according to the present invention, including:
the opening module 1101 is used for receiving an instruction of opening the security information input mode and opening and displaying the security keyboard by the mobile terminal.
A receiving module 1102 for receiving security information inputted based on a security keypad;
the analysis module 1103 analyzes the security information.
It should be noted that, in one embodiment, the opening module further includes: the security keyboard is generated as follows: determining key positions contained in a keyboard for inputting as safety information; dividing the key locations into a first set of key locations and a second set of key locations; in the first key position set, the key positions represented by every two elements are appointed to form a dislocation pair; when one element in the dislocation pair is clicked, key position information of the other element in the dislocation pair is read; or the elements in the first key position set are randomly arranged into K1, K2, K3, …, K (i-1), Ki, …, K (n-1) and K (n), wherein n is the number of all the elements in the first key position set, and i and n are natural numbers; reading key position information of the element Ki when the element K (i-1) is clicked; drawing and displaying the keyboard.
It should be noted that, in an embodiment, the parsing module further includes: the security information is analyzed as follows: judging whether the current key position is the key position in the first key position set, if so, reading key position information of another key position in a dislocation relation formed by the current key position, and analyzing; if not, reading the key position information of the current key position and analyzing.
It should be noted that, in one embodiment, the first set of key locations is randomly divided or designated by the user; the misalignment relationship is a random pairing or is specified by the user.
In addition, embodiments of the invention may be implemented by providing a non-transitory computer-readable storage medium. The non-transitory computer readable storage medium having stored thereon computer instructions; the computer instructions, when executed by the processor, implement any one of the above-described embodiments of the method for generating a keyboard for security information input or any one of the methods for security information input based on a mobile terminal.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (10)

1. A keyboard generation method for secure information input, comprising the steps of:
determining key positions contained in a keyboard for inputting as safety information;
dividing the key into a first set of keys and a second set of keys; when a first element in the first key position set is clicked, determining a second element corresponding to the first element according to a preset rule, and reading key position information of the second element;
drawing and displaying the keyboard.
2. The keyboard generation method for secure information input of claim 1,
the preset rule is as follows: in the first key position set, the key positions represented by every two elements are appointed to form a dislocation pair; and when one element in the dislocation pair is clicked, reading key position information of the other element in the dislocation pair.
3. The keyboard generation method for secure information input of claim 1,
the preset rule is as follows: randomly arranging elements in the first key position set into K1, K2, K3, …, K (i-1), Ki, …, K (n-1) and K (n), wherein n is the number of all elements in the first key position set, and i and n are natural numbers; and when the element K (i-1) is clicked, reading key position information of the element Ki, wherein the element K (i-1) and the element Ki form a dislocation relation.
4. A keyboard generation apparatus for secure information entry, comprising:
a key position determination module for determining key positions included in a keyboard for inputting as security information;
a dividing module that divides the keys into a first set of keys and a second set of keys; when a first element in the first key position set is clicked, determining a second element corresponding to the first element according to a preset rule, and reading key position information of the second element;
and the display module is used for drawing and displaying the keyboard.
5. A mobile terminal, comprising:
at least one processing device; and the number of the first and second groups,
a memory communicatively coupled to the at least one processing device; wherein the memory stores instructions executable by the at least one processing device to enable the at least one processing device to perform the keyboard generation method for secure information input of any of the preceding claims 1 to 3.
6. A security information input method based on a mobile terminal is characterized by comprising the following steps:
the mobile terminal receives an instruction for opening a safety information input mode and opens and displays a safety keyboard;
receiving security information input based on a security keyboard;
and analyzing the safety information.
7. A security information input apparatus based on a mobile terminal, comprising:
the mobile terminal receives an instruction for opening the safety information input mode and opens and displays a safety keyboard;
the receiving module receives safety information input based on a safety keyboard;
and the analysis module is used for analyzing the safety information.
8. A mobile terminal, comprising:
at least one processing device; and the number of the first and second groups,
a memory communicatively coupled to the at least one processing device; wherein,
the memory stores instructions executable by the at least one processing device to enable the at least one processing device to perform the mobile terminal based security information entry method of claim 6.
9. A non-transitory computer-readable storage medium storing computer instructions for enabling the at least one processing device to perform the keyboard generation method for secure information input of any of the preceding claims 1 to 3.
10. A non-transitory computer-readable storage medium storing computer instructions for enabling the at least one processing device to perform the mobile terminal-based security information input method of claim 6.
CN201911188051.0A 2019-11-28 2019-11-28 Keyboard generation method, security information input method and device and mobile terminal Active CN110941352B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911188051.0A CN110941352B (en) 2019-11-28 2019-11-28 Keyboard generation method, security information input method and device and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911188051.0A CN110941352B (en) 2019-11-28 2019-11-28 Keyboard generation method, security information input method and device and mobile terminal

Publications (2)

Publication Number Publication Date
CN110941352A true CN110941352A (en) 2020-03-31
CN110941352B CN110941352B (en) 2021-05-18

Family

ID=69908191

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911188051.0A Active CN110941352B (en) 2019-11-28 2019-11-28 Keyboard generation method, security information input method and device and mobile terminal

Country Status (1)

Country Link
CN (1) CN110941352B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4857914A (en) * 1986-02-05 1989-08-15 Thrower Keith R Access-control apparatus
JP2009199581A (en) * 2008-01-21 2009-09-03 Nec Corp Personal identification number input device, method, and program, and cellular phone
CN101794365A (en) * 2010-03-23 2010-08-04 中兴通讯股份有限公司 Method for safely inputting information on mobile terminal and mobile terminal
KR101368518B1 (en) * 2012-10-31 2014-02-28 인하대학교 산학협력단 User authentication method with parameterized security and usability
CN104915592A (en) * 2015-05-28 2015-09-16 东莞盛世科技电子实业有限公司 Password setting method and device
CN105022495A (en) * 2014-11-14 2015-11-04 西安百利信息科技有限公司 Cloud service based keyboard system and method capable of implementing customization on key position combination and mapping relationship
CN108182002A (en) * 2018-01-30 2018-06-19 北京小米移动软件有限公司 Layout method, device, equipment and the storage medium of enter key
CN108280374A (en) * 2018-02-27 2018-07-13 惠州Tcl移动通信有限公司 A kind of safe input control method of Mobile terminal keyboard, system and storage medium
CN109613990A (en) * 2018-11-26 2019-04-12 深圳供电局有限公司 Soft keyboard safety input method, server, client, electronic equipment and medium
CN109766107A (en) * 2018-11-28 2019-05-17 合肥联宝信息技术有限公司 A kind of method and device changing keyboard position
CN110275623A (en) * 2018-03-15 2019-09-24 龙芯中科技术有限公司 The triggering method and equipment of button value

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4857914A (en) * 1986-02-05 1989-08-15 Thrower Keith R Access-control apparatus
JP2009199581A (en) * 2008-01-21 2009-09-03 Nec Corp Personal identification number input device, method, and program, and cellular phone
CN101794365A (en) * 2010-03-23 2010-08-04 中兴通讯股份有限公司 Method for safely inputting information on mobile terminal and mobile terminal
KR101368518B1 (en) * 2012-10-31 2014-02-28 인하대학교 산학협력단 User authentication method with parameterized security and usability
CN105022495A (en) * 2014-11-14 2015-11-04 西安百利信息科技有限公司 Cloud service based keyboard system and method capable of implementing customization on key position combination and mapping relationship
CN104915592A (en) * 2015-05-28 2015-09-16 东莞盛世科技电子实业有限公司 Password setting method and device
CN108182002A (en) * 2018-01-30 2018-06-19 北京小米移动软件有限公司 Layout method, device, equipment and the storage medium of enter key
CN108280374A (en) * 2018-02-27 2018-07-13 惠州Tcl移动通信有限公司 A kind of safe input control method of Mobile terminal keyboard, system and storage medium
CN110275623A (en) * 2018-03-15 2019-09-24 龙芯中科技术有限公司 The triggering method and equipment of button value
CN109613990A (en) * 2018-11-26 2019-04-12 深圳供电局有限公司 Soft keyboard safety input method, server, client, electronic equipment and medium
CN109766107A (en) * 2018-11-28 2019-05-17 合肥联宝信息技术有限公司 A kind of method and device changing keyboard position

Also Published As

Publication number Publication date
CN110941352B (en) 2021-05-18

Similar Documents

Publication Publication Date Title
KR101832544B1 (en) Picture gesture authentication
CN104143068B (en) Method of password authentication and system
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
CN105320864A (en) A processing method and device for event operation
CN103092484A (en) Method and device and terminal for unlocking screen
CN112380510B (en) Information verification method, device, electronic equipment and storage medium
CN103873455B (en) A kind of method and device of information checking
CN107895105B (en) Password processing method, terminal equipment and computer readable storage medium
EP2927834A1 (en) Information processing apparatus, information processing method, and recording medium
WO2021244531A1 (en) Payment method and apparatus based on facial recognition
CN106228364A (en) A kind of information demonstrating method and present device
CN103632105A (en) Information displaying method and electronic device
US20160062975A1 (en) Web page providing device, web page providing method, and web page providing program
JP2007310515A (en) Password authentication system, password authentication server, password authentication method and program
CN106203163A (en) A kind of abnormality eliminating method, device and terminal unit
CN103795849A (en) Device and method for executing operation on private contact person in portable terminal
CN107315934A (en) Communication message processing method, mobile terminal and storage device
CN110941352B (en) Keyboard generation method, security information input method and device and mobile terminal
CN106203186A (en) Electronic equipment and message display method thereof
JP2006215923A (en) Screen saver display method and information processing system
CN110837628B (en) Encryption and decryption method and device for terminal equipment, computer equipment and storage medium
CN105335672A (en) Security mode prompting method and apparatus
CN114564764A (en) Password input method, device, equipment and storage medium
CN109298910B (en) Window calling method, mobile terminal and computer readable storage medium
CN109634602B (en) Electronic device, man-machine voting recognition method, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant