Browse Prior Art Database

A method to input password safely with preventing peek

IP.com Disclosure Number: IPCOM000244317D
Publication Date: 2015-Dec-02
Document File: 2 page(s) / 36K

Publishing Venue

The IP.com Prior Art Database

Abstract

Many mobile devices (smartphone, tablet, etc) use virtual keyboard to input there credential information and sensitive data on the screen of the device, and most likely the devices use QWERTY keyboard, but there maybe a risk that , someone may peek their finger movement or just capture or record the range of the fingure movement , and then analyzes the credential data they input by re-play the finger movement range, detect the sensitive data such as account password and others.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 2

A method to input password safely with preventing peek

Many mobile devices (smartphone, tablet, etc) use virtual keyboard to input there credential information and sensitive data on the screen of the device, and most likely the devices use QWERTY keyboard, but there maybe a risk that , someone may peek their finger movement or just capture or record the range of the fingure movement , and then analyzes the credential data they input by re-play the finger movement range, detect the sensitive data such as account password and others.

Target at the peek behavior at the user input , this method use a new , self-defined keyboard to avoid hackers' peek.

1. User installs one or more intelligent teeth on his/her mouth, the intelligent teeth can communicate with smart phones via some protocol, such as blue teeth.

2. User should define a password policy on the device, user choose the most-likely used characters for their password input considering his intelligent teeth numbers. For example, user may set 'Q,A,Z,D,C,1,5,6,*,&' as a password-set, as he installs ten intelligent teeth, his most used passwords are all contained in this set, user's actual password is a sub-set of this password-set.

3. User declare a new keyboard for input password in the mobile system, for example, 'teeth keyboard', the customized keyboard's keys are the user-choosed password-set, and he assign the relationship between the tooth and the password char within the password-set, each intelligent tooth will assign a password char, namely there is a password char-tooth map for each password char and a tooth.

4. When user choose a password text input field and the system prompts for user to input there account password, user can :

4.1 Choose the user customized virtual keyboard as the input keyboard

4.2 The virtual 'tooth keyboard' displays on the screen.

4.3 When the user touch or touch twice on a specific part of intelligent tooth, the sensor in the intelligent tooth get the touch action and send a signal to the smart phone.

4.4 The virtual 'tooth keyboard' get the signal from a specific tooth, it retrieves the corresponding password char from the password char-tooth map, displays on the screen that the tooth is touched, and then input the password in the password field.

5. User inputs all the needed passwords by touches the teeth, and finishes the password input.

By us...