CN101030238A - Method for inputting intelligent key safety information - Google Patents
Method for inputting intelligent key safety information Download PDFInfo
- Publication number
- CN101030238A CN101030238A CNA2007100653188A CN200710065318A CN101030238A CN 101030238 A CN101030238 A CN 101030238A CN A2007100653188 A CNA2007100653188 A CN A2007100653188A CN 200710065318 A CN200710065318 A CN 200710065318A CN 101030238 A CN101030238 A CN 101030238A
- Authority
- CN
- China
- Prior art keywords
- character
- intelligent key
- key apparatus
- image
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Input From Keyboards Or The Like (AREA)
Abstract
A method for safely inputting information of intelligent cipher key device includes displaying a group of pre-confirmed character at intelligent cipher key device independent to host on input boundary region in graph or image mode, recording displayed character and its position information, obtaining its position information and comparing it with relevant information stored formerly by said cipher key device when a character is selected by user in order to confirm character to be inputted actually by user.
Description
Technical field
The present invention relates to information security field, relate in particular to a kind of information security input method of intelligent key apparatus.
Background technology
Along with fast development of information technology, increasing routine work and life activity can be finished by network.But also there is the potential safety hazard that can not be ignored in network providing greatly easily simultaneously for work and life.For example, in the process of concluding the business by network, the private sensitive information of some of user (as account number, password etc.) may be stolen by trojan horse program and be falsely used by malice.Therefore, use account number and password etc. to have very big security risk merely as identity documents.At this type of problem, various information security technologies have appearred.Intelligent key apparatus a kind of information safety devices that comes to this.It adopts the double factor mode of combination of hardware PIN code to carry out authentication, has evaded the stolen risk of account number and password.
Intelligent key apparatus is a kind of small-size computer peripheral hardware equipment that has processor and storer, has functions such as digital signature, data encrypting and deciphering and certificate storage, is applicable to a lot of fields such as E-Government, ecommerce, information privacy, Web bank.Usually, intelligent key apparatus all adopts USB (Universal Serial Bus, USB (universal serial bus)) interface, can link to each other with a USB port on the computing machine, and realization is communicated by letter with computing machine.Various enciphering and deciphering algorithms, digital certificate and key can be stored in intelligent key apparatus inside, and the computing relevant with information security portion fully within it finished.Generally speaking, intelligent key apparatus comes the authenticated identity by combination of hardware PIN (Personal Identification Number, personal identification identification code) sign indicating number or individual subscriber biological characteristic (comprising fingerprint etc.) double factor mode.That is to say that when using intelligent key apparatus, the user not only needs to be connected to computing machine, also needs to import correct PIN code (or personal biology characteristics).Intelligent key apparatus is a kind of information safety devices, and only after the legal identity of confirming its holder, main frame could be visited the data of its storage.In addition, aspect network ID authentication, intelligent key apparatus can provide reliable safety assurance for the user.
Identity authorization system based on intelligent key apparatus mainly contains two kinds of application models: one is based on the certification mode of PKI system, and two are based on the certification mode of impact/response.Asymmetric key mechanisms is present most widely used a kind of Authentication mechanism, and in this mechanism, encryption key and decruption key have nothing in common with each other, and can only decipher with corresponding with it private key with the data of public key encryption.The digital signature of PKI mechanism had both guaranteed the confidentiality of information, guaranteed that again information has non repudiation, its principle is: at first will obtain digital signature expressly with the side's of being verified private key signature, then digital signature is sent to authentication, authentication is verified with the PKI of the side of being verified.
In the process of using intelligent key apparatus, because the information such as PIN code that the user imports by conventional keyboard are the plaintext form, might be stolen by trojan horse program, therefore still there is certain potential safety hazard.
Chinese patent CN1728062 discloses a kind of computer information safe input method based on graphic keyboard, can effectively improve the security of terminal user's data input, stopped trojan horse program and other programs possible to the intercepting of conventional numeric keypad numeral, character input signal and steal, improved the security of system.This method utilizes the mode of figure or image to show each character on inputting interface, and preserves each character and the positional information of this character on inputting interface in computer memory.When the user clicks character graphics or image, obtain its positional information by program, and in computer memory, retrieve its corresponding informance, export corresponding character at last and import as the user.Yet, the character data of key is kept in the computer memory not fool proof because these data might be obtained by hiding trojan horse program on computers.
In addition, in the use of intelligent key apparatus, usually need sensitive informations such as input PIN code and signed data, and these information are in case reveal and by malicious exploitation, will cause an immeasurable loss to the legal holder of intelligent key apparatus.
Summary of the invention
The information security input method that the purpose of this invention is to provide a kind of intelligent key apparatus, it is to be presented on the inputting interface zone by the form of predetermined one group of character in the intelligent key apparatus that will be independent of main frame with figure or image, and write down shown character and positional information thereof, after the user selects one of them character, intelligent key apparatus obtains its positional information and its relevant information with storage is before compared, thereby determines the character of the actual input of user.
Said method specifically comprises the steps:
1) intelligent key apparatus is connected with main frame by USB interface, the line data communication of going forward side by side;
2) intelligent key apparatus pre-determines the input character set;
3) form of each character in the predetermined input character set in the intelligent key apparatus with figure or image is presented on the inputting interface zone one by one;
4) intelligent key apparatus is preserved each character and the positional information thereof that is presented on the inputting interface zone, and this positional information can be the coordinate or the sequence of positions information of each character graphics or image;
5) user is by with click or use button or other multiple modes are chosen the figure or the image of a character in the inputting interface zone, and intelligent key apparatus obtains the positional information of selected character graphics or image;
6) intelligent key apparatus is retrieved its positional information of preserving, and determines and the input character of this positional information corresponding characters as the user.
Described button chooses the concrete steps of the figure of a character or image as follows: each character graphics or image in the highlighted demonstration inputting interface of (1) circulation zone; (2) be highlighted when showing when the figure of the character that will import or image, push button it is chosen.
The figure or the image of each character that shows on the described inputting interface zone are created by intelligent key apparatus.
The figure of the character of described predetermined character set or image, when the user imported at every turn, the display position on described inputting interface zone was variable.
Described predetermined input character set comprise from 0-9, a-z, A-Z., * ,+,-, the space, ↑, ↓, ←, →, the subclass relevant selected the set such as # with current application.
The figure of described each character or image are on the normal font basis of shown character, add that hot-tempered point, background add that lines, background add one or more processing in the mode such as picture and the figure or the image that produce through overstriking, stretching, distortion, inclination, art up, background at random.
Described button comprises the dedicated button on keyboard, mousebutton or the intelligent key apparatus.
Compared with prior art, it is anti-aggressive that method provided by the invention adopts multiple mode to improve, can effectively prevent the stealing that trojan horse program and other programs are possible to conventional numeric keypad and character input signal, the actual value of user's input is not transmitted in main frame in whole process, and because intelligent key apparatus is a kind of information safety devices, compared with prior art, the significant data of having avoided being correlated with on the one hand directly is stored in internal memory, have higher data storage security, also improved the security of input information when using intelligent key apparatus on the other hand.
Description of drawings
Fig. 1 is the synoptic diagram of the soft keyboard that relates to of the inventive method;
Fig. 2 is the schematic flow sheet of a kind of embodiment of the inventive method.
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
Figure 1 shows that the exemplary plot of the soft keyboard that on display screen, shows.Wherein, frame 101 is the border of inputting interface zone soft keyboard; One group of bitmap 102 is the button on the described soft keyboard.Soft keyboard of the present invention is to be generated on display screen by the intelligent key apparatus that is connected on the main frame, and its shape can be rectangle, ellipse etc.Each character and function key all can have the bitmap images of a correspondence.Described character and function key comprise: from 0-9, a-z, A-Z., * ,+,-, the space, ↑, ↓, ←, →, # etc.When the needs user imported, the soft keyboard display routine of intelligent key apparatus can access character relevant with current application and function key, and it is transferred to main frame, made in its inputting interface zone that is presented at screen.The figure of described each character and function key or image (each button on the soft keyboard) are on its normal font basis, add that hot-tempered point, background add that lines, background add one or more processing in the mode such as picture and the figure or the image that produce through overstriking, stretching, distortion, inclination, art up, background at random.The figure of each character or function key or the image position in showing input area is at random.In addition, the position of described soft keyboard also is uncertain, by the program STOCHASTIC CONTROL.By the way, greatly reduce the possibility that user's input information is intercepted and captured by trojan horse program.
Figure 2 shows that based on the embodiment of the information security input method of a kind of intelligent key apparatus of soft keyboard shown in Figure 1, comprise the steps:
It is anti-aggressive that method provided by the invention adopts multiple mode to improve, can effectively prevent the stealing that trojan horse program and other programs are possible to conventional numeric keypad and character input signal, the actual value of user's input is not transmitted in main frame in whole process, and because intelligent key apparatus is a kind of information safety devices, compared with prior art, the significant data of having avoided being correlated with on the one hand directly is stored in internal memory, have higher data storage security, also improved the security of input information when using intelligent key apparatus on the other hand.
Above-described embodiment is a more preferably embodiment of the present invention, and common variation that those skilled in the art carries out in the technical solution of the present invention scope and replacement all should be included in protection scope of the present invention.
Claims (9)
1. the information security input method of an intelligent key apparatus, it is characterized in that, to be independent of predetermined one group of character in the intelligent key apparatus of main frame is presented on the inputting interface zone with the form of figure or image, and write down shown character and positional information thereof, after the user selects one of them character, intelligent key apparatus obtains its positional information and its relevant information with storage is before compared, thereby determines the character of the actual input of user.
2. according to the information security input method of the described intelligent key apparatus of claim 1, it is characterized in that said method specifically comprises the steps:
1) intelligent key apparatus is connected with main frame by USB interface, the line data communication of going forward side by side;
2) intelligent key apparatus pre-determines the input character set;
3) form of each character in the predetermined input character set in the intelligent key apparatus with figure or image is presented on the inputting interface zone one by one;
4) intelligent key apparatus is preserved each character and the positional information thereof that is presented on the inputting interface zone, and this positional information can be the coordinate or the sequence of positions information of each character graphics or image;
5) user is by with click or use button or other multiple modes are chosen the figure or the image of a character in the inputting interface zone, and intelligent key apparatus obtains the positional information of selected character graphics or image;
6) intelligent key apparatus is retrieved its positional information of preserving, and determines and the input character of this positional information corresponding characters as the user.
3. according to the information security input method of claim 1 or 2 described intelligent key apparatus, it is characterized in that, described inputting interface zone determined on display screen by mainframe program, and during the each input information of user, the position in described inputting interface zone is at random.
4. according to the information security input method of the described intelligent key apparatus of claim 2, it is characterized in that described button chooses the concrete steps of the figure of a character or image as follows: each character graphics or image in the highlighted demonstration inputting interface of (1) circulation zone; (2) be highlighted when showing when the figure of the character that will import or image, push button it is chosen.
5. according to the information security input method of claim 1,2 or 4 described intelligent key apparatus, it is characterized in that the figure or the image of each character that shows on the described inputting interface zone are created by intelligent key apparatus.
6. according to the information security input method of claim 1,2 or 4 described intelligent key apparatus, it is characterized in that, the figure of the character of described predetermined character set or image, when the user imported at every turn, the display position on described inputting interface zone was variable.
7. according to the information security input method of claim 1,2 or 4 described intelligent key apparatus, it is characterized in that, described predetermined input character set comprise from 0-9, a-z, A-Z., * ,+,-, the space, ↑, ↓, ←, →, the subclass relevant selected the set such as # with current application.
8. according to the information security input method of claim 1,2 or 4 described intelligent key apparatus, it is characterized in that, the figure of described each character or image are on the normal font basis of shown character, add that hot-tempered point, background add that lines, background add one or more processing in the mode such as picture and the figure or the image that produce through overstriking, stretching, distortion, inclination, art up, background at random.
9. according to the information security input method of claim 2 or 4 described intelligent key apparatus, it is characterized in that described button comprises the dedicated button on keyboard, mousebutton or the intelligent key apparatus.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007100653188A CN101030238A (en) | 2007-04-11 | 2007-04-11 | Method for inputting intelligent key safety information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007100653188A CN101030238A (en) | 2007-04-11 | 2007-04-11 | Method for inputting intelligent key safety information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101030238A true CN101030238A (en) | 2007-09-05 |
Family
ID=38715578
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2007100653188A Pending CN101030238A (en) | 2007-04-11 | 2007-04-11 | Method for inputting intelligent key safety information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101030238A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101977107A (en) * | 2010-10-22 | 2011-02-16 | 北京天地融科技有限公司 | Dynamic password token device and parameter configuration processing method thereof |
CN101291226B (en) * | 2008-05-19 | 2011-09-21 | 北京深思洛克软件技术股份有限公司 | Method for enhancing security verified by information security device using image information |
CN102194069A (en) * | 2010-03-18 | 2011-09-21 | F2威尔股份有限公司 | Test data generating method, data management system and computer program product thereof |
CN102332065A (en) * | 2010-07-13 | 2012-01-25 | F2威尔股份有限公司 | Completely automated public test to tell computers and humans apart (CAPTCH) data generating method, and management system and method thereof |
CN102546550A (en) * | 2010-12-21 | 2012-07-04 | F2威尔股份有限公司 | Management method and management system for full-automatic computer and human being distinction test data |
CN104090688A (en) * | 2014-08-06 | 2014-10-08 | 广东欧珀移动通信有限公司 | Password input method and device for mobile terminal |
CN104704450A (en) * | 2012-10-10 | 2015-06-10 | 奥林巴斯株式会社 | Head-mounted display device, unlock processing system, program, head-mounted display device control method, and unlock processing system control method |
CN108139858A (en) * | 2015-09-26 | 2018-06-08 | 高通股份有限公司 | Secure identification information input on small-sized touch-screen display |
TWI628558B (en) * | 2013-06-25 | 2018-07-01 | 中國銀聯股份有限公司 | a method of indicating a mobile device operating environment and a mobile device capable of indicating an operating environment |
CN114268447A (en) * | 2020-09-16 | 2022-04-01 | 京东科技信息技术有限公司 | File transmission method and device, electronic equipment and computer readable medium |
CN114448650A (en) * | 2022-04-12 | 2022-05-06 | 深圳市乐凡信息科技有限公司 | Encryption authentication method, device, equipment and storage medium |
-
2007
- 2007-04-11 CN CNA2007100653188A patent/CN101030238A/en active Pending
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101291226B (en) * | 2008-05-19 | 2011-09-21 | 北京深思洛克软件技术股份有限公司 | Method for enhancing security verified by information security device using image information |
CN102194069A (en) * | 2010-03-18 | 2011-09-21 | F2威尔股份有限公司 | Test data generating method, data management system and computer program product thereof |
CN102332065A (en) * | 2010-07-13 | 2012-01-25 | F2威尔股份有限公司 | Completely automated public test to tell computers and humans apart (CAPTCH) data generating method, and management system and method thereof |
CN101977107A (en) * | 2010-10-22 | 2011-02-16 | 北京天地融科技有限公司 | Dynamic password token device and parameter configuration processing method thereof |
CN102546550A (en) * | 2010-12-21 | 2012-07-04 | F2威尔股份有限公司 | Management method and management system for full-automatic computer and human being distinction test data |
CN104704450A (en) * | 2012-10-10 | 2015-06-10 | 奥林巴斯株式会社 | Head-mounted display device, unlock processing system, program, head-mounted display device control method, and unlock processing system control method |
TWI628558B (en) * | 2013-06-25 | 2018-07-01 | 中國銀聯股份有限公司 | a method of indicating a mobile device operating environment and a mobile device capable of indicating an operating environment |
CN104090688A (en) * | 2014-08-06 | 2014-10-08 | 广东欧珀移动通信有限公司 | Password input method and device for mobile terminal |
CN104090688B (en) * | 2014-08-06 | 2018-01-16 | 广东欧珀移动通信有限公司 | The cipher-code input method and device of a kind of mobile terminal |
CN108139858A (en) * | 2015-09-26 | 2018-06-08 | 高通股份有限公司 | Secure identification information input on small-sized touch-screen display |
CN114268447A (en) * | 2020-09-16 | 2022-04-01 | 京东科技信息技术有限公司 | File transmission method and device, electronic equipment and computer readable medium |
CN114268447B (en) * | 2020-09-16 | 2023-04-07 | 京东科技信息技术有限公司 | File transmission method and device, electronic equipment and computer readable medium |
CN114448650A (en) * | 2022-04-12 | 2022-05-06 | 深圳市乐凡信息科技有限公司 | Encryption authentication method, device, equipment and storage medium |
CN114448650B (en) * | 2022-04-12 | 2022-07-01 | 深圳市乐凡信息科技有限公司 | Encryption authentication method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101030238A (en) | Method for inputting intelligent key safety information | |
US20190260748A1 (en) | Securing a transaction performed from a non-secure terminal | |
US10528717B2 (en) | User authentication | |
US10176315B2 (en) | Graphical authentication | |
US8108685B2 (en) | Apparatus and method for indicating password quality and variety | |
EP1190290B1 (en) | System for digitally signing a document | |
US9740884B2 (en) | Method and device for generating a code | |
US9514316B2 (en) | Optical security enhancement device | |
US9117068B1 (en) | Password protection using pattern | |
US20090252323A1 (en) | Methods, techniques and system for maintaining security on computer systems | |
US8769406B2 (en) | Image display apparatus capable of displaying image while retaining confidentiality | |
US20040073809A1 (en) | System and method for securing a user verification on a network using cursor control | |
US20060288226A1 (en) | System and method for establishing and authorizing a security code | |
US20120243682A1 (en) | Method and system for transmitting data from a first data processing device to a second data processing device | |
CN107273736B (en) | Cipher-code input method, device, computer equipment and storage medium | |
US20080077978A1 (en) | Abstract password and input method | |
US20080077974A1 (en) | Authentication method | |
US20120198530A1 (en) | Real time password generation apparatus and method | |
US9418215B2 (en) | Optical security enhancement device | |
CN108229190A (en) | Control method, device, program, storage medium and the electronic equipment of transparent encryption and decryption | |
JP4704369B2 (en) | Computer system and user authentication method | |
EP2992476B1 (en) | Optical security enhancement device | |
Rani et al. | A Novel Session Password Security Technique using Textual Color and Images | |
EP3319068A1 (en) | Method for securely transmitting a secret data to a user of a terminal | |
US20230409747A1 (en) | Obfuscating information in content presented on a display |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20070905 |