[go: nahoru, domu]

CN101030238A - Method for inputting intelligent key safety information - Google Patents

Method for inputting intelligent key safety information Download PDF

Info

Publication number
CN101030238A
CN101030238A CNA2007100653188A CN200710065318A CN101030238A CN 101030238 A CN101030238 A CN 101030238A CN A2007100653188 A CNA2007100653188 A CN A2007100653188A CN 200710065318 A CN200710065318 A CN 200710065318A CN 101030238 A CN101030238 A CN 101030238A
Authority
CN
China
Prior art keywords
character
intelligent key
key apparatus
image
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007100653188A
Other languages
Chinese (zh)
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CNA2007100653188A priority Critical patent/CN101030238A/en
Publication of CN101030238A publication Critical patent/CN101030238A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Input From Keyboards Or The Like (AREA)

Abstract

A method for safely inputting information of intelligent cipher key device includes displaying a group of pre-confirmed character at intelligent cipher key device independent to host on input boundary region in graph or image mode, recording displayed character and its position information, obtaining its position information and comparing it with relevant information stored formerly by said cipher key device when a character is selected by user in order to confirm character to be inputted actually by user.

Description

A kind of information security input method of intelligent key apparatus
Technical field
The present invention relates to information security field, relate in particular to a kind of information security input method of intelligent key apparatus.
Background technology
Along with fast development of information technology, increasing routine work and life activity can be finished by network.But also there is the potential safety hazard that can not be ignored in network providing greatly easily simultaneously for work and life.For example, in the process of concluding the business by network, the private sensitive information of some of user (as account number, password etc.) may be stolen by trojan horse program and be falsely used by malice.Therefore, use account number and password etc. to have very big security risk merely as identity documents.At this type of problem, various information security technologies have appearred.Intelligent key apparatus a kind of information safety devices that comes to this.It adopts the double factor mode of combination of hardware PIN code to carry out authentication, has evaded the stolen risk of account number and password.
Intelligent key apparatus is a kind of small-size computer peripheral hardware equipment that has processor and storer, has functions such as digital signature, data encrypting and deciphering and certificate storage, is applicable to a lot of fields such as E-Government, ecommerce, information privacy, Web bank.Usually, intelligent key apparatus all adopts USB (Universal Serial Bus, USB (universal serial bus)) interface, can link to each other with a USB port on the computing machine, and realization is communicated by letter with computing machine.Various enciphering and deciphering algorithms, digital certificate and key can be stored in intelligent key apparatus inside, and the computing relevant with information security portion fully within it finished.Generally speaking, intelligent key apparatus comes the authenticated identity by combination of hardware PIN (Personal Identification Number, personal identification identification code) sign indicating number or individual subscriber biological characteristic (comprising fingerprint etc.) double factor mode.That is to say that when using intelligent key apparatus, the user not only needs to be connected to computing machine, also needs to import correct PIN code (or personal biology characteristics).Intelligent key apparatus is a kind of information safety devices, and only after the legal identity of confirming its holder, main frame could be visited the data of its storage.In addition, aspect network ID authentication, intelligent key apparatus can provide reliable safety assurance for the user.
Identity authorization system based on intelligent key apparatus mainly contains two kinds of application models: one is based on the certification mode of PKI system, and two are based on the certification mode of impact/response.Asymmetric key mechanisms is present most widely used a kind of Authentication mechanism, and in this mechanism, encryption key and decruption key have nothing in common with each other, and can only decipher with corresponding with it private key with the data of public key encryption.The digital signature of PKI mechanism had both guaranteed the confidentiality of information, guaranteed that again information has non repudiation, its principle is: at first will obtain digital signature expressly with the side's of being verified private key signature, then digital signature is sent to authentication, authentication is verified with the PKI of the side of being verified.
In the process of using intelligent key apparatus, because the information such as PIN code that the user imports by conventional keyboard are the plaintext form, might be stolen by trojan horse program, therefore still there is certain potential safety hazard.
Chinese patent CN1728062 discloses a kind of computer information safe input method based on graphic keyboard, can effectively improve the security of terminal user's data input, stopped trojan horse program and other programs possible to the intercepting of conventional numeric keypad numeral, character input signal and steal, improved the security of system.This method utilizes the mode of figure or image to show each character on inputting interface, and preserves each character and the positional information of this character on inputting interface in computer memory.When the user clicks character graphics or image, obtain its positional information by program, and in computer memory, retrieve its corresponding informance, export corresponding character at last and import as the user.Yet, the character data of key is kept in the computer memory not fool proof because these data might be obtained by hiding trojan horse program on computers.
In addition, in the use of intelligent key apparatus, usually need sensitive informations such as input PIN code and signed data, and these information are in case reveal and by malicious exploitation, will cause an immeasurable loss to the legal holder of intelligent key apparatus.
Summary of the invention
The information security input method that the purpose of this invention is to provide a kind of intelligent key apparatus, it is to be presented on the inputting interface zone by the form of predetermined one group of character in the intelligent key apparatus that will be independent of main frame with figure or image, and write down shown character and positional information thereof, after the user selects one of them character, intelligent key apparatus obtains its positional information and its relevant information with storage is before compared, thereby determines the character of the actual input of user.
Said method specifically comprises the steps:
1) intelligent key apparatus is connected with main frame by USB interface, the line data communication of going forward side by side;
2) intelligent key apparatus pre-determines the input character set;
3) form of each character in the predetermined input character set in the intelligent key apparatus with figure or image is presented on the inputting interface zone one by one;
4) intelligent key apparatus is preserved each character and the positional information thereof that is presented on the inputting interface zone, and this positional information can be the coordinate or the sequence of positions information of each character graphics or image;
5) user is by with click or use button or other multiple modes are chosen the figure or the image of a character in the inputting interface zone, and intelligent key apparatus obtains the positional information of selected character graphics or image;
6) intelligent key apparatus is retrieved its positional information of preserving, and determines and the input character of this positional information corresponding characters as the user.
Described button chooses the concrete steps of the figure of a character or image as follows: each character graphics or image in the highlighted demonstration inputting interface of (1) circulation zone; (2) be highlighted when showing when the figure of the character that will import or image, push button it is chosen.
The figure or the image of each character that shows on the described inputting interface zone are created by intelligent key apparatus.
The figure of the character of described predetermined character set or image, when the user imported at every turn, the display position on described inputting interface zone was variable.
Described predetermined input character set comprise from 0-9, a-z, A-Z., * ,+,-, the space, ↑, ↓, ←, →, the subclass relevant selected the set such as # with current application.
The figure of described each character or image are on the normal font basis of shown character, add that hot-tempered point, background add that lines, background add one or more processing in the mode such as picture and the figure or the image that produce through overstriking, stretching, distortion, inclination, art up, background at random.
Described button comprises the dedicated button on keyboard, mousebutton or the intelligent key apparatus.
Compared with prior art, it is anti-aggressive that method provided by the invention adopts multiple mode to improve, can effectively prevent the stealing that trojan horse program and other programs are possible to conventional numeric keypad and character input signal, the actual value of user's input is not transmitted in main frame in whole process, and because intelligent key apparatus is a kind of information safety devices, compared with prior art, the significant data of having avoided being correlated with on the one hand directly is stored in internal memory, have higher data storage security, also improved the security of input information when using intelligent key apparatus on the other hand.
Description of drawings
Fig. 1 is the synoptic diagram of the soft keyboard that relates to of the inventive method;
Fig. 2 is the schematic flow sheet of a kind of embodiment of the inventive method.
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
Figure 1 shows that the exemplary plot of the soft keyboard that on display screen, shows.Wherein, frame 101 is the border of inputting interface zone soft keyboard; One group of bitmap 102 is the button on the described soft keyboard.Soft keyboard of the present invention is to be generated on display screen by the intelligent key apparatus that is connected on the main frame, and its shape can be rectangle, ellipse etc.Each character and function key all can have the bitmap images of a correspondence.Described character and function key comprise: from 0-9, a-z, A-Z., * ,+,-, the space, ↑, ↓, ←, →, # etc.When the needs user imported, the soft keyboard display routine of intelligent key apparatus can access character relevant with current application and function key, and it is transferred to main frame, made in its inputting interface zone that is presented at screen.The figure of described each character and function key or image (each button on the soft keyboard) are on its normal font basis, add that hot-tempered point, background add that lines, background add one or more processing in the mode such as picture and the figure or the image that produce through overstriking, stretching, distortion, inclination, art up, background at random.The figure of each character or function key or the image position in showing input area is at random.In addition, the position of described soft keyboard also is uncertain, by the program STOCHASTIC CONTROL.By the way, greatly reduce the possibility that user's input information is intercepted and captured by trojan horse program.
Figure 2 shows that based on the embodiment of the information security input method of a kind of intelligent key apparatus of soft keyboard shown in Figure 1, comprise the steps:
Step 201 connects intelligent key apparatus and main frame.Intelligent key apparatus is connected to main frame, makes and set up the communication connection between the two.Usually, both adopt USB interface to carry out data communication.
Step 202, intelligent key apparatus pre-determine the input character set.After intelligent key apparatus and the binding of certain application program, pre-determine the required input character according to current application.
Step 203 is determined the position of inputting interface zone on screen at random.Mainframe program is determined the particular location of soft keyboard on display screen at random.With the rectangular area is example, can determine the coordinate (X in the upper left corner that this is regional 0, Y 0).If other shapes, also can determine the position of central point.
Step 204 is created the inputting interface regional window on display screen.Mainframe program is determined the zone of a specific size and shape at random on display screen.With the rectangular area is example, if length that should the zone is a, width is b, and coordinate that then should the lower right corner, zone is exactly (X 0+ a, Y 0+ b).At (X 0, Y 0) and (X 0+ a, Y 0+ b) just formed a soft keyboard zone in the scope.
Step 205, intelligent key apparatus are created the figure or the image of each character in the predetermined input character set.
Step 206, according to character graphics or image that intelligent key apparatus is created, mainframe program is inserted each button (being character graphics or image) on soft keyboard.In order to improve security, the particular location of button can be determined at random by mainframe program.
Step 207, the positional information of each button of record in intelligent key apparatus comprises the coordinate range of each button or the actual characters or the function key assignments of its sequence of positions and correspondence thereof.Mainframe program passes to intelligent key apparatus with above-mentioned positional information, and intelligent key apparatus is preserved this information.
Step 208, intelligent key apparatus obtains the user and selects information.When any one button in user's usefulness click soft keyboard, intelligent key apparatus obtains click positional information (can be the sequence of positions information of its coordinate or button) by mainframe program, and itself and the information that prestores compared, thereby determine the value of the actual input of user.Perhaps, if each button on the soft keyboard is to be highlighted demonstration in order successively, also can determine input character by button.Herein, described button can be the dedicated button on keyboard, mousebutton or the intelligent key apparatus.In this case, each character graphics or image in the highlighted demonstration inputting interface of the program loop zone when the figure of the character that will import or image are highlighted when showing, push button it are chosen.Then, intelligent key apparatus obtains the character graphics of user's selection or the positional information of image (being the soft keyboard button) by mainframe program.
Step 209, intelligent key apparatus compares user's the selection information and the key position information of its storage, determines active user's actual input.The positional information of the selected button that intelligent key apparatus will receive compares with the positional information that prestores, thereby determines the value of the actual input of user.
Step 210, mainframe program change the position in inputting interface zone, for user next time imports ready.
Step 211, intelligent key apparatus continue to accept user's input, are closed up to soft keyboard.
It is anti-aggressive that method provided by the invention adopts multiple mode to improve, can effectively prevent the stealing that trojan horse program and other programs are possible to conventional numeric keypad and character input signal, the actual value of user's input is not transmitted in main frame in whole process, and because intelligent key apparatus is a kind of information safety devices, compared with prior art, the significant data of having avoided being correlated with on the one hand directly is stored in internal memory, have higher data storage security, also improved the security of input information when using intelligent key apparatus on the other hand.
Above-described embodiment is a more preferably embodiment of the present invention, and common variation that those skilled in the art carries out in the technical solution of the present invention scope and replacement all should be included in protection scope of the present invention.

Claims (9)

1. the information security input method of an intelligent key apparatus, it is characterized in that, to be independent of predetermined one group of character in the intelligent key apparatus of main frame is presented on the inputting interface zone with the form of figure or image, and write down shown character and positional information thereof, after the user selects one of them character, intelligent key apparatus obtains its positional information and its relevant information with storage is before compared, thereby determines the character of the actual input of user.
2. according to the information security input method of the described intelligent key apparatus of claim 1, it is characterized in that said method specifically comprises the steps:
1) intelligent key apparatus is connected with main frame by USB interface, the line data communication of going forward side by side;
2) intelligent key apparatus pre-determines the input character set;
3) form of each character in the predetermined input character set in the intelligent key apparatus with figure or image is presented on the inputting interface zone one by one;
4) intelligent key apparatus is preserved each character and the positional information thereof that is presented on the inputting interface zone, and this positional information can be the coordinate or the sequence of positions information of each character graphics or image;
5) user is by with click or use button or other multiple modes are chosen the figure or the image of a character in the inputting interface zone, and intelligent key apparatus obtains the positional information of selected character graphics or image;
6) intelligent key apparatus is retrieved its positional information of preserving, and determines and the input character of this positional information corresponding characters as the user.
3. according to the information security input method of claim 1 or 2 described intelligent key apparatus, it is characterized in that, described inputting interface zone determined on display screen by mainframe program, and during the each input information of user, the position in described inputting interface zone is at random.
4. according to the information security input method of the described intelligent key apparatus of claim 2, it is characterized in that described button chooses the concrete steps of the figure of a character or image as follows: each character graphics or image in the highlighted demonstration inputting interface of (1) circulation zone; (2) be highlighted when showing when the figure of the character that will import or image, push button it is chosen.
5. according to the information security input method of claim 1,2 or 4 described intelligent key apparatus, it is characterized in that the figure or the image of each character that shows on the described inputting interface zone are created by intelligent key apparatus.
6. according to the information security input method of claim 1,2 or 4 described intelligent key apparatus, it is characterized in that, the figure of the character of described predetermined character set or image, when the user imported at every turn, the display position on described inputting interface zone was variable.
7. according to the information security input method of claim 1,2 or 4 described intelligent key apparatus, it is characterized in that, described predetermined input character set comprise from 0-9, a-z, A-Z., * ,+,-, the space, ↑, ↓, ←, →, the subclass relevant selected the set such as # with current application.
8. according to the information security input method of claim 1,2 or 4 described intelligent key apparatus, it is characterized in that, the figure of described each character or image are on the normal font basis of shown character, add that hot-tempered point, background add that lines, background add one or more processing in the mode such as picture and the figure or the image that produce through overstriking, stretching, distortion, inclination, art up, background at random.
9. according to the information security input method of claim 2 or 4 described intelligent key apparatus, it is characterized in that described button comprises the dedicated button on keyboard, mousebutton or the intelligent key apparatus.
CNA2007100653188A 2007-04-11 2007-04-11 Method for inputting intelligent key safety information Pending CN101030238A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007100653188A CN101030238A (en) 2007-04-11 2007-04-11 Method for inputting intelligent key safety information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007100653188A CN101030238A (en) 2007-04-11 2007-04-11 Method for inputting intelligent key safety information

Publications (1)

Publication Number Publication Date
CN101030238A true CN101030238A (en) 2007-09-05

Family

ID=38715578

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007100653188A Pending CN101030238A (en) 2007-04-11 2007-04-11 Method for inputting intelligent key safety information

Country Status (1)

Country Link
CN (1) CN101030238A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101977107A (en) * 2010-10-22 2011-02-16 北京天地融科技有限公司 Dynamic password token device and parameter configuration processing method thereof
CN101291226B (en) * 2008-05-19 2011-09-21 北京深思洛克软件技术股份有限公司 Method for enhancing security verified by information security device using image information
CN102194069A (en) * 2010-03-18 2011-09-21 F2威尔股份有限公司 Test data generating method, data management system and computer program product thereof
CN102332065A (en) * 2010-07-13 2012-01-25 F2威尔股份有限公司 Completely automated public test to tell computers and humans apart (CAPTCH) data generating method, and management system and method thereof
CN102546550A (en) * 2010-12-21 2012-07-04 F2威尔股份有限公司 Management method and management system for full-automatic computer and human being distinction test data
CN104090688A (en) * 2014-08-06 2014-10-08 广东欧珀移动通信有限公司 Password input method and device for mobile terminal
CN104704450A (en) * 2012-10-10 2015-06-10 奥林巴斯株式会社 Head-mounted display device, unlock processing system, program, head-mounted display device control method, and unlock processing system control method
CN108139858A (en) * 2015-09-26 2018-06-08 高通股份有限公司 Secure identification information input on small-sized touch-screen display
TWI628558B (en) * 2013-06-25 2018-07-01 中國銀聯股份有限公司 a method of indicating a mobile device operating environment and a mobile device capable of indicating an operating environment
CN114268447A (en) * 2020-09-16 2022-04-01 京东科技信息技术有限公司 File transmission method and device, electronic equipment and computer readable medium
CN114448650A (en) * 2022-04-12 2022-05-06 深圳市乐凡信息科技有限公司 Encryption authentication method, device, equipment and storage medium

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101291226B (en) * 2008-05-19 2011-09-21 北京深思洛克软件技术股份有限公司 Method for enhancing security verified by information security device using image information
CN102194069A (en) * 2010-03-18 2011-09-21 F2威尔股份有限公司 Test data generating method, data management system and computer program product thereof
CN102332065A (en) * 2010-07-13 2012-01-25 F2威尔股份有限公司 Completely automated public test to tell computers and humans apart (CAPTCH) data generating method, and management system and method thereof
CN101977107A (en) * 2010-10-22 2011-02-16 北京天地融科技有限公司 Dynamic password token device and parameter configuration processing method thereof
CN102546550A (en) * 2010-12-21 2012-07-04 F2威尔股份有限公司 Management method and management system for full-automatic computer and human being distinction test data
CN104704450A (en) * 2012-10-10 2015-06-10 奥林巴斯株式会社 Head-mounted display device, unlock processing system, program, head-mounted display device control method, and unlock processing system control method
TWI628558B (en) * 2013-06-25 2018-07-01 中國銀聯股份有限公司 a method of indicating a mobile device operating environment and a mobile device capable of indicating an operating environment
CN104090688A (en) * 2014-08-06 2014-10-08 广东欧珀移动通信有限公司 Password input method and device for mobile terminal
CN104090688B (en) * 2014-08-06 2018-01-16 广东欧珀移动通信有限公司 The cipher-code input method and device of a kind of mobile terminal
CN108139858A (en) * 2015-09-26 2018-06-08 高通股份有限公司 Secure identification information input on small-sized touch-screen display
CN114268447A (en) * 2020-09-16 2022-04-01 京东科技信息技术有限公司 File transmission method and device, electronic equipment and computer readable medium
CN114268447B (en) * 2020-09-16 2023-04-07 京东科技信息技术有限公司 File transmission method and device, electronic equipment and computer readable medium
CN114448650A (en) * 2022-04-12 2022-05-06 深圳市乐凡信息科技有限公司 Encryption authentication method, device, equipment and storage medium
CN114448650B (en) * 2022-04-12 2022-07-01 深圳市乐凡信息科技有限公司 Encryption authentication method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN101030238A (en) Method for inputting intelligent key safety information
US20190260748A1 (en) Securing a transaction performed from a non-secure terminal
US10528717B2 (en) User authentication
US10176315B2 (en) Graphical authentication
US8108685B2 (en) Apparatus and method for indicating password quality and variety
EP1190290B1 (en) System for digitally signing a document
US9740884B2 (en) Method and device for generating a code
US9514316B2 (en) Optical security enhancement device
US9117068B1 (en) Password protection using pattern
US20090252323A1 (en) Methods, techniques and system for maintaining security on computer systems
US8769406B2 (en) Image display apparatus capable of displaying image while retaining confidentiality
US20040073809A1 (en) System and method for securing a user verification on a network using cursor control
US20060288226A1 (en) System and method for establishing and authorizing a security code
US20120243682A1 (en) Method and system for transmitting data from a first data processing device to a second data processing device
CN107273736B (en) Cipher-code input method, device, computer equipment and storage medium
US20080077978A1 (en) Abstract password and input method
US20080077974A1 (en) Authentication method
US20120198530A1 (en) Real time password generation apparatus and method
US9418215B2 (en) Optical security enhancement device
CN108229190A (en) Control method, device, program, storage medium and the electronic equipment of transparent encryption and decryption
JP4704369B2 (en) Computer system and user authentication method
EP2992476B1 (en) Optical security enhancement device
Rani et al. A Novel Session Password Security Technique using Textual Color and Images
EP3319068A1 (en) Method for securely transmitting a secret data to a user of a terminal
US20230409747A1 (en) Obfuscating information in content presented on a display

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20070905