Method for secure data entry in an application

An application program and data technology, applied in the input/output process of data processing, digital transmission system, safety communication device, etc., can solve problems such as capture

Active Publication Date: 2008-05-21
CISCO TECH INC
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The association between operating system 16, device driver 20, and keyboard 14 makes the process of entering data vulnerable to malicious programs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for secure data entry in an application
  • Method for secure data entry in an application
  • Method for secure data entry in an application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In the following description, for purposes of explanation, numerous specific details are given in order to provide a thorough understanding of embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details.

[0024] The transfer of confidential data from the user to the application is inherently insecure. Thus, in an example embodiment, user-entered confidential data bypasses traditional data flow through OS components which, in many instances, are the cause of insecurity. In an example embodiment, the motion of the pointing device is utilized, and thus OS components or similar components that may render data unsafe may be avoided. In this way, the use of a hardware keyboard is avoided, and thus no physical pressing of the keys is required. To avoid the use of a hardware keyboard, an example embodiment uses a GUI keyboard (soft keyboard) and pointer movement / position to e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method and system for inputting data into an application program. The method may include displaying a graphical user interface (GUI) keyboard in the application, the keyboard including a plurality of identifier keys. The detection module may monitor the position of the pointer of the pointing device associated with the plurality of identifier keys, and detect that the pointer of the pointing device has been placed over one of the plurality of identifier keys for a predetermined period of time, thereby detecting the selection of the identifier key described above. In response to detection of said selection, data associated with the selected identifier key may be generated, and indicative data representative of said generated data may be displayed in the data field.

Description

technical field [0001] The present application relates to methods and systems for entering data into applications. In an example embodiment, the application relates to a method and system for monitoring the position and movement of a pointer of a pointing device from within the application and generating data based on the movement. Background technique [0002] To avoid eavesdropping or spyware attacks in a network environment, applications typically utilize encryption between network endpoints, or other security protocols such as HTTP, when information is transmitted in the network, and especially the Internet. In addition to the security features embedded or used by applications, the process of educating computer users has made them aware of the importance of keeping confidential information safe. [0003] Although applications use security measures and users take care to protect confidential data, we know that information is inherently insecure between users and the appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00H04L9/00
CPCG06F3/04886G06F3/04895G06F3/0489G06F21/83
Inventor 桑迪普·苏雷什·格尔贡卡
Owner CISCO TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products