Method and apparatus for improving information input safety

A technology of information input and security, applied in the field of information security, can solve problems such as economic loss of users, damage to legal user rights and weaknesses, etc., and achieve the effect of improving information security and information input security

Active Publication Date: 2015-07-22
FEITIAN TECHNOLOGIES
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Generally, the smart key device inputs the authentication information representing the identity of the user into the smart key device through an input device (such as a keyboard) of a terminal (such as a computer), but if the terminal is attacked by a hacker or infected by a virus , then the authentication information input through the input device of the terminal may be embezzled or monitored by others due to the processing of the terminal, which will damage the rights and interests of legitimate users and even cause economic losses to users.
Therefore, the method of inputting information into the smart key device through the input device of the terminal has weaknesses in ensuring the security of the user's information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for improving information input safety
  • Method and apparatus for improving information input safety
  • Method and apparatus for improving information input safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] This embodiment discloses an input method for improving the security of information input. When the user inputs authentication information to the smart key device, as shown in FIG. 1, the method includes:

[0025] 101. When authentication information needs to be input to the smart key device, generally after the smart key device establishes a connection with the terminal, the smart key device plays the media information corresponding to each character in sequence. The played media information includes authentication information for user identification.

[0026] 102. The authentication information is generally a string of character data. During the playback of media information, when the character data corresponding to the played media information is the same as the character data in the authentication information and the order in the authentication information is also the same, the smart key The device inputs a selection signal to select the media information.

[0027]...

Embodiment 2

[0032] This embodiment specifically describes the method for improving the security of information input when the user inputs authentication information to the smart key device, such as image 3 As shown, the method includes the following steps:

[0033] 301. Step 302 is executed when the smart key device receives an instruction requiring identity authentication, generally after the smart key device establishes a connection with the terminal.

[0034] The connection to the terminal can be established through a USB interface to connect to the terminal, or through an extended serial advanced technology attachment (eSATA) interface, an extended secure digital (SDIO) interface, or the definition of the Personal Computer Memory Card International Association (PCMCIA) PCMCIA interface, etc.

[0035] 302. The smart key device clears the buffer area used to store the authentication information input by the user, and starts counting the number of character data of the input authentica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for increasing the safety of information input and a device thereof, belonging to the field of information safety. The method and the device solve the problem of potential safety hazard which is generated when information is input into an intelligent key device through a keyboard of a computer. The method of the invention comprises the following steps: medium information corresponding to character data is orderly broadcast; selective signals are directly input through the intelligent key device; and the broadcasted character data corresponding to the medium information are stored when the selective signals are input. The invention is mainly applied to the scenes that authentication information is input to the intelligent key device, and realizes that the safety of information input is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to an input method and device for improving the security of information input. Background technique [0002] In modern society, when people conduct online transactions or log in to the system, they are often required to perform identity authentication first. This is to ensure that the user's information security is not damaged and prevent the user's legitimate rights and interests from being stolen by others. Therefore, the way of authenticating user identity becomes more and more important. [0003] In the existing field of information security, a smart key device (such as a universal serial bus key, i.e. USB Key) can be used for identity authentication, specifically including: the user establishes a connection between the smart key device and the computer Finally, input the authentication information into the smart key device through the input device connected to the terminal;...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products