Supercharge Your Innovation With Domain-Expert AI Agents!

Safe input method and system for notebook computer

A notebook computer and security input technology, applied in the input field, can solve the problem that input security cannot be effectively guaranteed, and achieve the effect of ensuring security

Active Publication Date: 2012-05-09
LENOVO (BEIJING) LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this kind of online banking soft keyboard can be cracked by the Trojan horse program implanted in the client's computer by recording the black and white screen image using the soft keyboard and sending it to the Trojan horse client, which cannot effectively guarantee the input security.
[0010] Using non-keyboard input methods will fail to capture and analyze Trojan horses, and cannot effectively ensure input security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe input method and system for notebook computer
  • Safe input method and system for notebook computer
  • Safe input method and system for notebook computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The embodiment of the present invention provides a notebook computer security input method, which can effectively ensure the security of computer keyboard input.

[0051] In order to more clearly illustrate the notebook computer security input method and the working principle and working process of the system, the following will be described in detail in conjunction with the accompanying drawings.

[0052] In order to facilitate the understanding of the notebook computer secure input method and system described in the embodiments of the present invention, firstly, the existing notebook computer hardware is introduced.

[0053] A chipset (Chipset, CS for short) is a core component of a motherboard of an X86 architecture PC in the prior art. According to the different arrangement positions on the motherboard, it is usually divided into North Bridge Chip (NB CS) and South Bridge Chip (SB CS).

[0054] The north bridge chip provides support for CPU type and main frequency,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safe input method for notebook computers, including the following steps: receiving key values input by a keyboard; sending a trigger signal to a secret key generating module based on the key value; receiving the secret key generated by the secret key generating module as the secret key of the key value for encryption; encrypting the key value with the secret key to generate a first encrypted message; sending the first encrypted message to an application program; and decrypting the first encrypted message according to the secret key to obtain the key value. The invention also provides a safe input system for notebook computers. By adopting the method for inputting, the security of keyboard input of the computer can be effectively guaranteed.

Description

technical field [0001] The invention relates to an input method, in particular to a safe input method and system for a notebook computer. Background technique [0002] As we all know, the existing computer structure has no effective protection measures for the privacy of keyboard input data, resulting in viruses and Trojan horses in the computer that can illegally obtain the data typed by users, such as account numbers and passwords of online banking, online games and instant chat tools, seriously Affect users' trust in computers. [0003] In terms of keyboard security input, the prior art can be divided into three categories: hardware method, software method and non-keyboard input method. [0004] Hardware method: A typical method is to use a keyboard with an encryption function, which requires embedding hardware with a cryptographic operation function in the keyboard, or making major changes to the existing technology, or attaching a special keyboard. Another typical met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/04G06F21/12
Inventor 李志刚
Owner LENOVO (BEIJING) LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More