Unlock instant, AI-driven research and patent intelligence for your innovation.

Information security input processing system and method and smart card

An input processing and information security technology, applied in the field of information security, can solve problems such as being easily obtained by attackers, USBKey cannot prevent data from being tampered with, and achieve the effects of avoiding interception and modification, high compatibility, and avoiding modification

Inactive Publication Date: 2013-05-08
POTEVIO INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The USB Key cannot prevent data from being tampered with. The business data entered by the user may be intercepted and tampered by hackers before being encrypted by the USB Key, thereby tampering with the transaction without the user's knowledge;
[0014] The PIN code that the user enters into the USB Key is easily obtained by an attacker, which may obtain the user's private key information or usage rights;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security input processing system and method and smart card
  • Information security input processing system and method and smart card
  • Information security input processing system and method and smart card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0100] image 3 It is a schematic structural diagram of the information security input processing system in Embodiment 1 of the system of the present invention. like image 3 As shown, the pseudo keyboard module 110, the random sequence generation module 111, the random sequence mapping module 112, the random sequence transmission module 113, and the random sequence recovery module 114 are all carried in the smart card 310, and the client 320 includes: a pseudo keyboard display program 321 , business program 322, and security input window 323.

[0101] In this embodiment, since the pseudo-keyboard display program 321 capable of presenting a pseudo-keyboard and the pseudo-keyboard module 110 are respectively located in the client 320 and the smart card 310, the pseudo-keyboard module 110 in this embodiment needs to be further configured The pseudo-keyboard is packaged as an application package interface, which can be called by the pseudo-keyboard display program 321 in the cl...

Embodiment 2

[0115] Figure 4 It is a schematic structural diagram of the information security input processing system in the second embodiment of the system of the present invention. like Figure 4 As shown, in this embodiment, the random sequence generation module 111, the random sequence mapping module 112, the random sequence transmission module 113, and the random sequence recovery module 114 are carried in the smart card 410, while the pseudo keyboard module 110 is carried in the client 420 , and the client 420 also includes a pseudo-keyboard display program 421 capable of presenting a pseudo-keyboard, a business program 422 , and a secure input window 423 .

[0116] The pseudo-keyboard module 110 and other functional modules are respectively located in the client 420 and the smart card 410 , so the above-mentioned one-to-one mapping relationship or the random sequence of each key-to-one mapping needs to be transmitted between the client 420 and the smart card 410 . In order to ens...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security input processing system and a method and a smart card. The invention provides a pseudo keyboard capable of appearing at the client; and each keystroke of the pseudo keyboard maps to a random sequence generated by the system one by one. When the pseudo keyboard is invoked by the client, a user can input the random sequence mapped to each keystroke atthe client over the pseudo keyboard and then restore the random sequence from the client as mapped keystroke information so that the input information is prevented from being revised, the informationinput through the client is prevented from being revised in the memory and the information is further prevented from being intercepted and revised; thus, the security in information interaction is improved.

Description

technical field [0001] The invention relates to information security technology, in particular to an information security input processing system, an information security input processing method, a smart card and a device supporting information security input. Background technique [0002] With the rapid development of Internet technology, online transactions have penetrated into daily life and work, the most representative applications of which are "online banking" and "e-commerce". [0003] Taking "online banking" as an example, as a user service submission channel, users can handle inquiries, inquiries, Transfer, payment and other banking services, manage your own assets. However, the security problem of "online banking" has become more and more prominent. The information such as user identification codes such as account numbers and passwords entered by users on the client terminal are easily stolen during the transaction process transmitted to the online banking server ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/34G06F21/57G06F21/83
Inventor 刘宏伟王四军姚俊武
Owner POTEVIO INFORMATION TECH CO LTD