Information security input processing system and method and smart card
An input processing and information security technology, applied in the field of information security, can solve problems such as being easily obtained by attackers, USBKey cannot prevent data from being tampered with, and achieve the effects of avoiding interception and modification, high compatibility, and avoiding modification
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0100] image 3 It is a schematic structural diagram of the information security input processing system in Embodiment 1 of the system of the present invention. like image 3 As shown, the pseudo keyboard module 110, the random sequence generation module 111, the random sequence mapping module 112, the random sequence transmission module 113, and the random sequence recovery module 114 are all carried in the smart card 310, and the client 320 includes: a pseudo keyboard display program 321 , business program 322, and security input window 323.
[0101] In this embodiment, since the pseudo-keyboard display program 321 capable of presenting a pseudo-keyboard and the pseudo-keyboard module 110 are respectively located in the client 320 and the smart card 310, the pseudo-keyboard module 110 in this embodiment needs to be further configured The pseudo-keyboard is packaged as an application package interface, which can be called by the pseudo-keyboard display program 321 in the cl...
Embodiment 2
[0115] Figure 4 It is a schematic structural diagram of the information security input processing system in the second embodiment of the system of the present invention. like Figure 4 As shown, in this embodiment, the random sequence generation module 111, the random sequence mapping module 112, the random sequence transmission module 113, and the random sequence recovery module 114 are carried in the smart card 410, while the pseudo keyboard module 110 is carried in the client 420 , and the client 420 also includes a pseudo-keyboard display program 421 capable of presenting a pseudo-keyboard, a business program 422 , and a secure input window 423 .
[0116] The pseudo-keyboard module 110 and other functional modules are respectively located in the client 420 and the smart card 410 , so the above-mentioned one-to-one mapping relationship or the random sequence of each key-to-one mapping needs to be transmitted between the client 420 and the smart card 410 . In order to ens...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 