Key-defending recording method and system

A recording method and recording system technology, applied in the field of network information security, can solve problems such as security risks and damage, and achieve the effect of ensuring security and protecting keyboard input.

Inactive Publication Date: 2013-02-13
江苏华御威盾网络科技有限公司
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Whether it is making documents or filling in codes, especially when it comes to account numbers and passwords, keyboard input highlights a variety of security risks, especially malicious keylogging software, which can use this software to record the information entered by users, thereby stealing users Accounts and passwords of MSN,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key-defending recording method and system
  • Key-defending recording method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention.

[0018] It should be noted that the diagrams provided in this embodiment are only schematically illustrating the basic idea of ​​the present invention, and only the components related to the present invention are shown in the diagrams rather than the number, shape and shape of the components in actual implementation. Dimensional drawing, the type, quantity and proportion of each component can be changed arbitrarily during actual impleme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a key-defending recording method and a key-defending recording system which are applied to a computer with a keyboard. The method comprises the following steps of: when input information of keys of a keyboard is detected, intercepting the input information; encrypting the input information by adopting an asymmetric cryptographic algorithm; sending the encrypted input information to a keyboard buffer area of a computer memory; calling the encrypted input information in the keyboard buffer area, monitoring and analyzing the keyboard buffer area to judge whether the calling is legal or not; and when the calling is judged to be legal, decrypting the called input information, and when the calling is judged to be abnormal, refusing to send a decryption request. Therefore, by the method and the system, the aim of protecting keyboard input is fulfilled, so that the safety of the keyboard input for users can be ensured to a large extent.

Description

technical field [0001] The invention relates to the field of network information security, in particular to an anti-keylogging method and system applied to computers. Background technique [0002] The use of the Internet is becoming more and more popular. With the vigorous development of the Internet, the construction and expansion of the Internet have gradually changed human behavior patterns. For example, due to the popularity of the Internet, most users collect data, browse knowledge, purchase goods, work, discuss problems and make friends through the Internet. Therefore, a variety of websites appear on the Internet, making human behavior more convenient, faster and more technological by interacting with various online communities. [0003] General computer users generally use a keyboard as an input tool in the process of using a computer. Whether it is making documents or filling in codes, especially when it comes to account numbers and passwords, keyboard input highli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
Inventor 耿振民戴伟强
Owner 江苏华御威盾网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products