Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!
Safety keyboard working method
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A working method, technology of a secure keyboard, applied in the field of information security
Active Publication Date: 2014-04-23
FEITIAN TECHNOLOGIES
View PDF2 Cites 12 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0003] The inventor found that the prior art has the following defects. When the user inputs data on the soft keyboard, since the positions of the keys on the soft keyboard remain unchanged, hackers can steal the input data by capturing the track of the mouse
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0069] The technical solution provided by the embodiment of the present invention is applied to the Android system, and involves keyboard control, password box control, keyboard touch screen event processing function, password box touch screen event processing function, switching screen direction event processing function, keyboard sub-function and JNI Encryption and decryption functions defined in (Java Native Interface, Java native call).
[0070] Such as Picture 1-1 As shown, the upper layer application performs the following operations, including:
[0071] Step 101, the upper layer application initializes the password box control, initializes the keyboard control, clears the first storage area, and clears the second storage area;
[0072] Step 102, the upper layer application registers the touch screen event in the password box control;
[0073] In this embodiment, a touch screen event is registered in the password box control, and when a touch screen event occurs in the...
Embodiment 2
[0185] An embodiment of the present invention provides a working method of a security keyboard, including:
[0186] The upper application initializes the password box control, initializes the keyboard control, clears the first storage area and the second storage area, registers touch screen events in the password box control, registers touch screen events and switching screen direction events in the keyboard control, and initializes the key count value , key state identification, switch screen direction identification, keyboard control status identification, split screen identification, initialization key, algorithm.
[0187] In this embodiment, the touch screen event is registered in the password box control. When a touch screen event occurs in the password box control, the password box control sends the first touch screen event notification to the password box touch screen event processing function by broadcasting; The touch screen event is registered in the control. When a ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention relates to a safety keyboard working method and belongs to the field of information safety. The method specifically includes that a password frame control judges the type of received data. If the data is a first touch screen event notice, a state identifier of a keyboard control is set, and the notice is utilized as a keyboard control drawing notice and transmitted to the keyboard control. If the data is a key value information notice, corresponding operation is conducted according to the key value, and an execution result is stored in a first storage area. If the data is an information acquisition notice, the data in the first storage area is acquired and transmitted to an upper layer application. When the keyboard control receives the event notice, the keyboard control judges the notice type. If the notice is the keyboard control drawing notice, the keyboard control is displayed or concealed according to the state identifier of the keyboard control. If the notice is a second touch screen event notice, corresponding operation is conducted according to the key value type. If the notice is a screen direction switching event notice, the keyboard control is redrawn.
Description
technical field [0001] The invention relates to the field of information security, in particular to a working method of a security keyboard. Background technique [0002] With the rise of e-commerce, network security has attracted more and more attention. In the prior art, people often use soft keyboards to input data to improve the security of network transactions. Soft keyboards are displayed on the screen and controlled by software. With the virtual keyboard, the user can use the mouse to click the keys on the soft keyboard to input data. [0003] The inventors found that the prior art has the following defects. When the user inputs data on the soft keyboard, since the positions of the keys on the soft keyboard remain unchanged, hackers can steal the input data by capturing the track of the mouse. Contents of the invention [0004] In order to solve the defects in the prior art, the present invention provides a working method of a safety keyboard, comprising: [0005]...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.