A working method of a safety keyboard

A working method, technology of a secure keyboard, applied in the field of information security

Active Publication Date: 2016-08-24
FEITIAN TECHNOLOGIES
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The inventor found that the prior art has the following defects. When the user inputs data on the soft keyboard, since the positions of the keys on the soft keyboard remain unchanged, hackers can steal the input data by capturing the track of the mouse

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A working method of a safety keyboard
  • A working method of a safety keyboard
  • A working method of a safety keyboard

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] The technical solution provided by the embodiment of the present invention is applied to the Android system, and involves keyboard control, password box control, keyboard touch screen event processing function, password box touch screen event processing function, switching screen direction event processing function, keyboard sub-function and JNI Encryption function and decryption function defined in (Java Native Interface, Java native call).

[0070] Such as Picture 1-1 As shown, the upper layer application performs the following operations, including:

[0071] Step 101, the upper layer application initializes the password box control, initializes the keyboard control, clears the first storage area, and clears the second storage area;

[0072] Step 102, the upper layer application registers the touch screen event in the password box control;

[0073] In this embodiment, a touch screen event is registered in the password box control, and when a touch screen event occur...

Embodiment 2

[0185] An embodiment of the present invention provides a working method of a security keyboard, including:

[0186] The upper application initializes the password box control, initializes the keyboard control, clears the first storage area and the second storage area, registers touch screen events in the password box control, registers touch screen events and switching screen direction events in the keyboard control, and initializes the key count value , key state identification, switch screen direction identification, keyboard control status identification, split screen identification, initialization key, algorithm.

[0187] In this embodiment, the touch screen event is registered in the password box control. When a touch screen event occurs in the password box control, the password box control sends the first touch screen event notification to the password box touch screen event processing function by broadcasting; The touch screen event is registered in the control. When a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safety keyboard working method and belongs to the field of information safety. The method specifically includes that a password frame control judges the type of received data. If the data is a first touch screen event notice, a state identifier of a keyboard control is set, and the notice is utilized as a keyboard control drawing notice and transmitted to the keyboard control. If the data is a key value information notice, corresponding operation is conducted according to the key value, and an execution result is stored in a first storage area. If the data is an information acquisition notice, the data in the first storage area is acquired and transmitted to an upper layer application. When the keyboard control receives the event notice, the keyboard control judges the notice type. If the notice is the keyboard control drawing notice, the keyboard control is displayed or concealed according to the state identifier of the keyboard control. If the notice is a second touch screen event notice, corresponding operation is conducted according to the key value type. If the notice is a screen direction switching event notice, the keyboard control is redrawn.

Description

technical field [0001] The invention relates to the field of information security, in particular to a working method of a security keyboard. Background technique [0002] With the rise of e-commerce, network security has attracted more and more attention. In the prior art, people often use soft keyboards to input data to improve the security of network transactions. Soft keyboards are displayed on the screen and controlled by software. With the virtual keyboard, the user can use the mouse to click the keys on the soft keyboard to input data. [0003] The inventors found that the prior art has the following defects. When the user inputs data on the soft keyboard, since the positions of the keys on the soft keyboard remain unchanged, hackers can steal the input data by capturing the track of the mouse. Contents of the invention [0004] In order to solve the defects in the prior art, the present invention provides a working method of a safety keyboard, comprising: [0005]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/83G06F21/60
CPCG06F21/83
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products