Network information security input system and method based on independent encryption

A technology for secure input and network information, applied in the field of network information security input system based on independent encryption, which can solve the problems of user information theft, limited application range, high development cost, etc., to ensure transmission security, wide application range, and convenient encryption and decryption Effect

Active Publication Date: 2019-05-17
重庆交慧发掘科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

What's more serious is that when you send sensitive information such as card number and password to your friends, once it is stolen, it will directly cause economic property loss
At present, due to the popularization of mobile devices and the diversity of existing application software, the attacks of malicious software such as program loopholes and Trojan horses directly cause user information to be stolen, bringing great security risks
The current solutions are mainly divided into two types: one is the method of providing a safe input method by the application itself, but there are problems such as tight coupling with the application, difficulty in development, high development cost, and limited application range; Network authentication and encryption measures, such as VPN, OpenID, etc., but these heavier enterprise-level solutions still have performance and user experience problems for current mobile devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network information security input system and method based on independent encryption
  • Network information security input system and method based on independent encryption
  • Network information security input system and method based on independent encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Embodiment of the present invention is described in detail below in conjunction with accompanying drawing: present embodiment implements under the premise of technical solution of the present invention, has provided concrete implementation method, but protection scope of the present invention is not limited to following embodiment.

[0038] General Architecture Description

[0039] The overall architecture uses a relatively mature C / S model, which is divided into client and server. The client is divided into an input method module and a content encryption and decryption module; the server is divided into a business display module, a business service module and a data access module. See the function module diagram for details figure 1 , characterized in that the system includes the following modules:

[0040] Input method module: This part is based on the AEVIOU sliding input method, and it can also be an ordinary input method. Its function is the same as the basic fu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an independent encryption based network information safe input system. The system comprises a safe input method client end and a safe input method server end. The safe input method client end comprises an input method module and a content encryption and decryption module. The safe input method server end comprises a business show module, a business service module and a data access module, and a safe input method. The input method is not bound with a third-party application, so that the input method and the third-party application are separated but cooperate with each other. Information that the user needs to encrypt can be encrypted flexibly, namely, a certain passage of dialogue or key content can be encrypted; the user can encrypt and decrypt the information conveniently without through complicated operation; and information and a secret key are managed and transmitted through independent channels, thereby guaranteeing safe transmission of the information.

Description

technical field [0001] The invention relates to the technical field of network information security, in particular to a system and method for securely inputting network information based on independent encryption. Background technique [0002] With the popularity of smart phones and the rapid growth of mobile Internet users, the functions of mobile phones are becoming more diversified. The functions of mobile devices are becoming more and more powerful. As the most frequently used mobile phone software, input methods are applied to more and more functions. Relevant information shows that text input has become a daily routine for mobile phone users when writing text messages, writing emails, sending Weibo and most other applications. At present, there are many types of input methods, and the most widely used ones are Sogou input method, Tencent input method, Google input method, Ziguang input method, Baidu input method, etc., but they all focus on how users can quickly input...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3249H04L63/0428
Inventor 薛坤戚正伟
Owner 重庆交慧发掘科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products