A Method of Using Safe Keyboard to Conduct Network Transactions

A technology for secure keyboards and network transactions, applied in secure communication devices, user identity/authority verification, digital transmission systems, etc., can solve problems such as attacks

Active Publication Date: 2018-11-16
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For self-drawn random keyboards, it is still possible to suffer from attacks such as secondary packaging of applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Using Safe Keyboard to Conduct Network Transactions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The design idea of ​​the present invention is: the present invention develops a method of using a security keyboard for network transactions in the sensitive application fields of network transactions such as financial applications and e-commerce applications. The center conducts login authentication, the keyboard pattern is randomly generated, and the password and actual password mapping adopts a one-to-many randomized mapping form. By adopting the present invention, the drawbacks in the prior art that only need to log in to the transaction webpage to conduct transactions are avoided, and only legitimate users who pass through the security keyboard can enter transaction passwords, thereby further ensuring the transaction security of users.

[0017] The technical solution is described in detail below.

[0018] The realization basis of the method of the present invention is: the safety keyboard control and the safety management service module arranged on the client end, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for carrying out network transaction by using a secure keyboard. The invention develops the method for carrying out the network transaction by using the secure keyboard in financial application, e-commerce application and other network transaction sensitive application fields. The secure keyboard is scheduled on a client in an SDK mode, the login of the secure keyboard is authenticated by a special management center, a keyboard pattern is generated randomly, and a password and actual password mapping employ a one-to-many random mapping form. By adopting the method provided by the invention, the defect in the prior art that the transaction can be carried out just by logging in a transaction webpage is avoided, and only a legitimate user using the secure keyboard can input the transaction password, so the user transaction security is further guaranteed.

Description

technical field [0001] The invention relates to the technical field of mobile terminal security, in particular to a method for using a security keyboard to carry out network transactions. Background technique [0002] Currently, there are three types of mobile application keyboards: system default input method, self-drawn fixed keyboard and self-drawn random keyboard. The system input method is easy to be hijacked, has the worst security, and may be recorded by malicious attackers to input sensitive data. For self-drawn fixed keyboards, attackers can attack by recording the coordinates of the key points. For self-drawn random keyboards, there may still be attacks such as secondary packaging of applications. Contents of the invention [0003] In order to solve the above-mentioned problem, the present invention provides a kind of method that utilizes safety keyboard to carry out network transaction, and it realizes transaction by the management center that is arranged on s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3228H04L63/0838
Inventor 郭宇斌任飞王迪安红章
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products