Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Asymmetric algorithm-based keyboard encryption system and keyboard encryption method

An asymmetric algorithm and encryption system technology, which is applied in the keyboard encryption system and the field of keyboard encryption, can solve the problems of poor versatility of encrypted keyboards, and achieve the effects of strong versatility, improved efficiency, and reduced time to obtain parameter N

Pending Publication Date: 2018-08-28
JIANGSU LANSWON TECH CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to overcome the defect of poor versatility of the encryption keyboard in the prior art, and provide a keyboard encryption system and keyboard encryption method based on asymmetric algorithm with low manufacturing cost and strong versatility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric algorithm-based keyboard encryption system and keyboard encryption method
  • Asymmetric algorithm-based keyboard encryption system and keyboard encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0030] Such as figure 1 As shown, the keyboard encryption system based on the asymmetric algorithm of the present embodiment includes a keyboard 101, an encryptor 102, a client 103 and a server 104, wherein the keyboard 101 is used to input a keyboard code, and the keyboard 101 includes but is not limited to a mechanical keyboard, For plastic film keyboards, conductive rubber keyboards and non-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of security, in particular to an asymmetric algorithm-based keyboard encryption system and keyboard encryption method. The keyboard encryption system comprises a keyboard, an encryptor, a client and a server, wherein the keyboard is used for inputting keyboard codes; the encryptor is used for encryption; the client is used for logging in a user system;and the server is used for performing decryption and determining whether a user can log in the user system or not. The encryptor encrypts source text codes based on an asymmetric algorithm to obtain aciphertext, and sends the ciphertext to the server; the server performs decryption and determines whether the user can log in the user system or not; the encryptor is a universal independently usableencryption apparatus; the input end of the encryptor is connected with the keyboard through a USB port or a PS / 2 port; the output end of the encryptor is connected with a client machine of the client; and an existing general keyboard can be encrypted after being connected with the client machine through the encryptor, so that the universality is high.

Description

technical field [0001] The invention relates to the field of security technology, in particular to a keyboard encryption system and a keyboard encryption method. Background technique [0002] With the rapid development of electronic information technology, it is more and more popular to use the network to conduct transactions or transfer files. In order to ensure the security of passwords during transactions, it is necessary to encrypt passwords to prevent them from being intercepted by Trojan horse programs. [0003] In the prior art, the user usually uses the keyboard as an instruction and data input device to realize the operation of the application program between the client and the user in response to the instruction. The client corresponds to the server, and the client provides the user with a local service program. Installed on an ordinary client computer, it needs to cooperate with the server to run. The server provides services for the client and stores user-related...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/83H04L29/06
CPCH04L63/0442G06F21/83
Inventor 霍建军吴震球
Owner JIANGSU LANSWON TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products