Method for inputting information through keyboard, device and system, electronic equipment and storage medium

A keyboard input and secure keyboard technology, applied in the computer field, can solve problems such as inflexibility, poor user experience, and inability to guarantee key security, so as to achieve the effect of ensuring key security, preventing data interception, and improving security

Pending Publication Date: 2021-06-18
JINGDONG TECH HLDG CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method cannot guarantee the security of the key. Encryption is implemented in the whole process of keyboard input at one time, which leaves a risk gap in the data process and is easy to be cracked.
And the existing encryption algorithm is inefficient and inflexible
The existing security keyboard technology for mobile applications cannot adaptively adjust the content of the keyboard according to different input content, making it difficult for users to find the target character in a keyboard with a large number of redundant characters arranged in disorder, resulting in poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for inputting information through keyboard, device and system, electronic equipment and storage medium
  • Method for inputting information through keyboard, device and system, electronic equipment and storage medium
  • Method for inputting information through keyboard, device and system, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present disclosure will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0031] It should be noted that, in the case of no conflict, the embodiments in the present disclosure and the features in the embodiments can be combined with each other. The present disclosure will be described in detail below with reference to the accompanying drawings and embodiments.

[0032] figure 1 An architecture diagram of a system showing keyboard input information.

[0033] Such as figure 1As shown, the keyboard input information system mainly includes the mobile terminal and the server terminal. The mobile terminal provides the front end of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for inputting information through a keyboard, a device and a system, electronic equipment and a storage medium. The specific implementation mode of the method comprises the steps that a mobile terminal detects a keyboard input information request and calls a secure keyboard; and the server generates a first key for symmetric encryption and a second key for asymmetric encryption and sends the first key and the second key to the mobile terminal. The mobile terminal symmetrically encrypts characters on the secure keyboard clicked by the user every time by using the first key to obtain a first ciphertext, and when the mobile terminal detects that the user confirms input, the first ciphertext is asymmetrically encrypted by using the second key to obtain a second ciphertext. The mobile terminal sends the second ciphertext to the server. The server decrypts the ciphertext to obtain the information input by the keyboard. According to the implementation mode, the security problems in the data input aspects such as input data monitoring, keyboard screen capture, input data tampering, memory crash and user password replay of the mobile equipment are solved.

Description

technical field [0001] The embodiments of the present disclosure relate to the field of computer technology, and in particular, to a method, device, system, electronic equipment, and storage medium for inputting information through a keyboard. Background technique [0002] With the popularization of mobile terminal equipment and applications and the favorable payment environment, mobile terminal application consumption has grown rapidly in my country's economy and people's lives, and the transaction volume and payment amount of mobile financial services have increased rapidly. Mobile finance has become a part of people's daily life. However, with the rapid development of mobile finance, security issues have become increasingly prominent. [0003] In the process of mobile application development, the security of data storage on the server and the security of data communication between the client and the server are usually considered first, while the first entry protection of d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F3/023G06F21/60G06F21/83
CPCG06F3/0233G06F21/602G06F21/83
Inventor 杨毓刘会王绪文张海龙马国清
Owner JINGDONG TECH HLDG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products