Unlock instant, AI-driven research and patent intelligence for your innovation.

Graphics keyboard based security input method for computer information

A graphic keyboard and information security technology, applied in the protection of internal/peripheral computer components, the input/output process of data processing, and calculation, etc. safety effect

Active Publication Date: 2007-07-18
CHINA MERCHANTS BANK
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Computer applications are inseparable from input and output. Among them, keyboard input is the most commonly used and most convenient means of information input, especially for inputting a small amount of numbers and character information. Although the conventional keyboard input of numbers and letters is convenient, it is still safe. For example, stealing keyboard input is a function of popular Trojan horse programs. Anyone with low computer skills and no programming and development capabilities can use and spread Trojan horse programs. Most of the transmission from these people makes it possible that when numbers or characters are input through the keyboard, the input numbers and characters may be stolen by a computer-infected Trojan horse program, so that key information such as passwords and password information through the keyboard may be illegally embezzled , there is a great security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Graphics keyboard based security input method for computer information
  • Graphics keyboard based security input method for computer information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The method of the present invention will be described in further detail in conjunction with the accompanying drawings and embodiments.

[0014] 1, the key points of the computer information security input method of the present invention

[0015] The method for solving computer information security input in the present invention is aimed at the input of a small amount of key data, such as account numbers and passwords, which must be input. The present invention solves the problem of safe input of key data through the local non-standardization of the input program of the network terminal application program. All characters that may be used for input data, such as numbers from 1 to 9, English letters from A to Z, and carriage return or confirmation keys, decimal point keys, etc., the present invention has two random characters in addition to the graphical display of the keys. First, the position area of ​​the keyboard displayed on the screen is uncertain, but the position...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A safe input method of computer information based on pattern keyboard includes preconfirming input character set, confirming input boundary region, plotting each character in pattern mode and displaying it on said region, storing relation of each character to plotting and position in boundary region into computer storage, intercepting click position of mouse by '' Hook '' program embedded in user program when user clicks any point on said region , indexing out position information stored in said storage and outputting its corresponding character as user input.

Description

technical field [0001] The present invention relates to computer security technology, more specifically, relates to a computer information security input method based on a graphic keyboard. Background technique [0002] Computer applications are inseparable from input and output. Among them, keyboard input is the most commonly used and most convenient means of information input, especially for inputting a small amount of numbers and character information. Although the conventional keyboard input of numbers and letters is convenient, it is still safe. For example, stealing keyboard input is a function of popular Trojan horse programs. Anyone with low computer skills and no programming and development capabilities can use and spread Trojan horse programs. Most of the transmission from these people makes it possible that when numbers or characters are input through the keyboard, the input numbers and characters may be stolen by a computer-infected Trojan horse program, so that ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/033G06F21/83
Inventor 要求不公开姓名
Owner CHINA MERCHANTS BANK