Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for inputting private data in network application

An input method and network application technology, applied in the input field of confidential data, can solve problems such as loss of traders, unavoidable data theft, theft of trader's account and password data, etc., to ensure the effect of security.

Inactive Publication Date: 2005-11-30
石国伟
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, using the traditional method of entering account numbers and passwords and adding dynamic random passwords, it is difficult to escape the theft of this type of data by malicious Trojan horse software.
In actual transactions, it is not uncommon for important data such as trader account numbers and passwords to be stolen through this type of transaction data input method
The reason is that the data entered by the user through the keyboard is real data, and malicious software such as Trojan horses can intercept the keyboard data at the first time, or intercept such important data during transmission, causing traders to suffer losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for inputting private data in network application
  • A method for inputting private data in network application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In online transactions, there are client software such as browsers in the foreground and server software in the background. The method of inputting confidential data in this network application is that when client software such as a browser logs in to the server software of the corresponding website, the server software randomly generates a data input conversion rule and returns it to the client software, and the client software converts the rules to the client software. The data input conversion rules are displayed on the page. According to the data input conversion rules, the client users convert the real data to be input into input data before inputting, instead of directly inputting real data.

[0018] For the operation steps of the input method in the embodiment of the present invention, see figure 1 , the input method includes the following steps:

[0019] 1. The client software logs in to the server software and sends a connection request.

[0020] 2. After rec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention disclose one network application coding data input method, which generates data input conversion rules through service terminal software to convert the data into rules and the real data into input data and comprises the following steps: customer terminal software loading on the service software; the service software generating data input conversion rules and going back; user converting the original data by the rules; the customer terminal software sending the user input data; the server terminal software receiving the above data and converting it into original data for identification.

Description

technical field [0001] The invention relates to a data input method, in particular to a method for inputting confidential data in network applications, which is used for inputting important confidential data such as user names, account numbers, bank card numbers and passwords in network applications. Background technique [0002] With the development of the Internet, online transactions are more and more accepted by people, and how to ensure the security of online transactions is also the focus of people's attention. Since online payment in online transactions involves confidential data such as trader account numbers and passwords, most traders have a defensive mentality. However, using the traditional method of inputting account numbers and passwords with dynamic random passwords, it is difficult to escape the theft of this type of data by malicious Trojan horse software. In actual transactions, it is not uncommon for important data such as trader account numbers and passw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
Inventor 许戟石国伟
Owner 石国伟
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products