Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

43 results about "Keystroke logging" patented technology

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. A keylogger can be either software or hardware.

Implementation method for integrated security protection subsystem of mobile office system

ActiveCN104469767AImprove data securityRealize multi-factor authentication security defenseTransmissionSecurity arrangementInformation securityOne-time pad
The invention discloses an implementation method for an integrated security protection subsystem of a mobile office system. The implementation method includes the steps of triple mobile phone client identity authentication, triple background management system login security defense and tight service logic data security protection. The step of triple mobile phone client identity authentication includes password authentication, face recognition authentication and pattern password authentication. The step of triple background management system login security defense includes keyboard record prevention based on the simulative transmission keyboard information technology, a transparent one-time pad administrator login identity information encryption transmission mode based on RSA, and a double-factor authentication mode based on cloud pushing and combining dynamic passwords with static user names/passwords. Various kinds of security technology is transparently adopted, the data security is improved, multi-identity-authentication security defense is achieved, the access control capacity is enhanced, and notice announcement and news browsing of enterprises are safe and efficient through the integrated information security protection subsystem.
Owner:杭州安新立行网络科技有限公司

Intelligent terminal oriented security password input system and implementation method

The invention discloses an intelligent terminal oriented security password input system which comprises an intelligent terminal, an external password input unit and a remote server. The external password input unit is used for displaying and encrypting graphic information and directed line segment information. An implementation method includes a), enabling the external password input unit to be in communication connection with the intelligent terminal; b), configuring graphic parameters; c), selecting directed line segments; d), encrypting password configuration information; e), transmitting the password configuration information; f), acquiring the password configuration information; g), randomly generating a regular graph; h), encrypting the graphic information; i), transmitting the encrypted graphic information; j), decrypting the graphic information and the directed line segment information; k), enabling the remote server to perform judgment. The intelligent terminal oriented security password input system and the implementation method have the advantages that passwords are configured by the aid of the graph and the directed line segments jointly and accordingly are different from one another; the real passwords of users cannot be detected even if a keyboard recorder is mounted on the intelligent terminal; the intelligent terminal oriented security password input system and the implementation method have wide application space in the field of mobile application and particularly in the field of electronic commerce and electronic governments.
Owner:QILU UNIV OF TECH

Reusable encryption keyboard circuit and design method thereof

The invention provides an anti-bootlegging and anti-attacking reusable encryption keyboard circuit and an encryption method thereof. The reusable encryption keyboard circuit includes a programmable keyboard scanning and encrypting chip and an encryption control circuit. The programmable keyboard scanning and encrypting chip is used for scanning keyboard information, encrypting under control of the encryption control circuit, and inputting the keyboard information to a computer. The reusable encryption method includes: firstly, the keyboard information is scanned to be written in a caching area by a keyboard scanning circuit; secondly, encryption state, encryption manner and replacement of a secret key by the encryption control circuit are controlled so as to realize encryption of the scanned keyboard information; and thirdly, keyboard data enters an encryption mode, and encryption algorithm and the secret key are replaced according to a control instruction, and accordingly safety class of data recorded by the keyboard can be kept high. Data can be encrypted in multiple modes without a redundant hardware circuit by the reusable encryption keyboard circuit and the encryption method thereof compared with the prior art, and accordingly real-time construction of the keyboard information is facilitated, and safe transmission of the keyboard information is achieved.
Owner:SHENZHEN DELUX IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products