CN102566924A - Soft keyboard operation processing method capable of enhancing safety protection - Google Patents

Soft keyboard operation processing method capable of enhancing safety protection Download PDF

Info

Publication number
CN102566924A
CN102566924A CN2011104415378A CN201110441537A CN102566924A CN 102566924 A CN102566924 A CN 102566924A CN 2011104415378 A CN2011104415378 A CN 2011104415378A CN 201110441537 A CN201110441537 A CN 201110441537A CN 102566924 A CN102566924 A CN 102566924A
Authority
CN
China
Prior art keywords
soft keyboard
character
character button
storage space
button
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011104415378A
Other languages
Chinese (zh)
Other versions
CN102566924B (en
Inventor
郝永建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Singularity Xinyuan International Technology Development (Beijing) Co.,Ltd.
Original Assignee
CHONGQING XINMEI AGRICULTURAL INFORMATION TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHONGQING XINMEI AGRICULTURAL INFORMATION TECHNOLOGY CO LTD filed Critical CHONGQING XINMEI AGRICULTURAL INFORMATION TECHNOLOGY CO LTD
Priority to CN201110441537.8A priority Critical patent/CN102566924B/en
Publication of CN102566924A publication Critical patent/CN102566924A/en
Application granted granted Critical
Publication of CN102566924B publication Critical patent/CN102566924B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a soft keyboard operation processing method. The method is characterized in that every character button of a soft keyboard corresponds to a character storage space, characters displayed by the character buttons of the soft keyboard and the characters which are triggered by clicking to output are the characters stored in the character storage spaces corresponding to the character buttons, and each character button of the soft keyboard can dynamically correspond to the different characters in the different time periods by dynamically changing the distribution and storage situation of all the characters which are preset and output by the soft keyboard in the character storage spaces corresponding to all the character buttons at different times, so that the soft keyboard can effectively prevent a virus from getting password symbols output by the key board through one-time screenshot and mouse coordinate capture technologies, the risk of capturing all the characters output by the soft keyboard by a virus software based on the screenshot technology and the mouse coordinate capture technology can be reduced and even shielded, and the safety protection performance of the soft keyboard against passwords of a user can be enhanced.

Description

The soft keyboard operation processing method that tightens security and protect
Technical field
The present invention relates to the internet communication technology and computer software technical field, be specifically related to computing machine and internet cryptoguard technology, relate in particular to a kind of soft keyboard operation processing method of the protection that tightens security.
Background technology
Password is the professional number of the account of protection internet service and computing machine individual's application software important means safe in utilization.But along with the development of the internet communication technology and computer software technology, computing machine, internet virus technology have also obtained corresponding development, and serious threat is to the cryptosecurity of professional number of the account of internet service and computing machine individual application software.Owing to press character keys different on the computer hardware keyboard; The output signal of hardware keyboards is different; Password early obtains the hardware keyboards output signal that bogusware is just received through intercepting computer hardware keyboard signal interface; Discern the code characters of hardware keyboards output, and the code characters that identifies is sent to the hacker of far-end through the internet, thereby steal the password of professional number of the account of other people internet service or computing machine individual application software.Yet the appearance of soft keyboard technology becomes the powerful mean of reply based on the bogusware of hardware keyboards intercepting technology.Soft keyboard (Soft Keyboard) is meant the simulating keyboard of realizing through computer software, and it is shown on the screen, realizes the character input through the character button that left mouse button is clicked on the soft keyboard.Soft keyboard technology is applied in growing field, and particularly Bank Account Number, online payment number of the account etc. relate in the password input of the professional number of the account of internet service of personal property on the net, and the application of soft keyboard is very general.The user can use soft keyboard input code characters fully; Need not operational computations machine hardware keyboards again; And because soft keyboard is certainly as the running software program; The character that soft keyboard is exported during by clicking trigger can not pass through the computer hardware interface yet; The hardware device output signal that bogusware can't be received through intercepting computer hardware interface again obtains the code characters of other people input, and therefore in a very long time, soft keyboard technology has effectively been protected the safe in utilization of professional number of the account of internet service and computing machine individual application software.
But because the development of computer system utilization and programming technique; Triggering computer system through programming carries out the screenshotss processing and catches left mouse button clicking trigger screen pixels coordinate constantly; The basic skills that the software development programming technique personnel based on computer system are grasped have been become; Thereby new bogusware occurred, broken through the security perimeter of current soft keyboard technology based on screenshotss technology and mouse coordinates capture technique.Based on the operation logic of the bogusware of screenshotss technology and mouse coordinates capture technique normally; After soft keyboard starts operation; Triggering computer system carries out screenshotss and obtains the snapshot picture; And then obtain the distributing position of each character button in the screen pixels coordinate on the soft keyboard through the screenshotss image processing and analyzing, then through catching mouse, again through mouse screen pixels coordinate being combined the in addition operational analysis of soft keyboard character button screen pixels coordinate distributing position at left button clicking trigger screen pixels coordinate constantly; Can know that the user uses the defeated clicking trigger of soft keyboard to export out to each code characters of dialog box or password input frame, the realization password is stolen.
Therefore, how further to strengthen the cipher safe protecting of professional number of the account of internet service and computing machine individual application software, become the research direction of computing machine and internet cryptoguard technology.
Summary of the invention
To the above-mentioned deficiency that exists in the prior art; The object of the present invention is to provide a kind of soft keyboard operation processing method of the protection that tightens security; Reduce or shield and catch soft keyboard, strengthen the safeguard protection performance of soft keyboard user cipher by the risk of the alphabet of clicking trigger output based on the bogusware of screenshotss technology and mouse coordinates capture technique.
For realizing above-mentioned purpose, the present invention has adopted following technological means:
A kind of soft keyboard operation processing method of the protection that tightens security; It is characterized in that; Each character button of soft keyboard is to there being a character storage space; The character that makes soft keyboard character button characters displayed and exported by clicking trigger is the character that character button corresponding characters storage space is stored; Through constantly dynamically change the distributed store situation of each character of the preset output of soft keyboard in difference, make each character button of soft keyboard at the dynamically corresponding different character of different time section at each character button corresponding characters storage space.
Above-mentioned soft keyboard operation processing method specifically comprises the steps:
A) soft keyboard starts operation, and each character distributed store of the preset output of soft keyboard is in each soft keyboard character button corresponding characters storage space;
B) according to the current character of storing in the soft keyboard character button corresponding characters storage space, carry out the character display process of soft keyboard character button, and at the character button of soft keyboard during by clicking trigger, execution in step C);
C) soft keyboard output is by the current character of storing in the character button corresponding characters storage space of clicking trigger, then execution in step D immediately);
D) character of being stored in each soft keyboard character button corresponding characters storage space of the soft keyboard exchange that misplaces is at random handled, returned step B then);
E) circulation execution in step B) ~ D), run abort until soft keyboard.
In the above-mentioned soft keyboard operation processing method; But as a kind of selection scheme, at step B) in, said " according to the current character of storing in the soft keyboard character button corresponding characters storage space; carry out the character display process of soft keyboard character button; and at the character button of soft keyboard during by clicking trigger, execution in step C) " is specially: with each character button of soft keyboard current character of storing in its corresponding characters storage space of update displayed respectively, wait for by clicking trigger; Until the character button of soft keyboard during by clicking trigger, execution in step C).
In the above-mentioned soft keyboard operation processing method; But as a kind of selection scheme; At step B) in, said " according to the current character of storing in the soft keyboard character button corresponding characters storage space, carry out the character display process of soft keyboard character button; and at the character button of soft keyboard during by clicking trigger; execution in step C) " is specially: each character button of soft keyboard is the current character of storing in its corresponding characters storage space of update displayed respectively, and random valued is set distribution and switched time limit Ta in the positive scope, begins to carry out timing; In timing course, if the character button of soft keyboard is by clicking trigger, execution in step C then); If timing arrives distribution when switching time limit Ta, the character button of soft keyboard is as yet by clicking trigger, then execution in step D).
In the above-mentioned soft keyboard operation processing method, further, said distribution is switched and is carried out the random valued setting in the scope of time limit Ta between 3 ~ 10 seconds.
In the above-mentioned soft keyboard operation processing method, but as a kind of selection scheme, each character button of said soft keyboard is also to there being a visible state sign; At step B) in; Said " according to the current character of storing in the soft keyboard character button corresponding characters storage space; carry out the character display process of soft keyboard character button, and at the character button of soft keyboard during by clicking trigger, execution in step C) " be specially:
B1) random valued is set visible state switching times K in the positive scope;
B2) M character button in the selected at random soft keyboard, the visible state sign of M selected character button is set to invisible, and the visible state of other character button sign is set to visible in the soft keyboard;
B3) each visible state of soft keyboard is designated the visible character button current character of storing in its corresponding characters storage space of update displayed respectively, each visible state be designated sightless character button respectively update displayed be the character invisible mode;
B4) random valued is set visible state switching time limit Tb in the positive scope, begins to carry out timing; In timing course, if the character button of soft keyboard is by clicking trigger, execution in step C then); If when timing arrived visible state switching time limit Tb, the character button of soft keyboard was not as yet by clicking trigger, then visible state switching times K is from subtracting one, execution in step b5);
B5) value as if current visible state switching times K is zero, then execution in step D); Otherwise, return step b2).
In the above-mentioned soft keyboard operation processing method, further, carry out random valued in the scope of said visible state switching times K between 2 ~ 5 and set; Said visible state switches and carries out the random valued setting in the scope of time limit Tb between 1 ~ 5 second.
In the above-mentioned soft keyboard operation processing method, further, in said " M character button in the selected at random soft keyboard ", the span of M is that 5≤M≤(Ma/3), wherein Ma representes the character overall number of buttons of soft keyboard.
In the above-mentioned soft keyboard operation processing method; But as a kind of selection scheme; In steps A) in, said " each character distributed store of the preset output of soft keyboard is in each soft keyboard character button corresponding characters storage space " is specially: each character of the preset output of soft keyboard randomly distributed store in each soft keyboard character button corresponding characters storage space.
In the above-mentioned soft keyboard operation processing method; But as a kind of selection scheme; In steps A) in; Said " each character distributed store of the preset output of soft keyboard is in each soft keyboard character button corresponding characters storage space " is specially: divide soft keyboard into a plurality of keyboard areas, in each keyboard area each character of the preset output of character button randomly distributed store in each character button corresponding characters storage space of this keyboard area; At step D) in, said " character of being stored in each soft keyboard character button corresponding characters storage space of the soft keyboard exchange that misplaces is at random handled " is specially: respectively with the character of being stored in each soft keyboard character button corresponding characters storage space of each keyboard area of the soft keyboard exchange that between each soft keyboard character button corresponding characters storage space in corresponding keyboard zone, misplaces at random.
Than prior art, the present invention has following beneficial effect:
1, the present invention tighten security the protection the soft keyboard operation processing method; Through dynamically changing the distributed store situation of each character of the preset output of soft keyboard constantly at each character button corresponding characters storage space in difference; Make each character button of soft keyboard at the dynamically corresponding different character of different time section; Can effectively prevent to obtain the code characters of soft keyboard output, strengthen the safeguard protection performance of soft keyboard user cipher through the virus of screenshots and mouse coordinates capture technique.
2,, many-sided factors such as R&D costs high, the screenshotss of anti-virus software interception protection big between the research and development technology difficulty; To succeed to the new virus of soft keyboard operation processing method of the present invention is very difficult based on screenshotss technology and the research and development of mouse coordinates capture technique; Make soft keyboard operation processing method of the present invention can reduce even shield the risk of catching the alphabet of soft keyboard output based on the bogusware of screenshotss technology and mouse coordinates capture technique, thus can better protection user cipher safety.
3, soft keyboard operation processing method of the present invention; Can also change complicated degree through the character dynamic random that increases soft keyboard at different aspect; Significantly promote the technical difficulty that bogusware breaks through soft keyboard operation processing method safeguard protection of the present invention defence line; Even if make soft keyboard operation processing method of the present invention not protect by the screenshotss interception of anti-virus software; Also can guarantee to capture soft keyboard by the alphabet of clicking trigger output, and then shield the risk of catching the alphabet of soft keyboard output based on the bogusware of screenshotss technology and mouse coordinates capture technique fully based on the bogusware of screenshotss technology and mouse coordinates capture technique.
Description of drawings
Fig. 1 is the soft keyboard operation processing method process flow diagram of the embodiment of the invention one;
Fig. 2 ~ Fig. 4 is the view in the soft keyboard operational process of the embodiment of the invention one;
Fig. 5 is the soft keyboard operation processing method process flow diagram of the embodiment of the invention two;
Fig. 6 is the soft keyboard operation processing method process flow diagram of the embodiment of the invention three;
Fig. 7 ~ Fig. 9 is the view in the soft keyboard operational process of the embodiment of the invention three;
Figure 10 and Figure 11 are the view in the soft keyboard operational process of the embodiment of the invention four.
Embodiment
Present bogusware based on screenshotss technology and mouse coordinates capture technique; Its principle of work is; Obtain the distributing position of each character button in the screen pixels coordinate on the soft keyboard through a screenshotss analysis earlier; Know that through catching mouse at left button clicking trigger screen pixels coordinate constantly, analyzing soft keyboard is by the code characters of clicking trigger output then.Why bogusware can so be easy to catch soft keyboard by the code characters of clicking trigger output; Be because the character button positions of existing soft keyboard all fixedly installs according to the distributing order of character keys on the hardware keyboards of corresponding function; Bogusware only need can obtain the distributing position of each character button in the screen pixels coordinate on the soft keyboard through screenshotss; Screen pixels coordinate during the combined mouse clicking trigger carries out simple screen pixels coordinate contrast matching operation again, just can know on the soft keyboard by the character of click triggering.Though; It is comparatively general that present computer user installs anti-virus software on computers; And the anti-virus software of main flow has all possessed the safety precaution function of the viral screenshotss of interception at present; But the viral screenshotss interception function of anti-virus software is not to detect and to tackle each screenshotss of bogusware in absolutely accurate ground mostly, and the omission of bogusware screenshotss still happens occasionally, even if therefore the interception protection of anti-virus software is arranged; Bogusware still can be passed through repeatedly screenshotss; As long as any screenshotss success of its people, bogusware can obtain the distributing position of each character button in the screen pixels coordinate on the soft keyboard equally, and then catches soft keyboard by the code characters of clicking trigger.
For this reason; The present invention proposes a kind of soft keyboard operation processing method of the protection that tightens security; This method no longer fixedly installs the character button of soft keyboard; But let each character button of soft keyboard to a character storage space should be arranged; The character that makes soft keyboard character button characters displayed and exported by clicking trigger is the character that character button corresponding characters storage space is stored, and through constantly dynamically change the distributed store situation of each character of the preset output of soft keyboard at each character button corresponding characters storage space in difference, makes each character button of soft keyboard at the dynamically corresponding different character of different time section.Because each character button of soft keyboard is dynamic change in different time section corresponding characters; And screenshotss only can obtain the character button of soft keyboard at a certain static pairing character constantly; Bogusware based on screenshotss technology and mouse coordinates capture technique can't obtain the soft keyboard character button in the concrete corresponding characters of different time section institute through screenshotss again; Even if the screen pixels coordinate therefore during bogusware combined mouse clicking trigger; Also can't accurately know soft keyboard by the alphabet of clicking trigger output, strengthen the purpose of soft keyboard the safeguard protection performance of user cipher thereby reached.
Each character of the preset output of soft keyboard of the present invention is to the soft keyboard of difference in functionality, is meant that the needs soft keyboard of setting according to preset soft key function carries out each character of output.For example, for the soft keyboard of combine digital output function only, the character of the preset output of its soft keyboard promptly includes numerical character " 0 ~ 9 "; For the soft keyboard of object computer character output function, the character of the preset output of its soft keyboard then includes dissimilar computer characters such as numerical character, English character, sign character.The preset output of soft keyboard is which type of character, is to set according to the software dish function of concrete application need, and it does not belong to discussion main points of the present invention, does not add narration at this.
Through embodiment effect of the present invention is further specified below.
Embodiment one:
Present embodiment adopts soft keyboard operation processing method of the present invention; Realize an object computer character output function, be used for the soft keyboard that password is imported; The character of the preset output of this soft keyboard include numerical character " 0 ~ 9 ", English character " a ~ z " and ", ", "; ", a plurality of sign characters such as "/"; In addition; Soft keyboard also is provided with three function buttons; Realize handoff functionality " Shift ", caps lock function " Caps Lock " respectively and return and delete function " <-"; Because function button is not used in direct output character, can not influence the effect of character password safeguard protection in itself, so function button can fixedly install.
Adopt soft keyboard operation processing method of the present invention; Each character button of soft keyboard is to there being a character storage space; The character that makes soft keyboard character button characters displayed and exported by clicking trigger is the character that character button corresponding characters storage space is stored; Through constantly dynamically change the distributed store situation of each character of the preset output of soft keyboard in difference, make each character button of soft keyboard at the dynamically corresponding different character of different time section at each character button corresponding characters storage space.Wherein, For carrying out the trigger event that dynamically changes and dynamically changing form; Under different applicable cases, can adopt the different set mode, for example, can trigger with a fixed cycle (promptly pressing Fixed Time Interval) and carry out of the dynamic change of preset each character exported of soft keyboard in the distributed store situation of each character button corresponding characters storage space; Dynamically changing form can be the transposition distributed store that circulates according to certain rules, or the like.But consider; Dynamically change with the fixed cycle execution; And dynamically change and have under the situation of certain rule, grasped its cycle length through long-term test at interval and dynamically change rule by bogusware easily, thereby can influence the lasting stability property of the safeguard protection performance of soft keyboard.And to keep the safeguard protection performance of soft keyboard lastingly, just need to guarantee that the character that each character button of soft keyboard exported during constantly by clicking trigger in difference is all unpredictable.For reaching this purpose, present embodiment provides a kind of more excellent the carrying into execution a plan of the soft keyboard operation processing method of the protection that tightens security, and its flow process is as shown in Figure 1, and concrete execution in step is following:
01A) soft keyboard starts operation, and each character distributed store of the preset output of soft keyboard is in each soft keyboard character button corresponding characters storage space.
The purpose of this step; Be when letting soft keyboard start operation; Can character be arranged the initialization corresponding stored in its each character button corresponding characters storage space, carry out corresponding operating to guarantee the character that each character button of soft keyboard is stored in needs show or can be according to its corresponding characters storage space during by clicking trigger.When soft keyboard starts operation; Each computer character of the preset output of soft keyboard can be set in the distributed store situation of each character storage space as required; For example still can preset each character of exporting, also can distribute preparatory each character distributed store that will preset output in proper order of storage in each soft keyboard character button corresponding characters storage space according to certain fixing initialization according to the character arrangements situation distributed store of computer character hardware keyboards; But in order to make the safeguard protection of soft keyboard more effective; Being preferably in soft keyboard starts when moving; Also let the preset output of soft keyboard each character randomly distributed store in each soft keyboard character button corresponding characters storage space, make that soft keyboard character button corresponding characters is out of order at random.
01B) according to the current character of storing in the soft keyboard character button corresponding characters storage space, carry out the character display process of soft keyboard character button, and at the character button of soft keyboard during by clicking trigger, execution in step 01C).
This step is in order to carry out the character display process of soft keyboard character button, conveniently uses the user to select clicking operation according to soft keyboard character button characters displayed, and can trigger execution in step C at the character button in the lump during by clicking trigger.For present embodiment; The concrete executive mode of this step is; With each character button of soft keyboard current character of storing in its corresponding characters storage space of update displayed respectively; Wait for then by clicking trigger, until the character button of soft keyboard during by clicking trigger, execution in step 01C).
01C) soft keyboard output is by the current character of storing in the character button corresponding characters storage space of clicking trigger, then execution in step 01D immediately).
This step just is able to carry out during by clicking trigger at the character button of soft keyboard; Be in order to export by the corresponding character of character button of clicking trigger; And behind output character execution in step 01D immediately), trigger the dynamic change of each character of carrying out the preset output of soft keyboard in the distributed store situation of each character button corresponding characters storage space.
01D) character of being stored in each soft keyboard character button corresponding characters storage space of the soft keyboard exchange that misplaces is at random handled, returned step 01B then).
This step has adopted at random, and the mode of dislocation exchange processing dynamically changes the character of being stored in each soft keyboard character button corresponding characters storage space of soft keyboard; After making each soft keyboard character button by clicking trigger, each character button corresponding characters again is all unpredictable.
01E) circulation execution in step 01B) ~ 01D), run abort until soft keyboard.
, soft keyboard start operation after, then circulate execution in step 01B visible by the above-mentioned operational scheme of soft keyboard) ~ 01D) operation runs abort until soft keyboard.A step 01B is carried out in its every circulation) ~ 01D); The exchange that will once misplace at random of the distributed store situation of each character in each soft keyboard character button corresponding characters storage space of the preset output of soft keyboard; And loop start step 01B) ~ 01D) takes place during by clicking trigger at the character button of soft keyboard; Make the user each time during clicking trigger soft keyboard output character like this; Dislocation exchange at random will inevitably take place once in the pairing character of each character button of soft keyboard, thereby the character that makes each character button of soft keyboard exported during constantly by clicking trigger in difference is all unpredictable.For example, each character of the preset output of soft keyboard at a time is as shown in Figure 2 in the corresponding distribution situation of each soft keyboard character button; Behind user's clicking trigger soft keyboard output character, each character of the preset output of soft keyboard is then changed into as shown in Figure 3 in the corresponding distribution situation of each soft keyboard character button; Soft keyboard is changed into as shown in Figure 4 by its character distribution situation after the clicking trigger once more ... The change of distribution situation is at random, does not have governed rule.So, bogusware can't obtain the soft keyboard character button by the alphabet of clicking trigger output through a screenshotss prediction again.
The safeguard protection defence line of Gonna breakthrough soft keyboard operation processing method of the present invention; Bogusware only can depend on repeatedly screenshotss; Place hope on through screenshotss repeatedly and obtain the character position distribution situation after the each character dislocation of the soft keyboard exchange, just be engraved in the pixel coordinate in the screen during a plurality of clicking trigger of binding analysis left mouse button again and know that the user uses each code characters of soft keyboard output; Yet the duration that the user carries out the password input operation is merely tens of seconds, and bogusware will realize repeatedly the screenshotss processing in these tens of seconds, and its technology realizes that difficulty is improved; And the moment of user's clicking trigger soft keyboard is indefinite at random; Soft keyboard all can dynamically be changed the character distribution situation by clicking trigger at every turn; Even if through screenshotss repeatedly, also being difficult to judge between twice screenshots soft keyboard, bogusware whether caused the pairing character of soft keyboard character button that exchange has at random repeatedly taken place by clicking trigger repeatedly; In addition, how to confirm repeatedly the corresponding relation between snapshot picture and a plurality of mouse screen pixels coordinate, also will become the new technical barrier that bogusware realizes that password capture is analyzed.So; Utilize the safeguard protection defence line of breaking through soft keyboard operation processing method of the present invention based on the bogusware of screenshotss technology and mouse coordinates capture technique; The technical difficulty of its bogusware research and development is able to significantly promote the corresponding R&D costs that improve bogusware in many aspects.Moreover; It is comparatively general that present computer user installs anti-virus software on computers; If the auxiliary of anti-virus software arranged; Even if bogusware is carried out repeatedly screenshotss, tackled by anti-virus software by part screenshotss wherein, bogusware then can't be known the character distribution situation after the each character dislocation of the soft keyboard exchange completely; Also just can't be by analyzing mouse pixel coordinate and accurately, fully catch whole code characters that the user uses soft keyboard output in screen, thus make bogusware be difficult to successfully obtain other people password.This shows; Soft keyboard operation processing method of the present invention not only can effectively prevent to obtain through the virus of screenshots and mouse coordinates capture technique the code characters of soft keyboard output; And, many-sided factors such as R&D costs high, the screenshotss of anti-virus software interception protection big between the research and development technology difficulty; To succeed to the new virus of soft keyboard operation processing method of the present invention is also very difficult based on screenshotss technology and the research and development of mouse coordinates capture technique; Therefore; Soft keyboard operation processing method of the present invention reduces even has shielded the risk of catching the alphabet of soft keyboard output based on the bogusware of screenshotss technology and mouse coordinates capture technique, thereby has effectively promoted the safeguard protection performance of soft keyboard to user cipher.
Embodiment two:
Present embodiment still adopts soft keyboard operation processing method of the present invention to realize the soft keyboard like embodiment one described object computer character output function; But compare with embodiment one, the soft keyboard operation processing method of present embodiment has carried out further reinforcement to the safeguard protection performance of soft keyboard.The flow process of present embodiment soft keyboard operation processing method is as shown in Figure 5, and concrete execution in step is following:
02A) soft keyboard starts operation, and each character distributed store of the preset output of soft keyboard is in each soft keyboard character button corresponding characters storage space.
02B) according to the current character of storing in the soft keyboard character button corresponding characters storage space, carry out the character display process of soft keyboard character button, and at the character button of soft keyboard during by clicking trigger, execution in step 02C).With step 01B among the embodiment one) embodiment different; Step 02B in the present embodiment) concrete executive mode is; Each character button of soft keyboard is the current character of storing in its corresponding characters storage space of update displayed respectively; And random valued is set distribution switching time limit Ta in the positive scope, begins to carry out timing; In timing course, if the character button of soft keyboard is by clicking trigger, execution in step 02C then); If timing arrives distribution when switching time limit Ta, the character button of soft keyboard is as yet by clicking trigger, then execution in step 02D).
02C) soft keyboard output is by the current character of storing in the character button corresponding characters storage space of clicking trigger, then execution in step 02D immediately).
02D) character of being stored in each soft keyboard character button corresponding characters storage space of the soft keyboard exchange that misplaces is at random handled, returned step 02B then).
02E) circulation execution in step 02B) ~ 02D), run abort until soft keyboard.
Operational scheme by the present embodiment soft keyboard can be seen; Step 02B) increased the timing of switching time limit Ta to distribution at random in; Making soft keyboard not only trigger the dislocation at random of carrying out the corresponding character of each character button of soft keyboard institute during by clicking trigger in the lump at the character button exchanges; Even if the user not under the state of clicking trigger soft keyboard; Timing arrives distribution that random valued sets when switching time limit Ta, also can trigger execution in step 02D) carry out the character swap operation that misplaces at random, further strengthened the dynamic change randomness of the corresponding character of soft keyboard character button.So; Even if bogusware is passed through repeatedly screenshotss; Also be difficult to the pairing character of character button between twice clicking trigger soft keyboard of judges whether the exchange of dislocation at random repeatedly taken place, perhaps between twice screenshots soft keyboard whether by clicking trigger; And; Because arriving when the distribution of random valued setting is switched time limit Ta, timing also can trigger execution in step 02D); Make that the exchange number of times of dislocation at random and the soft keyboard of the corresponding character of soft keyboard character button are not reciprocity by the number of times of clicking trigger; Even if bogusware repeatedly screenshotss has obtained character distribution situation image and mouse after the each dislocation at random of the soft keyboard exchange at each clicking trigger screen pixels coordinate constantly; Because the not reciprocity permutation and combination situation that has increased its corresponding relation greatly of both number of times; Make bogusware possibly determine repeatedly the corresponding relation between snapshot picture and a plurality of mouse screen pixels coordinate hardly, the technical difficulty that bogusware breaks through this soft keyboard operation processing method safeguard protection defence line further promotes.This shows; The soft keyboard operation processing method that relies on present embodiment; Even do not protect by the screenshotss interception of anti-virus software; Bogusware based on screenshotss technology and mouse coordinates capture technique also possibly capture soft keyboard hardly by the alphabet of clicking trigger output, makes soft keyboard that the lifting of matter arranged the safeguard protection performance of user cipher.
Certainly; Cause the user to be difficult to operation for the exchange of dislocation at random that does not cause the corresponding character of soft keyboard character button is too frequent; Also long in order not make that soft keyboard is carried out interval time of dislocation exchange at random voluntarily under the clicking trigger state; The random valued that distribution is switched time limit Ta is preferably in one than carrying out in the suitable scope; For example can preset to limit in the scope of distribution switching time limit Ta between 3 ~ 10 seconds and carry out the random valued setting, perhaps set the random valued scope of distribution switching time limit Ta according to the concrete needs of using.
Embodiment three:
Present embodiment still adopts soft keyboard operation processing method of the present invention to realize the soft keyboard like embodiment one described object computer character output function; Different with embodiment one, two is that the soft keyboard operation of present embodiment is handled and through another kind of embodiment the safeguard protection performance of soft keyboard carried out further reinforcement.In the present embodiment soft keyboard operation processing method, also set up a visible state sign should be arranged for each character button of soft keyboard, its flow process is as shown in Figure 6, and concrete execution in step is following:
03A) soft keyboard starts operation, and each character distributed store of the preset output of soft keyboard is in each soft keyboard character button corresponding characters storage space.
03B) according to the current character of storing in the soft keyboard character button corresponding characters storage space, carry out the character display process of soft keyboard character button, and at the character button of soft keyboard during by clicking trigger, execution in step 03C).Step 03B) concrete executive mode such as b1) ~ b5) said:
B1) random valued is set visible state switching times K in the positive scope;
B2) M character button in the selected at random soft keyboard, the visible state sign of M selected character button is set to invisible, and the visible state of other character button sign is set to visible in the soft keyboard;
B3) each visible state of soft keyboard is designated the visible character button current character of storing in its corresponding characters storage space of update displayed respectively, each visible state be designated sightless character button respectively update displayed be the character invisible mode;
B4) random valued is set visible state switching time limit Tb in the positive scope, begins to carry out timing; In timing course, if the character button of soft keyboard is by clicking trigger, execution in step 03C then); If when timing arrived visible state switching time limit Tb, the character button of soft keyboard was not as yet by clicking trigger, then visible state switching times K is from subtracting one, execution in step b5);
B5) value as if current visible state switching times K is zero, then execution in step 03D); Otherwise, return step b2).
03C) soft keyboard output is by the current character of storing in the character button corresponding characters storage space of clicking trigger, then execution in step 03D immediately).
03D) character of being stored in each soft keyboard character button corresponding characters storage space of the soft keyboard exchange that misplaces is at random handled, returned step 03B then).
03E) circulation execution in step 03B) ~ 03D), run abort until soft keyboard.
Operational scheme by the present embodiment soft keyboard can be seen; Step 03B) increased the sightless processing of character of M character button in the selected at random soft keyboard in; And corresponding visible state switching times K and the visible state of having set up the random valued setting switches time limit Tb; Make soft keyboard all have M character button at random to be in the character invisible mode at any time; And misplace at random between the process that exchanges at execution character; K time of can also carry out at random of the character button that is in the character invisible mode dynamically switched, and visible state to switch time limit Tb also be at random, in addition; The character button of user's clicking trigger soft keyboard or character invisible mode switch at random the K time exchange of dislocation at random that can trigger to carry out character in the soft keyboard, thereby make the character dynamic random situation of change of soft keyboard be tending towards the most complicated.For example, each character of the preset output of soft keyboard at a time is as shown in Figure 7 at the corresponding distribution situation and the character invisible mode of each soft keyboard character button; Soft keyboard not by the state of clicking trigger under through behind the random time, the distribution situation of the corresponding character of character button institute does not change, but the character invisible mode is able to switch change, and is as shown in Figure 8; And soft keyboard by clicking trigger after, the character button the distribution situation and the character invisible mode of corresponding character randomly changing all takes place once more, as shown in Figure 9 ... Do not exist fully between each different conditions and can follow rule.Realize the sightless concrete operations mode of character; Can be when the execution character display process; Be designated just character display button only of sightless character button to visible state, perhaps the character button covered and be presented on the character, again or character is shown as the identical color of character button ... Or the like; As long as can make the sightless implementation of character on the character button, all can adopt for the present invention.So; For the user who uses soft keyboard; Because the variation of variation of the distribution situation of the corresponding character of soft keyboard character button institute and character invisible mode all is a dynamic random; Therefore each character of the preset output of soft keyboard can not be in invisible mode always, and the user can find it need be as the character of object output from the software dish sometime, and corresponding character button is realized character output on the clicking trigger soft keyboard; Yet for bogusware; Even if it passes through repeatedly screenshotss; What each screenshotss were obtained all is that the character distribution is chaotic, the sightless soft keyboard static images of several characters; Wherein the distribution situation of several sightless characters in the soft keyboard character button is difficult to predict; And the character of visible state next distribution situation constantly in the soft keyboard character button also is difficult to predict; And probably when user's clicking trigger character button its to be shown as character visible, and when the bogusware screenshotss this character button to be shown as character invisible, thereby make bogusware be difficult to the exchange of dislocation at random that how many times has taken place for the pairing character of character button between twice clicking trigger soft keyboard of judges; Whether also be difficult to judge between twice screenshots soft keyboard by clicking trigger, be difficult to more to judge that whether the sightless character button of character is by clicking trigger and specifically corresponding to what character in the soft keyboard image that screenshotss obtain; And; Because visible state switching times K, visible state switch time limit Tb, the sightless character number of buttons of character M is at random; Make that the character distribution is chaotic in the soft keyboard, the sightless dynamic random situation of change of several characters is very versatile and flexible; Therefore bogusware possibly determined repeatedly snapshot picture and mouse hardly at the corresponding relation between the clicking trigger screen pixels coordinate constantly repeatedly, and the technical difficulty in this soft keyboard operation processing method safeguard protection defence line of bogusware breakthrough is significantly promoted.This shows; The soft keyboard operation processing method that relies on present embodiment; Even do not protect by the screenshotss interception of anti-virus software; Bogusware based on screenshotss technology and mouse coordinates capture technique also possibly capture soft keyboard hardly by the alphabet of clicking trigger output, makes soft keyboard to the safeguard protection performance of user cipher significantly lifting arranged.This also is that the optimum of soft keyboard operation processing method of the present invention carries into execution a plan; Though for the user; Use the soft keyboard of so operation to carry out character and write more loaded down with trivial detailsly relatively, but possess under the prerequisite of so high safeguard protection performance at it, its complex operation degree also is an acceptable.
Cause the user to be difficult to operation for the switching at random of the exchange of dislocation at random that do not cause the corresponding character of soft keyboard character button and character invisible mode is too frequent; Also long in order not make that soft keyboard is carried out interval time of switching at random of dislocation exchange at random and character invisible mode voluntarily under the clicking trigger state; The random valued that visible state switching times K, visible state switch time limit Tb is preferably in one than carrying out in the suitable scope; For example; Carry out random valued in the scope of visible state switching times K between 2 ~ 5 and set, visible state switches and carries out the random valued setting in the scope of time limit Tb between 1 ~ 5 second; Simultaneously; Too much character is invisible and cause the user to be difficult to thoughtful required character for a long time in the soft keyboard; The random valued of the sightless character number of buttons of character M also is preferably in the suitable scope carries out; For example, the span of M is between 5≤M≤(Ma/3), and wherein Ma representes the character overall number of buttons of soft keyboard; So both guaranteed that invisible character was difficult to distinguished easily by bogusware, and can avoid in the soft keyboard large-area character button to be in the character invisible mode simultaneously again and cause the user to be difficult to operation.Certainly; Those skilled in the art also can set up the span of visible state switching times K, visible state switching time limit Tb, the sightless character number of buttons of character M according to concrete applicable cases on their own when implementing this soft keyboard operation processing method of utilization.
Embodiment four:
The core thinking of soft keyboard operation processing method of the present invention; Be through constantly dynamically change the distributed store situation of each character of the preset output of soft keyboard in difference, make each character button of soft keyboard at the dynamically corresponding different character of different time section at each character button corresponding characters storage space; Wherein, each character of the preset output of soft keyboard can adopt multiple multi-form in the dynamic change of the distributed store situation of each character button corresponding characters storage space.Though the dynamic change of character distribution situation is more complicated, the safeguard protection performance of soft keyboard is also corresponding good more, also makes simultaneously the user use become all the more loaded down with trivial details of the operation of soft keyboard.It is described like embodiment one that present embodiment also adopts soft keyboard operation processing method of the present invention to realize; But for more user-friendly soft keyboard carries out the character input operation; Present embodiment is on the basis of embodiment one; Proposed a kind of improved soft keyboard operation processing method, its concrete execution in step is following:
04A) soft keyboard starts operation, and each character distributed store of the preset output of soft keyboard is in each soft keyboard character button corresponding characters storage space.This step is specially, and divides soft keyboard into a plurality of keyboard areas, in each keyboard area each character of the preset output of character button randomly distributed store in each character button corresponding characters storage space of this keyboard area.For example; For the soft keyboard of object computer character output function; Can in soft keyboard, divide the first line character button into " numerical character keyboard area "; Divide the second line character button into " sign character keyboard area ", divide third and fourth line character button into " English character keyboard area "; Then; Let each numerical character randomly distributed store in " numerical character keyboard area " each soft keyboard character button corresponding characters storage space; Let each sign character randomly distributed store in " sign character keyboard area " each soft keyboard character button corresponding characters storage space, let each English character randomly distributed store in " English character keyboard area " each soft keyboard character button corresponding characters storage space.
04B) according to the current character of storing in the soft keyboard character button corresponding characters storage space, carry out the character display process of soft keyboard character button, and at the character button of soft keyboard during by clicking trigger, execution in step 04C).
04C) soft keyboard output is by the current character of storing in the character button corresponding characters storage space of clicking trigger, then execution in step 04D immediately).
04D) character of being stored in each soft keyboard character button corresponding characters storage space of the soft keyboard exchange that misplaces is at random handled, returned step 04B then).At step 04D) in, said " character of being stored in each soft keyboard character button corresponding characters storage space of the soft keyboard exchange that misplaces is at random handled " is specially: respectively with the character of being stored in each soft keyboard character button corresponding characters storage space of each keyboard area of the soft keyboard exchange that between each soft keyboard character button corresponding characters storage space in corresponding keyboard zone, misplaces at random.For example; For the computer character output function soft keyboard of a plurality of keyboard areas of aforementioned division; As execution in step 04D) time; The exchange that just between " numerical character keyboard area " each soft keyboard character button corresponding characters storage space, misplaces at random of each numerical character; The exchange that just between " sign character keyboard area " each soft keyboard character button corresponding characters storage space, misplaces at random of each sign character, the exchange and each English character just misplaces between " English character keyboard area " each soft keyboard character button corresponding characters storage space at random.
04E) circulation execution in step 04B) ~ 04D), run abort until soft keyboard.
Soft keyboard operational scheme by present embodiment is visible; Can be through soft keyboard being divided into a plurality of keyboard areas; Make each character of the preset output of character button in each keyboard area of soft keyboard in its corresponding keyboard area, carry out dynamic random dislocation exchange; And let the relative independence of maintenance between the different keyboard areas, convenient like this user in the corresponding keyboard area of its required character, find the corresponding characters button, reduce the fussy degree that the user manipulates soft keyboard.For the soft keyboard of present embodiment; Because the first line character button divides " numerical character keyboard area " in soft keyboard, inciting somebody to action; Divide the second line character button into " sign character keyboard area "; Divide third and fourth line character button into " English character keyboard area ", and soft keyboard is able to operation according to above-mentioned operational scheme, makes numerical character only between the soft keyboard first line character button, carry out dynamic random and distribute; Sign character is only carried out dynamic random and is distributed between the soft keyboard second line character button, English character only carries out dynamic random and distributes between third and fourth line character button of soft keyboard; For example; Each character of the preset output of a certain moment soft keyboard is shown in figure 10 in the corresponding distribution situation of each soft keyboard character button; And the situation after the distribution situation of preset each character exported of another moment soft keyboard changes is shown in figure 11 ... Like this; Even if the character position in the soft keyboard is constantly carrying out the dynamic random variation, when the user need export numeric character, sign character and English character respectively, that just can fix removed to seek corresponding character button respectively in first row, second row and the 3rd four lines character button of soft keyboard; Make that the searching of character is more easily simple, reduced the complex operation degree of soft keyboard.As the cost that simplifies the operation, the soft keyboard that adopts above-mentioned soft keyboard operation treatment scheme to realize, its safeguard protection performance slightly reduces than embodiment one; If but the step 04B in the present embodiment soft keyboard operational scheme) combine to adopt step 02B among the embodiment two) or embodiment three in step 03B) executive mode; Let in each keyboard area of soft keyboard the dynamic random situation of change of each character button complicated more; Still can on the basis that keeps low complex operation degree, make the soft keyboard operation processing method of present embodiment possess higher safeguard protection performance equally.
Comprehensive above-mentioned four embodiment illustrate; Can see; Soft keyboard operation processing method of the present invention not only can effectively prevent to obtain through the virus of screenshots and mouse coordinates capture technique the code characters of soft keyboard output; Can also effectively prevent to obtain whole code characters of soft keyboard output through the virus of screenshotss and mouse coordinates capture technique repeatedly; The technical difficulty and the R&D costs that break through soft keyboard technology security perimeter of the present invention based on the bogusware of screenshotss technology and mouse coordinates capture technique have significantly been improved; Reduce even shielded the risk of catching the alphabet that soft keyboard exports based on the bogusware of screenshotss technology and mouse coordinates capture technique, effectively promoted the safeguard protection performance of soft keyboard user cipher.
Explanation is at last; Above embodiment is only unrestricted in order to technical scheme of the present invention to be described; Although with reference to embodiment the present invention is specified, those of ordinary skill in the art should be appreciated that and can make amendment or be equal to replacement technical scheme of the present invention; And not breaking away from the aim and the scope of technical scheme of the present invention, it all should be encompassed in the middle of the claim scope of the present invention.

Claims (10)

  1. One kind tighten security the protection the soft keyboard operation processing method; It is characterized in that; Each character button of soft keyboard is to there being a character storage space; The character that makes soft keyboard character button characters displayed and exported by clicking trigger is the character that character button corresponding characters storage space is stored; Through constantly dynamically change the distributed store situation of each character of the preset output of soft keyboard in difference, make each character button of soft keyboard at the dynamically corresponding different character of different time section at each character button corresponding characters storage space.
  2. 2. soft keyboard operation processing method according to claim 1 is characterized in that, specifically comprises the steps:
    A) soft keyboard starts operation, and each character distributed store of the preset output of soft keyboard is in each soft keyboard character button corresponding characters storage space;
    B) according to the current character of storing in the soft keyboard character button corresponding characters storage space, carry out the character display process of soft keyboard character button, and at the character button of soft keyboard during by clicking trigger, execution in step C);
    C) soft keyboard output is by the current character of storing in the character button corresponding characters storage space of clicking trigger, then execution in step D immediately);
    D) character of being stored in each soft keyboard character button corresponding characters storage space of the soft keyboard exchange that misplaces is at random handled, returned step B then);
    E) circulation execution in step B) ~ D), run abort until soft keyboard.
  3. 3. soft keyboard operation processing method according to claim 2; It is characterized in that, at step B) in, said " according to the current character of storing in the soft keyboard character button corresponding characters storage space; carry out the character display process of soft keyboard character button; and at the character button of soft keyboard during by clicking trigger, execution in step C) " is specially: with each character button of soft keyboard current character of storing in its corresponding characters storage space of update displayed respectively, wait for by clicking trigger; Until the character button of soft keyboard during by clicking trigger, execution in step C).
  4. 4. soft keyboard operation processing method according to claim 2; It is characterized in that; At step B) in, said " according to the current character of storing in the soft keyboard character button corresponding characters storage space, carry out the character display process of soft keyboard character button; and at the character button of soft keyboard during by clicking trigger; execution in step C) " is specially: each character button of soft keyboard is the current character of storing in its corresponding characters storage space of update displayed respectively, and random valued is set distribution and switched time limit Ta in the positive scope, begins to carry out timing; In timing course, if the character button of soft keyboard is by clicking trigger, execution in step C then); If timing arrives distribution when switching time limit Ta, the character button of soft keyboard is as yet by clicking trigger, then execution in step D).
  5. 5. soft keyboard operation processing method according to claim 4 is characterized in that, said distribution is switched and carried out the random valued setting in the scope of time limit Ta between 3 ~ 10 seconds.
  6. 6. soft keyboard operation processing method according to claim 2 is characterized in that, each character button of said soft keyboard is also to there being a visible state sign; At step B) in; Said " according to the current character of storing in the soft keyboard character button corresponding characters storage space; carry out the character display process of soft keyboard character button, and at the character button of soft keyboard during by clicking trigger, execution in step C) " be specially:
    B1) random valued is set visible state switching times K in the positive scope;
    B2) M character button in the selected at random soft keyboard, the visible state sign of M selected character button is set to invisible, and the visible state of other character button sign is set to visible in the soft keyboard;
    B3) each visible state of soft keyboard is designated the visible character button current character of storing in its corresponding characters storage space of update displayed respectively, each visible state be designated sightless character button respectively update displayed be the character invisible mode;
    B4) random valued is set visible state switching time limit Tb in the positive scope, begins to carry out timing; In timing course, if the character button of soft keyboard is by clicking trigger, execution in step C then); If when timing arrived visible state switching time limit Tb, the character button of soft keyboard was not as yet by clicking trigger, then visible state switching times K is from subtracting one, execution in step b5);
    B5) value as if current visible state switching times K is zero, then execution in step D); Otherwise, return step b2).
  7. 7. soft keyboard operation processing method according to claim 6 is characterized in that, carries out random valued in the scope of said visible state switching times K between 2 ~ 5 and sets; Said visible state switches and carries out the random valued setting in the scope of time limit Tb between 1 ~ 5 second.
  8. 8. soft keyboard operation processing method according to claim 6 is characterized in that, in said " M character button in the selected at random soft keyboard ", the span of M is that 5≤M≤(Ma/3), wherein Ma representes the character overall number of buttons of soft keyboard.
  9. 9. according to each described soft keyboard operation processing method in the claim 2 ~ 8; It is characterized in that; In steps A) in, said " each character distributed store of the preset output of soft keyboard is in each soft keyboard character button corresponding characters storage space " is specially: each character of the preset output of soft keyboard randomly distributed store in each soft keyboard character button corresponding characters storage space.
  10. 10. according to each described soft keyboard operation processing method in the claim 2 ~ 8; It is characterized in that; In steps A) in; Said " each character distributed store of the preset output of soft keyboard is in each soft keyboard character button corresponding characters storage space " is specially: divide soft keyboard into a plurality of keyboard areas, in each keyboard area each character of the preset output of character button randomly distributed store in each character button corresponding characters storage space of this keyboard area;
    At step D) in, said " character of being stored in each soft keyboard character button corresponding characters storage space of the soft keyboard exchange that misplaces is at random handled " is specially: respectively with the character of being stored in each soft keyboard character button corresponding characters storage space of each keyboard area of the soft keyboard exchange that between each soft keyboard character button corresponding characters storage space in corresponding keyboard zone, misplaces at random.
CN201110441537.8A 2011-12-26 2011-12-26 Soft keyboard operation processing method capable of enhancing safety protection Active CN102566924B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110441537.8A CN102566924B (en) 2011-12-26 2011-12-26 Soft keyboard operation processing method capable of enhancing safety protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110441537.8A CN102566924B (en) 2011-12-26 2011-12-26 Soft keyboard operation processing method capable of enhancing safety protection

Publications (2)

Publication Number Publication Date
CN102566924A true CN102566924A (en) 2012-07-11
CN102566924B CN102566924B (en) 2014-01-01

Family

ID=46412451

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110441537.8A Active CN102566924B (en) 2011-12-26 2011-12-26 Soft keyboard operation processing method capable of enhancing safety protection

Country Status (1)

Country Link
CN (1) CN102566924B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102968602A (en) * 2012-10-31 2013-03-13 北京奇虎科技有限公司 Setting method and device for keyboard
CN102982272A (en) * 2012-10-31 2013-03-20 北京奇虎科技有限公司 Method and device for keyboard layout
CN103491533A (en) * 2013-09-23 2014-01-01 上海翰鑫信息科技有限公司 WAP gateway, user WAP terminal, WAP payment system and WAP payment method
CN103996011A (en) * 2014-06-05 2014-08-20 福建天晴数码有限公司 Method and device for protecting codes to be input safely
WO2016000323A1 (en) * 2014-06-30 2016-01-07 深圳市中兴微电子技术有限公司 Method for operating soft keyboard, terminal and computer readable storage medium
CN105323207A (en) * 2014-06-06 2016-02-10 南京理工大学常熟研究院有限公司 Web portal security login method preventing AP intercepting
CN106295314A (en) * 2015-05-22 2017-01-04 中兴通讯股份有限公司 Encryption method based on dummy keyboard and device
CN107239152A (en) * 2016-03-29 2017-10-10 刘金宏 A kind of data inputting method of association in time
CN107272920A (en) * 2016-04-06 2017-10-20 阿里巴巴集团控股有限公司 Change the method and device of the corresponding relation of button and character
CN108710810A (en) * 2018-05-22 2018-10-26 中国银联股份有限公司 A kind of acquisition methods of password, traction equipment and terminal
CN109885241A (en) * 2019-01-16 2019-06-14 平安普惠企业管理有限公司 Dummy keyboard generation method, server and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020093535A1 (en) * 2001-01-17 2002-07-18 Murphy Michael William User interface for character entry using a minimum number of selection keys
CN1728062A (en) * 2004-07-30 2006-02-01 招商银行股份有限公司 Graphics keyboard based security input method for computer information
CN101388059A (en) * 2007-09-14 2009-03-18 英业达股份有限公司 Screen key entry system for preventing trojan program and method thereof
CN101634935A (en) * 2009-08-18 2010-01-27 深圳市同洲电子股份有限公司 Method and device for inputting characters by touch screen
CN101968711A (en) * 2010-09-29 2011-02-09 北京播思软件技术有限公司 Method for accurately inputting characters based on touch screen

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020093535A1 (en) * 2001-01-17 2002-07-18 Murphy Michael William User interface for character entry using a minimum number of selection keys
CN1728062A (en) * 2004-07-30 2006-02-01 招商银行股份有限公司 Graphics keyboard based security input method for computer information
CN101388059A (en) * 2007-09-14 2009-03-18 英业达股份有限公司 Screen key entry system for preventing trojan program and method thereof
CN101634935A (en) * 2009-08-18 2010-01-27 深圳市同洲电子股份有限公司 Method and device for inputting characters by touch screen
CN101968711A (en) * 2010-09-29 2011-02-09 北京播思软件技术有限公司 Method for accurately inputting characters based on touch screen

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102982272A (en) * 2012-10-31 2013-03-20 北京奇虎科技有限公司 Method and device for keyboard layout
WO2014067321A1 (en) * 2012-10-31 2014-05-08 北京奇虎科技有限公司 Method and apparatus for setting keyboard
CN102982272B (en) * 2012-10-31 2015-12-02 北京奇虎科技有限公司 keyboard layout method and device
CN102968602A (en) * 2012-10-31 2013-03-13 北京奇虎科技有限公司 Setting method and device for keyboard
CN103491533A (en) * 2013-09-23 2014-01-01 上海翰鑫信息科技有限公司 WAP gateway, user WAP terminal, WAP payment system and WAP payment method
CN103996011A (en) * 2014-06-05 2014-08-20 福建天晴数码有限公司 Method and device for protecting codes to be input safely
CN105323207A (en) * 2014-06-06 2016-02-10 南京理工大学常熟研究院有限公司 Web portal security login method preventing AP intercepting
WO2016000323A1 (en) * 2014-06-30 2016-01-07 深圳市中兴微电子技术有限公司 Method for operating soft keyboard, terminal and computer readable storage medium
CN106295314A (en) * 2015-05-22 2017-01-04 中兴通讯股份有限公司 Encryption method based on dummy keyboard and device
CN107239152A (en) * 2016-03-29 2017-10-10 刘金宏 A kind of data inputting method of association in time
CN107272920A (en) * 2016-04-06 2017-10-20 阿里巴巴集团控股有限公司 Change the method and device of the corresponding relation of button and character
CN107272920B (en) * 2016-04-06 2020-10-23 创新先进技术有限公司 Method and device for changing corresponding relation between keys and characters
CN112198973A (en) * 2016-04-06 2021-01-08 创新先进技术有限公司 Method and device for changing corresponding relation between keys and characters
CN108710810A (en) * 2018-05-22 2018-10-26 中国银联股份有限公司 A kind of acquisition methods of password, traction equipment and terminal
CN109885241A (en) * 2019-01-16 2019-06-14 平安普惠企业管理有限公司 Dummy keyboard generation method, server and computer readable storage medium

Also Published As

Publication number Publication date
CN102566924B (en) 2014-01-01

Similar Documents

Publication Publication Date Title
CN102566924B (en) Soft keyboard operation processing method capable of enhancing safety protection
KR102108614B1 (en) Method and apparatus for unlocking user interface
Anwar et al. Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey
KR20130087010A (en) Method and device for secured entry of personal data
CN106599717B (en) Data processor
CN106462508A (en) Access control and code scheduling
Kim Keypad against brute force attacks on smartphones
US20190197216A1 (en) Method, apparatus, and computer-readable medium for executing a logic on a computing device and protecting the logic against reverse engineering
CN105264540A (en) Cryptographic label for attachment to a communication card
CN102521531A (en) Password protection system based on hardware virtualization
CN107463856A (en) A kind of attack protection data processor based on trusted kernel
CN105447378A (en) Password generation method and device
Jiang et al. A novel cache bank timing attack
CN108874500A (en) A kind of application security guard method based on hardware virtualization technology
EP2667319B1 (en) Computer implemented security system and method
CN104598810B (en) The method and apparatus for realizing the safe handling of intelligent terminal
CN101655768A (en) Anti-peep password input method
CN103136461B (en) A kind of implementation method of anti-screenshot soft keyboard and device
WO2017028694A1 (en) Method and device for unlocking
Wang et al. Implication of animation on Android security
CN105335674B (en) Password burglary-preventing method and device
CN105389506B (en) A kind of method and apparatus for improving input safety
Tang et al. Flush+ time: A high accuracy and high resolution cache attack on arm-fpga embedded soc
CN104156678B (en) The guard method of one kind input character, system and electronic equipment
Zheng et al. TZ-KPM: Kernel protection mechanism on embedded devices on hardware-assisted isolated environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200605

Address after: Room 502-1, floor 5, building 2, courtyard 10, KEGU 1st Street, economic development zone, Daxing District, Beijing 100081

Patentee after: Singularity Xinyuan International Technology Development (Beijing) Co.,Ltd.

Address before: 401121 Chongqing City, northern New District of Chongqing municipality Mount Huangshan Road No. 5 South Mercury Technology Building 1 floor office No. 3

Patentee before: A-MEDIA COMMUNICATION TECH Co.,Ltd.

TR01 Transfer of patent right