CN102566924B - Soft keyboard operation processing method capable of enhancing safety protection - Google Patents

Soft keyboard operation processing method capable of enhancing safety protection Download PDF

Info

Publication number
CN102566924B
CN102566924B CN201110441537.8A CN201110441537A CN102566924B CN 102566924 B CN102566924 B CN 102566924B CN 201110441537 A CN201110441537 A CN 201110441537A CN 102566924 B CN102566924 B CN 102566924B
Authority
CN
China
Prior art keywords
character
soft keyboard
button
storage space
keyboard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110441537.8A
Other languages
Chinese (zh)
Other versions
CN102566924A (en
Inventor
郝永建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Singularity Xinyuan International Technology Development (Beijing) Co.,Ltd.
Original Assignee
CHONGQING XINMEI AGRICULTURAL INFORMATION TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHONGQING XINMEI AGRICULTURAL INFORMATION TECHNOLOGY CO LTD filed Critical CHONGQING XINMEI AGRICULTURAL INFORMATION TECHNOLOGY CO LTD
Priority to CN201110441537.8A priority Critical patent/CN102566924B/en
Publication of CN102566924A publication Critical patent/CN102566924A/en
Application granted granted Critical
Publication of CN102566924B publication Critical patent/CN102566924B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Input From Keyboards Or The Like (AREA)

Abstract

The invention provides a soft keyboard operation processing method. The method is characterized in that every character button of a soft keyboard corresponds to a character storage space, characters displayed by the character buttons of the soft keyboard and the characters which are triggered by clicking to output are the characters stored in the character storage spaces corresponding to the character buttons, and each character button of the soft keyboard can dynamically correspond to the different characters in the different time periods by dynamically changing the distribution and storage situation of all the characters which are preset and output by the soft keyboard in the character storage spaces corresponding to all the character buttons at different times, so that the soft keyboard can effectively prevent a virus from getting password symbols output by the key board through one-time screenshot and mouse coordinate capture technologies, the risk of capturing all the characters output by the soft keyboard by a virus software based on the screenshot technology and the mouse coordinate capture technology can be reduced and even shielded, and the safety protection performance of the soft keyboard against passwords of a user can be enhanced.

Description

The soft keyboard operation processing method that tightens security and protect
Technical field
The present invention relates to the internet communication technology and computer software technical field, be specifically related to computing machine and internet cryptoguard technology, relate in particular to a kind of soft keyboard operation processing method of the protection that tightens security.
Background technology
Password is an important means of protection the Internet service business account and computing machine individual application software application safety.But, along with the development of the internet communication technology and computer software technology, computing machine, internet virus technology have also obtained corresponding development, serious threat is to the cryptosecurity of the Internet service business account and computing machine individual application software.Owing to pressing character keys different on the computer hardware keyboard, the output signal difference of hardware keyboards, password early obtains the hardware keyboards output signal that bogusware just receives by intercepting computer hardware keyboard signal interface, the code characters of identification hardware keyboards output, and the code characters identified is sent to the hacker of far-end by internet, thereby steal the password of other people the Internet service business account or computing machine individual application software.Yet the appearance of soft keyboard technology, become the powerful mean of tackling the bogusware based on hardware keyboards intercepting technology.Soft keyboard (Soft Keyboard), refer to the simulating keyboard of realizing by computer software, and it is shown on screen, and the character button of clicking on soft keyboard by left mouse button is realized the character input.Soft keyboard technology is applied in increasing field, and particularly Bank Account Number, online payment account etc. relate in the Password Input of the Internet service business account of personal property on the net, and the application of soft keyboard is very general.The user can use soft keyboard input code characters fully; without operating again the computer hardware keyboard; and due to soft keyboard from as the running software program; during the clicked triggering of soft keyboard, the character of output can not pass through the computer hardware interface yet; the hardware device output signal that bogusware can't receive by intercepting computer hardware interface is again obtained the code characters of other people input; therefore within a very long time, soft keyboard technology has effectively been protected the use safety of the Internet service business account and computing machine individual application software.
But the development due to computer system utilization and programming technique, triggering computer system by programming carries out the screenshotss processing and catches left mouse button clicking trigger screen pixels coordinate constantly, the basic skills that the software development programming technique personnel based on computer system grasp have been become, thereby the new bogusware based on screenshotss technology and mouse coordinates capture technique occurred, broken through the security perimeter of current soft keyboard technology.The operation logic of the bogusware based on screenshotss technology and mouse coordinates capture technique normally, after soft keyboard starts operation, triggering computer system carries out screenshotss and obtains the snapshot picture, and then obtain the distributing position of each character button in the screen pixels coordinate on soft keyboard by the screenshotss image processing and analyzing, then by catching mouse at the left button clicking trigger screen pixels coordinate in the moment, pass through again mouse screen pixels coordinate in conjunction with the operational analysis in addition of soft keyboard character button screen pixels coordinate distributing position, can know that the user uses the defeated clicking trigger of soft keyboard to export out to each code characters of dialog box or Password Input frame, realize that password steals.
Therefore, how further to strengthen the cipher safe protecting of the Internet service business account and computing machine individual application software, become the important research direction of computing machine and internet cryptoguard technology.
Summary of the invention
For above shortcomings in prior art; the object of the present invention is to provide a kind of soft keyboard operation processing method of the protection that tightens security; reduction or the bogusware of shielding based on screenshotss technology and mouse coordinates capture technique are caught the risk of the alphabet of the clicked triggering output of soft keyboard, strengthen the safeguard protection performance of soft keyboard to user cipher.
For achieving the above object, the present invention has adopted following technological means:
A kind of soft keyboard operation processing method of the protection that tightens security; it is characterized in that; each character button of soft keyboard is to there being a character storage space; the character that makes the soft keyboard character button show and clicked triggering thereof and the character exported are the character that character storage space that the character button is corresponding is stored; the distributed store situation of the character storage space corresponding at each character button by each character dynamically not changing in the same time the default output of soft keyboard, make each character button of soft keyboard at dynamic corresponding different character of different time periods.
Above-mentioned soft keyboard operation processing method, specifically comprise the steps:
A) soft keyboard starts operation, in each character distributed store of the default output of soft keyboard character storage space corresponding in each soft keyboard character button;
B) current the stored character in corresponding character storage space according to the soft keyboard character button, carry out the character Graphics Processing of soft keyboard character button, and, when clicked triggerings of character button of soft keyboard, perform step C);
C) soft keyboard is exported current stored character in the character storage space that the character button of clicked triggering is corresponding, then performs step immediately D);
D) character of each soft keyboard character button of soft keyboard being stored in corresponding character storage space carries out random dislocation exchange to be processed, and then returns to step B);
E) circulation execution step B) ~ D), until soft keyboard runs abort.
In above-mentioned soft keyboard operation processing method, but as a kind of selection scheme, at step B) in, described " current the stored character in corresponding character storage space according to the soft keyboard character button, carry out the character Graphics Processing of soft keyboard character button, and when the clicked triggering of character button of soft keyboard, execution step C) " be specially: each character button of soft keyboard is upgraded respectively and shows current stored character in its corresponding character storage space, wait for clicked triggering, until during the clicked triggering of character button of soft keyboard, execution step C).
In above-mentioned soft keyboard operation processing method, but as a kind of selection scheme, at step B) in, described " current the stored character in corresponding character storage space according to the soft keyboard character button; carry out the character Graphics Processing of soft keyboard character button; and when clicked triggerings of character button of soft keyboard; execution step C) " be specially: each character button of soft keyboard upgrades respectively current stored character in its corresponding character storage space of demonstration, and in the positive scope, random value is set distribution switching time limit Ta, starts to carry out timing; In timing course, if the clicked triggering of character button of soft keyboard performs step C); If when timing arrives distribution switching time limit Ta, the not yet clicked triggering of the character button of soft keyboard, perform step D).
In above-mentioned soft keyboard operation processing method, further, in the scope of described distribution switching time limit Ta between 3 ~ 10 seconds, carry out the random value setting.
In above-mentioned soft keyboard operation processing method, but, as a kind of selection scheme, each character button of described soft keyboard is also to there being a visible state sign; At step B) in, described " current the stored character in corresponding character storage space according to the soft keyboard character button; carry out the character Graphics Processing of soft keyboard character button, and, when clicked triggerings of character button of soft keyboard, perform step C) " be specially:
B1) in the positive scope, random value is set visible state switching times K;
B2) select at random M character button in soft keyboard, the visible state sign of selected M character button is set to invisible, and in soft keyboard, the visible state of other character button sign is set to visible;
B3) each visible state of soft keyboard is designated visible character button and upgrades respectively and show that current stored character in its corresponding character storage space, each visible state are designated sightless character button and upgrade respectively and be shown as the character invisible mode;
B4) in the positive scope, random value is set visible state switching time limit Tb, starts to carry out timing; In timing course, if the clicked triggering of character button of soft keyboard performs step C); When if timing arrives visible state switching time limit Tb, the not yet clicked triggering of the character button of soft keyboard, visible state switching times K, from subtracting one, performs step b5);
B5) if the value of current visible state switching times K is zero, perform step D); Otherwise, return to step b2).
In above-mentioned soft keyboard operation processing method, further, in the scope of described visible state switching times K between 2 ~ 5, carry out the random value setting; Carry out the random value setting in the scope of described visible state switching time limit Tb between 1 ~ 5 second.
In above-mentioned soft keyboard operation processing method, further, in described " M character button in selected soft keyboard at random ", the span of M is that 5≤M≤(Ma/3), wherein Ma means the character overall number of buttons of soft keyboard.
In above-mentioned soft keyboard operation processing method, but as a kind of selection scheme, in steps A) in, described " each character distributed store of the default output of soft keyboard character storage space in " corresponding in each soft keyboard character button is specially: each character of the default output of soft keyboard is randomly in the distributed store character storage space corresponding in each soft keyboard character button.
In above-mentioned soft keyboard operation processing method, but as a kind of selection scheme, in steps A) in, described " each character distributed store of the default output of soft keyboard character storage space in " corresponding in each soft keyboard character button is specially: divide soft keyboard into a plurality of keyboard areas, in each keyboard area, each character of the default output of character button is randomly in the distributed store character storage space corresponding in each character button of this keyboard area; At step D) in, described " character that each soft keyboard character button of soft keyboard is stored in corresponding character storage space carries out random dislocation exchange to be processed " is specially: between the character of respectively each soft keyboard character button of each keyboard area of soft keyboard being stored in the corresponding character storage space character storage space corresponding at each soft keyboard character button in corresponding keyboard zone, carry out random dislocation exchange.
Than prior art, the present invention has following beneficial effect:
1, the soft keyboard operation processing method that the present invention tightens security and protects; the distributed store situation of the character storage space corresponding at each character button by each character dynamically not changing in the same time the default output of soft keyboard; make each character button of soft keyboard at dynamic corresponding different character of different time periods; can effectively prevent from obtaining by the virus of screenshots and mouse coordinates capture technique the code characters of soft keyboard output, strengthen the safeguard protection performance of soft keyboard to user cipher.
2,, the many factors such as R&D costs high, the screenshotss of anti-virus software interception protection large between the research and development technology difficulty; to be difficult to succeed by the new virus for soft keyboard operation processing method of the present invention based on the research and development of screenshotss technology and mouse coordinates capture technique; the bogusware that makes soft keyboard operation processing method of the present invention can reduce, even shield based on screenshotss technology and mouse coordinates capture technique is caught the risk of the alphabet of soft keyboard output, thereby can better protect user cipher safety.
3, soft keyboard operation processing method of the present invention, can also change complicated degree by the character dynamic random that increases soft keyboard at different aspect, significantly promote the technical difficulty that bogusware breaks through soft keyboard operation processing method safeguard protection of the present invention defence line, even if making soft keyboard operation processing method of the present invention does not protect by the screenshotss interception of anti-virus software, also can guarantee that the bogusware based on screenshotss technology and mouse coordinates capture technique can not capture the alphabet of the clicked triggering output of soft keyboard, and then shield the risk that bogusware based on screenshotss technology and mouse coordinates capture technique is caught the alphabet of soft keyboard output fully.
The accompanying drawing explanation
The soft keyboard operation processing method process flow diagram that Fig. 1 is the embodiment of the present invention one;
View in the soft keyboard operational process that Fig. 2 ~ Fig. 4 is the embodiment of the present invention one;
The soft keyboard operation processing method process flow diagram that Fig. 5 is the embodiment of the present invention two;
The soft keyboard operation processing method process flow diagram that Fig. 6 is the embodiment of the present invention three;
View in the soft keyboard operational process that Fig. 7 ~ Fig. 9 is the embodiment of the present invention three;
View in the soft keyboard operational process that Figure 10 and Figure 11 are the embodiment of the present invention four.
Embodiment
The current bogusware based on screenshotss technology and mouse coordinates capture technique, its principle of work is, first by a screenshotss analysis, obtain the distributing position of each character button in the screen pixels coordinate on soft keyboard, then by catching mouse at the left button clicking trigger screen pixels coordinate in the moment, analyze the code characters of knowing the clicked triggering output of soft keyboard.Why bogusware can so be easy to catch the code characters of the clicked triggering output of soft keyboard, because the character button position that has soft keyboard now all is fixedly installed according to the distributing order of character keys on the hardware keyboards of corresponding function, bogusware only need to can obtain the distributing position of each character button in the screen pixels coordinate on soft keyboard by screenshotss, screen pixels coordinate during the combined mouse clicking trigger carries out simple screen pixels coordinate contrast matching operation again, just can know on soft keyboard by the character of mouse clicking trigger.Although, it is comparatively general that present computer user installs anti-virus software on computers, and the anti-virus software of main flow has all possessed the safety precaution function of the viral screenshotss of interception at present, but the viral screenshotss interception function of anti-virus software not can detect and tackle each screenshotss of bogusware in absolutely accurate ground mostly, the bogusware screenshotss are undetected still to happen occasionally, even if therefore the interception protection of anti-virus software is arranged, bogusware still can be passed through repeatedly screenshotss, as long as any screenshotss success of its people, bogusware can obtain the distributing position of each character button in the screen pixels coordinate on soft keyboard equally, and then catch the code characters of the clicked triggering of soft keyboard.
For this reason, the present invention proposes a kind of soft keyboard operation processing method of the protection that tightens security, the method no longer is fixedly installed the character button of soft keyboard, but allow each character button of soft keyboard to a character storage space should be arranged, the character that makes the soft keyboard character button show and clicked triggering thereof and the character exported are the character that character storage space that the character button is corresponding is stored, the distributed store situation of the character storage space corresponding at each character button by each character dynamically not changing in the same time the default output of soft keyboard, make each character button of soft keyboard at dynamic corresponding different character of different time periods.Because each character button of soft keyboard is dynamic change at character corresponding to different time periods, and screenshotss only can obtain the character button of soft keyboard at a certain static corresponding character constantly, bogusware based on screenshotss technology and mouse coordinates capture technique can't be again obtains the character of soft keyboard character button in the concrete correspondence of institute of different time periods by screenshotss, even if the screen pixels coordinate therefore during bogusware combined mouse clicking trigger, also can't accurately know the alphabet of the clicked triggering output of soft keyboard, strengthen the purpose of soft keyboard to the safeguard protection performance of user cipher thereby reached.
Each character of the default output of soft keyboard of the present invention, be for the soft keyboard of difference in functionality, refers to that the soft keyboard that needs of setting according to default soft key function carries out each character of output.For example, for the soft keyboard of combine digital output function only, the character of the default output of its soft keyboard includes numerical character " 0 ~ 9 "; For the soft keyboard of object computer character output function, the character of the default output of its soft keyboard includes the dissimilar computer characters such as numerical character, English character, sign character.The default output of soft keyboard is which type of character, is that the software dish function needed according to concrete application is set, and it does not belong to discussion main points of the present invention, at this, does not add narration.
Below by embodiment, effect of the present invention is described further.
embodiment mono-:
The present embodiment adopts soft keyboard operation processing method of the present invention, realized an object computer character output function, for the soft keyboard of Password Input, the character of the default output of this soft keyboard include numerical character " 0 ~ 9 ", English character " a ~ z " and ", ", "; ", a plurality of sign characters such as "/"; In addition; soft keyboard also is provided with three function buttons; realize respectively handoff functionality " Shift ", caps lock function " Caps Lock " and return and delete function "<-"; because function button is not used in direct output character; can not affect in itself the effect of character password safeguard protection, so function button can be fixedly installed.
Adopt soft keyboard operation processing method of the present invention, each character button of soft keyboard is to there being a character storage space, the character that makes the soft keyboard character button show and clicked triggering thereof and the character exported are the character that character storage space that the character button is corresponding is stored, the distributed store situation of the character storage space corresponding at each character button by each character dynamically not changing in the same time the default output of soft keyboard, make each character button of soft keyboard at dynamic corresponding different character of different time periods.Wherein, for carrying out the trigger event dynamically changed and dynamically changing form, can adopt the different set mode under different applicable cases, for example, can trigger with a fixed cycle (pressing Fixed Time Interval) the dynamic change of the distributed store situation of carrying out the character storage space that default each character exported of soft keyboard is corresponding at each character button, dynamically changing form can be the transposition distributed store that circulates according to certain rules, etc.But consider; carry out dynamically and change with the fixed cycle; and dynamically change and have in the situation of certain rule, easily by bogusware, through long-term test, grasped its of interval and dynamically change rule cycle length, thereby can affect the lasting stability of the safeguard protection performance of soft keyboard.And to keep lastingly the safeguard protection performance of soft keyboard, just need to guarantee that each character button of soft keyboard is unpredictable at the character of not exporting during clicked the triggering in the same time.For reaching this purpose, the present embodiment provides a kind of of soft keyboard operation processing method of the protection that tightens security preferably to carry into execution a plan, and as shown in Figure 1, concrete execution step is as follows for its flow process:
01A) soft keyboard starts operation, in each character distributed store of the default output of soft keyboard character storage space corresponding in each soft keyboard character button.
The purpose of this step, when allowing soft keyboard start operation, can character be arranged the initialization corresponding stored in character storage space corresponding to its each character button, to guarantee the character that each character button of soft keyboard is stored in needs show or can the character storage space corresponding according to it during clicked the triggering, carry out corresponding operating.When soft keyboard starts operation, each computer character of the default output of soft keyboard can be set as required in the distributed store situation of each character storage space, for example still can be according to each character of the default output of the character arrangements situation distributed store of computer character hardware keyboards, initialization that also can be fixing according to certain distributes in each character distributed store that the pre-order of storage will preset output character storage space corresponding in each soft keyboard character button; But in order to make the safeguard protection of soft keyboard more effective; being preferably in soft keyboard starts while moving; also allow each character of the default output of soft keyboard randomly in the distributed store character storage space corresponding in each soft keyboard character button, make the character random disorder that the soft keyboard character button is corresponding.
01B) current the stored character in corresponding character storage space according to the soft keyboard character button, carry out the character Graphics Processing of soft keyboard character button, and, when clicked triggerings of character button of soft keyboard, perform step 01C).
This step is in order to carry out the character Graphics Processing of soft keyboard character button, and clicking operation selected in the character that facilitates the user to show according to the soft keyboard character button, and can trigger in the lump execution step C when the clicked triggering of character button.For the present embodiment, the concrete executive mode of this step is, each character button of soft keyboard is upgraded respectively and shows current stored character in its corresponding character storage space, then wait for clicked triggering, until during the clicked triggering of character button of soft keyboard, execution step 01C).
01C) soft keyboard is exported current stored character in the character storage space that the character button of clicked triggering is corresponding, then performs step immediately 01D).
This step is just carried out when the clicked triggering of character button of soft keyboard, in order to export the corresponding character of character button of clicked triggering, and perform step immediately 01D after output character), trigger the dynamic change of the distributed store situation of the character storage space that each character of carrying out the default output of soft keyboard is corresponding at each character button.
The character of 01D) each soft keyboard character button of soft keyboard being stored in corresponding character storage space carries out random dislocation exchange to be processed, and then returns to step 01B).
The mode that this step has adopted random dislocation exchange to process dynamically changes the character of storing in the character storage space that each soft keyboard character button of soft keyboard is corresponding, after making the clicked triggering of each soft keyboard character button, each character button corresponding character again is all unpredictable.
01E) circulation execution step 01B) ~ 01D), until soft keyboard runs abort.
From the above-mentioned operational scheme of soft keyboard, after soft keyboard starts operation, circulation execution step 01B) operation ~ 01D), until soft keyboard runs abort.A step 01B is carried out in its every circulation) ~ 01D), distributed store situation in each character of the default output of soft keyboard character storage space corresponding at each soft keyboard character button will be carried out once random dislocation exchange, and loop start step 01B) ~ 01D) occurs when the clicked triggering of character button of soft keyboard, make like this user each time during clicking trigger soft keyboard output character, random dislocation exchange will inevitably occur once in the corresponding character of each character button of soft keyboard, thereby make each character button of soft keyboard all unpredictable at the character of not exporting during clicked trigger in the same time.For example, each character of the at a time default output of soft keyboard in the corresponding distribution situation of each soft keyboard character button as shown in Figure 2; After user's clicking trigger soft keyboard output character, each character of the default output of soft keyboard is changed into as shown in Figure 3 in the corresponding distribution situation of each soft keyboard character button; Soft keyboard again after clicked triggering its character distribution situation change into as shown in Figure 4 ... the change of distribution situation is random, does not have governed rule.So, bogusware can't obtain the alphabet of the clicked triggering output of soft keyboard character button again by a screenshotss prediction.
The safeguard protection defence line of Gonna breakthrough soft keyboard operation processing method of the present invention, bogusware only can depend on repeatedly screenshotss, place hope on by screenshotss repeatedly and obtain the character position distribution situation after the each character dislocation of soft keyboard exchange, just likely be engraved in the pixel coordinate in screen during a plurality of clicking trigger of binding analysis left mouse button again and know each code characters that the user uses soft keyboard to export; Yet the duration that the user carries out the Password Input operation is only tens of seconds, bogusware will realize repeatedly the screenshotss processing within these tens of seconds, and its technology realizes that difficulty is improved; And the moment of user's clicking trigger soft keyboard is random indefinite, the each clicked triggering of soft keyboard all can dynamically change the character distribution situation, even if bogusware by screenshotss repeatedly, also is difficult to judge between twice screenshots the soft keyboard random exchange repeatedly that whether by clicking trigger repeatedly, caused the corresponding character of soft keyboard character button to occur; In addition, how to confirm repeatedly the corresponding relation between snapshot picture and a plurality of mouse screen pixels coordinate, also will become the new technical barrier that bogusware realizes that password capture is analyzed.So; utilize the safeguard protection defence line of the bogusware breakthrough soft keyboard operation processing method of the present invention based on screenshotss technology and mouse coordinates capture technique; the technical difficulty of its bogusware research and development is significantly promoted in many aspects, the corresponding R&D costs that improve bogusware.Moreover, it is comparatively general that present computer user installs anti-virus software on computers, if the auxiliary of anti-virus software arranged, even if bogusware is carried out repeatedly screenshotss, to by anti-virus software, be tackled by part screenshotss wherein, bogusware can't be known the character distribution situation after the each character dislocation of soft keyboard exchange completely, also just can't be by analyzing mouse pixel coordinate and accurately, fully catch whole code characters that the user uses soft keyboard output in screen, thus make bogusware be difficult to successfully obtain other people password.As can be seen here, soft keyboard operation processing method of the present invention not only can effectively prevent from obtaining by the virus of screenshots and mouse coordinates capture technique the code characters of soft keyboard output, and large between the research and development technology difficulty, R&D costs are high, the screenshotss interception protection of anti-virus software waits many factors, to also be difficult to succeed by the new virus for soft keyboard operation processing method of the present invention based on the research and development of screenshotss technology and mouse coordinates capture technique, therefore, soft keyboard operation processing method of the present invention reduces the risk that the bogusware even shielded based on screenshotss technology and mouse coordinates capture technique is caught the alphabet of soft keyboard output, thereby effectively promoted the safeguard protection performance of soft keyboard to user cipher.
embodiment bis-:
The present embodiment still adopts soft keyboard operation processing method of the present invention to realize the soft keyboard of object computer character output function as described as embodiment mono-; but with embodiment mono-, compare, the soft keyboard operation processing method of the present embodiment has carried out further reinforcement to the safeguard protection performance of soft keyboard.As shown in Figure 5, concrete execution step is as follows for the flow process of the present embodiment soft keyboard operation processing method:
02A) soft keyboard starts operation, in each character distributed store of the default output of soft keyboard character storage space corresponding in each soft keyboard character button.
02B) current the stored character in corresponding character storage space according to the soft keyboard character button, carry out the character Graphics Processing of soft keyboard character button, and, when clicked triggerings of character button of soft keyboard, perform step 02C).From step 01B in embodiment mono-) embodiment different, step 02B in the present embodiment) concrete executive mode is, each character button of soft keyboard upgrades respectively and shows current stored character in its corresponding character storage space, and in the positive scope, random value is set distribution switching time limit Ta, starts to carry out timing; In timing course, if the clicked triggering of character button of soft keyboard performs step 02C); If when timing arrives distribution switching time limit Ta, the not yet clicked triggering of the character button of soft keyboard, perform step 02D).
02C) soft keyboard is exported current stored character in the character storage space that the character button of clicked triggering is corresponding, then performs step immediately 02D).
The character of 02D) each soft keyboard character button of soft keyboard being stored in corresponding character storage space carries out random dislocation exchange to be processed, and then returns to step 02B).
02E) circulation execution step 02B) ~ 02D), until soft keyboard runs abort.
Operational scheme by the present embodiment soft keyboard can be seen, step 02B) increased the timing for random distribution switching time limit Ta in, make soft keyboard not only trigger in the lump the random dislocation of carrying out the corresponding character of each character button of soft keyboard institute while triggering and exchange the character button is clicked, even if the user not under the state of clicking trigger soft keyboard, when timing arrives the distribution switching time limit Ta of random value setting, also can trigger execution step 02D) carry out the character swap operation that misplaces at random, further strengthened the dynamic change randomness of the corresponding character of soft keyboard character button.So, even if bogusware is passed through repeatedly screenshotss, also be difficult to judge whether the corresponding character of character button between twice clicking trigger soft keyboard of user random dislocation exchange has repeatedly occurred, or the whether clicked triggering of soft keyboard between twice screenshots, and, also can trigger execution step 02D while due to the distribution of timing arrival random value setting, switching time limit Ta), make the number of times of the random dislocation exchange times of the corresponding character of soft keyboard character button and the clicked triggering of soft keyboard not reciprocity, even if bogusware repeatedly screenshotss has obtained character distribution situation image after the each random dislocation exchange of soft keyboard and mouse at each clicking trigger screen pixels coordinate constantly, the not reciprocity permutation and combination situation that has greatly increased its corresponding relation due to both number of times, make bogusware may determine hardly repeatedly the corresponding relation between snapshot picture and a plurality of mouse screen pixels coordinate, the technical difficulty that bogusware breaks through this soft keyboard operation processing method safeguard protection defence line further promotes.As can be seen here; the soft keyboard operation processing method that relies on the present embodiment; even do not protect by the screenshotss interception of anti-virus software; bogusware based on screenshotss technology and mouse coordinates capture technique also may capture the alphabet of the clicked triggering output of soft keyboard hardly, makes soft keyboard that the lifting of matter arranged the safeguard protection performance of user cipher.
Certainly, for the random dislocation exchange that does not cause the corresponding character of soft keyboard character button is too frequent, cause the user to be difficult to operation, also in order not make the interval time of carrying out voluntarily random dislocation exchange under the not clicked triggering state of soft keyboard long, the random value of distribution switching time limit Ta is preferably in a more suitable scope carries out, for example can preset to limit in the scope of distribution switching time limit Ta between 3 ~ 10 seconds and carry out the random value setting, or set the random value scope of distribution switching time limit Ta according to the needs of concrete application.
embodiment tri-:
The present embodiment still adopts soft keyboard operation processing method of the present invention to realize the soft keyboard of object computer character output function as described as embodiment mono-; different from embodiment mono-, two, the soft keyboard operation of the present embodiment is processed, by another kind of embodiment, the safeguard protection performance of soft keyboard has been carried out to further reinforcement.In the present embodiment soft keyboard operation processing method, for each character button of soft keyboard, also set up a visible state sign should be arranged, as shown in Figure 6, concrete execution step is as follows for its flow process:
03A) soft keyboard starts operation, in each character distributed store of the default output of soft keyboard character storage space corresponding in each soft keyboard character button.
03B) current the stored character in corresponding character storage space according to the soft keyboard character button, carry out the character Graphics Processing of soft keyboard character button, and, when clicked triggerings of character button of soft keyboard, perform step 03C).Step 03B) concrete executive mode is as b1) ~ b5) as described in:
B1) in the positive scope, random value is set visible state switching times K;
B2) select at random M character button in soft keyboard, the visible state sign of selected M character button is set to invisible, and in soft keyboard, the visible state of other character button sign is set to visible;
B3) each visible state of soft keyboard is designated visible character button and upgrades respectively and show that current stored character in its corresponding character storage space, each visible state are designated sightless character button and upgrade respectively and be shown as the character invisible mode;
B4) in the positive scope, random value is set visible state switching time limit Tb, starts to carry out timing; In timing course, if the clicked triggering of character button of soft keyboard performs step 03C); When if timing arrives visible state switching time limit Tb, the not yet clicked triggering of the character button of soft keyboard, visible state switching times K, from subtracting one, performs step b5);
B5) if the value of current visible state switching times K is zero, perform step 03D); Otherwise, return to step b2).
03C) soft keyboard is exported current stored character in the character storage space that the character button of clicked triggering is corresponding, then performs step immediately 03D).
The character of 03D) each soft keyboard character button of soft keyboard being stored in corresponding character storage space carries out random dislocation exchange to be processed, and then returns to step 03B).
03E) circulation execution step 03B) ~ 03D), until soft keyboard runs abort.
Operational scheme by the present embodiment soft keyboard can be seen, step 03B) increased the sightless processing of character of M character button in random selected soft keyboard in, and corresponding visible state switching times K and the visible state switching time limit Tb that has set up the random value setting, make soft keyboard random M character button be arranged at any time in the character invisible mode, and misplace at random between the process exchanged at execution character, character button in the character invisible mode can also advance row stochastic K dynamically switching, and visible state switching time limit Tb is also random, in addition, the character button of user's clicking trigger soft keyboard or character invisible mode switch the random dislocation exchange that character in soft keyboard is carried out in random can triggering for K time, thereby make the character dynamic random situation of change of soft keyboard be tending towards the most complicated.For example, each character of the at a time default output of soft keyboard at the corresponding distribution situation of each soft keyboard character button and character invisible mode as shown in Figure 7; Soft keyboard not under the state of clicked triggering after random time, the character button the distribution situation of corresponding character do not change, but the character invisible mode is switched change, as shown in Figure 8; And after the clicked triggering of soft keyboard, the character button distribution situation and the character invisible mode of corresponding character randomly changing all occurs again, as shown in Figure 9 ... fully do not exist and can follow rule between each different conditions.Realize the sightless concrete operations mode of character, can be when the execution character Graphics Processing, be designated sightless character button for visible state and just only show the character button, perhaps the character button is covered and is presented on character, be shown as the color that the character button is identical again or by character ... etc., as long as can make the sightless implementation of character on the character button, all can adopt for the present invention.So, for the user who uses soft keyboard, due to the soft keyboard character button the distribution situation of corresponding character change and the variation of character invisible mode is all dynamic random, therefore each character of the default output of soft keyboard can be always in invisible mode, the user can find it need to be as the character of object output sometime from the software dish, and on the clicking trigger soft keyboard, corresponding character button is realized character output, yet for bogusware, even if it passes through repeatedly screenshotss, what each screenshotss obtained is all character distribution confusion, the sightless soft keyboard static images of several characters, wherein the distribution situation of several sightless characters in the soft keyboard character button is difficult to prediction, and the character of visible state next distribution situation constantly in the soft keyboard character button also is difficult to prediction, and probably when user's clicking trigger character button its to be shown as character visible, and when the bogusware screenshotss this character button to be shown as character invisible, thereby make bogusware be difficult to judge that the random dislocation exchange of how many times has occurred for the corresponding character of character button between twice clicking trigger soft keyboard of user, also be difficult to judge the whether clicked triggering of soft keyboard between twice screenshots, more be difficult to judge in the soft keyboard image that screenshotss obtain the whether clicked triggering of the sightless character button of character and specifically corresponding to what character, and, because visible state switching times K, visible state switching time limit Tb, the sightless character number of buttons of character M are random, make in soft keyboard that the character distribution is chaotic, the sightless dynamic random situation of change of several characters is very versatile and flexible, therefore bogusware may be determined repeatedly snapshot picture and the mouse corresponding relation between the screen pixels coordinate in clicking trigger moment repeatedly hardly, and the technical difficulty that bogusware breaks through this soft keyboard operation processing method safeguard protection defence line is significantly promoted.As can be seen here; the soft keyboard operation processing method that relies on the present embodiment; even do not protect by the screenshotss interception of anti-virus software; bogusware based on screenshotss technology and mouse coordinates capture technique also may capture the alphabet of the clicked triggering output of soft keyboard hardly, makes soft keyboard, to the safeguard protection performance of user cipher, significantly lifting arranged.This is also that the optimum of soft keyboard operation processing method of the present invention carries into execution a plan; although for the user; it is relatively more loaded down with trivial details that the soft keyboard that use so moves carries out character writing, but possess under the prerequisite of so high safeguard protection performance at it, and its complex operation degree is also acceptable.
For the random switching of the random dislocation exchange that do not cause the corresponding character of soft keyboard character button and character invisible mode is too frequent, cause the user to be difficult to operation, also long for the interval time that does not make under the not clicked triggering state of soft keyboard the random switching of carrying out voluntarily random dislocation exchange and character invisible mode, visible state switching times K, the random value of visible state switching time limit Tb is preferably in a more suitable scope carries out, for example, carry out the random value setting in the scope of visible state switching times K between 2 ~ 5, carry out the random value setting in the scope of visible state switching time limit Tb between 1 ~ 5 second, simultaneously, for fear of too much character is invisible and cause the user to be difficult to for a long time thoughtful required character in soft keyboard, the random value of the sightless character number of buttons of character M also is preferably in a more suitable scope carries out, for example, the span of M is between 5≤M≤(Ma/3), wherein Ma means the character overall number of buttons of soft keyboard, so both guaranteed that invisible character was difficult to be distinguished easily by bogusware, and can avoid again large-area character button in soft keyboard in the character invisible mode, to cause the user to be difficult to operation simultaneously.Certainly, those skilled in the art, when implementing to use this soft keyboard operation processing method, also can set up according to concrete applicable cases the span of visible state switching times K, visible state switching time limit Tb, the sightless character number of buttons of character M on their own.
embodiment tetra-:
The core thinking of soft keyboard operation processing method of the present invention, be the distributed store situation of the character storage space corresponding at each character button by each character dynamically not changing in the same time the default output of soft keyboard, make each character button of soft keyboard at dynamic corresponding different character of different time periods; The dynamic change of the distributed store situation of the character storage space that wherein, each character of the default output of soft keyboard is corresponding at each character button can adopt multiple multi-form.Although the dynamic change of character distribution situation is more complicated, the safeguard protection performance of soft keyboard is also corresponding better, also makes the user use become all the more loaded down with trivial details of the operation of soft keyboard simultaneously.It is as described as embodiment mono-that the present embodiment also adopts soft keyboard operation processing method of the present invention to realize, but for more user-friendly soft keyboard carries out the character input operation, the present embodiment is on the basis of embodiment mono-, proposed a kind of improved soft keyboard operation processing method, its concrete execution step is as follows:
04A) soft keyboard starts operation, in each character distributed store of the default output of soft keyboard character storage space corresponding in each soft keyboard character button.This step is specially, and divides soft keyboard into a plurality of keyboard areas, and in each keyboard area, each character of the default output of character button is randomly in the distributed store character storage space corresponding in each character button of this keyboard area.For example, for the soft keyboard of object computer character output function, can in soft keyboard, divide the first row character button into " numerical character keyboard area ", divide the second line character button into " sign character keyboard area ", divide third and fourth line character button into " English character keyboard area "; Then, allow each numerical character randomly in the distributed store character storage space corresponding in " numerical character keyboard area " each soft keyboard character button, allow each sign character randomly in the distributed store character storage space corresponding in " sign character keyboard area " each soft keyboard character button, allow each English character randomly in the distributed store character storage space corresponding in " English character keyboard area " each soft keyboard character button.
04B) current the stored character in corresponding character storage space according to the soft keyboard character button, carry out the character Graphics Processing of soft keyboard character button, and, when clicked triggerings of character button of soft keyboard, perform step 04C).
04C) soft keyboard is exported current stored character in the character storage space that the character button of clicked triggering is corresponding, then performs step immediately 04D).
The character of 04D) each soft keyboard character button of soft keyboard being stored in corresponding character storage space carries out random dislocation exchange to be processed, and then returns to step 04B).At step 04D) in, described " character that each soft keyboard character button of soft keyboard is stored in corresponding character storage space carries out random dislocation exchange to be processed " is specially: between the character of respectively each soft keyboard character button of each keyboard area of soft keyboard being stored in the corresponding character storage space character storage space corresponding at each soft keyboard character button in corresponding keyboard zone, carry out random dislocation exchange.For example, for the computer character output function soft keyboard of a plurality of keyboard areas of aforementioned division, as execution step 04D) time, each numerical character just carries out random dislocation exchange between corresponding character storage space at " numerical character keyboard area " each soft keyboard character button, each sign character is just carried out random dislocation exchange between corresponding character storage space at " sign character keyboard area " each soft keyboard character button, and each English character just carries out random dislocation exchange between corresponding character storage space at " English character keyboard area " each soft keyboard character button.
04E) circulation execution step 04B) ~ 04D), until soft keyboard runs abort.
Soft keyboard operational scheme from the present embodiment, can be by soft keyboard being divided into to a plurality of keyboard areas, make each character of the default output of character button in each keyboard area of soft keyboard carry out dynamic random dislocation exchange in its corresponding keyboard area, and allow the relative independence of maintenance between different keyboard areas, convenient like this user finds corresponding character button in the corresponding keyboard area of its required character, reduces the user and operates the fussy degree of using soft keyboard.For the soft keyboard of the present embodiment, owing in soft keyboard, dividing middle the first row character button into " numerical character keyboard area ", divide the second line character button into " sign character keyboard area ", by the 3rd, four lines character button divides " English character keyboard area " into, and soft keyboard is moved according to above-mentioned operational scheme, make numerical character only between soft keyboard the first row character button, carry out the dynamic random distribution, sign character is only carried out the dynamic random distribution between soft keyboard the second line character button, English character is only at soft keyboard the 3rd, carry out the dynamic random distribution between four lines character button, for example, each character of the default output of a certain moment soft keyboard in the corresponding distribution situation of each soft keyboard character button as shown in figure 10, and the situation after the distribution situation of default each character exported of another moment soft keyboard changes as shown in figure 11 ... like this, even if the character position in soft keyboard is constantly carrying out the dynamic random variation, when the user needs respectively to export numeric character, when sign character and English character, just can fix respectively in the first row of soft keyboard, remove to find corresponding character button in the second row and the 3rd four lines character button, make the searching of character more easily simple, reduced the complex operation degree of soft keyboard.As the cost simplified the operation, the soft keyboard that adopts above-mentioned soft keyboard operation treatment scheme to realize, its safeguard protection performance slightly reduces than embodiment mono-; If but the step 04B in the present embodiment soft keyboard operational scheme) in conjunction with adopting step 02B in embodiment bis-) or embodiment tri-in step 03B) executive mode; allow in each keyboard area of soft keyboard the dynamic random situation of change of each character button more complicated; still can, on the basis that keeps low complex operation degree, make the soft keyboard operation processing method of the present embodiment possess equally higher safeguard protection performance.
Comprehensive above-mentioned four embodiment illustrate, can see, soft keyboard operation processing method of the present invention not only can effectively prevent from obtaining by the virus of screenshots and mouse coordinates capture technique the code characters of soft keyboard output, can also effectively prevent to obtain by the virus of screenshotss and mouse coordinates capture technique repeatedly whole code characters of soft keyboard output, technical difficulty and the R&D costs of the bogusware breakthrough soft keyboard technology security perimeter of the present invention based on screenshotss technology and mouse coordinates capture technique have significantly been improved, reduce the bogusware even shielded based on screenshotss technology and mouse coordinates capture technique and catch the risk of the alphabet of soft keyboard output, effectively promoted the safeguard protection performance of soft keyboard to user cipher.
Finally explanation is, above embodiment is only unrestricted in order to technical scheme of the present invention to be described, although with reference to embodiment, the present invention is had been described in detail, those of ordinary skill in the art is to be understood that, can modify or be equal to replacement technical scheme of the present invention, and not breaking away from aim and the scope of technical solution of the present invention, it all should be encompassed in the middle of claim scope of the present invention.

Claims (9)

  1. One kind tighten security the protection the soft keyboard operation processing method, it is characterized in that, each character button of soft keyboard is to there being a character storage space, the character that makes the soft keyboard character button show and clicked triggering thereof and the character exported are the character that character storage space that the character button is corresponding is stored, the distributed store situation of the character storage space corresponding at each character button by each character dynamically not changing in the same time the default output of soft keyboard, make each character button of soft keyboard at dynamic corresponding different character of different time periods;
    The method specifically comprises the steps:
    A) soft keyboard starts operation, in each character distributed store of the default output of soft keyboard character storage space corresponding in each soft keyboard character button;
    B) current the stored character in corresponding character storage space according to the soft keyboard character button, carry out the character Graphics Processing of soft keyboard character button, and, when clicked triggerings of character button of soft keyboard, perform step C);
    C) soft keyboard is exported current stored character in the character storage space that the character button of clicked triggering is corresponding, then performs step immediately D);
    D) character of each soft keyboard character button of soft keyboard being stored in corresponding character storage space carries out random dislocation exchange to be processed, and then returns to step B);
    E) circulation execution step B) ~ D), until soft keyboard runs abort;
    Wherein, above-mentioned steps B) be specially: each character button of soft keyboard upgrades respectively and shows current stored character in its corresponding character storage space, and in the positive scope, random value is set distribution switching time limit Ta, starts to carry out timing; In timing course, if the clicked triggering of character button of soft keyboard performs step C); If when timing arrives distribution switching time limit Ta, the not yet clicked triggering of the character button of soft keyboard, perform step D).
  2. 2. soft keyboard operation processing method according to claim 1, is characterized in that, in the scope of described distribution switching time limit Ta between 3 ~ 10 seconds, carries out the random value setting.
  3. 3. soft keyboard operation processing method according to claim 1 and 2, it is characterized in that, in steps A) in, described " each character distributed store of the default output of soft keyboard character storage space in " corresponding in each soft keyboard character button is specially: each character of the default output of soft keyboard is randomly in the distributed store character storage space corresponding in each soft keyboard character button.
  4. 4. soft keyboard operation processing method according to claim 1 and 2, it is characterized in that, in steps A) in, described " each character distributed store of the default output of soft keyboard character storage space in " corresponding in each soft keyboard character button is specially: divide soft keyboard into a plurality of keyboard areas, in each keyboard area, each character of the default output of character button is randomly in the distributed store character storage space corresponding in each character button of this keyboard area;
    At step D) in, described " character that each soft keyboard character button of soft keyboard is stored in corresponding character storage space carries out random dislocation exchange to be processed " is specially: between the character of respectively each soft keyboard character button of each keyboard area of soft keyboard being stored in the corresponding character storage space character storage space corresponding at each soft keyboard character button in corresponding keyboard zone, carry out random dislocation exchange.
  5. One kind tighten security the protection the soft keyboard operation processing method, it is characterized in that, each character button of soft keyboard is to there being a character storage space, the character that makes the soft keyboard character button show and clicked triggering thereof and the character exported are the character that character storage space that the character button is corresponding is stored, the distributed store situation of the character storage space corresponding at each character button by each character dynamically not changing in the same time the default output of soft keyboard, make each character button of soft keyboard at dynamic corresponding different character of different time periods;
    The method specifically comprises the steps:
    A) soft keyboard starts operation, in each character distributed store of the default output of soft keyboard character storage space corresponding in each soft keyboard character button;
    B) current the stored character in corresponding character storage space according to the soft keyboard character button, carry out the character Graphics Processing of soft keyboard character button, and, when clicked triggerings of character button of soft keyboard, perform step C);
    C) soft keyboard is exported current stored character in the character storage space that the character button of clicked triggering is corresponding, then performs step immediately D);
    D) character of each soft keyboard character button of soft keyboard being stored in corresponding character storage space carries out random dislocation exchange to be processed, and then returns to step B);
    E) circulation execution step B) ~ D), until soft keyboard runs abort;
    Wherein, above-mentioned steps B) be specially:
    B1) in the positive scope, random value is set visible state switching times K;
    B2) select at random M character button in soft keyboard, the visible state sign of selected M character button is set to invisible, and in soft keyboard, the visible state of other character button sign is set to visible;
    B3) each visible state of soft keyboard is designated visible character button and upgrades respectively and show that current stored character in its corresponding character storage space, each visible state are designated sightless character button and upgrade respectively and be shown as the character invisible mode;
    B4) in the positive scope, random value is set visible state switching time limit Tb, starts to carry out timing; In timing course, if the clicked triggering of character button of soft keyboard performs step C); When if timing arrives visible state switching time limit Tb, the not yet clicked triggering of the character button of soft keyboard, visible state switching times K, from subtracting one, performs step b5);
    B5) if the value of current visible state switching times K is zero, perform step D); Otherwise, return to step b2).
  6. 6. soft keyboard operation processing method according to claim 5, is characterized in that, in the scope of described visible state switching times K between 2 ~ 5, carries out the random value setting; Carry out the random value setting in the scope of described visible state switching time limit Tb between 1 ~ 5 second.
  7. 7. soft keyboard operation processing method according to claim 5, is characterized in that, in described " M character button in selected soft keyboard at random ", the span of M is that 5≤M≤(Ma/3), wherein Ma means the character overall number of buttons of soft keyboard.
  8. 8. according to the described soft keyboard operation processing method of any one in claim 5 ~ 7, it is characterized in that, in steps A) in, described " each character distributed store of the default output of soft keyboard character storage space in " corresponding in each soft keyboard character button is specially: each character of the default output of soft keyboard is randomly in the distributed store character storage space corresponding in each soft keyboard character button.
  9. 9. according to the described soft keyboard operation processing method of any one in claim 5 ~ 7, it is characterized in that, in steps A) in, described " each character distributed store of the default output of soft keyboard character storage space in " corresponding in each soft keyboard character button is specially: divide soft keyboard into a plurality of keyboard areas, in each keyboard area, each character of the default output of character button is randomly in the distributed store character storage space corresponding in each character button of this keyboard area;
    At step D) in, described " character that each soft keyboard character button of soft keyboard is stored in corresponding character storage space carries out random dislocation exchange to be processed " is specially: between the character of respectively each soft keyboard character button of each keyboard area of soft keyboard being stored in the corresponding character storage space character storage space corresponding at each soft keyboard character button in corresponding keyboard zone, carry out random dislocation exchange.
CN201110441537.8A 2011-12-26 2011-12-26 Soft keyboard operation processing method capable of enhancing safety protection Active CN102566924B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110441537.8A CN102566924B (en) 2011-12-26 2011-12-26 Soft keyboard operation processing method capable of enhancing safety protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110441537.8A CN102566924B (en) 2011-12-26 2011-12-26 Soft keyboard operation processing method capable of enhancing safety protection

Publications (2)

Publication Number Publication Date
CN102566924A CN102566924A (en) 2012-07-11
CN102566924B true CN102566924B (en) 2014-01-01

Family

ID=46412451

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110441537.8A Active CN102566924B (en) 2011-12-26 2011-12-26 Soft keyboard operation processing method capable of enhancing safety protection

Country Status (1)

Country Link
CN (1) CN102566924B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102968602B (en) * 2012-10-31 2016-04-20 北京奇虎科技有限公司 A kind of method to set up of keyboard and device
CN102982272B (en) * 2012-10-31 2015-12-02 北京奇虎科技有限公司 keyboard layout method and device
CN103491533B (en) * 2013-09-23 2017-06-20 上海翰鑫信息科技有限公司 WAP gateway, user WAP terminals, WAP payment systems and method
CN103996011A (en) * 2014-06-05 2014-08-20 福建天晴数码有限公司 Method and device for protecting codes to be input safely
CN105323207A (en) * 2014-06-06 2016-02-10 南京理工大学常熟研究院有限公司 Web portal security login method preventing AP intercepting
CN105204755A (en) * 2014-06-30 2015-12-30 深圳市中兴微电子技术有限公司 Soft keyboard operation method and terminal
CN106295314A (en) * 2015-05-22 2017-01-04 中兴通讯股份有限公司 Encryption method based on dummy keyboard and device
CN107239152A (en) * 2016-03-29 2017-10-10 刘金宏 A kind of data inputting method of association in time
CN112198973A (en) * 2016-04-06 2021-01-08 创新先进技术有限公司 Method and device for changing corresponding relation between keys and characters
CN108710810B (en) * 2018-05-22 2022-03-08 中国银联股份有限公司 Password obtaining method, transaction equipment and terminal
CN109885241B (en) * 2019-01-16 2022-10-21 平安普惠企业管理有限公司 Virtual keyboard generation method, server and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1728062A (en) * 2004-07-30 2006-02-01 招商银行股份有限公司 Graphics keyboard based security input method for computer information
CN101388059A (en) * 2007-09-14 2009-03-18 英业达股份有限公司 Screen key entry system for preventing trojan program and method thereof
CN101634935A (en) * 2009-08-18 2010-01-27 深圳市同洲电子股份有限公司 Method and device for inputting characters by touch screen
CN101968711A (en) * 2010-09-29 2011-02-09 北京播思软件技术有限公司 Method for accurately inputting characters based on touch screen

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020093535A1 (en) * 2001-01-17 2002-07-18 Murphy Michael William User interface for character entry using a minimum number of selection keys

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1728062A (en) * 2004-07-30 2006-02-01 招商银行股份有限公司 Graphics keyboard based security input method for computer information
CN101388059A (en) * 2007-09-14 2009-03-18 英业达股份有限公司 Screen key entry system for preventing trojan program and method thereof
CN101634935A (en) * 2009-08-18 2010-01-27 深圳市同洲电子股份有限公司 Method and device for inputting characters by touch screen
CN101968711A (en) * 2010-09-29 2011-02-09 北京播思软件技术有限公司 Method for accurately inputting characters based on touch screen

Also Published As

Publication number Publication date
CN102566924A (en) 2012-07-11

Similar Documents

Publication Publication Date Title
CN102566924B (en) Soft keyboard operation processing method capable of enhancing safety protection
Evtyushkin et al. Jump over ASLR: Attacking branch predictors to bypass ASLR
CN101183412B (en) Method and device for secure data entry in an application
CN104685508B (en) Data processing equipment and data processing method
Irazoqui et al. MASCAT: Stopping microarchitectural attacks before execution
US8712049B2 (en) System for implementing dynamic pseudorandom keyboard remapping
CN103038726A (en) Method and device for secured entry of personal data
CN102521531B (en) Password protection system based on hardware virtualization
CN106462508A (en) Access control and code scheduling
CN102667794A (en) Method and system for protecting an operating system against unauthorized modification
US20190197216A1 (en) Method, apparatus, and computer-readable medium for executing a logic on a computing device and protecting the logic against reverse engineering
WO2013144051A1 (en) Display authentication
CN105264540A (en) Cryptographic label for attachment to a communication card
CN108874500A (en) A kind of application security guard method based on hardware virtualization technology
Mukhtar et al. Flush+ prefetch: A countermeasure against access-driven cache-based side-channel attacks
CN106295322B (en) A kind of hardware protection device for buffer overflow attack
CN106682493B (en) A kind of method, apparatus for preventing process from maliciously being terminated and electronic equipment
Huang et al. Return-oriented vulnerabilities in ARM executables
Wikner et al. Spring: Spectre returning in the browser with speculative load queuing and deep stacks
CN105825086B (en) A kind of ROP means of defences based on Attack Tree
CN105335674B (en) Password burglary-preventing method and device
CN104462942B (en) The detection method and system of mobile terminal trusted users input/output interface
KR101467877B1 (en) System and method for securing process memory using Hypervisor
EP2674892A1 (en) A method, a device and a computer program support for execution of encrypted computer code
CN105224887B (en) A kind of anti-tamper shielded layer for safety chip

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200605

Address after: Room 502-1, floor 5, building 2, courtyard 10, KEGU 1st Street, economic development zone, Daxing District, Beijing 100081

Patentee after: Singularity Xinyuan International Technology Development (Beijing) Co.,Ltd.

Address before: 401121 Chongqing City, northern New District of Chongqing municipality Mount Huangshan Road No. 5 South Mercury Technology Building 1 floor office No. 3

Patentee before: A-MEDIA COMMUNICATION TECH Co.,Ltd.