CN107844717A - Safe input system, method and intelligent terminal - Google Patents
Safe input system, method and intelligent terminal Download PDFInfo
- Publication number
- CN107844717A CN107844717A CN201610838138.8A CN201610838138A CN107844717A CN 107844717 A CN107844717 A CN 107844717A CN 201610838138 A CN201610838138 A CN 201610838138A CN 107844717 A CN107844717 A CN 107844717A
- Authority
- CN
- China
- Prior art keywords
- character
- input
- incoming event
- interference
- node file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
- Document Processing Apparatus (AREA)
Abstract
The invention discloses a kind of safe input system, method and intelligent terminal, the system includes:Drive module is inputted, for by the incoming event write device input node file of user;Interference incident inserts module, for when monitoring that equipment input node file has incoming event write-in, generating write device input node file after the incoming event for interference;Incoming event processing module, for reading the incoming event in equipment input node file, and pass it to input method procedure;Safe input processing module, for receiving the character generated according to incoming event of input method procedure transmission, and rejected from the character of reception for disturbing character corresponding to the incoming event of interference, and the character not being removed is sent to target program.The present invention can be on the basis of existing input system, and security improvement is done in the input to common input method procedure, reduces the security risk brought in itself by input method procedure, largely lifts the safety coefficient of product.
Description
Technical field
The present invention relates to the communications field, more particularly to a kind of safe input system, method and intelligent terminal.
Background technology
Rapid growth is obtained in the service of mobile phone terminal with the business such as quick popularization, mobile payment of smart mobile phone,
Thing followed customer information is stolen and monetary losses are but as a big security threat of domestic consumer.For example a kind of privacy is stolen
Viroid --- " keyboard evil backstage manipulator ", once popular in overseas, the virus is packaged into well-known cellphone inputting method SwiftKey
In KeyBoard, can direct monitoring users input through keyboard, upload leakage user account password information, in addition including credit card,
Net silver etc. pays data, and the viral harm is extremely serious.
Intelligent terminal input through keyboard security risk at present, it can be summarized as follows:
1st, rogue program obtains the input content of target program by process injection technique.Process is injected
By one section of code copies to target process, target process is then allowed to perform the technology of this section of code.Can by process injection technique
Input content is obtained to run one section of content for obtaining input frame in target program or be injected into input method.
2nd, record is obtained by the KeyEvent of operating system bottom, that is, by obtaining the encoded radio of input through keyboard,
Encoded radio is converted into keypad character again, for example record/dev/ can be passed through in the mobile terminal based on linux system
Input equipment content under input paths, user's input content is obtained, complete invasion.
3rd, input through keyboard content is obtained by input method.The content input of each class method on intelligent terminal must be by defeated
Enter method to complete, so, as long as the important information input of user, which is called, is arrived input method, it is possible to stolen to input method procedure chance
Get user and input information.Rogue program invasion input method procedure does not need special authority, and fascinating strong, difficulty is low.If
Domestic consumer download input method procedure of the installation kit containing malicious code, or in terminal normal input method procedure by rogue program
Invasion, then user will face the security risk that information is stolen.For example " keyboard evil backstage manipulator " mentioned above is exactly to use to beat
External cellphone inputting method SwiftKey KeyBoard progress input through keyboard is wrapped to steal.
For obtaining this security risk of input through keyboard content by input method, existing solution has:
The method inputted safely on intelligent terminal, some schemes are currently existed, such as:
Scheme one:The method of touch terminal Secure Transaction, this method are installed by installing input method in touch terminal
Input method is bundled on transaction program, in transaction program using binding input method and forbid being switched to common input method, can
Avoid dangerous input method from stealing user sensitive information, reduce the possibility that data are stolen silently when inputting sensitive data.
Scheme two:The implementation method and terminal inputted safely, this method are applied to a terminal with display screen, the end
End includes the first application program, including:The initial input character of input is obtained, the initial input character is included in an input
Inframe;The input mode of initial input character described in identified input;Based on the input mode and predetermined instruction secure strategy,
Determine effectively to input character corresponding to the initial input character;It is supplied to described first to apply journey the effectively input character
Sequence.It is this that the initial input character of input is identified and changed to form effective instruction using instruction secure strategy so as to use
Family can in the case of environment complexity need not scruple onlooker and can be safe in terminal the various privacy informations of input and
Security information, it is effectively guaranteed the security of privacy information and security information.
Although existing scheme solves the problems, such as safety input to a certain extent, simultaneously it can also be seen that above-mentioned side
Be present some drawbacks in case, be mainly shown as:
For scheme one, it is by special input method procedure overall safety input, common input method is not worked, used
It is to complete input using common input method procedure in many cases during the using terminal of family.So such a scheme coverage rate is not wide;
For scheme two, it is by the way that initial input character to be converted into preset significant character, reaches the mesh inputted safely
, this scheme needs the conversion corresponding relation of the preset character of user, and user occurs when in use forgets character corresponding relation
Situation, so, certain drawback in application be present in this scheme.
The content of the invention
The present invention provides a kind of safe input system, method and intelligent terminal, to solve input method journey in the prior art
The problem of sequence is easily invaded, and the information for causing user to input easily is stolen.
According to one aspect of the present invention, there is provided a kind of safe input system, including:
Drive module is inputted, for by the incoming event write device input node file of user;
Interference incident inserts module, for when monitoring that the equipment input node file has incoming event write-in, giving birth to
Into the incoming event for interference, the incoming event is write into the equipment input node file;
Incoming event processing module, for reading the incoming event in the equipment input node file, and transmitted
To input method procedure;
Safe input processing module, the word generated according to the incoming event sent for receiving the input method procedure
Symbol, and rejected from the character of reception and disturb character corresponding to the incoming event for being used to disturb, and will not picked
The character removed is sent to target program.
According to another aspect of the present invention, there is provided a kind of intelligent terminal, including:Safety input system of the present invention
System.
According to the third aspect of the invention, a kind of secured inputting method is also provided, including:
When monitoring that input drives the incoming event write device input node file by user, generate for the defeated of interference
Incoming event, and the incoming event is write into the equipment input node file;
Incoming event in the equipment input node file is passed into input method procedure;
Receive the character generated according to the incoming event that the input method procedure is sent, and from the character of reception
Character is disturbed corresponding to the incoming event for being used to disturb described in middle rejecting, and the character not being removed is sent to target journey
Sequence.
The present invention has the beneficial effect that:
Safe input system, method and intelligent terminal proposed by the present invention, when user side has incoming event, insertion interference
Incoming event, and when sending the character that input method procedure obtains to target program, will be obtained in character according to exogenous disturbances event
The character arrived is rejected, and so in the case where input method procedure is by malicious intrusions, rogue program also can not accurately be collected into user
The real content of input, so as to reach the purpose inputted safely.It can be seen that scheme of the present invention can be in existing input system base
On plinth, security improvement is done in the input to common input method procedure, reduces the security risk brought in itself by input method procedure, larger
The safety coefficient of the lifting product of degree.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this area
Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention
Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 is a kind of structured flowchart for safe input system that first embodiment of the invention provides;
Fig. 2 is that intelligent terminal does not use input system framework during safe input system to illustrate in second embodiment of the invention
Figure;
Fig. 3 is that intelligent terminal uses input system framework during safe input system to illustrate in second embodiment of the invention
Figure;
Fig. 4 is the safe input system block flow diagram of intelligent terminal in second embodiment of the invention;
Fig. 5 is that intelligent terminal application safe input system realizes the flow that character inputs safely in second embodiment of the invention
Figure;
Fig. 6 is a kind of flow chart for secured inputting method that third embodiment of the invention provides.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in accompanying drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
Completely it is communicated to those skilled in the art.
The embodiment of the present invention proposes a kind of safe input system, method and intelligent terminal, specifically, in the present embodiment,
When user is by input method inputting character information, system is automatically added to exogenous disturbances event, and generates character in input method procedure
Afterwards, the interference character being automatically added to by system process deletion system, the word for then being inputted remaining user by system process
Symbol letter passs target program.So input method procedure can not be accurately obtained the real content of user's input, realize the peace of content
Full input.
Separately below in terms of system, method, terminal are several, the implementation process of the embodiment of the present invention is explained in detail
State.
In the first embodiment of the present invention, there is provided a kind of safe input system, as shown in figure 1, the system includes:It is defeated
Enter drive module 110, interference incident insertion module 120, incoming event processing module 130 and safe input processing module 140.
Drive module 110 is inputted, for by the incoming event write device input node file of user;That is, user has defeated
When entering to operate, equipment input node file can record the coordinate that user's input operation corresponds to character, such as based on Linux's
In intelligence system, coordinate information can be recorded in equipment input node file/dev/input/event*.
Interference incident inserts module 120, for when monitoring that the equipment input node file has incoming event write-in,
The incoming event for interference is generated, the incoming event is write into the equipment input node file;
Incoming event processing module 130, for reading the incoming event in the equipment input node file, and passed
Pass input method procedure;
Safe input processing module 140, for receiving being generated according to the incoming event for the input method procedure transmission
Character, and rejected from the character of reception and disturb character corresponding to the incoming event for being used to disturb, and will not
The character being removed is sent to target program.
Wherein, the target program can be, but not limited to as the software application higher to input safety requirements, such as mobile phone
Banking software etc..
In one particular embodiment of the present invention, interference incident insertion module 120, the layout of current inputting interface is parsed
Information, the center position coordinates of each character in inputting interface are obtained, some words are extracted in inputting interface by setting extracting mechanism
The coordinate of symbol, and the coordinate of the character according to extraction, generate the incoming event for interference.
In the still another embodiment of the present invention, interference incident insertion module 120, inserted according to the interference incident of setting
Rule, the incoming event for being used to disturb of generation is write into the equipment input node file.
Wherein, rule is inserted for interference incident, those skilled in the art can be with flexible configuration, for example, being configurable to:
An exogenous disturbances event is inserted after each incoming event that input drive module 110 writes, is write in input drive module 110
Multiple exogenous disturbances events are inserted after each incoming event entered, are inserted after input drive module 110 writes multiple incoming events
Enter an exogenous disturbances event or, input drive module 110 write multiple incoming events after insert multiple exogenous disturbances things
Part, etc..
Further, in the embodiment of the present invention, safe input processing module 140 judges that the character that input method procedure is sent is
It is no be disturb character mode include but is not limited to be:
Mode one:
Interference incident insert module 120, by for interference incoming event write the equipment input node file when, to
Safe input processing module 140 sends interference notice;
Safe input processing module 140, notified according to the interference received, determine that the incoming event for interference is corresponding
Interference character, and according to the interference character determined, carry out disturbing character to reject operation.
Wherein, safe input processing module 140 is capable of determining that a kind of embodiment of interference character according to interference notice
For:Carried in the interference notice that interference incident insertion module 120 is sent for character information corresponding to the incoming event of interference.
Certainly, there are other ways of realization, for example, the side of safe input processing module 140 can transfer inputting interface information, now, do
Safe input processing module can be sent to by the incoming event information of insertion by notice by disturbing event insertion module, defeated by safety
Enter processing module 140 according to inputting interface information and incoming event information, it is determined that interference character.The present invention is not to interference notice
Way of realization is specifically limited, as long as by disturbing notice to enable to safe input processing module 140 to determine to disturb character
Scheme, all the present invention protection thought range within.
In the present embodiment, preferably, word corresponding to the incoming event for being used to disturb that interference incident insertion module 120 is inserted
Symbol should be different from character corresponding to the incoming event of the user monitored.
Mode two:
Interference incident inserts module 120, and rule is inserted according to the interference incident of setting, by the input for being used to disturb of generation
Event writes the equipment input node file.Now, safe input processing module 140, interference incident insertion rule can be transferred
Then, and according to the interference incident rule is inserted, determined for disturbing character corresponding to the incoming event of interference, and according to true
The interference character made, carry out disturbing character to reject operation.
For example, the insertion rule that interference incident insertion module 120 inserts interference incident is to be write in input drive module 110
Each incoming event after insert an exogenous disturbances event, then the character that corresponding input method procedure identifies is exactly:Very
The order of the true character puppet character ... of character puppet character, so, safe input processing module 140 can determine even bit automatically
Character is the interference character of insertion, it is necessary to reject.
In summary, under the safe input system described in the embodiment of the present invention, when user clicks on character in input keyboard,
Input coordinate can be produced, and when by input coordinate write device input node file/dev/input/event*, system meeting
Single or multiple interference coordinates are generated, and are written in equipment input node file/dev/input/event*.When input method journey
During these input coordinates in sequence response apparatus input node file, multiple characters can be sequentially generated, are contained in these characters
The interference character that the normal character and system of user's input add, system are responsible for being deleted interference character, and will be remaining
The normal character of user's input passes to target program.So, even if in the case where input method procedure is by malicious intrusions, malice
Program also can not accurately be collected into the real content of user's input, so as to reach the purpose inputted safely.
In the second embodiment of the present invention, there is provided a kind of intelligent terminal, the intelligent terminal do not use first embodiment institute
Input system frame diagram during the safe input system stated is as shown in Fig. 2 as seen from the figure, input system framework includes:Target
Program, system process, input method process three parts.
Work as target program, when needing to input character content such as social software, Mobile banking's software, first to system process Shen
Input method procedure please be open, when system process receives application, binding input frame and display input method.Such as based on
In Android system terminal target program, system process and input method process respectively by InputMethodManager,
InputMethodManagerService, InputMethodService carry out collaborative interactive.
When binding input frame and after display input method, user's point touching screen, input method process generation character, and by character
Send target program to, after target program receives character, be shown on corresponding control.
The input safety of such a input system needs to rely on input method procedure, when input method procedure is insincere, exists
Input security risk.
As shown in figure 3, the safety input system described in first embodiment is applied for intelligent terminal described in the embodiment of the present invention
Input system frame diagram after system.Under the input system framework, self-defined input management service is added in system process (i.e.
On original input management service infrastructure, add the interference incident insertion module 120 in first embodiment and safety inputs
The function of processing module 140), for completing the insertion of interference incident and disturbing the rejecting of character.
The present embodiment is realized to the excellent of character input flow by increasing self-defined input server in system process
Change and improve.Specifically, when user has input operation, incoming event corresponding to input operation is recorded, and is automatically added to disturb defeated
Incoming event, after input method procedure generates character according to incoming event, character content is not transmitted directly to target program, but will
Interference character is rejected, only retains the normal character of user's input, normal character is then passed into target by system process again
Program.
In intelligent terminal safe input system framework, input method procedure can not be obtained accurately in the character of user's input
Hold, the caused security risk because input method procedure can be avoided.
As shown in figure 4, be the safe input system block flow diagram of intelligent terminal described in the embodiment of the present invention, idiographic flow
It is as follows:
User carries out input operation by the touch-screen of intelligent terminal or physical button etc.;
The drivers such as the system kernel layer touch-screen of intelligent terminal, physical button (corresponding input drive module) are according to more
Physical signalling is changed into incoming event by the event rules of point touch-control protocol definition, and is written to equipment input node file;Than
Such as in the intelligence system based on linux, input equipment node file is under/dev/input/ catalogues.
The incoming event processing thread (corresponding incoming event processing module) of system framework layer is responsible for reading input equipment section
Incoming event in dot file, and pass to upper level applications.Such as when user calls input method procedure to input character,
The incoming event of user is passed to input method procedure by incoming event processing thread, and then input method procedure is according to incoming input
Event generates character.
In safe input system, system framework layer also passes through interference incident in addition to completing conventional incoming event and reading
Insertion thread (corresponding to interference incident insertion module) writes interference incident in input equipment node file.
Interference incident inserts thread when inserting interference incident, (corresponds to safe input with safe input processing thread
Reason module) communicated, notify character corresponding to interference incident that safe input processing thread inserted, safe input processing line
Journey is handled the result character that input method generates according to obtained information, is deleted interference character, is only retained user's input
Normal character.
Finally, the normal character obtained after processing is passed to target program by safe input processing thread.
As shown in figure 5, realize that character inputs safely for intelligent terminal application safe input system described in the embodiment of the present invention
Flow chart, specifically comprise the following steps:
S502, user click on some character on screen entering method keyboard, such as alphabetical a.
S504, touch-screen driver response click action, obtains the coordinate of click location, generates incoming event;And will
Co-ordinate content reports intelligent terminal input subsystem.
S506, touch-screen driver write incoming event in input equipment node file, such as based on linux's
In intelligence system, input equipment file is under/dev/input/ catalogues.
S508, the incoming event processing thread of intelligent terminal monitor the content change in input equipment node file, and will
Original coordinates information is packaged, and upper level applications are sent in a manner of incoming event (i.e.:Input method procedure).
S510, input method procedure response incoming event, generates character, such as alphabetical a.
S512, the safe input processing thread of intelligent terminal receive and cached the character that input method procedure sends over, such as
Alphabetical a.
S514, intelligent terminal interference incident insertion thread generation interference coordinate, is written to/dev/input input equipment sections
In dot file, and interference character information corresponding to interference coordinate is notified to safe input processing thread;
In detail, the rule of generation interference coordinate is the layout information by parsing current inputting interface, obtains each word
The center position coordinates of female control, some alphabetic coordinates therein are then taken out at random as interference coordinate.
S516, the incoming event processing thread of intelligent terminal monitor the interference coordinate of the insertion in input equipment node file
Information, and be packaged, exogenous disturbances event is sent to input method procedure.
S518, input method procedure response incoming event, generation interference character, such as alphabetical b.
S520, the safe all characters of input processing thread cache of intelligent terminal, such as ab.
S522, the safe input processing thread of intelligent terminal delete interference character, only retain user inputs character, such as by ab
It is changed to a.
S524, final character is sent to target program by the safe input processing thread of intelligent terminal, for example alphabetical a is sent
To target program.
S526, target program show the character of user's input, for example show alphabetical a.
Above process step completes the safety input of character, and in this flow, when user, which performs, to be inputted, system is quick
Automatically generate interference coordinate, and interference character is generated by input method, then system process will contain the defeated of interference character
Enter the character that content recovery is user's input.
In the third embodiment of the present invention, there is provided a kind of secured inputting method, as shown in fig. 6, including:
Step S601, when monitoring that input drives the incoming event write device input node file by user, generation is used
The equipment input node file is write in the incoming event of interference, and by the incoming event;
In the present embodiment, the incoming event for interference is generated, including:
The layout information of current inputting interface is parsed, obtains the center position coordinates of each character in inputting interface;
The coordinate of some characters, and the coordinate of the character according to extraction are extracted in inputting interface by setting extracting mechanism,
Generate the incoming event for interference.
Further, in the present embodiment, monitoring input driving by the incoming event write device input node of user
During file, rule is inserted according to the interference incident of setting, the incoming event for being used to disturb of generation is write into the equipment inputs
Node file.
Step S602, the incoming event in the equipment input node file is passed into input method procedure;
Step S603, receives the character generated according to the incoming event that the input method procedure is sent, and from reception
The character in reject interference character corresponding to the incoming event for being used to disturb, and the character not being removed is sent
To target program.
In the present embodiment, judge whether the character that input method procedure is sent is that the mode for disturbing character includes but is not limited to
For:
Mode one:When generating the incoming event for interference, record for character corresponding to the incoming event of interference.This
Sample, after the character generated according to the incoming event that the input method procedure is sent is received, it is possible to according to record
Character determines interference character corresponding to the incoming event for being used to disturb, disturb the rejecting of character to operate.
Mode two:After receiving the character generated according to the incoming event that the input method procedure is sent, according to interference
Event insertion rule, is determined for disturbing character corresponding to the incoming event of interference, to carry out disturbing character to reject operation.
In summary, secured inputting method proposed by the present invention, when user side has incoming event, exogenous disturbances thing is inserted
Part, and when sending the character that input method procedure obtains to target program, the word that will be obtained in character according to exogenous disturbances event
Symbol is rejected, and so in the case where input method procedure is by malicious intrusions, rogue program also can not accurately be collected into user's input
Real content, so as to reach the purpose inputted safely.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, computer, clothes
Be engaged in device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair
The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills
Art field, is included within the scope of the present invention.
Claims (12)
- A kind of 1. safe input system, it is characterised in that including:Drive module is inputted, for by the incoming event write device input node file of user;Interference incident inserts module, for when monitoring that the equipment input node file has incoming event write-in, generation to be used In the incoming event of interference, the incoming event is write into the equipment input node file;Incoming event processing module, for reading the incoming event in the equipment input node file, and pass it to defeated Enter method program;Safe input processing module, the character generated according to the incoming event sent for receiving the input method procedure, And rejected from the character of reception character is disturbed corresponding to the incoming event for being used to disturb, and will not be removed Character is sent to target program.
- 2. the system as claimed in claim 1, it is characterised in that the interference incident inserts module, for parsing current input The layout information at interface, the center position coordinates of each character in inputting interface are obtained, by setting extracting mechanism in inputting interface The coordinate of some characters, and the coordinate of the character according to extraction are extracted, generates the incoming event for interference.
- 3. the system as claimed in claim 1, it is characterised in that the interference incident inserts module, for according to the dry of setting Event insertion rule is disturbed, the incoming event for being used to disturb of generation is write into the equipment input node file.
- 4. the system as described in claim 1 or 2 or 3, it is characterised in thatThe interference incident inserts module, during for by writing the equipment input node file for the incoming event of interference, Interference notice is sent to the safe input processing module;The safe input processing module, for according to the interference notice received, determining the incoming event pair for interference The interference character answered, and according to the interference character determined, carry out disturbing character to reject operation.
- 5. system as claimed in claim 4, it is characterised in that the interference incident inserts module, for by for interference Character information corresponding to incoming event is sent to the safe input processing module as the content of notice.
- 6. system as claimed in claim 3, it is characterised in that the safe input processing module, for transferring the interference Event insertion rule, and rule is inserted according to the interference incident, determine for noise word corresponding to the incoming event of interference Symbol, and according to the interference character determined, carry out disturbing character to reject operation.
- 7. a kind of intelligent terminal, it is characterised in that the intelligent terminal includes the safety described in claim 1 to 6 any one Input system.
- A kind of 8. secured inputting method, it is characterised in that including:When monitoring that input drives the incoming event write device input node file by user, the input thing for interference is generated Part, and the incoming event is write into the equipment input node file;Incoming event in the equipment input node file is passed into input method procedure;The character generated according to the incoming event that the input method procedure is sent is received, and is picked from the character of reception Except character is disturbed corresponding to the incoming event for being used to disturb, and the character not being removed is sent to target program.
- 9. method as claimed in claim 8, it is characterised in that the incoming event generated for interference, including:The layout information of current inputting interface is parsed, obtains the center position coordinates of each character in inputting interface;The coordinate of some characters, and the coordinate of the character according to extraction, generation are extracted in inputting interface by setting extracting mechanism Incoming event for interference.
- 10. method as claimed in claim 8, it is characterised in that monitoring incoming event write-in of the input driving by user During equipment input node file, rule is inserted according to the interference incident of setting, the incoming event for being used to disturb of generation is write The equipment input node file.
- 11. the method as described in claim 8 or 9 or 10, it is characterised in that it is described generate for interference incoming event when, Also include:Record for character corresponding to the incoming event of interference;After the character generated according to the incoming event that the input method procedure is sent is received, determined according to the character of record Interference character corresponding to the incoming event for being used to disturb, disturb the rejecting of character to operate.
- 12. method as claimed in claim 10, it is characterised in that in the reception input method procedure transmission according to described defeated After the character of incoming event generation, rule is inserted according to the interference incident, determined for being done corresponding to the incoming event of interference Character is disturbed, to carry out disturbing character to reject operation.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610838138.8A CN107844717A (en) | 2016-09-21 | 2016-09-21 | Safe input system, method and intelligent terminal |
PCT/CN2017/073033 WO2018053988A1 (en) | 2016-09-21 | 2017-02-07 | Secure input system and method, intelligent terminal, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610838138.8A CN107844717A (en) | 2016-09-21 | 2016-09-21 | Safe input system, method and intelligent terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107844717A true CN107844717A (en) | 2018-03-27 |
Family
ID=61657539
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610838138.8A Withdrawn CN107844717A (en) | 2016-09-21 | 2016-09-21 | Safe input system, method and intelligent terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107844717A (en) |
WO (1) | WO2018053988A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111193740A (en) * | 2019-12-31 | 2020-05-22 | 苏宁金融科技(南京)有限公司 | Encryption method, device, decryption method, computer device and storage medium |
CN114153726A (en) * | 2021-11-25 | 2022-03-08 | 麒麟软件有限公司 | Login test method and device based on linux desktop operating system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101101625A (en) * | 2007-08-07 | 2008-01-09 | 江雨 | Input data safe treatment method and device |
CN102393894A (en) * | 2011-09-30 | 2012-03-28 | 飞天诚信科技股份有限公司 | Method and device for enhancing user information input security |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7464171B2 (en) * | 2004-10-01 | 2008-12-09 | Microsoft Corporation | Effective protection of computer data traffic in constrained resource scenarios |
CN104143068B (en) * | 2014-07-16 | 2017-10-17 | 宇龙计算机通信科技(深圳)有限公司 | Method of password authentication and system |
-
2016
- 2016-09-21 CN CN201610838138.8A patent/CN107844717A/en not_active Withdrawn
-
2017
- 2017-02-07 WO PCT/CN2017/073033 patent/WO2018053988A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101101625A (en) * | 2007-08-07 | 2008-01-09 | 江雨 | Input data safe treatment method and device |
CN102393894A (en) * | 2011-09-30 | 2012-03-28 | 飞天诚信科技股份有限公司 | Method and device for enhancing user information input security |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111193740A (en) * | 2019-12-31 | 2020-05-22 | 苏宁金融科技(南京)有限公司 | Encryption method, device, decryption method, computer device and storage medium |
CN111193740B (en) * | 2019-12-31 | 2023-03-14 | 苏宁金融科技(南京)有限公司 | Encryption method, device, decryption method, computer device and storage medium |
CN114153726A (en) * | 2021-11-25 | 2022-03-08 | 麒麟软件有限公司 | Login test method and device based on linux desktop operating system |
CN114153726B (en) * | 2021-11-25 | 2024-05-17 | 麒麟软件有限公司 | Login test method and device based on linux desktop operating system |
Also Published As
Publication number | Publication date |
---|---|
WO2018053988A1 (en) | 2018-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104468611B (en) | The data safety processing method and device switched based on dual system | |
CN104184900B (en) | Data processing method, system and mobile terminal | |
EP2706699B1 (en) | User terminal and payment system | |
CN101794365B (en) | The method of safely inputting information and mobile terminal on mobile terminals | |
CN103793659A (en) | Method and system for setting password and method and system for verifying password | |
CN105493054A (en) | Fast data protection using dual file systems | |
CN105068974A (en) | Information processing method and electronic device | |
CN104796534A (en) | Method and device for processing information contents | |
CN103401771A (en) | Network isolation method and network isolation system | |
CN105006045B (en) | NFC mobile phone dynamic password gate control system and its control method | |
CN109960938A (en) | Processing method, device, medium and the electronic equipment of sensitive information | |
CN107370872A (en) | Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine | |
CN107844717A (en) | Safe input system, method and intelligent terminal | |
CN103854181B (en) | A kind of electric endorsement method and electronic signature equipment, client and system | |
CN102271332A (en) | Method and device for maintaining secrecy of terminal information | |
CN106971163A (en) | One kind connects neck people recognition methods, device and system | |
CN101384032A (en) | Ciphered short message shielding method, sending method and storing method | |
CN104408378A (en) | Method and device for protecting private data | |
CN107563209A (en) | Touch-screen PIN input methods and device based on Android | |
CN111913773A (en) | NFC card control method, NFC card control device and electronic equipment | |
CN107516215A (en) | The intelligent POS terminal and method of PIN code can be inputted safely | |
CN105389506B (en) | A kind of method and apparatus for improving input safety | |
CN104021351A (en) | Method and device for data resource access | |
CN108040047A (en) | Terminal applies log-in control method, mobile terminal and computer-readable recording medium | |
CN104462992B (en) | A kind of information processing method and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180327 |