CN107844717A - Safe input system, method and intelligent terminal - Google Patents

Safe input system, method and intelligent terminal Download PDF

Info

Publication number
CN107844717A
CN107844717A CN201610838138.8A CN201610838138A CN107844717A CN 107844717 A CN107844717 A CN 107844717A CN 201610838138 A CN201610838138 A CN 201610838138A CN 107844717 A CN107844717 A CN 107844717A
Authority
CN
China
Prior art keywords
character
input
incoming event
interference
node file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610838138.8A
Other languages
Chinese (zh)
Inventor
姚均营
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610838138.8A priority Critical patent/CN107844717A/en
Priority to PCT/CN2017/073033 priority patent/WO2018053988A1/en
Publication of CN107844717A publication Critical patent/CN107844717A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention discloses a kind of safe input system, method and intelligent terminal, the system includes:Drive module is inputted, for by the incoming event write device input node file of user;Interference incident inserts module, for when monitoring that equipment input node file has incoming event write-in, generating write device input node file after the incoming event for interference;Incoming event processing module, for reading the incoming event in equipment input node file, and pass it to input method procedure;Safe input processing module, for receiving the character generated according to incoming event of input method procedure transmission, and rejected from the character of reception for disturbing character corresponding to the incoming event of interference, and the character not being removed is sent to target program.The present invention can be on the basis of existing input system, and security improvement is done in the input to common input method procedure, reduces the security risk brought in itself by input method procedure, largely lifts the safety coefficient of product.

Description

Safe input system, method and intelligent terminal
Technical field
The present invention relates to the communications field, more particularly to a kind of safe input system, method and intelligent terminal.
Background technology
Rapid growth is obtained in the service of mobile phone terminal with the business such as quick popularization, mobile payment of smart mobile phone, Thing followed customer information is stolen and monetary losses are but as a big security threat of domestic consumer.For example a kind of privacy is stolen Viroid --- " keyboard evil backstage manipulator ", once popular in overseas, the virus is packaged into well-known cellphone inputting method SwiftKey In KeyBoard, can direct monitoring users input through keyboard, upload leakage user account password information, in addition including credit card, Net silver etc. pays data, and the viral harm is extremely serious.
Intelligent terminal input through keyboard security risk at present, it can be summarized as follows:
1st, rogue program obtains the input content of target program by process injection technique.Process is injected By one section of code copies to target process, target process is then allowed to perform the technology of this section of code.Can by process injection technique Input content is obtained to run one section of content for obtaining input frame in target program or be injected into input method.
2nd, record is obtained by the KeyEvent of operating system bottom, that is, by obtaining the encoded radio of input through keyboard, Encoded radio is converted into keypad character again, for example record/dev/ can be passed through in the mobile terminal based on linux system Input equipment content under input paths, user's input content is obtained, complete invasion.
3rd, input through keyboard content is obtained by input method.The content input of each class method on intelligent terminal must be by defeated Enter method to complete, so, as long as the important information input of user, which is called, is arrived input method, it is possible to stolen to input method procedure chance Get user and input information.Rogue program invasion input method procedure does not need special authority, and fascinating strong, difficulty is low.If Domestic consumer download input method procedure of the installation kit containing malicious code, or in terminal normal input method procedure by rogue program Invasion, then user will face the security risk that information is stolen.For example " keyboard evil backstage manipulator " mentioned above is exactly to use to beat External cellphone inputting method SwiftKey KeyBoard progress input through keyboard is wrapped to steal.
For obtaining this security risk of input through keyboard content by input method, existing solution has:
The method inputted safely on intelligent terminal, some schemes are currently existed, such as:
Scheme one:The method of touch terminal Secure Transaction, this method are installed by installing input method in touch terminal Input method is bundled on transaction program, in transaction program using binding input method and forbid being switched to common input method, can Avoid dangerous input method from stealing user sensitive information, reduce the possibility that data are stolen silently when inputting sensitive data.
Scheme two:The implementation method and terminal inputted safely, this method are applied to a terminal with display screen, the end End includes the first application program, including:The initial input character of input is obtained, the initial input character is included in an input Inframe;The input mode of initial input character described in identified input;Based on the input mode and predetermined instruction secure strategy, Determine effectively to input character corresponding to the initial input character;It is supplied to described first to apply journey the effectively input character Sequence.It is this that the initial input character of input is identified and changed to form effective instruction using instruction secure strategy so as to use Family can in the case of environment complexity need not scruple onlooker and can be safe in terminal the various privacy informations of input and Security information, it is effectively guaranteed the security of privacy information and security information.
Although existing scheme solves the problems, such as safety input to a certain extent, simultaneously it can also be seen that above-mentioned side Be present some drawbacks in case, be mainly shown as:
For scheme one, it is by special input method procedure overall safety input, common input method is not worked, used It is to complete input using common input method procedure in many cases during the using terminal of family.So such a scheme coverage rate is not wide;
For scheme two, it is by the way that initial input character to be converted into preset significant character, reaches the mesh inputted safely , this scheme needs the conversion corresponding relation of the preset character of user, and user occurs when in use forgets character corresponding relation Situation, so, certain drawback in application be present in this scheme.
The content of the invention
The present invention provides a kind of safe input system, method and intelligent terminal, to solve input method journey in the prior art The problem of sequence is easily invaded, and the information for causing user to input easily is stolen.
According to one aspect of the present invention, there is provided a kind of safe input system, including:
Drive module is inputted, for by the incoming event write device input node file of user;
Interference incident inserts module, for when monitoring that the equipment input node file has incoming event write-in, giving birth to Into the incoming event for interference, the incoming event is write into the equipment input node file;
Incoming event processing module, for reading the incoming event in the equipment input node file, and transmitted To input method procedure;
Safe input processing module, the word generated according to the incoming event sent for receiving the input method procedure Symbol, and rejected from the character of reception and disturb character corresponding to the incoming event for being used to disturb, and will not picked The character removed is sent to target program.
According to another aspect of the present invention, there is provided a kind of intelligent terminal, including:Safety input system of the present invention System.
According to the third aspect of the invention, a kind of secured inputting method is also provided, including:
When monitoring that input drives the incoming event write device input node file by user, generate for the defeated of interference Incoming event, and the incoming event is write into the equipment input node file;
Incoming event in the equipment input node file is passed into input method procedure;
Receive the character generated according to the incoming event that the input method procedure is sent, and from the character of reception Character is disturbed corresponding to the incoming event for being used to disturb described in middle rejecting, and the character not being removed is sent to target journey Sequence.
The present invention has the beneficial effect that:
Safe input system, method and intelligent terminal proposed by the present invention, when user side has incoming event, insertion interference Incoming event, and when sending the character that input method procedure obtains to target program, will be obtained in character according to exogenous disturbances event The character arrived is rejected, and so in the case where input method procedure is by malicious intrusions, rogue program also can not accurately be collected into user The real content of input, so as to reach the purpose inputted safely.It can be seen that scheme of the present invention can be in existing input system base On plinth, security improvement is done in the input to common input method procedure, reduces the security risk brought in itself by input method procedure, larger The safety coefficient of the lifting product of degree.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 is a kind of structured flowchart for safe input system that first embodiment of the invention provides;
Fig. 2 is that intelligent terminal does not use input system framework during safe input system to illustrate in second embodiment of the invention Figure;
Fig. 3 is that intelligent terminal uses input system framework during safe input system to illustrate in second embodiment of the invention Figure;
Fig. 4 is the safe input system block flow diagram of intelligent terminal in second embodiment of the invention;
Fig. 5 is that intelligent terminal application safe input system realizes the flow that character inputs safely in second embodiment of the invention Figure;
Fig. 6 is a kind of flow chart for secured inputting method that third embodiment of the invention provides.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Completely it is communicated to those skilled in the art.
The embodiment of the present invention proposes a kind of safe input system, method and intelligent terminal, specifically, in the present embodiment, When user is by input method inputting character information, system is automatically added to exogenous disturbances event, and generates character in input method procedure Afterwards, the interference character being automatically added to by system process deletion system, the word for then being inputted remaining user by system process Symbol letter passs target program.So input method procedure can not be accurately obtained the real content of user's input, realize the peace of content Full input.
Separately below in terms of system, method, terminal are several, the implementation process of the embodiment of the present invention is explained in detail State.
In the first embodiment of the present invention, there is provided a kind of safe input system, as shown in figure 1, the system includes:It is defeated Enter drive module 110, interference incident insertion module 120, incoming event processing module 130 and safe input processing module 140.
Drive module 110 is inputted, for by the incoming event write device input node file of user;That is, user has defeated When entering to operate, equipment input node file can record the coordinate that user's input operation corresponds to character, such as based on Linux's In intelligence system, coordinate information can be recorded in equipment input node file/dev/input/event*.
Interference incident inserts module 120, for when monitoring that the equipment input node file has incoming event write-in, The incoming event for interference is generated, the incoming event is write into the equipment input node file;
Incoming event processing module 130, for reading the incoming event in the equipment input node file, and passed Pass input method procedure;
Safe input processing module 140, for receiving being generated according to the incoming event for the input method procedure transmission Character, and rejected from the character of reception and disturb character corresponding to the incoming event for being used to disturb, and will not The character being removed is sent to target program.
Wherein, the target program can be, but not limited to as the software application higher to input safety requirements, such as mobile phone Banking software etc..
In one particular embodiment of the present invention, interference incident insertion module 120, the layout of current inputting interface is parsed Information, the center position coordinates of each character in inputting interface are obtained, some words are extracted in inputting interface by setting extracting mechanism The coordinate of symbol, and the coordinate of the character according to extraction, generate the incoming event for interference.
In the still another embodiment of the present invention, interference incident insertion module 120, inserted according to the interference incident of setting Rule, the incoming event for being used to disturb of generation is write into the equipment input node file.
Wherein, rule is inserted for interference incident, those skilled in the art can be with flexible configuration, for example, being configurable to: An exogenous disturbances event is inserted after each incoming event that input drive module 110 writes, is write in input drive module 110 Multiple exogenous disturbances events are inserted after each incoming event entered, are inserted after input drive module 110 writes multiple incoming events Enter an exogenous disturbances event or, input drive module 110 write multiple incoming events after insert multiple exogenous disturbances things Part, etc..
Further, in the embodiment of the present invention, safe input processing module 140 judges that the character that input method procedure is sent is It is no be disturb character mode include but is not limited to be:
Mode one:
Interference incident insert module 120, by for interference incoming event write the equipment input node file when, to Safe input processing module 140 sends interference notice;
Safe input processing module 140, notified according to the interference received, determine that the incoming event for interference is corresponding Interference character, and according to the interference character determined, carry out disturbing character to reject operation.
Wherein, safe input processing module 140 is capable of determining that a kind of embodiment of interference character according to interference notice For:Carried in the interference notice that interference incident insertion module 120 is sent for character information corresponding to the incoming event of interference. Certainly, there are other ways of realization, for example, the side of safe input processing module 140 can transfer inputting interface information, now, do Safe input processing module can be sent to by the incoming event information of insertion by notice by disturbing event insertion module, defeated by safety Enter processing module 140 according to inputting interface information and incoming event information, it is determined that interference character.The present invention is not to interference notice Way of realization is specifically limited, as long as by disturbing notice to enable to safe input processing module 140 to determine to disturb character Scheme, all the present invention protection thought range within.
In the present embodiment, preferably, word corresponding to the incoming event for being used to disturb that interference incident insertion module 120 is inserted Symbol should be different from character corresponding to the incoming event of the user monitored.
Mode two:
Interference incident inserts module 120, and rule is inserted according to the interference incident of setting, by the input for being used to disturb of generation Event writes the equipment input node file.Now, safe input processing module 140, interference incident insertion rule can be transferred Then, and according to the interference incident rule is inserted, determined for disturbing character corresponding to the incoming event of interference, and according to true The interference character made, carry out disturbing character to reject operation.
For example, the insertion rule that interference incident insertion module 120 inserts interference incident is to be write in input drive module 110 Each incoming event after insert an exogenous disturbances event, then the character that corresponding input method procedure identifies is exactly:Very The order of the true character puppet character ... of character puppet character, so, safe input processing module 140 can determine even bit automatically Character is the interference character of insertion, it is necessary to reject.
In summary, under the safe input system described in the embodiment of the present invention, when user clicks on character in input keyboard, Input coordinate can be produced, and when by input coordinate write device input node file/dev/input/event*, system meeting Single or multiple interference coordinates are generated, and are written in equipment input node file/dev/input/event*.When input method journey During these input coordinates in sequence response apparatus input node file, multiple characters can be sequentially generated, are contained in these characters The interference character that the normal character and system of user's input add, system are responsible for being deleted interference character, and will be remaining The normal character of user's input passes to target program.So, even if in the case where input method procedure is by malicious intrusions, malice Program also can not accurately be collected into the real content of user's input, so as to reach the purpose inputted safely.
In the second embodiment of the present invention, there is provided a kind of intelligent terminal, the intelligent terminal do not use first embodiment institute Input system frame diagram during the safe input system stated is as shown in Fig. 2 as seen from the figure, input system framework includes:Target Program, system process, input method process three parts.
Work as target program, when needing to input character content such as social software, Mobile banking's software, first to system process Shen Input method procedure please be open, when system process receives application, binding input frame and display input method.Such as based on In Android system terminal target program, system process and input method process respectively by InputMethodManager, InputMethodManagerService, InputMethodService carry out collaborative interactive.
When binding input frame and after display input method, user's point touching screen, input method process generation character, and by character Send target program to, after target program receives character, be shown on corresponding control.
The input safety of such a input system needs to rely on input method procedure, when input method procedure is insincere, exists Input security risk.
As shown in figure 3, the safety input system described in first embodiment is applied for intelligent terminal described in the embodiment of the present invention Input system frame diagram after system.Under the input system framework, self-defined input management service is added in system process (i.e. On original input management service infrastructure, add the interference incident insertion module 120 in first embodiment and safety inputs The function of processing module 140), for completing the insertion of interference incident and disturbing the rejecting of character.
The present embodiment is realized to the excellent of character input flow by increasing self-defined input server in system process Change and improve.Specifically, when user has input operation, incoming event corresponding to input operation is recorded, and is automatically added to disturb defeated Incoming event, after input method procedure generates character according to incoming event, character content is not transmitted directly to target program, but will Interference character is rejected, only retains the normal character of user's input, normal character is then passed into target by system process again Program.
In intelligent terminal safe input system framework, input method procedure can not be obtained accurately in the character of user's input Hold, the caused security risk because input method procedure can be avoided.
As shown in figure 4, be the safe input system block flow diagram of intelligent terminal described in the embodiment of the present invention, idiographic flow It is as follows:
User carries out input operation by the touch-screen of intelligent terminal or physical button etc.;
The drivers such as the system kernel layer touch-screen of intelligent terminal, physical button (corresponding input drive module) are according to more Physical signalling is changed into incoming event by the event rules of point touch-control protocol definition, and is written to equipment input node file;Than Such as in the intelligence system based on linux, input equipment node file is under/dev/input/ catalogues.
The incoming event processing thread (corresponding incoming event processing module) of system framework layer is responsible for reading input equipment section Incoming event in dot file, and pass to upper level applications.Such as when user calls input method procedure to input character, The incoming event of user is passed to input method procedure by incoming event processing thread, and then input method procedure is according to incoming input Event generates character.
In safe input system, system framework layer also passes through interference incident in addition to completing conventional incoming event and reading Insertion thread (corresponding to interference incident insertion module) writes interference incident in input equipment node file.
Interference incident inserts thread when inserting interference incident, (corresponds to safe input with safe input processing thread Reason module) communicated, notify character corresponding to interference incident that safe input processing thread inserted, safe input processing line Journey is handled the result character that input method generates according to obtained information, is deleted interference character, is only retained user's input Normal character.
Finally, the normal character obtained after processing is passed to target program by safe input processing thread.
As shown in figure 5, realize that character inputs safely for intelligent terminal application safe input system described in the embodiment of the present invention Flow chart, specifically comprise the following steps:
S502, user click on some character on screen entering method keyboard, such as alphabetical a.
S504, touch-screen driver response click action, obtains the coordinate of click location, generates incoming event;And will Co-ordinate content reports intelligent terminal input subsystem.
S506, touch-screen driver write incoming event in input equipment node file, such as based on linux's In intelligence system, input equipment file is under/dev/input/ catalogues.
S508, the incoming event processing thread of intelligent terminal monitor the content change in input equipment node file, and will Original coordinates information is packaged, and upper level applications are sent in a manner of incoming event (i.e.:Input method procedure).
S510, input method procedure response incoming event, generates character, such as alphabetical a.
S512, the safe input processing thread of intelligent terminal receive and cached the character that input method procedure sends over, such as Alphabetical a.
S514, intelligent terminal interference incident insertion thread generation interference coordinate, is written to/dev/input input equipment sections In dot file, and interference character information corresponding to interference coordinate is notified to safe input processing thread;
In detail, the rule of generation interference coordinate is the layout information by parsing current inputting interface, obtains each word The center position coordinates of female control, some alphabetic coordinates therein are then taken out at random as interference coordinate.
S516, the incoming event processing thread of intelligent terminal monitor the interference coordinate of the insertion in input equipment node file Information, and be packaged, exogenous disturbances event is sent to input method procedure.
S518, input method procedure response incoming event, generation interference character, such as alphabetical b.
S520, the safe all characters of input processing thread cache of intelligent terminal, such as ab.
S522, the safe input processing thread of intelligent terminal delete interference character, only retain user inputs character, such as by ab It is changed to a.
S524, final character is sent to target program by the safe input processing thread of intelligent terminal, for example alphabetical a is sent To target program.
S526, target program show the character of user's input, for example show alphabetical a.
Above process step completes the safety input of character, and in this flow, when user, which performs, to be inputted, system is quick Automatically generate interference coordinate, and interference character is generated by input method, then system process will contain the defeated of interference character Enter the character that content recovery is user's input.
In the third embodiment of the present invention, there is provided a kind of secured inputting method, as shown in fig. 6, including:
Step S601, when monitoring that input drives the incoming event write device input node file by user, generation is used The equipment input node file is write in the incoming event of interference, and by the incoming event;
In the present embodiment, the incoming event for interference is generated, including:
The layout information of current inputting interface is parsed, obtains the center position coordinates of each character in inputting interface;
The coordinate of some characters, and the coordinate of the character according to extraction are extracted in inputting interface by setting extracting mechanism, Generate the incoming event for interference.
Further, in the present embodiment, monitoring input driving by the incoming event write device input node of user During file, rule is inserted according to the interference incident of setting, the incoming event for being used to disturb of generation is write into the equipment inputs Node file.
Step S602, the incoming event in the equipment input node file is passed into input method procedure;
Step S603, receives the character generated according to the incoming event that the input method procedure is sent, and from reception The character in reject interference character corresponding to the incoming event for being used to disturb, and the character not being removed is sent To target program.
In the present embodiment, judge whether the character that input method procedure is sent is that the mode for disturbing character includes but is not limited to For:
Mode one:When generating the incoming event for interference, record for character corresponding to the incoming event of interference.This Sample, after the character generated according to the incoming event that the input method procedure is sent is received, it is possible to according to record Character determines interference character corresponding to the incoming event for being used to disturb, disturb the rejecting of character to operate.
Mode two:After receiving the character generated according to the incoming event that the input method procedure is sent, according to interference Event insertion rule, is determined for disturbing character corresponding to the incoming event of interference, to carry out disturbing character to reject operation.
In summary, secured inputting method proposed by the present invention, when user side has incoming event, exogenous disturbances thing is inserted Part, and when sending the character that input method procedure obtains to target program, the word that will be obtained in character according to exogenous disturbances event Symbol is rejected, and so in the case where input method procedure is by malicious intrusions, rogue program also can not accurately be collected into user's input Real content, so as to reach the purpose inputted safely.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, computer, clothes Be engaged in device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (12)

  1. A kind of 1. safe input system, it is characterised in that including:
    Drive module is inputted, for by the incoming event write device input node file of user;
    Interference incident inserts module, for when monitoring that the equipment input node file has incoming event write-in, generation to be used In the incoming event of interference, the incoming event is write into the equipment input node file;
    Incoming event processing module, for reading the incoming event in the equipment input node file, and pass it to defeated Enter method program;
    Safe input processing module, the character generated according to the incoming event sent for receiving the input method procedure, And rejected from the character of reception character is disturbed corresponding to the incoming event for being used to disturb, and will not be removed Character is sent to target program.
  2. 2. the system as claimed in claim 1, it is characterised in that the interference incident inserts module, for parsing current input The layout information at interface, the center position coordinates of each character in inputting interface are obtained, by setting extracting mechanism in inputting interface The coordinate of some characters, and the coordinate of the character according to extraction are extracted, generates the incoming event for interference.
  3. 3. the system as claimed in claim 1, it is characterised in that the interference incident inserts module, for according to the dry of setting Event insertion rule is disturbed, the incoming event for being used to disturb of generation is write into the equipment input node file.
  4. 4. the system as described in claim 1 or 2 or 3, it is characterised in that
    The interference incident inserts module, during for by writing the equipment input node file for the incoming event of interference, Interference notice is sent to the safe input processing module;
    The safe input processing module, for according to the interference notice received, determining the incoming event pair for interference The interference character answered, and according to the interference character determined, carry out disturbing character to reject operation.
  5. 5. system as claimed in claim 4, it is characterised in that the interference incident inserts module, for by for interference Character information corresponding to incoming event is sent to the safe input processing module as the content of notice.
  6. 6. system as claimed in claim 3, it is characterised in that the safe input processing module, for transferring the interference Event insertion rule, and rule is inserted according to the interference incident, determine for noise word corresponding to the incoming event of interference Symbol, and according to the interference character determined, carry out disturbing character to reject operation.
  7. 7. a kind of intelligent terminal, it is characterised in that the intelligent terminal includes the safety described in claim 1 to 6 any one Input system.
  8. A kind of 8. secured inputting method, it is characterised in that including:
    When monitoring that input drives the incoming event write device input node file by user, the input thing for interference is generated Part, and the incoming event is write into the equipment input node file;
    Incoming event in the equipment input node file is passed into input method procedure;
    The character generated according to the incoming event that the input method procedure is sent is received, and is picked from the character of reception Except character is disturbed corresponding to the incoming event for being used to disturb, and the character not being removed is sent to target program.
  9. 9. method as claimed in claim 8, it is characterised in that the incoming event generated for interference, including:
    The layout information of current inputting interface is parsed, obtains the center position coordinates of each character in inputting interface;
    The coordinate of some characters, and the coordinate of the character according to extraction, generation are extracted in inputting interface by setting extracting mechanism Incoming event for interference.
  10. 10. method as claimed in claim 8, it is characterised in that monitoring incoming event write-in of the input driving by user During equipment input node file, rule is inserted according to the interference incident of setting, the incoming event for being used to disturb of generation is write The equipment input node file.
  11. 11. the method as described in claim 8 or 9 or 10, it is characterised in that it is described generate for interference incoming event when, Also include:Record for character corresponding to the incoming event of interference;
    After the character generated according to the incoming event that the input method procedure is sent is received, determined according to the character of record Interference character corresponding to the incoming event for being used to disturb, disturb the rejecting of character to operate.
  12. 12. method as claimed in claim 10, it is characterised in that in the reception input method procedure transmission according to described defeated After the character of incoming event generation, rule is inserted according to the interference incident, determined for being done corresponding to the incoming event of interference Character is disturbed, to carry out disturbing character to reject operation.
CN201610838138.8A 2016-09-21 2016-09-21 Safe input system, method and intelligent terminal Withdrawn CN107844717A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610838138.8A CN107844717A (en) 2016-09-21 2016-09-21 Safe input system, method and intelligent terminal
PCT/CN2017/073033 WO2018053988A1 (en) 2016-09-21 2017-02-07 Secure input system and method, intelligent terminal, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610838138.8A CN107844717A (en) 2016-09-21 2016-09-21 Safe input system, method and intelligent terminal

Publications (1)

Publication Number Publication Date
CN107844717A true CN107844717A (en) 2018-03-27

Family

ID=61657539

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610838138.8A Withdrawn CN107844717A (en) 2016-09-21 2016-09-21 Safe input system, method and intelligent terminal

Country Status (2)

Country Link
CN (1) CN107844717A (en)
WO (1) WO2018053988A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111193740A (en) * 2019-12-31 2020-05-22 苏宁金融科技(南京)有限公司 Encryption method, device, decryption method, computer device and storage medium
CN114153726A (en) * 2021-11-25 2022-03-08 麒麟软件有限公司 Login test method and device based on linux desktop operating system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101101625A (en) * 2007-08-07 2008-01-09 江雨 Input data safe treatment method and device
CN102393894A (en) * 2011-09-30 2012-03-28 飞天诚信科技股份有限公司 Method and device for enhancing user information input security

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7464171B2 (en) * 2004-10-01 2008-12-09 Microsoft Corporation Effective protection of computer data traffic in constrained resource scenarios
CN104143068B (en) * 2014-07-16 2017-10-17 宇龙计算机通信科技(深圳)有限公司 Method of password authentication and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101101625A (en) * 2007-08-07 2008-01-09 江雨 Input data safe treatment method and device
CN102393894A (en) * 2011-09-30 2012-03-28 飞天诚信科技股份有限公司 Method and device for enhancing user information input security

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111193740A (en) * 2019-12-31 2020-05-22 苏宁金融科技(南京)有限公司 Encryption method, device, decryption method, computer device and storage medium
CN111193740B (en) * 2019-12-31 2023-03-14 苏宁金融科技(南京)有限公司 Encryption method, device, decryption method, computer device and storage medium
CN114153726A (en) * 2021-11-25 2022-03-08 麒麟软件有限公司 Login test method and device based on linux desktop operating system
CN114153726B (en) * 2021-11-25 2024-05-17 麒麟软件有限公司 Login test method and device based on linux desktop operating system

Also Published As

Publication number Publication date
WO2018053988A1 (en) 2018-03-29

Similar Documents

Publication Publication Date Title
CN104468611B (en) The data safety processing method and device switched based on dual system
CN104184900B (en) Data processing method, system and mobile terminal
EP2706699B1 (en) User terminal and payment system
CN101794365B (en) The method of safely inputting information and mobile terminal on mobile terminals
CN103793659A (en) Method and system for setting password and method and system for verifying password
CN105493054A (en) Fast data protection using dual file systems
CN105068974A (en) Information processing method and electronic device
CN104796534A (en) Method and device for processing information contents
CN103401771A (en) Network isolation method and network isolation system
CN105006045B (en) NFC mobile phone dynamic password gate control system and its control method
CN109960938A (en) Processing method, device, medium and the electronic equipment of sensitive information
CN107370872A (en) Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
CN107844717A (en) Safe input system, method and intelligent terminal
CN103854181B (en) A kind of electric endorsement method and electronic signature equipment, client and system
CN102271332A (en) Method and device for maintaining secrecy of terminal information
CN106971163A (en) One kind connects neck people recognition methods, device and system
CN101384032A (en) Ciphered short message shielding method, sending method and storing method
CN104408378A (en) Method and device for protecting private data
CN107563209A (en) Touch-screen PIN input methods and device based on Android
CN111913773A (en) NFC card control method, NFC card control device and electronic equipment
CN107516215A (en) The intelligent POS terminal and method of PIN code can be inputted safely
CN105389506B (en) A kind of method and apparatus for improving input safety
CN104021351A (en) Method and device for data resource access
CN108040047A (en) Terminal applies log-in control method, mobile terminal and computer-readable recording medium
CN104462992B (en) A kind of information processing method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20180327