CN108334794A - A kind of information input encryption method and system for information input equipment - Google Patents
A kind of information input encryption method and system for information input equipment Download PDFInfo
- Publication number
- CN108334794A CN108334794A CN201711463018.5A CN201711463018A CN108334794A CN 108334794 A CN108334794 A CN 108334794A CN 201711463018 A CN201711463018 A CN 201711463018A CN 108334794 A CN108334794 A CN 108334794A
- Authority
- CN
- China
- Prior art keywords
- information input
- input equipment
- key assignments
- button
- triggered
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
The present invention provides a kind of information input encryption method and system for information input equipment, and this method includes:In an encrypted mode, the safety chip of information input equipment obtains the second key assignments that the button being triggered generates, and is encrypted to the second key assignments, obtains the second key assignments ciphertext;Call the second communication interface that operation requests are sent to Cloud Server, operation requests include the second key assignments ciphertext;Cloud Server pair the second key assignments ciphertext is decrypted to obtain the second key assignments;Determine the corresponding KeyEvent of the second key assignments;KeyEvent is executed, KeyEvent execution result information is obtained;KeyEvent execution result information is encrypted to obtain KeyEvent execution result information ciphertext;Operation response is sent to information input equipment, operation response includes KeyEvent execution result information ciphertext;Safety chip is decrypted to obtain KeyEvent execution result information to KeyEvent execution result information ciphertext;Determine information to be displayed, and control display screen shows information to be displayed.
Description
Technical field
The present invention relates to a kind of electronic technology field more particularly to a kind of information input encryptions for information input equipment
Method and system.
Background technology
With the fast development of teleworking, more and more people carry out information input dependent on keyboard, in the prior art,
The information inputted by common keyboard is subject to the attack of the rogue program of wooden horse or virus etc, is inputted so as to cause keyboard
Information be in unsafe environment, how to improve the safety of keyboard input information is urgent problem.
Invention content
Present invention seek to address that the above problem.
The main purpose of the present invention is to provide a kind of information input encryption methods for information input equipment;
Another object of the present invention is to provide a kind of information input encryption systems for information input equipment.
In order to achieve the above objectives, technical scheme of the present invention is specifically realized in:
One aspect of the present invention provides a kind of information input encryption method for information input equipment, including:Common
Under pattern, the safety chip of information input equipment detects the instruction whether the first communication interface receives host computer transmission, is examining
When measuring first communication interface and receiving the instruction that the host computer is sent, judge whether described instruction is that first mode is cut
Instruction is changed, when judging described instruction for the first mode switching command, control described information input equipment switches to encryption
Pattern;Alternatively, in the normal mode, the button of the safety chip detection described information input equipment of information input equipment whether by
Triggering obtains the key assignments that the button being triggered generates, judges institute when detecting that the button of described information input equipment is triggered
State whether the key assignments that the button being triggered generates is the first key assignments, the key assignments that the button being triggered described in judging generates is first
When key assignments, control described information input equipment switches to encryption mode;In an encrypted mode, the safety of described information input equipment
Whether the button of chip detection described information input equipment is triggered;The safety chip of described information input equipment detects described
When the button of information input equipment is triggered, the second key assignments that the button being triggered generates is obtained, information input equipment side is obtained
Security key;The safety chip of described information input equipment is using described information input equipment side security key to second key
Value is encrypted, and obtains the second key assignments ciphertext;The safety chip of described information input equipment calls the second communication interface that will operate
Request is sent to Cloud Server, and the operation requests include the second key assignments ciphertext;The cloud server described information
The operation requests that input equipment is sent;The Cloud Server obtains Cloud Server corresponding with described information input equipment side
Security key;The Cloud Server is decrypted to obtain using Cloud Server side security key to the second key assignments ciphertext
Second key assignments;The Cloud Server determines the corresponding KeyEvent of second key assignments;Described in the Cloud Server executes
KeyEvent obtains KeyEvent execution result information;The Cloud Server is using Cloud Server side security key to institute
KeyEvent execution result information is stated to be encrypted to obtain KeyEvent execution result information ciphertext;The Cloud Server will operate
Response is sent to described information input equipment, and the operation response includes the KeyEvent execution result information ciphertext;It is described
The safety chip of information input equipment detects whether second communication interface receives the behaviour that the Cloud Server is sent
It responds;When the safety chip of described information input equipment receives the operation response that the Cloud Server is sent, use
Described information input equipment side security key is decrypted to obtain the keyboard to the KeyEvent execution result information ciphertext
Event execution result information;The safety chip of described information input equipment is waited for according to KeyEvent execution result information determination
Show information, and control display screen shows the information to be displayed.
In addition, this method, further includes:Under the encryption mode, the safety chip of described information input equipment detection the
Whether one communication interface receives the instruction of host computer transmission, is detecting that first communication interface receives the host computer
When the instruction of transmission, judges whether described instruction is second mode switching command, judging described instruction for the second mode
When switching command, control described information input equipment switches to general mode;Alternatively, under the encryption mode, described information
Whether the button of the safety chip detection described information input equipment of input equipment is triggered, and is set detecting that described information inputs
When standby button is triggered, the key assignments that the button being triggered generates is obtained, the key assignments that the button being triggered described in judgement generates is
No is third key assignments, and when the key assignments that the button that is triggered described in judging generates is the third key assignments, it is defeated to control described information
Enter equipment and switches to general mode.
In addition, obtaining the key assignments that the button being triggered generates, specifically include:What acquisition while the multiple buttons pressed generated
Key assignment combination;Alternatively, obtaining the single key assignments that the single button pressed generates.
Another aspect of the present invention provides a kind of cloud mode encryption system, including:Information input equipment equipped with safety chip
And Cloud Server;The safety chip of described information input equipment, in the normal mode, whether the first communication interface of detection to connect
The instruction for receiving host computer transmission is sentenced when detecting that first communication interface receives the instruction that the host computer is sent
Whether disconnected described instruction is first mode switching command, when judging described instruction for the first mode switching command, control
Described information input equipment switches to encryption mode;Alternatively, in the normal mode, detection described information input equipment is pressed
Whether key is triggered, and when detecting that the button of described information input equipment is triggered, obtains the key that the button being triggered generates
It is worth, whether the key assignments that the button being triggered described in judgement generates is the first key assignments, what the button being triggered described in judgement generated
When key assignments is the first key assignments, control described information input equipment switches to encryption mode;And in an encrypted mode, described in detection
Whether the button of information input equipment is triggered;When detecting that the button of described information input equipment is triggered, acquisition is triggered
The second key assignments for generating of button, obtain information input equipment side security key;It is close safely using described information input equipment side
Second key assignments is encrypted in key, obtains the second key assignments ciphertext;Call the second communication interface that operation requests are sent to cloud
Server, the operation requests include the second key assignments ciphertext;The Cloud Server, for receiving described information input equipment
The operation requests sent;Obtain Cloud Server corresponding with described information input equipment side security key;Use the cloud
Server side security key is decrypted the second key assignments ciphertext to obtain second key assignments;Determine second key-value pair
The KeyEvent answered;The KeyEvent is executed, KeyEvent execution result information is obtained;Use Cloud Server side safety
KeyEvent execution result information described in key pair is encrypted to obtain KeyEvent execution result information ciphertext;And it will operation
Response is sent to described information input equipment, and the operation response includes the KeyEvent execution result information ciphertext;It is described
The safety chip of information input equipment is additionally operable to detect whether second communication interface receives what the Cloud Server was sent
The operation response;When receiving the operation response that the Cloud Server is sent, pacified using described information input equipment side
KeyEvent execution result information ciphertext is decrypted to obtain the KeyEvent execution result information described in full key pair;According to
The KeyEvent execution result information determines information to be displayed, and control display screen shows the information to be displayed.
In addition, the safety chip of described information input equipment, is additionally operable under the encryption mode, the first communication of detection connects
Whether mouth receives the instruction of host computer transmission, is detecting that first communication interface receives the finger that the host computer is sent
When enabling, judge whether described instruction is second mode switching command, is judging described instruction for the second mode switching command
When, control described information input equipment switches to general mode;Alternatively, the safety chip of described information input equipment, is additionally operable to
Under the encryption mode, whether the button of detection described information input equipment is triggered, and is set detecting that described information inputs
When standby button is triggered, the key assignments that the button being triggered generates is obtained, the key assignments that the button being triggered described in judgement generates is
No is third key assignments, and when the key assignments that the button that is triggered described in judging generates is the third key assignments, it is defeated to control described information
Enter equipment and switches to general mode.
In addition, the safety chip of described information input equipment, specifically for obtaining the button being triggered in the following way
The second key assignments generated:The key assignment combination that acquisition while the multiple buttons pressed generate;Alternatively, obtaining the single button production pressed
Raw single key assignments.
As seen from the above technical solution provided by the invention, the present invention provides a kind of for information input equipment
Information input encryption method and system carry out button detection by the safety chip of information input equipment, improve button detection
Safety, and it can all be sent to Cloud Server after encryption by all buttons that information input equipment triggers, by Cloud Server
Execution is triggered the corresponding KeyEvent of button, and is back to information input after KeyEvent execution result information is encrypted and sets
It is standby, due to triggering button generate key assignments and KeyEvent execution result information be encrypted transmission, improve key assignments with
And the safety of KeyEvent execution result information transmission.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment
Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this
For the those of ordinary skill in field, without creative efforts, other are can also be obtained according to these attached drawings
Attached drawing.
Fig. 1 is the flow chart for the information input encryption method for information input equipment that the embodiment of the present invention 1 provides;
Fig. 2 is the structural representation for the information input encryption system for information input equipment that the embodiment of the present invention 1 provides
Figure.
Specific implementation mode
With reference to the attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on this
The embodiment of invention, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, belongs to protection scope of the present invention.
In the description of the present invention, it is to be understood that, term "center", " longitudinal direction ", " transverse direction ", "upper", "lower",
The orientation or positional relationship of the instructions such as "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outside" is
It is based on the orientation or positional relationship shown in the drawings, is merely for convenience of description of the present invention and simplification of the description, rather than instruction or dark
Show that signified device or element must have a particular orientation, with specific azimuth configuration and operation, therefore should not be understood as pair
The limitation of the present invention.In addition, term " first ", " second " are used for description purposes only, it is not understood to indicate or imply opposite
Importance or quantity or position.
In the description of the present invention, it should be noted that unless otherwise clearly defined and limited, term " installation ", " phase
Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can
Can also be electrical connection to be mechanical connection;It can be directly connected, can also indirectly connected through an intermediary, Ke Yishi
Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition
Concrete meaning in invention.
The embodiment of the present invention is described in further detail below in conjunction with attached drawing.
Embodiment 1
The present embodiment provides a kind of information input encryption methods for information input equipment, as shown in Figure 1, including as follows
Step:
101, in the normal mode, whether safety chip the first communication interface of detection of information input equipment receives upper
The instruction that machine is sent judges the finger when detecting that first communication interface receives the instruction that the host computer is sent
Whether order is first mode switching command, when judging described instruction for the first mode switching command, controls described information
Input equipment switches to encryption mode;Alternatively, in the normal mode, the safety chip detection described information of information input equipment is defeated
Whether the button for entering equipment is triggered, when detecting that the button of described information input equipment is triggered, obtain be triggered by
The key assignments that key generates, whether the key assignments that the button being triggered described in judgement generates is the first key assignments, is triggered described in judgement
When the key assignments that button generates is the first key assignments, control described information input equipment switches to encryption mode;
As the optional realization structure of information input equipment of the present invention, may include:(1) keyboard of new structure is manufactured,
Button, display screen and the communication interface etc. of common keyboard are set on the keyboard case, it is internal that safety chip is set;(2) exist
Be arranged in common keyboard connect with safety chip interface (interface can be using existing interface, such as USB interface etc.,
Interface can be separately provided), in safety equipment, (safety equipment independent can be set separately as one for safety chip setting
It is standby) in, safety equipment is connected with common keyboard by interface, constitutes the information input equipment of the present invention, wherein on safety equipment
The structures such as display screen can be set or the interface etc. being connected with display screen is set.
In the present embodiment, difference lies in the information input equipment in the application is equipped with safe core with existing common keyboard
Piece, there are two types of operating modes for information input equipment tool:General mode and encryption mode, wherein general mode and existing keyboard
Operating mode it is similar, after information input equipment switches to the general mode, information input equipment is to passing through the information input
The information of equipment input will not carry out any safe handling;Encryption mode is a kind of encryption mode of information input equipment, is being believed
After breath input equipment switches to the encryption mode, information input equipment will carry out the information inputted by the information input equipment
Information after safe handling is sent to Cloud Server by safe handling, such as encryption again later, after carrying out
Continuous processing.
In the present embodiment, on the basis of existing common keyboard, invention increases safety chip, display screen and communications to connect
Mouth waits to realize corresponding function.The safety chip being arranged on information input equipment meets national Password Management Ju Deng Ministries of State Security
Door requirement, preset instruction can only be executed, therefore, which can not be held as a hostage, it is ensured that its execute operation and
Control to equipment is the expression of true intention.
A kind of optional realization method of the present embodiment, information input equipment are connect by the first communication interface with host computer,
The host computer can be the terminals such as computer, mobile phone, which can be wired communication interface or wireless communication
Interface, wired communication interface are, for example, the keyboard interfaces such as PS/2 interfaces, USB interface, wireless communication interface be, for example, bluetooth,
The wireless communication interfaces such as WiFi, NFC.
This step 101 describes two kinds of realization methods that information input equipment switches to encryption mode from general mode:
A kind of mode is that host computer sends first mode switching command to information input equipment, and information input equipment passes through the
One communication interface receives the first mode switching command, switches to encryption mode;Such as:It needs to input during network bank business
When PIN code, information input equipment is controlled by the Internetbank client in host computer and is switched to encryption mode progress PIN code input;
Alternatively, in the compiling procedure of privacy enhanced mail, it is switched to and is added by the Mail Clients control information input equipment in host computer
Close pattern carries out writing for Mail Contents.
Another way is equipped with the switch key for realizing pattern switching for information input equipment, and user presses the switching
Triggering information input equipment is generated the first key assignments, when which detects first key assignments, from general mode by key
Switch to encryption mode.Such as:When needing to input PIN code during network bank business, trigger default in information input equipment
Button enters information into equipment and is switched to encryption mode progress PIN code input from general mode;Alternatively, writing in privacy enhanced mail
In the process, the programmable button in triggering information input equipment enters information into equipment and is switched to encryption mode progress from general mode
Mail Contents are write.
In a kind of optional realization method of the present embodiment, information input equipment switches to general mode from encryption mode can be with
It is realized using following:
Under the encryption mode, the safety chip of described information input equipment detects whether the first communication interface receives
The instruction that host computer is sent judges institute when detecting that first communication interface receives the instruction that the host computer is sent
State whether instruction is second mode switching command, when judging described instruction for the second mode switching command, described in control
Information input equipment switches to general mode;Alternatively, under the encryption mode, the safety chip of described information input equipment is examined
Whether the button for surveying described information input equipment is triggered, and when detecting that the button of described information input equipment is triggered, obtains
The key assignments for the button generation being triggered is taken, whether the key assignments that the button being triggered described in judgement generates is third key assignments, is being judged
When the key assignments that the button being triggered generates is the third key assignments, control described information input equipment switches to common mould
Formula.
As it can be seen that information input equipment switches to general mode from encryption mode can also use two kinds of realization methods:It is a kind of
Mode is that host computer sends second mode switching command to information input equipment, and information input equipment is connect by the first communication interface
The second mode switching command is received, general mode is switched to;Another way is that information input equipment is equipped with for realizing mould
The switch key of formula switching, user press the switch key, and triggering information input equipment is generated third key assignments, the information input equipment
When detecting the third key assignments, general mode is switched to from encryption mode.
When practical application, a button realization general mode and encryption may be used for realizing the switch key of pattern switching
Toggling between pattern generates the first key assignments (or third key assignments, at this time the first key assignments that is, when the switch key is triggered
It is identical with third key assignments), from a pattern switching in general mode and encryption mode to another pattern.Certainly, it is used for real
The switch key of existing pattern switching can also use two buttons to realize, a button is triggered to generate the first key assignments, for real
Encryption mode now is switched to from general mode, another button is triggered to generate third key assignments, for realizing from encryption mode
Switch to general mode.
Specifically which kind of mode to realize that the switching between general mode and encryption mode can be according to the need of practical application using
It asks and is set, do not limited herein.
In the present embodiment, the button of information input equipment can be physical button, certainly, if key board supports touch screen
When, the button of the information input equipment may be virtual key, not limit herein.It is understood that if button is object
Manage button form, then it refers to that the button is pressed that the button described in the present embodiment, which is triggered, if button is virtual key form,
It refers to that the button is clicked that then the button described in the present embodiment, which is triggered,.
102, in an encrypted mode, the button of the safety chip detection described information input equipment of described information input equipment
Whether it is triggered;When the safety chip of described information input equipment detects that the button of described information input equipment is triggered, obtain
The second key assignments for taking the button being triggered to generate;The safety chip of described information input equipment obtains information input equipment side safety
Key;The safety chip of described information input equipment using described information input equipment side security key to second key assignments into
Row encryption, obtains the second key assignments ciphertext;
In the present embodiment, after information input equipment enters encryption mode, on information input equipment all buttons whether by by
Under be detected by the safety chip of information input equipment, since the security level of safety chip is higher, be not easy by illegal program
Manipulation, compared with easily being controlled by illegal programs such as wooden horse, viruses when existing common keyboard detects button, the present embodiment is by safe core
Piece, which executes button detection, can improve the safety of button detection.
When practical application, the button that is triggered can be that multiple buttons may be single button, i.e. the second key assignments can be with
For the combination of a key assignments or multiple key assignments, thus, the second key assignments that the button being triggered generates is obtained in this step can be with
It realizes in the following way:The key assignment combination that acquisition while the multiple buttons pressed generate;Alternatively, obtaining the single button pressed
The single key assignments generated.For example, when practical application, different operations needs to realize by triggering different buttons, for example, input
When word, single button can be triggered successively;When deleting file, single delete key can be triggered;File is carried out
When preservation, the combination button of ctrl+c can be triggered.
In the present embodiment, which can be stored in advance in information input equipment, alternatively,
It is obtained after carrying out key agreement with Cloud Server by information input equipment.Wherein, information input equipment carries out close with Cloud Server
The process that key is negotiated is referred to the realization of existing key agreement, and details are not described herein.
The realization that information input equipment side security key is obtained in this step can be obtained in advance in information input equipment
The information input equipment side security key deposited, or can also be to be obtained after information input equipment carries out key agreement with Cloud Server
It obtains.
In the present embodiment, which can be stored in the safety chip of information input equipment, to ensure that safety is close
The safety of key storage.
In the present embodiment, after information input equipment enters encryption mode, when safety chip detects that any button is triggered,
The key assignments use information input equipment side security key that will be all generated to the button being triggered is sent to after being encrypted
Cloud Server ensures that the key assignments is not leaked in transmission process, to improve safety of the key assignments in transmission process.
103, the safety chip of described information input equipment calls the second communication interface that operation requests are sent to cloud service
Device, the operation requests include the second key assignments ciphertext;
In a kind of optional realization method of the present embodiment, the second communication interface can be with network communication interface, the network communication
Interface can be wired network mouth, or can also be the wireless network interface of such as WiFi;At this point, the information input equipment asks operation
It asks and is sent to being embodied as Cloud Server:Directly operation is asked by the second communication interface by the safety chip of information input equipment
It asks and is sent to Cloud Server;
In the optional realization method of another kind of the present embodiment, the second communication interface can be same connect with the first communication interface
Mouthful, at this point, operation requests are sent to being embodied as Cloud Server by the information input equipment:The safety chip of information input equipment
Operation requests are sent to host computer by the second communication interface, then Cloud Server is forwarded to by host computer.
104, the operation requests that the cloud server described information input equipment is sent;The Cloud Server obtains
Take Cloud Server corresponding with described information input equipment side security key;The Cloud Server is pacified using the Cloud Server side
The second key assignments ciphertext is decrypted to obtain second key assignments described in full key pair;The Cloud Server determines second key assignments
Corresponding KeyEvent;The Cloud Server executes the KeyEvent, KeyEvent execution result information is obtained, using described
Cloud Server side security key is encrypted to obtain KeyEvent execution result information to the KeyEvent execution result information
Ciphertext;
In the present embodiment, Cloud Server side can be stored with the corresponding cloud service of one or more information input equipments
Device side security key first obtains and sends the information input equipment pair of the operation requests after Cloud Server receives operation requests
The Cloud Server side security key answered, correctly to be decrypted to the ciphertext carried in operation requests.
In the present embodiment, Cloud Server side security key can be stored in advance in Cloud Server, alternatively, by Cloud Server
It is obtained after carrying out key agreement with information input equipment.
In this step, Cloud Server obtains the realization of Cloud Server corresponding with information input equipment side security key such as
Under:Cloud Server is searched and hair in the corresponding Cloud Server side security key of multiple information input equipments being locally stored
Give the information input equipment of the operation requests corresponding Cloud Server side security key;Or it can also be from Cloud Server and information
Input equipment obtains Cloud Server side security key after carrying out key agreement.
In the present embodiment, the ciphertext that information input equipment use information input equipment side secure key encryption obtains is sent to
Cloud Server, Cloud Server can be decrypted using Cloud Server side security key to show that similarly, Cloud Server makes in plain text
The ciphertext obtained with Cloud Server side secure key encryption is sent to information input equipment, and information input equipment can also use letter
Breath input equipment side security key is decrypted to obtain in plain text.
In the present embodiment, Cloud Server side security key can be a pair of symmetrical close with information input equipment side security key
Key, or may be a pair of of unsymmetrical key.
In the present embodiment, information input equipment side will not storage file processing will not be executed to file, information input is set
After the button that standby safety chip detection is triggered, cloud service will be sent to after the corresponding key assignments encryption of the button being triggered
Device, Cloud Server are stored with file, and the key assignments that cloud server is sent from information input equipment is determined according to key assignments and corresponded to
KeyEvent, and corresponding file process is executed to file according to KeyEvent, for example, file is established, word input, modification,
The processing such as deletion, later, by treated, document information is back to information input equipment as KeyEvent execution result information
It is shown.
105, operation response is sent to described information input equipment by the Cloud Server, and the operation response includes described
KeyEvent execution result information ciphertext;
In the present embodiment, the realization that operation response is sent to described information input equipment by Cloud Server is as follows:Cloud service
Operation response is sent to information input equipment by device by host computer, or in second communication interface is radio network interface
When, operation response is directly sent to the second communication interface of information input equipment by radio network interface by Cloud Server, or
When second communication interface is wired network interface, Cloud Server is directly sent operation response by wired network interface person
To the second communication interface of information input equipment.
106, the safety chip of described information input equipment detects whether second communication interface receives the cloud clothes
The operation response that business device is sent;The safety chip of described information input equipment receives the described of the Cloud Server transmission
When operation response, the KeyEvent execution result information ciphertext is solved using described information input equipment side security key
It is close to obtain the KeyEvent execution result information;
In the present embodiment, KeyEvent execution result information is used by Cloud Server after the secure key encryption of Cloud Server side
Transmission, though by illegally intercepting and capturing, also due to information input equipment side security key can not be obtained and can not successful decryption, ensure
The safety of KeyEvent execution result information transmission.
107, the safety chip of described information input equipment determines to be shown according to the KeyEvent execution result information
Information, and control display screen shows the information to be displayed.
In the present embodiment, the display screen can be integrated in described information input equipment, as information input equipment
A part.Certainly, the display screen can also be the independent display screen with except information input equipment, which can pass through
Either wireless interface (such as WiFi or blue tooth interface etc.) is connected wireline interface (such as HDMI interface) with information input equipment
It connects, this is not restricted.
In the present embodiment, safety chip determines the realization of information to be displayed such as according to the KeyEvent execution result information
Under:Full content in KeyEvent execution result information can be determined as information to be displayed by safety chip, can also be according to pre-
If display rule, determine that partial content is information to be displayed from KeyEvent execution result information, or can also be in keyboard
All or part of content is chosen in event execution result information and generates information to be displayed after setting display format.
In the present embodiment, button detection is carried out by the safety chip of information input equipment, improves the safety of button detection
Property, and it can all be sent to Cloud Server after encryption by all buttons that information input equipment triggers, it is executed by Cloud Server
The corresponding KeyEvent of the button that is triggered, and it is back to information input equipment after KeyEvent execution result information is encrypted, by
The key assignments and KeyEvent execution result information generated in the button of triggering is encrypted transmission, improves key assignments and keyboard
The safety of event execution result information transmission;
And the corresponding KeyEvent of the button that is triggered is executed by Cloud Server side, thus information input equipment can be not required to
The execution of KeyEvent could be completed by being connected to some display terminal or host, need to be connected to master with existing common keyboard
Machine is compared with the execution for completing KeyEvent, and the information input equipment in the present embodiment can be used independently as a terminal,
After information input equipment receives the KeyEvent execution result information that Cloud Server returns, safety chip determines information to be displayed,
And display is completed on the display screen of information input equipment.
The present embodiment also provides one kind and being used for cloud mode encryption system, for executing the above-mentioned letter for information input equipment
Breath input encryption method, as shown in Fig. 2, this method includes:Information input equipment 21 equipped with safety chip and Cloud Server 22;
The safety chip of described information input equipment 21, in the normal mode, whether the first communication interface of detection to connect
The instruction for receiving host computer transmission is sentenced when detecting that first communication interface receives the instruction that the host computer is sent
Whether disconnected described instruction is first mode switching command, when judging described instruction for the first mode switching command, control
Described information input equipment 21 switches to encryption mode;Alternatively, in the normal mode, detection described information input equipment 21
Button whether be triggered, when detecting that the button of described information input equipment 21 is triggered, obtain be triggered button production
Raw key assignments, whether the key assignments that the button being triggered described in judgement generates is the first key assignments, the button being triggered described in judgement
When the key assignments of generation is the first key assignments, control described information input equipment 21 switches to encryption mode;And in an encrypted mode,
Whether the button of detection described information input equipment 21 is triggered;Detect that the button of described information input equipment 21 is triggered
When, the second key assignments that the button being triggered generates is obtained, 21 side security key of information input equipment is obtained;It is defeated using described information
Enter 21 side security key of equipment second key assignments is encrypted, obtains the second key assignments ciphertext;Call the second communication interface will
Operation requests are sent to Cloud Server, and the operation requests include the second key assignments ciphertext;
The Cloud Server 22, the operation requests for receiving the transmission of described information input equipment 21;Acquisition and institute
State 21 corresponding Cloud Server side security key of information input equipment;Using Cloud Server side security key to described second
Key assignments ciphertext is decrypted to obtain second key assignments;Determine the corresponding KeyEvent of second key assignments;Execute the keyboard
Event obtains KeyEvent execution result information;Knot is executed to the KeyEvent using Cloud Server side security key
Fruit information is encrypted to obtain KeyEvent execution result information ciphertext;And operation response is sent to described information input and is set
Standby 21, the operation response includes the KeyEvent execution result information ciphertext;
The safety chip of described information input equipment 21, be additionally operable to detect second communication interface whether receive it is described
The operation response that Cloud Server is sent;When receiving the operation response that the Cloud Server is sent, the letter is used
Breath 21 side security key of input equipment is decrypted to obtain the KeyEvent to the KeyEvent execution result information ciphertext
Execution result information;Information to be displayed is determined according to the KeyEvent execution result information, and described in control display screen shows
Information to be displayed.
In the present embodiment, difference lies in the information input equipment in the application is equipped with safe core with existing common keyboard
Piece, there are two types of operating modes for information input equipment tool:General mode and encryption mode, wherein general mode and existing keyboard
Operating mode it is similar, after information input equipment switches to the general mode, information input equipment is to passing through the information input
The information of equipment input will not carry out any safe handling;Encryption mode is a kind of encryption mode of information input equipment, is being believed
After breath input equipment switches to the encryption mode, information input equipment will carry out the information inputted by the information input equipment
Information after safe handling is sent to Cloud Server by safe handling, such as encryption again later, after carrying out
Continuous processing.
In the present embodiment, on the basis of existing common keyboard, invention increases safety chip, display screen and communications to connect
Mouth waits to realize corresponding function.The safety chip being arranged on information input equipment meets national Password Management Ju Deng Ministries of State Security
Door requirement, preset instruction can only be executed, therefore, which can not be held as a hostage, it is ensured that its execute operation and
Control to equipment is the expression of true intention.
In the present embodiment, after information input equipment enters encryption mode, on information input equipment all buttons whether by by
Under be detected by the safety chip of information input equipment, since the security level of safety chip is higher, be not easy by illegal program
Manipulation, compared with easily being controlled by illegal programs such as wooden horse, viruses when existing common keyboard detects button, the present embodiment is by safe core
Piece, which executes button detection, can improve the safety of button detection.
A kind of optional realization method of the present embodiment after information input equipment enters encryption mode, can also be realized from adding
Close pattern switching returns general mode, at this point, the safety chip of described information input equipment 21, is additionally operable in the encryption mode
Under, whether the first communication interface of detection receives the instruction of host computer transmission, is detecting that first communication interface receives
When the instruction that the host computer is sent, judges whether described instruction is second mode switching command, judging described instruction for institute
When stating second mode switching command, control described information input equipment 21 switches to general mode;Alternatively, described information input is set
Standby 21 safety chip, is additionally operable under the encryption mode, and whether the button of detection described information input equipment 21 is triggered,
When detecting that the button of described information input equipment 21 is triggered, the key assignments that the button that is triggered generates is obtained, described in judgement
Whether the key assignments that the button that is triggered generates is third key assignments, and the key assignments that the button being triggered described in judging generates is described the
When three key assignments, control described information input equipment 21 switches to general mode.
A kind of optional realization method of the present embodiment, the button being triggered can be multiple buttons may be individually by
Key, i.e. the second key assignments can be the combination of a key assignments or multiple key assignments, thus, the button production being triggered is obtained in this system
The second raw key assignments may be used under type such as and realize:The key assignment combination that acquisition while the multiple buttons pressed generate;Alternatively, obtaining
The single key assignments for taking the single button pressed to generate.For example, when practical application, different operations is needed by triggering different press
Key is realized, for example, when input word, can trigger single button successively;When deleting file, single delete can be triggered
Except key;When being preserved to file, the combination button of ctrl+c can be triggered.At this point, the safety of described information input equipment 21
Chip, the second key assignments generated specifically for obtaining the button being triggered in the following way:Obtain at the same press it is multiple by
The key assignment combination that key generates;Alternatively, obtaining the single key assignments that the single button pressed generates.
In the present embodiment, button detection is carried out by the safety chip of information input equipment, improves the safety of button detection
Property, and it can all be sent to Cloud Server after encryption by all buttons that information input equipment triggers, it is executed by Cloud Server
The corresponding KeyEvent of the button that is triggered, and it is back to information input equipment after KeyEvent execution result information is encrypted, by
The key assignments and KeyEvent execution result information generated in the button of triggering is encrypted transmission, improves key assignments and keyboard
The safety of event execution result information transmission;
And the corresponding KeyEvent of the button that is triggered is executed by Cloud Server side, thus information input equipment can be not required to
The execution of KeyEvent could be completed by being connected to some display terminal or host, need to be connected to master with existing common keyboard
Machine is compared with the execution for completing KeyEvent, and the information input equipment in the present embodiment can be used independently as a terminal,
After information input equipment receives the KeyEvent execution result information that Cloud Server returns, safety chip determines information to be displayed,
And display is completed on the display screen of information input equipment.
The function of modules is realized referring also to above-mentioned cloud encryption method in cloud encryption system provided in this embodiment
In input equipment and Cloud Server for information about associated description, details are not described herein.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes
It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion
Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable
Sequence, include according to involved function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
It should be appreciated that each section of the present invention can be realized with hardware, software, firmware or combination thereof.Above-mentioned
In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be executed with storage
Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware
Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal
Discrete logic, with suitable combinational logic gate circuit application-specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries
Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium
In matter, which includes the steps that one or a combination set of embodiment of the method when being executed.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, it can also
That each unit physically exists alone, can also two or more units be integrated in a module.Above-mentioned integrated mould
The form that hardware had both may be used in block is realized, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized in the form of software function module and when sold or used as an independent product, can also be stored in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any
One or more embodiments or example in can be combined in any suitable manner.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example
Property, it is not considered as limiting the invention, those skilled in the art are not departing from the principle of the present invention and objective
In the case of can make changes, modifications, alterations, and variations to the above described embodiments within the scope of the invention.The scope of the present invention
By appended claims and its equivalent limit.
Claims (6)
1. a kind of information input encryption method for information input equipment, which is characterized in that including:
In the normal mode, the safety chip of information input equipment detects whether the first communication interface receives host computer transmission
Instruction, when detecting that first communication interface receives the instruction that the host computer is sent, judge described instruction whether be
First mode switching command controls described information input equipment when judging described instruction for the first mode switching command
Switch to encryption mode;Alternatively, in the normal mode, the safety chip detection described information input equipment of information input equipment
Whether button is triggered, and when detecting that the button of described information input equipment is triggered, obtains what the button being triggered generated
Key assignments, whether the key assignments that the button being triggered described in judgement generates is the first key assignments, and the button being triggered described in judgement generates
Key assignments be the first key assignments when, control described information input equipment switch to encryption mode;
In an encrypted mode, whether the button of the safety chip detection described information input equipment of described information input equipment is touched
Hair;
When the safety chip of described information input equipment detects that the button of described information input equipment is triggered, acquisition is triggered
The second key assignments for generating of button, obtain information input equipment side security key;
The safety chip of described information input equipment using described information input equipment side security key to second key assignments into
Row encryption, obtains the second key assignments ciphertext;
The safety chip of described information input equipment calls the second communication interface that operation requests are sent to Cloud Server, the behaviour
It includes the second key assignments ciphertext to make request;
The operation requests that the cloud server described information input equipment is sent;
The Cloud Server obtains Cloud Server corresponding with described information input equipment side security key;
The Cloud Server is decrypted to obtain described using Cloud Server side security key to the second key assignments ciphertext
Second key assignments;
The Cloud Server determines the corresponding KeyEvent of second key assignments;
The Cloud Server executes the KeyEvent, obtains KeyEvent execution result information;
The Cloud Server is encrypted the KeyEvent execution result information using Cloud Server side security key
Obtain KeyEvent execution result information ciphertext;
Operation response is sent to described information input equipment by the Cloud Server, and the operation response includes the KeyEvent
Execution result information ciphertext;
The safety chip of described information input equipment detects whether second communication interface receives the Cloud Server transmission
The operation response;
When the safety chip of described information input equipment receives the operation response that the Cloud Server is sent, using described
Information input equipment side security key is decrypted to obtain the KeyEvent to the KeyEvent execution result information ciphertext
Execution result information;
The safety chip of described information input equipment determines information to be displayed according to the KeyEvent execution result information, and controls
Display screen processed shows the information to be displayed.
2. according to the method described in claim 1, it is characterized in that, further including:
Under the encryption mode, the safety chip of described information input equipment detect the first communication interface whether receive it is upper
The instruction that machine is sent judges the finger when detecting that first communication interface receives the instruction that the host computer is sent
Whether order is second mode switching command, when judging described instruction for the second mode switching command, controls described information
Input equipment switches to general mode;Alternatively, under the encryption mode, the safety chip of described information input equipment detects institute
Whether the button for stating information input equipment is triggered, and when detecting that the button of described information input equipment is triggered, obtains quilt
The key assignments that the button of triggering generates, whether the key assignments that the button being triggered described in judgement generates is third key assignments, described in judgement
When the key assignments that the button being triggered generates is the third key assignments, control described information input equipment switches to general mode.
3. method according to claim 1 or 2, which is characterized in that the key assignments that the button being triggered generates is obtained, it is specific to wrap
It includes:
The key assignment combination that acquisition while the multiple buttons pressed generate;
Alternatively, obtaining the single key assignments that the single button pressed generates.
4. a kind of cloud mode encryption system, which is characterized in that including:Information input equipment equipped with safety chip and cloud service
Device;
The safety chip of described information input equipment, in the normal mode, whether the first communication interface of detection to receive
The instruction that position machine is sent, when detecting that first communication interface receives the instruction that the host computer is sent, described in judgement
Whether instruction is first mode switching command, when judging described instruction for the first mode switching command, controls the letter
Breath input equipment switches to encryption mode;Alternatively, in the normal mode, whether the button of detection described information input equipment
It is triggered, when detecting that the button of described information input equipment is triggered, obtains the key assignments that the button being triggered generates, judge
Whether the key assignments that the button that is triggered generates is the first key assignments, and the key assignments that the button being triggered described in judging generates is the
When one key assignments, control described information input equipment switches to encryption mode;And in an encrypted mode, detection described information input
Whether the button of equipment is triggered;When detecting that the button of described information input equipment is triggered, the button production being triggered is obtained
The second raw key assignments obtains information input equipment side security key;Using described information input equipment side security key to described
Second key assignments is encrypted, and obtains the second key assignments ciphertext;Call the second communication interface that operation requests are sent to Cloud Server, institute
It includes the second key assignments ciphertext to state operation requests;
The Cloud Server, the operation requests for receiving the transmission of described information input equipment;It obtains defeated with described information
Enter the corresponding Cloud Server side security key of equipment;Using Cloud Server side security key to the second key assignments ciphertext into
Row decryption obtains second key assignments;Determine the corresponding KeyEvent of second key assignments;The KeyEvent is executed, key is obtained
Disk event execution result information;The KeyEvent execution result information is added using Cloud Server side security key
It is close to obtain KeyEvent execution result information ciphertext;And operation response is sent to described information input equipment, the operation
Response includes the KeyEvent execution result information ciphertext;
The safety chip of described information input equipment is additionally operable to detect whether second communication interface receives the cloud service
The operation response that device is sent;When receiving the operation response that the Cloud Server is sent, inputted using described information
Equipment side security key is decrypted the KeyEvent execution result information ciphertext to obtain the KeyEvent implementing result
Information;Information to be displayed is determined according to the KeyEvent execution result information, and control display screen shows the letter to be shown
Breath.
5. system according to claim 4, which is characterized in that
The safety chip of described information input equipment is additionally operable under the encryption mode, and whether the first communication interface of detection connects
The instruction for receiving host computer transmission is sentenced when detecting that first communication interface receives the instruction that the host computer is sent
Whether disconnected described instruction is second mode switching command, when judging described instruction for the second mode switching command, control
Described information input equipment switches to general mode;Alternatively,
The safety chip of described information input equipment is additionally operable under the encryption mode, detection described information input equipment
Whether button is triggered, and when detecting that the button of described information input equipment is triggered, obtains what the button being triggered generated
Key assignments, whether the key assignments that the button being triggered described in judgement generates is third key assignments, and the button being triggered described in judgement generates
Key assignments be the third key assignments when, control described information input equipment switch to general mode.
6. system according to claim 4 or 5, which is characterized in that the safety chip of described information input equipment, it is specific to use
In the second key assignments for obtaining the button generation being triggered in the following way:The key assignments that acquisition while the multiple buttons pressed generate
Combination;Alternatively, obtaining the single key assignments that the single button pressed generates.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711463018.5A CN108334794B (en) | 2017-12-28 | 2017-12-28 | Information input encryption method and system for information input equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711463018.5A CN108334794B (en) | 2017-12-28 | 2017-12-28 | Information input encryption method and system for information input equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108334794A true CN108334794A (en) | 2018-07-27 |
CN108334794B CN108334794B (en) | 2021-10-22 |
Family
ID=62924665
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711463018.5A Active CN108334794B (en) | 2017-12-28 | 2017-12-28 | Information input encryption method and system for information input equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108334794B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109117678A (en) * | 2018-08-10 | 2019-01-01 | 天地融科技股份有限公司 | A kind of information transferring method and system |
CN109344608A (en) * | 2018-08-10 | 2019-02-15 | 天地融科技股份有限公司 | A kind of information transferring method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101236591A (en) * | 2007-01-31 | 2008-08-06 | 联想(北京)有限公司 | Method, terminal and safe chip for guaranteeing critical data safety |
CN103036681A (en) * | 2012-12-13 | 2013-04-10 | 中国工商银行股份有限公司 | Password safety keyboard device and system |
CN202978979U (en) * | 2012-12-13 | 2013-06-05 | 中国工商银行股份有限公司 | Password security keypad device and password security pad system |
CN107358094A (en) * | 2017-07-10 | 2017-11-17 | 广东天波信息技术股份有限公司 | The password input system and method for smart machine |
-
2017
- 2017-12-28 CN CN201711463018.5A patent/CN108334794B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101236591A (en) * | 2007-01-31 | 2008-08-06 | 联想(北京)有限公司 | Method, terminal and safe chip for guaranteeing critical data safety |
CN103036681A (en) * | 2012-12-13 | 2013-04-10 | 中国工商银行股份有限公司 | Password safety keyboard device and system |
CN202978979U (en) * | 2012-12-13 | 2013-06-05 | 中国工商银行股份有限公司 | Password security keypad device and password security pad system |
CN107358094A (en) * | 2017-07-10 | 2017-11-17 | 广东天波信息技术股份有限公司 | The password input system and method for smart machine |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109117678A (en) * | 2018-08-10 | 2019-01-01 | 天地融科技股份有限公司 | A kind of information transferring method and system |
CN109344608A (en) * | 2018-08-10 | 2019-02-15 | 天地融科技股份有限公司 | A kind of information transferring method and system |
CN109344608B (en) * | 2018-08-10 | 2021-09-21 | 天地融科技股份有限公司 | Information transmission method and system |
Also Published As
Publication number | Publication date |
---|---|
CN108334794B (en) | 2021-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112596802B (en) | Information processing method and device | |
US20180241645A1 (en) | Providing Mobile Device Management Functionalities | |
EP3531662B1 (en) | Providing mobile device management functionalities | |
US9628448B2 (en) | User and device authentication in enterprise systems | |
US8910264B2 (en) | Providing mobile device management functionalities | |
EP2992698B1 (en) | Application with multiple operation modes | |
WO2017045417A1 (en) | Remote control method and apparatus and mobile terminal | |
US20160262196A1 (en) | Mobile Terminal Control Method, Apparatus And System | |
US8813179B1 (en) | Providing mobile device management functionalities | |
CN108319865B (en) | Privacy protection method based on multiple roles, storage medium and terminal equipment | |
CN111475832B (en) | Data management method and related device | |
CN108197501B (en) | Encryption method and device for input information of information input equipment and information input equipment | |
CN105325021B (en) | Method and apparatus for remote portable wireless device authentication | |
TWI680687B (en) | Communication method and device | |
CN106203174A (en) | Application information processing method and device and electronic equipment | |
CN108334794A (en) | A kind of information input encryption method and system for information input equipment | |
CN108566359A (en) | A kind of information input encryption method and system for information input equipment | |
CN106022095B (en) | A kind of safety device, method of controlling security and identity card card-reading terminal | |
CN106203081A (en) | A kind of safety protecting method and device | |
CN103971057A (en) | Implement method and system of trusted path of mobile communication intelligent terminal | |
Du Toit et al. | A model for secure mobile computing | |
CN106022033B (en) | A kind of method of controlling security, safety device and identity card card-reading terminal | |
WO2014026322A1 (en) | Method and device for sharing graphics information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |