CN108460299A - A kind of encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic - Google Patents
A kind of encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic Download PDFInfo
- Publication number
- CN108460299A CN108460299A CN201710089942.5A CN201710089942A CN108460299A CN 108460299 A CN108460299 A CN 108460299A CN 201710089942 A CN201710089942 A CN 201710089942A CN 108460299 A CN108460299 A CN 108460299A
- Authority
- CN
- China
- Prior art keywords
- keyboard
- code
- server
- ciphertext
- source document
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 20
- 238000004891 communication Methods 0.000 claims description 4
- 230000000717 retained effect Effects 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 abstract description 4
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000008450 motivation Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000012731 temporal analysis Methods 0.000 description 1
- 238000000700 time series analysis Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to security technology areas, especially a kind of encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic, encrypting keyboard system includes keyboard, encryption equipment, client and server-side, keyboard is for inputting keypad code, encryption equipment is for encrypting, client is used for login user system, and server-side is for decrypting and determining whether user can login custom system.The encryption equipment of the present invention is encrypted to obtain ciphertext based on asymmetric arithmetic to source document code, ciphertext is sent to server-side by encryption equipment, server-side decrypts and determines whether user can login custom system, the encryption equipment is a kind of general independent used encryption device, the input terminal of encryption equipment is connected by USB port or PS/2 mouthfuls with keyboard, the output end of encryption equipment and the client computer of client connect, common keyboard existing in this way can realize encrypting keyboard after being connect with client computer by encryption equipment, versatile.
Description
Technical field
The present invention relates to security technology area more particularly to a kind of encrypting keyboard system and keyboard encrypting methods.
Background technology
With the high speed development of electronic information technology, uses a network for merchandising or transmission file is more and more universal, in order to
The safety for ensureing password in process of exchange, needs that password is encrypted, prevents password from being intercepted and captured by trojan horse program.
In the prior art, user realizes client and user terminal usually using keyboard as instruction and data input unit
Between application program response instruction operation, client is corresponding with server-side, and client provides local service journey to the user
Sequence is typically mounted in common client computer, needs to work in coordination operation with server-side, and server-side provides service for client,
And user related information is stored, such as user account password etc., user when client login application program by needing by close
Code authentication, and user when keyboard input password by trojan horse program by can be recorded if client is encroached on by trojan horse
Come, threatens to account safety, thus it has been proposed that a kind of Encryption Keyboard, such as " CN201220386190.1 " number,
Referred to as the utility model patent of " Encryption Keyboard and the self-service device using the keyboard ", the Encryption Keyboard are close including being stored with first
The memory module of key;The detecting module whether detecting Encryption Keyboard is destroyed;Be connected to memory module and detecting module, detecing
Survey the first protection circuit that module detects the first key deleted when Encryption Keyboard is destroyed in memory module.Although above-mentioned add
Close keyboard can realize cryptoguard, but its manufacturing cost is high, poor universality, what computer itself must be equipped with by when use
Common keyboard replaces with this kind of Encryption Keyboard, and encryption efficiency is not high.
Invention content
The purpose of the present invention is overcoming the defect of Encryption Keyboard poor universality in the prior art, a kind of manufacturing cost is provided
Low and versatile encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic.
The technical solution adopted by the present invention to solve the technical problems is:
The present invention the encrypting keyboard system based on asymmetric arithmetic include:
Keyboard, for inputting keypad code;
Encryption equipment, for encrypting, the encryption equipment is based on Encryption Algorithm and source document code is encrypted to obtain ciphertext, described to add
The ciphertext is sent to server-side by close device;
Client is used for login user system;
Server-side, for decrypting, the server-side receives ciphertext and acquisition key is decrypted to ciphertext according to decipherment algorithm
The source document code of disk input, it is described when the source document code that the source document code that the server-side is decrypted is stored with server-side matches
Server authentication success, allows user's login user system.
The input terminal of encryption equipment of the present invention is connected by USB port or PS/2 mouthfuls with the keyboard, the encryption equipment
Output end is connected with the client, and the client is in communication with each other with the server-side by cable network or wireless network.
Keypad code and ciphertext are transferred to the client by encryption equipment of the present invention simultaneously, and the client sends out ciphertext
Give the server-side.
The present invention also provides a kind of keyboard encrypting methods based on asymmetric arithmetic, using above-mentioned based on asymmetric arithmetic
Encrypting keyboard system, include the following steps:
S01 write-in program algorithms:Server-side first generates public key (e, N) and private key (d, N) at random, and by public key (e, N)
Corresponding encipheror is sent to encryption equipment, while the corresponding decryption program of private key (d, N) is retained in server-side;
S02 is encrypted:Encryption equipment opens data receiver function and receives the single keypad code of keyboard input, to the single keyboard
Code is handled, i.e., the source document code being combined into continuing addition machine code, clock code, random code on single keypad code, encryption equipment
Ciphertext is obtained to source document code encryption according to encipheror, ciphertext is sent to server-side by encryption equipment;
S03 is decrypted:The server-side receives ciphertext and is decrypted to obtain source document code according to decryption program, and the server-side judges
Whether the source document code of decryption gained matches with the source document code that server-side stores, and user is allowed to login the use of client if matching
Family system.
The determination method of public key (e, N) of the present invention and private key (d, N) is N=p1*p2.....pn, n >=3,1≤i ≠
J≤n, piIt is prime number, e*d=1mod ((p1-1)*(p2-1)*......(pn-1))。
In encipheror of the present invention, the source document code is encrypted using the public key (e, N) and following formula,
Obtain the ciphertext:AeModN=B, wherein A indicates that the source document code, B indicate the ciphertext.
In decryption program of the present invention, the ciphertext is decrypted using private key (d, N) and following formula, obtains institute
State source document code:BdModN=A, wherein A indicates that the source document code, B indicate the ciphertext.
The advantageous effect of the encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic of the present invention is:
1. the encryption equipment of the present invention is encrypted source document code to obtain ciphertext based on asymmetric arithmetic, encryption equipment sends out ciphertext
Server-side is given, by server-side decrypted authentication, which is a kind of general independent used encryption device, encryption equipment
Input terminal be connected with keyboard by USB port or PS/2 mouthfuls, the client computer of the output end of encryption equipment and client connects, and shows in this way
Encrypting keyboard can be realized after having common keyboard to be connect with client computer by encryption equipment, without installation safety control in a client
Part is reequiped without to keyboard itself, therefore versatile;
2. the encryption equipment of the present invention can also be embedded in keyboard and use, the Encryption Keyboard of integral structure formula is formed with keyboard;
3. source document code and ciphertext can be transferred to client by the encryption equipment of the present invention simultaneously, can be as common keyboard
It uses;
4. the encryption equipment of the present invention is according to encrypted instruction, ciphertext is obtained using public key (e, N) encryption source document code, and to service
End send ciphertext, after server-side receives ciphertext, according to decryption instructions using private key (d, N) decrypt ciphertext, wherein parameter N by
At least three prime numbers are multiplied to obtain, N=p1*p2.....pn, n >=3, the relationship between parameter e and parameter d meets e*d=1mod
((p1-1)*(p2-1)*......(pn- 1)), pass through the smaller p of several numerical valueiMultiplication can obtain a larger ginseng
Number N, ensures encrypted safety, reduces the time for the N that gets parms before encrypting, improves encrypted efficiency.
Description of the drawings
The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.
Fig. 1 is the functional block diagram of the encrypting keyboard system based on asymmetric arithmetic of the present invention;
Fig. 2 is the keyboard encrypting method flow chart of the present invention.
Wherein:Keyboard 101, encryption equipment 102, client 103 and server-side 104.
Specific implementation mode
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects being described in detail in claims, of the invention.
As shown in Figure 1, the encrypting keyboard system based on asymmetric arithmetic of the present embodiment includes keyboard 101, encryption equipment
102, client 103 and server-side 104, wherein keyboard 101 includes but not limited to mechanical keys for inputting keypad code, keyboard 101
Disk, Plastic Diaphragm Type Servomotor keyboard, conductive rubber formula keyboard and contactless electrostatic capacitance keyboard, encryption equipment 102 obtain single keypad code
After can continue on the basis of keypad code add machine code, clock code, random code generate source document code.
For encrypting, encryption equipment 102 adds source document code based on rivest, shamir, adelman the encryption equipment 102 of the present embodiment
Close to obtain ciphertext, ciphertext is sent to server-side 104 by encryption equipment 102, which is a kind of general independent used
The input terminal of encryption device, encryption equipment 102 is connected by USB port or PS/2 mouthfuls with keyboard 101, the output end of encryption equipment 102 with
The client computer of client 103 connects, and client 103 can be in communication with each other with server-side 104 by cable network or wireless network,
Common keyboard 101 existing in this way can realize that keyboard 101 is encrypted after being connect with client computer by encryption equipment 102, without in visitor
Safe control is installed in the machine of family, is reequiped in itself without to keyboard 101, therefore versatile.
It is used it should be noted that the encryption equipment 102 of the present embodiment can also be embedded in keyboard 101, with the formation of keyboard 101
The Encryption Keyboard of integral structure formula, that is to say, that the keyboard for being embedded with the encryption equipment 102 of the present embodiment is also contained in the present invention's
In protection domain.
Keypad code and ciphertext can be transferred to client 103 by the encryption equipment 102 of the present embodiment simultaneously, installation encryption in this way
After device 102, keyboard 101 can still act as common keyboard use, and specifically, keyboard 101 sends keypad code to encryption equipment 102,
Keypad code directly can be sent to 103 real-time display of client, while 102 interim storage keypad code of encryption equipment by encryption equipment 102
And machine code is added, clock code and random code generate source document code, are then encrypted to obtain ciphertext, client 103 can will be close
It is given to server-side 104 in text, after the encryption equipment 102 of this sample embodiment is connected on keyboard 101, keyboard 101 can be as general
Logical keyboard equally uses.
The client 103 of the present embodiment is used for login user system, and client 103 is in common client computer using i.e.
Can, client 103 needs cipher authentication before login user system, and cipher authentication is not executed by client 103, but by
Long-range server-side 104 is judged, accordingly even when trojan horse program intercepts and captures source document code also directly can not enter use by client 103
Family system.
Server-side 104 can store user information after user succeeds in registration in custom system, such as account, password, a
The server-side 104 of people's authentication information etc., the present embodiment is used for decrypted authentication, and server-side 104 receives ciphertext and according to decipherment algorithm
Ciphertext is decrypted and obtains source document code, when server-side 104 decrypts the source document code phase that obtained source document code is stored with server-side 104
When matching, 104 certification of server-side success allows user's login user system, and otherwise server-side 104 sends prompt message to client
End 103, prompt cipher mistake.
Ciphertext can be sent to server-side 104 by the encryption equipment 102 in the present embodiment by client 103, can also be led to
It crosses wireless mode and ciphertext is directly sent to server-side 104, the embodiment of wireless transmission ciphertext, encryption equipment 102 is given below
Including shell and the integrated circuit board that is built in shell, encryption chip, wireless module and outer are integrated on integrated circuit board
Circuit is enclosed, wireless module can be WIFI module, 3G module or 4G modules, and WIFI module can be that news raise WM200 WIFI moulds
Block, ESP-12E serial ports WIFI module or ESP8266 serial ports WIFI modules, 3G module can be SL808X series 3G module, Q26
Serial sierra 3G modules or APTGT75TL60T 3G modules, 4G modules can be UI8300W 4G modules or L570 (TDD)
Encipheror is written in 4G modules, encryption chip, which is the encipheror based on asymmetric arithmetic, on integrated circuit board
Equipped with multiple interfaces, to realize that the connection with keyboard or other equipment, the concrete type of interface are not construed as limiting, such encryption equipment
102 can pass through wireless module and 104 direct communication of server-side, that is to say, that the encryption equipment 102 for being embedded with wireless module also wraps
Containing within the scope of the present invention.
As shown in Figs. 1-2, the application method of the above-mentioned encrypting keyboard system based on asymmetric arithmetic includes the following steps:
S01 write-in program algorithms:Server-side 104 first generates public key (e, N) and private key (d, N) at random, and by public key (e,
N) corresponding encipheror is sent to encryption equipment 102, while the corresponding decryption program of private key (d, N) is retained in server-side 104, public
The determination method of key (e, N) and private key (d, N) is N=p1*p2.....pn, n >=3, piIt is prime number, N is at least three prime number
Product, e*d=1mod ((p1-1)*(p2-1)*......(pn-1))。
S02 is encrypted:Encryption equipment 102 opens data receiver function and receives the single keypad code of the input of keyboard 101, to the list
A keypad code is handled, i.e., is combined into source document code to continuing addition machine code, clock code, random code on single keypad code, adds
Close device 102 obtains ciphertext according to encipheror to source document code encryption, and ciphertext is sent to server-side 104 by encryption equipment 102, encrypts journey
In sequence, source document code is encrypted using public key (e, N) and following formula, obtains ciphertext:AeModN=B, wherein A indicates source
Literary code, B indicate ciphertext.
S03 decrypted authentications:Server-side 104 receives ciphertext and is decrypted to obtain source document code according to decryption program, and server-side 104 is sentenced
Whether the source document code of disconnected decryption gained matches with the source document code that server-side 104 stores, and allows user to login client if matching
The custom system at end 103 in decryption program, is decrypted ciphertext using private key (d, N) and following formula, obtains source document code:
BdModN=A, wherein A indicate source document code, B indicate ciphertext, wherein server-side 104 decrypt detailed process be:Service termination
Ciphertext is received, then decrypts to obtain keypad code, machine code, clock code and random code in source document code according to private key decryption program, and
Field in the source document code is analyzed, clock code is compared with the clock code in the source document code received before, from
And judge whether the source document code received is the source document code sent in real time, the encryption to the machine code and server-side storage that receive
The machine code of device is compared, if the clock code and machine code in source document code all meet the requirements, by server-side decryption gained
The keypad code (password of typing when namely registering) that keypad code is stored with server-side is compared and judges whether to match, if
Match the custom system for then allowing user to login client;If any one of clock code or machine code in source document code are not met
It is required that then server-side sends out alarm signal.
In the specific implementation, since user is not aware that how parameter N obtains, only know the numerical value of parameter N, if
Want decryption ciphertext, then needs to carry out factorization to parameter N, can just obtain the private key (d, N) used when decryption, and to parameter
N progress factorization is relatively difficult, therefore ensure that the safety of ciphertext.
In addition, the secrecy timeliness due to ciphertext is time-consuming related with parameter N to decryption, parameter N is bigger, secrecy timeliness and decryption
Time is longer, in order to reinforce the safety of ciphertext, it will usually select the parameter N that numerical value is larger;When parameter N is two prime number a1With
a2Product when, to ensure parameter N it is very big, then need a1And a2Also very big, but the more difficult acquisition of the prodigious prime number of numerical value,
It needs to expend the more time when selection parameter before encryption, encrypted efficiency is affected;Parameter N in the present embodiment is
The product of at least three prime numbers, even if piNumerical value it is smaller, to enable parameter N numerical value need it is very big, it is only necessary to utilize several pi
Multiplication need not expend the more time when selection parameter before encryption, be conducive to improve encryption efficiency.
The encryption equipment 102 of the present embodiment is handled to obtain source document code and then be encrypted using public key (e, N) to keypad code
Server-side 104 is sent to after to ciphertext, server-side 104 decrypts ciphertext using private key (d, N) and obtains source document code, analyzing processing machine
It can get keypad code after code, clock code and random code, the safety that keypad code transmits ensure that in transmission process.In addition, by
In the user with bad motivation, such as hacker, it is not known that public key (e, N), even if having forged a string of characters to server-side 104,
Server-side 104 is decrypted using private key (d, N) also cannot get correct matched keypad code, therefore the mesh of authentication may be implemented
's.Even if trojan horse program intercepts and captures the keypad code that keyboard 101 inputs and is unable to get correct ciphertext since public key (e, N) is unknown,
It still can not can not login custom system by the certification of server-side 104, substantially increase safety.
The encryption equipment 102 of the present embodiment adds machine code, clock code, random code, main purpose on the basis of keypad code
It is to increase the difficulty cracked and make data and time and machine ID binding, there is uniqueness, refer to further according to encryption
It enables, after server-side 104 receives ciphertext, can also carry out Time-Series analysis to clock code in the source document code obtained after decryption, ensure to connect
The real-time and uniqueness of the data of receipts, the form that can not be sent by duplicate packet are obscured, each source document code
The clock code obtained after decryption only meet the requirements in the case of just can further by server-side 104 to client 103 into
Row data feedback.
It should be appreciated that specific embodiment described above is only used for explaining the present invention, it is not intended to limit the present invention.By
The obvious changes or variations that the spirit of the present invention is extended out are still in the protection scope of this invention.
Claims (7)
1. a kind of encrypting keyboard system based on asymmetric arithmetic, it is characterised in that:Including:
Keyboard (101), for inputting keypad code;
Encryption equipment (102), for encrypting, keypad code is generated source document code and is calculated based on asymmetric encryption by the encryption equipment (102)
Method is encrypted source document code to obtain ciphertext, and the ciphertext is sent to server-side (104) by the encryption equipment (102);
Client (103) is used for login user system;
Server-side (104), is used for decrypted authentication, and the server-side (104) receives ciphertext and carried out to ciphertext according to decipherment algorithm
Decryption obtains source document code, when the source document code phase that the source document code that the server-side (104) decryption obtains is stored with server-side (104)
Timing, server-side (104) the certification success, allows user to login custom system.
2. the encrypting keyboard system according to claim 1 based on asymmetric arithmetic, it is characterised in that:The encryption equipment
(102) input terminal is connected by USB port or PS/2 mouthfuls with the keyboard (101), the output end of the encryption equipment (102) and institute
It states client (103) to be connected, the client (103) and the server-side (104) are mutual by cable network or wireless network
Communication.
3. the encrypting keyboard system according to claim 1 based on asymmetric arithmetic, it is characterised in that:The encryption equipment
(102) while by keypad code and ciphertext it is transferred to the client (103), ciphertext is sent to described by the client (103)
Server-side (104).
4. a kind of keyboard encrypting method, special using the encrypting keyboard system as described in claim 1 based on asymmetric arithmetic
Sign is:Include the following steps:
S01 write-in program algorithms:Server-side (104) first generates public key (e, N) and private key (d, N) at random, and by public key (e, N)
Corresponding encipheror is sent to encryption equipment (102), while the corresponding decryption program of private key (d, N) is retained in server-side (104);
S02 is encrypted:The open data receiver function of encryption equipment (102) and the single keypad code for receiving keyboard (101) input, to the list
A keypad code is handled to obtain source document code, i.e., continues addition machine code, clock code, random code on single keypad code and be combined into
Source document code, encryption equipment (102) obtain ciphertext according to encipheror to source document code encryption, and ciphertext is sent to clothes by encryption equipment (102)
It is engaged in end (104);
S03 decrypted authentications:The server-side (104) receives ciphertext and is decrypted to obtain source document code, the service according to decryption program
End (104) judges whether the source document code of decryption gained matches with the source document code that server-side (104) stores, and allows to use if matching
The custom system of client (103) is logined at family.
5. keyboard encrypting method according to claim 4, it is characterised in that:The public key (e, N) and private key (d, N) are really
The method of determining is N=p1*p2.....pn, n >=3, piIt is prime number, e*d=1mod ((p1-1)*(p2-1)*......(pn-1))。
6. keyboard encrypting method according to claim 4, it is characterised in that:In the encipheror, the public key is utilized
The source document code is encrypted in (e, N) and following formula, obtains the ciphertext:AeMod N=B, wherein A indicates the source
Literary code, B indicate the ciphertext.
7. keyboard encrypting method according to claim 4, it is characterised in that:In the decryption program, utilize private key (d, N)
The ciphertext is decrypted with following formula, obtains the source document code:BdMod N=A, wherein A indicates the source document code,
B indicates the ciphertext.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710089942.5A CN108460299A (en) | 2017-02-20 | 2017-02-20 | A kind of encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710089942.5A CN108460299A (en) | 2017-02-20 | 2017-02-20 | A kind of encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108460299A true CN108460299A (en) | 2018-08-28 |
Family
ID=63221949
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710089942.5A Pending CN108460299A (en) | 2017-02-20 | 2017-02-20 | A kind of encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108460299A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109214147A (en) * | 2018-09-28 | 2019-01-15 | 内蒙古师范大学 | A kind of encryption system of accounting software |
CN110851800A (en) * | 2019-11-14 | 2020-02-28 | 苏州科达科技股份有限公司 | Code protection method, device, system and readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101043326A (en) * | 2006-03-22 | 2007-09-26 | 赵兴 | Dynamic information encrypting system and method |
CN101064595A (en) * | 2006-04-27 | 2007-10-31 | 联想(北京)有限公司 | Computer network safe input authentication system and method |
CN101236591A (en) * | 2007-01-31 | 2008-08-06 | 联想(北京)有限公司 | Method, terminal and safe chip for guaranteeing critical data safety |
WO2015017130A1 (en) * | 2013-07-28 | 2015-02-05 | Square, Inc. | Raw sensor input encryption for passcode entry security |
CN104618348A (en) * | 2015-01-12 | 2015-05-13 | 中国科学院信息工程研究所 | Method for resisting automatic programming batch illegalities |
-
2017
- 2017-02-20 CN CN201710089942.5A patent/CN108460299A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101043326A (en) * | 2006-03-22 | 2007-09-26 | 赵兴 | Dynamic information encrypting system and method |
CN101064595A (en) * | 2006-04-27 | 2007-10-31 | 联想(北京)有限公司 | Computer network safe input authentication system and method |
CN101236591A (en) * | 2007-01-31 | 2008-08-06 | 联想(北京)有限公司 | Method, terminal and safe chip for guaranteeing critical data safety |
WO2015017130A1 (en) * | 2013-07-28 | 2015-02-05 | Square, Inc. | Raw sensor input encryption for passcode entry security |
CN104618348A (en) * | 2015-01-12 | 2015-05-13 | 中国科学院信息工程研究所 | Method for resisting automatic programming batch illegalities |
Non-Patent Citations (1)
Title |
---|
戴莉 等: "关于网络会计安全问题的理性思考", 《当代经济》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109214147A (en) * | 2018-09-28 | 2019-01-15 | 内蒙古师范大学 | A kind of encryption system of accounting software |
CN110851800A (en) * | 2019-11-14 | 2020-02-28 | 苏州科达科技股份有限公司 | Code protection method, device, system and readable storage medium |
CN110851800B (en) * | 2019-11-14 | 2021-07-23 | 苏州科达科技股份有限公司 | Code protection method, device, system and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110995642B (en) | Providing secure connections using pre-shared keys | |
CN110460439A (en) | Information transferring method, device, client, server-side and storage medium | |
JP3676735B2 (en) | Method and apparatus for mutual authentication of two data processing units | |
US7366916B2 (en) | Method and apparatus for an encrypting keyboard | |
EP2188942A2 (en) | Information protection device | |
JP2008269610A (en) | Protecting sensitive data intended for remote application | |
US9154480B1 (en) | Challenge-response authentication of a cryptographic device | |
US20120124378A1 (en) | Method for personal identity authentication utilizing a personal cryptographic device | |
US20100005519A1 (en) | System and method for authenticating one-time virtual secret information | |
CN107548542B (en) | User authentication method with enhanced integrity and security | |
CN111008400A (en) | Data processing method, device and system | |
CN108460299A (en) | A kind of encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic | |
CN109510711B (en) | Network communication method, server, client and system | |
US20180063098A1 (en) | Vehicle Network Interface Tool | |
CN106972928B (en) | Bastion machine private key management method, device and system | |
US20230289424A1 (en) | Security Chip-Based Security Authentication Method and System, Security Chip, and Readable Storage Medium | |
EP4020875A1 (en) | Method, first server, second server, and system for transmitting securely a key | |
CN110098915B (en) | Authentication method and system, and terminal | |
EP3236631B1 (en) | Data checking device and data checking method using the same | |
CN101325492B (en) | Universal serial bus cipher lock based on programmable on-chip system | |
KR20210101304A (en) | communication module | |
WO2023138135A1 (en) | Man-machine identification method and device | |
US11799632B1 (en) | Optimized authentication system | |
US11856105B1 (en) | Secure multi-factor authentication system including identity verification of an authorized user | |
US11979501B2 (en) | Optimized access in a service environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180828 |
|
RJ01 | Rejection of invention patent application after publication |