CN1728062A - Graphics keyboard based security input method for computer information - Google Patents

Graphics keyboard based security input method for computer information Download PDF

Info

Publication number
CN1728062A
CN1728062A CNA2004100509501A CN200410050950A CN1728062A CN 1728062 A CN1728062 A CN 1728062A CN A2004100509501 A CNA2004100509501 A CN A2004100509501A CN 200410050950 A CN200410050950 A CN 200410050950A CN 1728062 A CN1728062 A CN 1728062A
Authority
CN
China
Prior art keywords
character
input method
graphic keyboard
computer information
method based
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2004100509501A
Other languages
Chinese (zh)
Other versions
CN1327325C (en
Inventor
(本人要求不公布姓名)
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHAOSHANG BANK CO Ltd
China Merchants Bank Co Ltd
Original Assignee
ZHAOSHANG BANK CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHAOSHANG BANK CO Ltd filed Critical ZHAOSHANG BANK CO Ltd
Priority to CNB2004100509501A priority Critical patent/CN1327325C/en
Publication of CN1728062A publication Critical patent/CN1728062A/en
Application granted granted Critical
Publication of CN1327325C publication Critical patent/CN1327325C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Input From Keyboards Or The Like (AREA)

Abstract

A safe input method of computer information based on pattern keyboard includes preconfirming input character set, confirming input boundary region, plotting each character in pattern mode and displaying it on said region, storing relation of each character to plotting and position in boundary region into computer storage, intercepting click position of mouse by '' Hook '' program embedded in user program when user clicks any point on said region , indexing out position information stored in said storage and outputting its corresponding character as user input.

Description

Computer information safe input method based on graphic keyboard
Technical field
The present invention relates to computer security technique, more particularly, relate to a kind of computer information safe input method based on graphic keyboard.
Background technology
Computer utility be unable to do without input and output, wherein keyboard input is the most frequently used also information input medium the most easily, especially to importing a spot of numeral, character information is especially true, though and also there are the hidden danger of secure context in conventional keyboard input digit and alphabetical process facility, for example, stealing the keyboard input is the function that a kind of popular trojan horse program all possesses, any one computer level is not high, there is not the people of programming development ability can both use and propagate trojan horse program, the trojan horse program major part that the user computer of having discovered and seized infects is from these people's propagation, make the time by keyboard input digit or character, the numeral that might import and character are stolen by the trojan horse program of computer infected, feasible key message such as password by keyboard, encrypted messages etc. may illegally be usurped, and have very big potential safety hazard.
Summary of the invention
The technical problem to be solved in the present invention provides a kind of safe computer information safe input method, can be used in the safety input of computerized information, raising is by the threshold of assault, and reduction comprises that the bad program of trojan horse program is to comprising the harm of significant data securities such as Internet bank's account number and password to a great extent.
The above-mentioned technical matters of the present invention solves like this, construct a kind of by changing the mode of significant datas such as user's keyboard input password, the input alphabet, the digital form that provide a kind of raising to comprise the applications of computer network system data safety of system of the Internet bank etc., and then strengthen the security of customer data and application system.Specifically comprise a kind of computer information safe input method of structure, it is characterized in that, may further comprise the steps: pre-determine the input character set based on graphic keyboard; On display screen, determine the inputting interface zone; To belong to each character that pre-determines in the character set draws and is presented at one by one on the described inputting interface zone with figure or image mode; The position relation that each character and this character are drawn and are presented in the described inputting interface zone is kept in the computer memory; When the user belongs to any one point in described inputting interface zone by click, intercept and capture the click position by " HOOK " program that is embedded in the user program; Retrieve the positional information of preserving in the described computer memory, output and of the input of this positional information corresponding characters as the user.
Above-mentioned according to the computer information safe input method based on graphic keyboard of the present invention in, it is characterized in that, when importing, be to determine at random in the inputting interface zone that display screen is determined at every turn.
Above-mentioned according to the computer information safe input method based on graphic keyboard of the present invention in, it is characterized in that when importing, each belongs to the display position of character on described inputting interface zone that pre-determines character set is changeable at every turn.
Above-mentioned according to the computer information safe input method based on graphic keyboard of the present invention in, describedly pre-determine input character set and comprise from comprise " 0 "-" 9 ", " a "-" z ", " A "-" Z ", ". ", " * ", "-", "+", " ", " ← ", " ↑ ", " → ", " ↓ " set and select the relevant subclass of current application program.
Above-mentioned according to the computer information safe input method based on graphic keyboard of the present invention in, it is characterized in that, described each character is drawn with figure or image mode is performed such: according to the normal font of shown character, select at random to comprise that inclination, distortion, elongation, background increase pit, background and increase snowflake, background and increase a kind of distortion of carrying out normal font in the vision noise methods such as lines, determine the required figure that comprises parameter such as background color and form of distortion simultaneously at random and shown.
Implement the computer information safe input method based on graphic keyboard provided by the invention, can effectively be applied to the network computer application system, ensure the security of terminal user's data input, by the HOOK program is set at terminal program, carry out the digital inputting interface and the input process of the inventive method, can effectively stop trojan horse program and other program possible to the intercepting of conventional keyboard digital, character input signal and steal, thereby improve the security of user data and whole application system greatly.
Description of drawings
Fig. 1 utilizes the inventive method to produce the synoptic diagram of the graphic keyboard that is used to import on display screen;
Fig. 2 is the synoptic diagram that utilizes the inventive method to produce to be used to the graphic keyboard of clicking input on display screen;
Fig. 3 is the logic flow synoptic diagram of an embodiment that the present invention is based on the computer information safe input method of graphic keyboard;
Embodiment
In conjunction with the accompanying drawings and embodiments, the inventive method is described in further detail.
1, the main points of computer information safe input method of the present invention
The present invention solve the computer information safe input method at be the input of a small amount of critical data, for example, account number, these data that must import of password.The present invention solves the safe input problem of critical data by the local nonstandardized technique of network terminal application program loading routine, based on viewpoint be when needing to import in the program, jump out the keyboard of a graphic presentation from display screen, the alphabet that has user's present input data to use on this keyboard, the numeral of 1-9 for example, the English alphabet of A-Z, carriage return or acknowledgement key can also be arranged, decimal key etc., the present invention is except adopting the graphics mode display button, also have two randomnesss, the one, the band of position that keyboard shows on screen is uncertain, but the position on the keyboard area of each button may also be uncertain, but these are uncertainly produced and record and do not influence the collection of input data by user program.
2, safety drawing keyboard
In one embodiment of the invention, " safety drawing keyboard " program is the program that a graphical interfaces shows and handles, and the user comes the substituting for key input by the button that draws in this interface of click.It has following characteristics, and these characteristics all are to be used for containing attacking or the difficulty of the dangerous program attack that increase system at least may hide:
1, the shown interface of this program comprises 0-9, and numeral and letter keys such as A-Z can be imported according to the user and require to determine this set.
The relative position of 2, the position of interfaces windows, and button all can random variation in showing each time
3, " 0 " of each demonstration, characters such as " A " all is that program is drawn voluntarily, compares with normal font, and certain distortion is all arranged, the degree of distortion and mode are at random, distortion comprises 1) tilt 2) distortion,
3) elongate 4) background increase pit, snowflake, vision noises such as lines.
4, user terminal program oneself is created hook (HOOK) program and is intercepted and captured click message, avoids being intercepted and captured by other programs in the system.
3, embodiment
Fig. 1-Fig. 3 shows one embodiment of the present of invention.Can be implemented by following steps from the visible the inventive method of the process flow diagram shown in Fig. 3.
1) as Fig. 1, at first determining will be at the where display graphics keyboard 200 of screen 100, chosen position (X0 at random, Y0) and big or small dx and dy (frame 301), create the graphic keyboard window, as Fig. 2, it is oval keyboard window herein, also can be other shapes,, the background of keyboard is made as transparent (frame 302) as rectangle etc.(dx, random offset dy) is at (X0+dx, Y0+dy) graphing keyboard on the position downwards to the right to produce one.
2) according to keyboard position (4 row) or lexicographic order (6 row) (frame 303) 36 buttons (frame 304) that draw successively, comprise 26 letter keys and 10 numerical keys.Distance between the row between the row also can be set at random.
3) method of the single button of picture: determine to press key range (position, long * wide) (frame 305), draw some differing in size, the round dot that color is different (frame 306), determine a certain background primary colours (frame 307), select from left to right or the drafting of gradual manner from top to down button background (frame 308).The character that calculating will show tilts or distortion (frame 309) by certain angle, and the bitmap (frame 310) after twisting and elongate with direction by a certain percentage is with button background stack (frame 311).
4) continuity of destruction stroke: to whole graphic keyboard, draw the different lines of some thickness length (frame 312), disturb lines as shown in Figure 2, to destroy the continuity of each alphabetical stroke, the increase program is used the difficulty of mode identification technology analyzed pattern corresponding characters.
5) position and the size (frame 313) of each button of record in internal memory.
6) finish the drafting of graphic keyboard after, intercept and capture user's click message, compared with the key position in the internal memory in the click position, determine user's input (frame 314).Do not return this click message then to system.
Reach better effect for implementing the present invention, need predict, the convenience that comprehensive user uses, the suitably randomness of design configuration key position and the randomness of distortion the attack method of trojan horse program.Simultaneously, should also be clear that message kind and number and whole these message of intercepting and capturing in the HOOK program that click produces in the windows system.

Claims (10)

1, a kind of computer information safe input method based on graphic keyboard is characterized in that, may further comprise the steps: pre-determine the input character set; On display screen, determine the inputting interface zone; To belong to each character that pre-determines in the character set draws and is presented at one by one on the described inputting interface zone with figure or image mode; The position relation that each character and this character are drawn and are presented in the described inputting interface zone is kept in the computer memory; When the user belongs to any one point in described inputting interface zone by click, intercept and capture the click position by " HOOK " program that is embedded in the user program; Retrieve the positional information of preserving in the described computer memory, output and of the input of this positional information corresponding characters as the user.
2, the computer information safe input method based on graphic keyboard according to claim 1 is characterized in that, when importing, is to determine at random in the inputting interface zone that display screen is determined at every turn.
3, the computer information safe input method based on graphic keyboard according to claim 1 and 2 is characterized in that, when importing, each belongs to the display position of character on described inputting interface zone that pre-determines character set is changeable at every turn.
4, the computer information safe input method based on graphic keyboard according to claim 3, it is characterized in that, describedly pre-determine input character set and comprise from comprise " 0 "-" 9 ", " a "-" z ", " A "-" Z ", ". ", " * ", "-", "+", " ", " ← ", " ↑ ", " → ", " ↓ " set and select the relevant subclass of current application program.
5, the computer information safe input method based on graphic keyboard according to claim 3, it is characterized in that, described each character is drawn with figure or image mode is performed such: according to the normal font of shown character, select at random to comprise that inclination, distortion, elongation, background increase pit, background and increase snowflake, background and increase a kind of distortion of carrying out normal font in the vision noise methods such as lines, determine the required figure that comprises parameter such as background color and form of distortion simultaneously at random and shown.
6, computer information safe input method based on graphic keyboard according to claim 1, it is characterized in that, describedly on display screen, determine the inputting interface zone and will belong to each character that pre-determines in the character set to draw and be presented at one by one on the described inputting interface zone with figure or image mode, may further comprise the steps: 1) select the position (X0 on the display screen at random, Y0) create the graphic keyboard window, produce a downward (dx to the right, dy) random offset, (X0+dx, Y0+dy) rendering context is set to transparent graphic keyboard on the position; 2) according to keyboard position or lexicographic order a plurality of buttons that draw successively, the distance between each button row, column is set at random; 3) draw single button: the indication range of determining single button with position, three parameters of length and width, in indication range, draw some differing in size, the round dot that color is different, determine a certain background primary colours, select from left to right or gradual manner is from top to down drawn the button background, the character that calculating will show tilts by certain angle, and the bitmap after twisting and elongate with direction by a certain percentage superposes with the button background.
7, the computer information safe input method based on graphic keyboard according to claim 6 is characterized in that, also comprises whole graphic keyboard, draws the different lines of some thickness length, destroying the continuity of each alphabetical stroke,
8, the computer information safe input method based on graphic keyboard according to claim 6 is characterized in that, also is included in the position of each button of record in the internal memory and the step of size.
9, the computer information safe input method based on graphic keyboard according to claim 6 is characterized in that, also be included in intercept and capture user's click message and determine user's button input after, step from this click message to system that do not return is set.
10, the computer information safe input method based on graphic keyboard according to claim 1 is characterized in that, described method is to realize by the user program that is arranged on the terminal.
CNB2004100509501A 2004-07-30 2004-07-30 Graphics keyboard based security input method for computer information Active CN1327325C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100509501A CN1327325C (en) 2004-07-30 2004-07-30 Graphics keyboard based security input method for computer information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100509501A CN1327325C (en) 2004-07-30 2004-07-30 Graphics keyboard based security input method for computer information

Publications (2)

Publication Number Publication Date
CN1728062A true CN1728062A (en) 2006-02-01
CN1327325C CN1327325C (en) 2007-07-18

Family

ID=35927375

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100509501A Active CN1327325C (en) 2004-07-30 2004-07-30 Graphics keyboard based security input method for computer information

Country Status (1)

Country Link
CN (1) CN1327325C (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101593256B (en) * 2008-05-26 2010-09-08 北京飞天诚信科技有限公司 Safe input method based on Windows operating system
CN101183412B (en) * 2006-11-13 2010-11-10 思科技术公司 Method and device for secure data entry in an application
CN102566924A (en) * 2011-12-26 2012-07-11 重庆新媒农信科技有限公司 Soft keyboard operation processing method capable of enhancing safety protection
CN101075873B (en) * 2007-06-28 2012-10-03 腾讯科技(深圳)有限公司 Method and system for inputting content
CN103597428A (en) * 2012-06-14 2014-02-19 软质层科技公司 System and method for secure data entry
CN104820799A (en) * 2015-04-07 2015-08-05 深圳天珑无线科技有限公司 Terminal having touch display screen and password protection method thereof
CN105279445A (en) * 2014-06-09 2016-01-27 全宏科技股份有限公司 Data input and transmission method and system
CN107589833A (en) * 2017-08-08 2018-01-16 阿里巴巴集团控股有限公司 Safety protecting method, device and VR terminal devices based on VR scenes
CN109978972A (en) * 2019-03-20 2019-07-05 珠海天燕科技有限公司 A kind of method and device of copy editor in picture
CN110297678A (en) * 2018-03-22 2019-10-01 北京搜狗科技发展有限公司 A kind for the treatment of method and apparatus of interface of input method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1136496C (en) * 2000-07-11 2004-01-28 中国石油天然气总公司油气开发计算机软件工程研究中心 Simplified spelling-touching screen mouse chinese character input method
JP2003050653A (en) * 2001-07-18 2003-02-21 Internatl Business Mach Corp <Ibm> Method for generating input event and information terminal equipment with the same method

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183412B (en) * 2006-11-13 2010-11-10 思科技术公司 Method and device for secure data entry in an application
US8161395B2 (en) 2006-11-13 2012-04-17 Cisco Technology, Inc. Method for secure data entry in an application
CN101075873B (en) * 2007-06-28 2012-10-03 腾讯科技(深圳)有限公司 Method and system for inputting content
CN101593256B (en) * 2008-05-26 2010-09-08 北京飞天诚信科技有限公司 Safe input method based on Windows operating system
CN102566924A (en) * 2011-12-26 2012-07-11 重庆新媒农信科技有限公司 Soft keyboard operation processing method capable of enhancing safety protection
CN102566924B (en) * 2011-12-26 2014-01-01 重庆新媒农信科技有限公司 Soft keyboard operation processing method capable of enhancing safety protection
CN103597428A (en) * 2012-06-14 2014-02-19 软质层科技公司 System and method for secure data entry
CN105279445A (en) * 2014-06-09 2016-01-27 全宏科技股份有限公司 Data input and transmission method and system
CN104820799A (en) * 2015-04-07 2015-08-05 深圳天珑无线科技有限公司 Terminal having touch display screen and password protection method thereof
CN107589833A (en) * 2017-08-08 2018-01-16 阿里巴巴集团控股有限公司 Safety protecting method, device and VR terminal devices based on VR scenes
CN110297678A (en) * 2018-03-22 2019-10-01 北京搜狗科技发展有限公司 A kind for the treatment of method and apparatus of interface of input method
CN110297678B (en) * 2018-03-22 2024-02-06 北京搜狗科技发展有限公司 Input method interface processing method and device
CN109978972A (en) * 2019-03-20 2019-07-05 珠海天燕科技有限公司 A kind of method and device of copy editor in picture

Also Published As

Publication number Publication date
CN1327325C (en) 2007-07-18

Similar Documents

Publication Publication Date Title
US7624277B1 (en) Content alteration for prevention of unauthorized scripts
JP5496960B2 (en) Extended HIP generation system and advanced HIP generation method
US9027122B2 (en) Isolation tool for user assistance in solving a captcha test
CA2569634C (en) Method and system to generate an image for monitoring user interaction with a computer
EP2410450A1 (en) Method for providing a challenge based on a content
CN1327325C (en) Graphics keyboard based security input method for computer information
CN101030238A (en) Method for inputting intelligent key safety information
Khan et al. Cyber security using arabic captcha scheme.
CN103514393A (en) Method for achieving three-dimensional verification code
WO2016206398A1 (en) Method and apparatus for controlling electronic device, and method and apparatus for unlocking hand-held terminal
Cui et al. CAPTCHA design based on moving object recognition problem
CN106778151A (en) Method for identifying ID and device based on person&#39;s handwriting
CN1922634A (en) Method for protecting a character entered at a graphical interface
Roshanbin et al. ADAMAS: Interweaving unicode and color to enhance CAPTCHA security
WO2009049275A1 (en) Method for detecting and resolving hidden text salting
Chaudhari et al. 3D drag-n-drop CAPTCHA enhanced security through CAPTCHA
US20160239656A1 (en) Test for distinguishing between a human and a computer program
Cui et al. A 3-layer dynamic CAPTCHA implementation
CN112883951A (en) Method, system and storage medium for protecting sensitive content
JP6168645B2 (en) Reverse Turing test method and access authentication method
Pate et al. Design and Generation of Devanagari Script CAPTCHA: Imaginative Technique
Roshanbin Interweaving unicode, color, and human interactions to enhance CAPTCHA security
Chougule et al. Revelio: A lightweight captcha solver using a dictionary based approach
CN1945620A (en) Automatic forming method for goods code
US7557806B2 (en) Method to protect display text from eavesdropping

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant