CN101136045A - Virtual machine system and safety input method thereof - Google Patents

Virtual machine system and safety input method thereof Download PDF

Info

Publication number
CN101136045A
CN101136045A CNA2006101286232A CN200610128623A CN101136045A CN 101136045 A CN101136045 A CN 101136045A CN A2006101286232 A CNA2006101286232 A CN A2006101286232A CN 200610128623 A CN200610128623 A CN 200610128623A CN 101136045 A CN101136045 A CN 101136045A
Authority
CN
China
Prior art keywords
keyboard
input
module
encryption
encrypting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006101286232A
Other languages
Chinese (zh)
Other versions
CN100594503C (en
Inventor
刘春梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN200610128623A priority Critical patent/CN100594503C/en
Publication of CN101136045A publication Critical patent/CN101136045A/en
Application granted granted Critical
Publication of CN100594503C publication Critical patent/CN100594503C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Input From Keyboards Or The Like (AREA)

Abstract

The virtual machine system comprises: an input encryption module used for getting corresponded and encrypted keyboard input; and a decryption module used for making decryption for the keyboard input. The method comprises: according to the original keyboard input, getting the encrypted key board input; decrypting the encrypted keyboard input to get original keyboard input. By the invention, the keyboard input captured by the virus is an encrypted input and is not an original keyboard input.

Description

Dummy machine system and secured inputting method thereof
Technical field
The present invention relates to a kind of virtual machine technique, particularly relate to a kind of dummy machine system and secured inputting method thereof.
Background technology
Along with popularizing of development of computer and computing machine, the computer security input more and more becomes the thing that the computer user pays close attention to.In existing multi-purpose computer, virus is by hanging a Hook Function, the keyboard input that the interception keyboard drive obtains in operating system.Like this, entering password or password the time, virus can be tackled the password or the password of user's input by Hook Function as the computer user.
For this situation, adopt the mode of anti-virus software to come the virus of invading in the dump usually, still, owing to need often to upgrade anti-virus software, and anti-virus software lags behind virus usually, is difficult to reach the purpose that prevents virus.Simultaneously, existing keyboard secured inputting method mainly is that by the click input information, this mode realizes cumbersome, and has limited the use of keyboard as the form simulation keyboard by picture.
In addition, in existing dummy machine system shown in Figure 1, the obtain manner of its keyboard input is as follows:
When the user of dummy machine system knocks keyboard, produce corresponding keyboard interrupt;
VMM (Virtual Machine Monitor, virtual machine monitor) obtains keyboard interrupt, and keyboard interrupt is passed to SOS (Service Operation System, service operations system);
Keyboard drive module among the SOS is gathered the keyboard input, DM (Device Model, the device model module) dummy keyboard in obtains the keyboard input from the keyboard drive module, and corresponding keyboard interrupt is sent to GOS (Guest Operation System, client operating system) by VMM;
Keyboard drive module among the GOS is read the value of keyboard input from DM, undertaken and the corresponding processing of keyboard input by corresponding application software then.
For above-mentioned dummy machine system, in the reciprocal process of the keyboard drive module of GOS and application software, virus can be intercepted and captured the keyboard input by Hook Function, thereby, there is potential safety hazard on the passage between the application software of keyboard drive module and the input of GOS reception keyboard, makes dummy machine system have the problem of information security transmission.
Like this, user's account number and password are easy to be intercepted and captured, and particularly under the situation of network payment, will cause very big loss to the user.
In view of this, need provide a kind of dummy machine system and secured inputting method thereof,, can guarantee that also user's account number and password are not obtained by other people even if make that outside input is intercepted, thereby, the safety input of user profile guaranteed.
Summary of the invention
The objective of the invention is, a kind of dummy machine system is provided.
Another object of the present invention is that a kind of secured inputting method of dummy machine system is provided.
According to a first aspect of the invention, the dummy machine system that is provided comprises hardware device, client operating system, service operations system and virtual machine monitor.Wherein, the service operations system comprises: the keyboard drive module is used for gathering original keyboard input after receiving keyboard interrupt; And the input encrypting module is used for importing according to the original keyboard that the keyboard drive module is gathered, the keyboard input after the encryption of acquisition correspondence.Client operating system comprises: the keyboard drive module, and the keyboard that is used to obtain after the input encrypting module is encrypted is imported; And, deciphering module, the keyboard input after the encryption that is used for the keyboard drive module is obtained is decrypted, and obtains original keyboard input.
According to a second aspect of the invention, the dummy machine system that is provided comprises hardware device, client operating system, service operations system and virtual machine monitor.Wherein, virtual machine monitor comprises: the input encrypting module, the corresponding original keyboard of keyboard interrupt collection that is used for intercepting and capturing according to virtual machine monitor is imported, and gives client operating system with keyboard interrupt after the input of the keyboard after acquisition is encrypted.Client operating system comprises: the keyboard drive module, be used for after receiving keyboard interrupt, and obtain the keyboard input after the encryption; Deciphering module, the keyboard input after the encryption that is used for the keyboard drive module is obtained is decrypted, and obtains original keyboard input.
According to a third aspect of the invention we, the dummy machine system that is provided comprises hardware device, client operating system, service operations system and virtual machine monitor.Wherein, virtual machine monitor comprises: the input encrypting module, the corresponding original keyboard of keyboard interrupt collection that is used for intercepting and capturing according to virtual machine monitor is imported, and gives the service operations system with keyboard interrupt after the input of the keyboard after acquisition is encrypted.The service operations system comprises: the keyboard drive module is used for gathering the keyboard input after encrypting after receiving keyboard interrupt; And the device model module is used for sending corresponding keyboard interrupt to client operating system after the input of the keyboard after the encryption of obtaining the collection of keyboard drive module.Client operating system comprises: the keyboard drive module, and the keyboard that is used to obtain after the input encrypting module is encrypted is imported; And, deciphering module, the keyboard input after the encryption that is used for the keyboard drive module is obtained is decrypted, and obtains original keyboard input.
According to a forth aspect of the invention, the dummy machine system that is provided comprises hardware device, client operating system, service operations system and virtual machine monitor.Wherein, this dummy machine system further comprises: the input encrypting module is used for obtaining the keyboard input of corresponding encryption according to original keyboard input; Deciphering module is used for the keyboard input after encrypting is decrypted, and obtains original keyboard input.
According to a fifth aspect of the invention, the secured inputting method that is provided is applied to may further comprise the steps in the dummy machine system:
Step 101 according to original keyboard input, obtains the keyboard input of the encryption corresponding with the input of original keyboard;
Step 102 is decrypted the keyboard input of encrypting, and obtains original keyboard input.
Compared with prior art, the invention has the beneficial effects as follows: the passage of setting up the safety input between the application software in keyboard and client operating system, by original keyboard input is encrypted, even if what make that virus intercepts and captures is keyboard input after keyboard is input as encryption, but not original keyboard input, thereby can guarantee the safety that the user imports, and for the scheme of existing anti-virus, realize more simple effective.
Description of drawings
Fig. 1 is the synoptic diagram of existing dummy machine system;
Fig. 2 is the synoptic diagram of dummy machine system first embodiment of the present invention;
Fig. 3 is the process flow diagram of secured inputting method first embodiment of the present invention;
Fig. 4 is the synoptic diagram of dummy machine system second embodiment of the present invention;
Fig. 5 is the process flow diagram of secured inputting method second embodiment of the present invention;
Fig. 6 is the synoptic diagram of dummy machine system the 3rd embodiment of the present invention;
Fig. 7 is the process flow diagram of secured inputting method the 3rd embodiment of the present invention.
Embodiment
Main thought of the present invention is, set up the passage of safety input between the application software in keyboard and client operating system, by original keyboard input is encrypted, like this, what virus was intercepted and captured is the keyboard input of encrypting, but not the input of original keyboard, thereby can guarantee the safety that the user imports, and for the scheme of existing anti-virus, realize more simple effective.
Below in conjunction with description of drawings dummy machine system of the present invention and secured inputting method thereof.
Fig. 2 is the structural representation of dummy machine system first embodiment of the present invention.As shown in Figure 2, dummy machine system of the present invention comprises SOS, GOS, VMM and hardware device.Wherein, comprise among the VMM and interrupt intercepting and capturing module, be used to intercept and capture user's keyboard interrupt; Comprise keyboard drive module and input encrypting module among the SOS, the keyboard drive module is used to gather the keyboard input, and the input encrypting module is used for the keyboard input of keyboard drive module collection is encrypted, and the input encrypting module can be arranged in the DM of SOS; Comprise keyboard drive module and deciphering module among the GOS, the keyboard drive module is used to obtain the keyboard input after the encryption, and the keyboard input after the encryption that deciphering module is used for the keyboard drive module is obtained is decrypted.
As can be seen from Figure 3, the dummy machine system of first embodiment of the invention is realized the input of keyboard safety by following flow process:
Step 301, at first, the user presses the button on the lower keyboard, produces corresponding keyboard interrupt;
Step 302, the interruption among the VMM is intercepted and captured module and is intercepted and captured this keyboard interrupt, and keyboard interrupt is sent to SOS;
Step 303, keyboard drive module are gathered the keyboard input, and the input encrypting module sends corresponding keyboard interrupt signal to GOS after the keyboard input of keyboard drive module collection is encrypted;
Keyboard input after step 304, the keyboard drive module among the GOS obtain to encrypt from the input encrypting module by VMM, and the input of the keyboard after will encrypting sends to deciphering module;
Step 305, deciphering module is decrypted the keyboard input after encrypting, the keyboard input after obtaining to decipher.
From above-mentioned steps as can be seen, in the dummy machine system of first embodiment of the invention, by the input encrypting module is set in SOS keyboard input is encrypted, and in GOS, be decrypted by deciphering module, can avoid other people to obtain the real keyboard input of user, thereby reach the purpose of safety input by virus.
In addition, as can be seen from Figure 2, can further set the encryption switch in the above-mentioned hardware device, this encrypts switch can be specific system in combination key, need receive the keyboard input of encryption when the application software of GOS has decipher function, (this client has from deciphering function) opens the encryption switch when using Net silver client input number of the account and password as the user, when the application software of GOS does not have decipher function and do not need to receive the keyboard input of encryption, close the encryption switch.
When switch open (promptly need to keyboard input encrypt), produce corresponding keyboard interrupt, interrupt intercepting and capturing module after intercepting and capturing this keyboard interrupt, keyboard interrupt is sent to SOS, keyboard drive module among the SOS sends to the input encrypting module with the keyboard input after gathering the keyboard input, when the input encrypting module need be encrypted the keyboard input in the keyboard input expression that receives, switch to encryption function.Like this, follow-up keyboard input except the keyboard that On/Off the produced input of above-mentioned encryption switch, is all handled according to the flow process of Fig. 3.
Otherwise, when closing (promptly not needing keyboard input is encrypted) at switch, produce corresponding keyboard interrupt, interrupt intercepting and capturing module after intercepting and capturing this keyboard interrupt, keyboard interrupt is sent to SOS, keyboard drive module among the SOS is gathered the keyboard input and is also sent it to the input encrypting module, and the input encrypting module switches to not encryption function when the keyboard input expression that receives does not need to keyboard that input is encrypted.Like this, the input encrypting module is not all encrypted for follow-up keyboard input, further, the input of follow-up keyboard does not need deciphering module, and input is decrypted to keyboard, handles accordingly and directly send to application software after being obtained by the keyboard drive module among the GOS.
Fig. 4 is the structural representation of dummy machine system second embodiment of the present invention.As shown in Figure 4, dummy machine system of the present invention comprises GOS, VMM and hardware device.Wherein, comprise among the VMM and interrupt intercepting and capturing module and input encrypting module that interrupt intercepting and capturing the keyboard interrupt that module is used to intercept and capture the user, the input encrypting module has keyboard drive function, dummy keyboard function and encryption function, gather the keyboard input and encrypt, and produce keyboard interrupt to GOS.Comprise keyboard drive module and deciphering module among the GOS, the keyboard drive module is used to obtain the keyboard input after the encryption, and the keyboard input after the encryption that deciphering module is used for the keyboard load module is obtained is decrypted.
As can be seen from Figure 5, the dummy machine system of second embodiment of the invention is realized the input of keyboard safety by following flow process:
Step 501, at first, the user presses the button on the lower keyboard, produces corresponding keyboard interrupt;
Step 502, the interruption among the VMM is intercepted and captured module and is intercepted and captured this keyboard interrupt, and calls the input encrypting module, obtains keyboard by the input encrypting module and imports and keyboard input is encrypted;
Step 503, input encrypting module send keyboard interrupt to GOS after the keyboard input is encrypted;
Step 504, the keyboard input after GOS calls the keyboard driver module and to encrypt and will encrypt after keyboard input send to deciphering module;
Step 505, deciphering module is decrypted the keyboard input after encrypting, the keyboard input after obtaining to decipher.
From above-mentioned steps as can be seen, in the dummy machine system of second embodiment of the invention, by input encrypting module collection keyboard input being set in VMM and keyboard input being encrypted, and in GOS, be decrypted by deciphering module, can avoid other people to obtain the real keyboard input of user, thereby reach the purpose of safety input by virus.
In addition, as can be seen from Figure 4, can further set the encryption switch in the above-mentioned hardware device, this encrypts switch can be specific system in combination key, when switch open (promptly need keyboard input encrypt), produces corresponding keyboard interrupt, interrupt intercepting and capturing module after intercepting and capturing this keyboard interrupt, to call the input encrypting module, when the input encrypting module need be encrypted the keyboard input in the keyboard input expression that receives, switch to encryption function.Like this, follow-up keyboard input except the keyboard that On/Off the produced input of above-mentioned encryption switch, is all handled according to the flow process of Fig. 5.
Otherwise, when closing (promptly not needing keyboard input is encrypted) at switch, produce specific keyboard interrupt, interrupt intercepting and capturing module after intercepting and capturing this keyboard interrupt, to call the input encrypting module, the input encrypting module switches to not encryption function when the keyboard input expression that receives does not need to keyboard that input is encrypted.Like this, the input encrypting module is not all encrypted for follow-up keyboard input, further, the input of follow-up keyboard does not need deciphering module, and input is decrypted to keyboard, handles accordingly and directly send to application software after being obtained by the keyboard drive module among the GOS.
Fig. 6 is the structural representation of dummy machine system the 3rd embodiment of the present invention.As shown in Figure 6, dummy machine system of the present invention comprises SOS, GOS, VMM and hardware device.Wherein, comprise among the VMM and interrupt intercepting and capturing module and input encrypting module, interrupt intercepting and capturing the keyboard interrupt that module is used to intercept and capture the user, the input encrypting module has keyboard drive function, dummy keyboard function and encryption function, be used to gather the keyboard input and the keyboard input of gathering is encrypted, and send keyboard interrupt to SOS; Comprise keyboard drive module and deciphering module among the GOS, the keyboard drive module is used to obtain the keyboard input after the encryption, and the keyboard input after the encryption that deciphering module is used for the keyboard load module is obtained is decrypted.
As can be seen from Figure 7, the dummy machine system of third embodiment of the invention is realized the input of keyboard safety by following flow process:
Step 701, at first, the user presses the button on the lower keyboard, produces corresponding keyboard interrupt;
Step 702, the interruption among the VMM is intercepted and captured module and is intercepted and captured this keyboard interrupt, and calls the input encrypting module, encrypts by input encrypting module collection keyboard input and to the keyboard input of gathering;
Step 703, input encrypting module send keyboard interrupt to SOS after the keyboard input is encrypted;
Step 704, SOS calls the keyboard input after the collection of keyboard driver module is encrypted, and the dummy keyboard among the DM obtains keyboard input after the encryption from the keyboard drive module, and corresponding keyboard interrupt is sent to GOS by VMM;
Step 705, the keyboard drive module among the GOS are read the keyboard input after the encryption from DM, the keyboard input after will encrypting then sends to deciphering module;
Step 706, deciphering module is decrypted the keyboard input after encrypting, the keyboard input after obtaining to decipher.
From above-mentioned steps as can be seen, in the dummy machine system of third embodiment of the invention, by the input encrypting module is set in VMM keyboard input is encrypted, and in GOS, be decrypted by deciphering module, can avoid other people to obtain the real keyboard input of user, thereby reach the purpose of safety input by virus.
In addition, as can be seen from Figure 6, can further set the encryption switch in the above-mentioned hardware device, this encrypts switch can be specific system in combination key, when switch open (promptly need keyboard input encrypt), produces corresponding keyboard interrupt, interrupt intercepting and capturing module after intercepting and capturing this keyboard interrupt, to call the input encrypting module, when the input encrypting module need be encrypted the keyboard input in the keyboard input expression that receives, switch to encryption function.Like this, follow-up keyboard input except the keyboard that On/Off the produced input of above-mentioned encryption switch, is all handled according to the flow process of Fig. 7.
Otherwise, when closing (promptly not needing keyboard input is encrypted) at switch, produce corresponding keyboard interrupt, interrupt intercepting and capturing module after intercepting and capturing this keyboard interrupt, to call the input encrypting module, the input encrypting module switches to not encryption function when the keyboard input expression that receives does not need to keyboard that input is encrypted.Like this, the input encrypting module is not all encrypted for follow-up keyboard input, further, the input of follow-up keyboard does not need deciphering module, and input is decrypted to keyboard, handles accordingly and directly send to application software after being obtained by the keyboard drive module among the GOS.
In above embodiment, also can in advance the keyboard input of encrypting be kept in the input encrypting module, and the user is pushed button the keyboard interrupt that produced as pumping signal, when the input encrypting module receives the keyboard input, obtain the keyboard input of the encryption of in advance preserving corresponding with the keyboard input by search, and the keyboard that will encrypt accordingly input sends to GOS, by the deciphering module among the GOS keyboard input of encrypting is decrypted.
In addition, for information specific such as username and password, also can realize: can in advance enciphered data be kept in the input encrypting module by such method, when the user presses the encryption switch, the input encrypting module passes to GOS with the enciphered data of storage as keyboard input, by corresponding deciphering module among the GOS ciphered data is decrypted.
In addition, in above embodiment, the safety of VMM and SOS can be isolated by the internal memory of virtual machine and guaranteed, perhaps the memory headroom of VMM operation is labeled as read-only memory, even may operate in the flash memory (Flash).Like this, can guarantee further that user's original keyboard input is not is not intercepted and captured by virus, guarantee user's safety input.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of claim.

Claims (12)

1. a dummy machine system comprises hardware device, client operating system, service operations system and virtual machine monitor, it is characterized in that,
The service operations system comprises:
The keyboard drive module is used for gathering original keyboard input after receiving keyboard interrupt; And
The input encrypting module is used for importing according to the original keyboard that the keyboard drive module is gathered, the keyboard input after the encryption of acquisition correspondence;
Client operating system comprises:
The keyboard drive module, the keyboard that is used to obtain after the input encrypting module is encrypted is imported; And
Deciphering module, the keyboard input after the encryption that is used for the keyboard drive module is obtained is decrypted, and obtains original keyboard input.
2. a dummy machine system comprises hardware device, client operating system, service operations system and virtual machine monitor, it is characterized in that,
Virtual machine monitor comprises:
The input encrypting module, the corresponding original keyboard of keyboard interrupt collection that is used for intercepting and capturing according to virtual machine monitor is imported, and gives client operating system with keyboard interrupt after the input of the keyboard after acquisition is encrypted;
Client operating system comprises:
The keyboard drive module is used for after receiving keyboard interrupt, obtains the keyboard input after the encryption;
Deciphering module, the keyboard input after the encryption that is used for the keyboard drive module is obtained is decrypted, and obtains original keyboard input.
3. a dummy machine system comprises hardware device, client operating system, service operations system and virtual machine monitor, it is characterized in that,
Virtual machine monitor comprises:
The input encrypting module, the corresponding original keyboard of keyboard interrupt collection that is used for intercepting and capturing according to virtual machine monitor is imported, and gives the service operations system with keyboard interrupt after the input of the keyboard after acquisition is encrypted;
The service operations system comprises:
The keyboard drive module is used for gathering the keyboard input after encrypting after receiving keyboard interrupt; And
The device model module is used for sending corresponding keyboard interrupt to client operating system after the input of the keyboard after the encryption of obtaining the collection of keyboard drive module;
Client operating system comprises:
The keyboard drive module, the keyboard that is used to obtain after the input encrypting module is encrypted is imported; And
Deciphering module, the keyboard input after the encryption that is used for the keyboard drive module is obtained is decrypted, and obtains original keyboard input.
4. a dummy machine system comprises hardware device, client operating system, service operations system and virtual machine monitor, it is characterized in that, further comprises:
The input encrypting module is used for obtaining the keyboard input of corresponding encryption according to original keyboard input;
Deciphering module is used for the keyboard input after encrypting is decrypted, and obtains original keyboard input.
5. as each described dummy machine system of claim 1 to 4, it is characterized in that the input encrypting module is by encrypting the keyboard input after obtaining to encrypt to original keyboard input.
6. as each described dummy machine system of claim 1 to 4, it is characterized in that, preserved the keyboard input of the encryption corresponding in the input encrypting module in advance, when obtaining original keyboard input, obtained the keyboard input of corresponding encryption by search with the input of original keyboard.
7. as each described dummy machine system of claim 1 to 6, it is characterized in that, further comprise the encryption switch, be used to control the switching of input encrypting module between encryption function and non-encryption function, when encrypting switch open, the input encrypting module switches to encryption function, and when the encryption switch cut out, the input encrypting module switched to not encryption function.
8. as each described dummy machine system of claim 1 to 7, it is characterized in that virtual machine monitor operates in internal memory, read-only memory or the flash memory of isolation.
9. as each described dummy machine system of claim 1 to 7, it is characterized in that virtual machine monitor and service operating system are in the internal memory of isolating.
10. a secured inputting method is applied to it is characterized in that in the dummy machine system, may further comprise the steps:
Step 101 according to original keyboard input, obtains the keyboard input of the encryption corresponding with the input of original keyboard;
Step 102 is decrypted the keyboard input of encrypting, and obtains original keyboard input.
11. method as claimed in claim 10 is characterized in that, in step 101, by original keyboard input being encrypted the keyboard input that obtains the encryption corresponding with the input of original keyboard.
12. method as claimed in claim 10 is characterized in that, in step 101, the keyboard input by the corresponding encryption of that preserve in advance and the original keyboard input of search obtains the keyboard input of encrypting.
CN200610128623A 2006-08-29 2006-08-29 Virtual machine system and safety input method thereof Active CN100594503C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200610128623A CN100594503C (en) 2006-08-29 2006-08-29 Virtual machine system and safety input method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200610128623A CN100594503C (en) 2006-08-29 2006-08-29 Virtual machine system and safety input method thereof

Publications (2)

Publication Number Publication Date
CN101136045A true CN101136045A (en) 2008-03-05
CN100594503C CN100594503C (en) 2010-03-17

Family

ID=39160137

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200610128623A Active CN100594503C (en) 2006-08-29 2006-08-29 Virtual machine system and safety input method thereof

Country Status (1)

Country Link
CN (1) CN100594503C (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101609489B (en) * 2008-06-17 2011-07-27 联想(北京)有限公司 Secure input method for computer and system
CN102393886A (en) * 2011-06-29 2012-03-28 北京数码视讯科技股份有限公司 Safety control method of mobile terminal, device and system
CN101593254B (en) * 2008-05-26 2012-05-09 联想(北京)有限公司 Safe input method and system for notebook computer
CN101661544B (en) * 2008-03-31 2013-06-05 英特尔公司 Method and apparatus for providing a secure display window inside the primary display
CN101751522B (en) * 2008-12-08 2013-11-20 王基斾 Method, device and system for preventing keys of keyboard from being logged
US20140359273A1 (en) * 2013-06-03 2014-12-04 Huawei Technologies Co., Ltd. Method and apparatus for inputting data
TWI488067B (en) * 2012-11-29 2015-06-11 Chi Pei Wang A method and a device for preventing the computer device from being screened on the screen
CN107278294A (en) * 2017-05-12 2017-10-20 深圳前海达闼云端智能科技有限公司 Input equipment implementation method and its realize device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10230693B2 (en) 2015-01-29 2019-03-12 WebCloak, LLC Safechannel encrypted messaging system

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101661544B (en) * 2008-03-31 2013-06-05 英特尔公司 Method and apparatus for providing a secure display window inside the primary display
CN101593254B (en) * 2008-05-26 2012-05-09 联想(北京)有限公司 Safe input method and system for notebook computer
CN101609489B (en) * 2008-06-17 2011-07-27 联想(北京)有限公司 Secure input method for computer and system
CN101751522B (en) * 2008-12-08 2013-11-20 王基斾 Method, device and system for preventing keys of keyboard from being logged
CN102393886A (en) * 2011-06-29 2012-03-28 北京数码视讯科技股份有限公司 Safety control method of mobile terminal, device and system
CN102393886B (en) * 2011-06-29 2014-11-26 北京数码视讯科技股份有限公司 Safety control method of mobile terminal, device and system
TWI488067B (en) * 2012-11-29 2015-06-11 Chi Pei Wang A method and a device for preventing the computer device from being screened on the screen
US20140359273A1 (en) * 2013-06-03 2014-12-04 Huawei Technologies Co., Ltd. Method and apparatus for inputting data
US9058500B2 (en) * 2013-06-03 2015-06-16 Huawei Technologies Co., Ltd. Method and apparatus for inputting data
US20150254466A1 (en) * 2013-06-03 2015-09-10 Huawei Technologies Co., Ltd. Method and apparatus for inputting data
US9672367B2 (en) 2013-06-03 2017-06-06 Huawei Technologies Co., Ltd. Method and apparatus for inputting data
CN107278294A (en) * 2017-05-12 2017-10-20 深圳前海达闼云端智能科技有限公司 Input equipment implementation method and its realize device
CN107278294B (en) * 2017-05-12 2020-11-06 深圳前海达闼云端智能科技有限公司 Input device implementation method and implementation device thereof

Also Published As

Publication number Publication date
CN100594503C (en) 2010-03-17

Similar Documents

Publication Publication Date Title
CN100594503C (en) Virtual machine system and safety input method thereof
CN103930899B (en) Method for the management public data of input and private data at equipment
Palisse et al. Ransomware and the legacy crypto API
AU2009329836B2 (en) Digital video guard
CN110430179A (en) A kind of control method and system for intranet and extranet secure access
CN102819702B (en) File encryption operation method and file encryption operational system
US9674153B2 (en) Secure data processing
CN102419805B (en) Terminal equipment and method for encrypting user information
US9961048B2 (en) System and associated software for providing advanced data protections in a defense-in-depth system by integrating multi-factor authentication with cryptographic offloading
CN101593254B (en) Safe input method and system for notebook computer
CN104270516B (en) Decryption method and mobile terminal
US20120278611A1 (en) Vpn-based method and system for mobile communication terminal to access data securely
CN103778384A (en) Identity authentication based virtual terminal safety environment protection method and system
CN101534311A (en) An information security method and procedure
CN104270353B (en) information security transmission method and system, receiving terminal and sending terminal
CN111274611A (en) Data desensitization method, device and computer readable storage medium
CN101227279A (en) Device, system and method for encrypting and deciphering audio signal
KR20140144069A (en) System for encoding information using optical character recognition and method thereof
CN110932951B (en) Intelligent household control method and device
CN101169815A (en) Computer system and data input method
CN112260820A (en) Mobile payment password keyboard based on key splitting protection in Android system and implementation method thereof
CN110750326A (en) Disk encryption and decryption method and system for virtual machine
CN111915290A (en) Mobile payment password keyboard based on key splitting protection under iOS system and implementation method thereof
WO2009004590A3 (en) Method, apparatus, system and computer program for key parameter provisioning
CN108491723A (en) A kind of encryption and decryption method and device of computer

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant