CN111625806A - System and method for realizing remote safety keyboard - Google Patents

System and method for realizing remote safety keyboard Download PDF

Info

Publication number
CN111625806A
CN111625806A CN202010396355.2A CN202010396355A CN111625806A CN 111625806 A CN111625806 A CN 111625806A CN 202010396355 A CN202010396355 A CN 202010396355A CN 111625806 A CN111625806 A CN 111625806A
Authority
CN
China
Prior art keywords
terminal
local
remote
keyboard
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010396355.2A
Other languages
Chinese (zh)
Inventor
杨洪海
张建军
史丽君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202010396355.2A priority Critical patent/CN111625806A/en
Publication of CN111625806A publication Critical patent/CN111625806A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • G06F21/43User authentication using separate channels for security data wireless channels
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a system and a method for realizing a remote security keyboard, wherein the system for realizing the remote security keyboard comprises the following steps: local first terminal, local second terminal and remote terminal, wherein: the local first terminal is connected with the local second terminal; the remote terminal is remotely connected with a local first terminal; the remote terminal is used for sending the keyboard code required by the local second terminal to the local first terminal and receiving a judgment result which is forwarded by the local first terminal and used for judging whether the keyboard code is correct or not by the local second terminal; the local first terminal is used for collecting image data of the local second terminal, sending the image data to the remote terminal and forwarding the keyboard code sent by the remote terminal to the local second terminal. The system and the method for realizing the remote safe keyboard realize the convenience and high efficiency of the remote operation of inputting the confidential information in the fields of finance and communication on the premise of ensuring the safety, and save the time cost.

Description

System and method for realizing remote safety keyboard
Technical Field
The invention relates to the technical field of information, in particular to the technical field of information encryption in the fields of finance and communication, and particularly relates to a system and a method for realizing a remote security keyboard.
Background
In the field of finance and communication, certain high-level authority operation needs to be performed only after a specific person logs in a computer through a password, for example, when a bank counter is used for handling large-amount cash-taking and cash-storing services, after a service person handles related procedures, the service person needs to input a related password (the password is held by a specific person) before the computer to continue the operation, in this case, if the specific person is out of place or inconvenient to input the password and the like, and the local person does not have related authority, the operation cannot be performed.
In response to the above, prior art devices have corresponding applications through which a user may provide text input using a virtual keyboard on the user's handheld device (e.g., smartphone, tablet, etc.). However, the user must install and invoke the application before being able to provide text input to the confidential information receiving device using the virtual keyboard, and installing and invoking the application poses many security problems.
Disclosure of Invention
Aiming at the problems in the prior art, the system and the method for realizing the remote safety keyboard realize the convenience and high efficiency of the remote operation of inputting confidential information in the fields of finance and communication on the premise of ensuring the safety, and save the time cost.
In order to solve the technical problems, the invention provides the following technical scheme:
in a first aspect, the present invention provides a system for implementing a remote security keyboard, comprising: local first terminal, local second terminal and remote terminal, wherein:
the local first terminal is connected with the local second terminal;
the remote terminal is remotely connected with the local first terminal;
the remote terminal is used for sending a keyboard code required by a local second terminal to the local first terminal and receiving a judgment result which is forwarded by the local first terminal and is used for judging whether the keyboard code is correct or not by the local second terminal;
the local first terminal is used for acquiring image data of the local second terminal, sending the image data to the remote terminal and forwarding a keyboard code sent by the remote terminal to the local second terminal;
the local second terminal is used for receiving the keyboard code forwarded by the local first terminal, judging whether the keyboard code is correct or not, sending a judgment result to the remote terminal from the local first terminal, and monitoring the keyboard code.
In an embodiment, the system for implementing a remote security keyboard further includes a camera device, and the camera device is connected to the local first terminal and is configured to collect the image data in real time.
In an embodiment, the remote terminal and the local first terminal are both smart phones, and the local second terminal is a computer.
In a second aspect, the present invention provides a method for implementing a remote security keyboard, which is applied to a remote terminal, and the method includes:
sending a keyboard code required by the local second terminal to the local first terminal; and the local first terminal forwards the keyboard code to a local second terminal;
and receiving a judgment result of whether the keyboard code of the local second terminal is correct or not, wherein the judgment result is forwarded by the local first terminal.
In an embodiment, the remote terminal and the local second terminal transmit the keypad code by using a preset encryption method.
In one embodiment, the preset encryption method includes: an external U shield, a TEE encryption method, an SE chip encryption method, an internal U shield and a soft certificate.
In one embodiment, the local first terminal forwards only the keypad code sent by the remote terminal to the local second terminal;
the remote terminal and the local first terminal are both smart phones, and the local second terminal is a computer.
In a third aspect, the present invention provides a method for implementing a remote security keyboard, which is applied to a local second terminal, and includes:
receiving a keypad code transmitted by the remote terminal and forwarded by the local first terminal;
and judging whether the keyboard code is correct or not, and forwarding a judgment result to the remote terminal from the local first terminal.
In one embodiment, the local first terminal is connected to the local second terminal through a USB data line, and monitors the keyboard code;
the remote terminal and the local first terminal are both smart phones, and the local second terminal is a computer.
In one embodiment, the monitoring the keypad code comprises:
and controlling the communication connection with the local first terminal in real time according to the sending speed of the keyboard code and/or the proportion of the control code in the character stream.
As can be seen from the above description, the system and method for implementing a remote security keyboard according to the embodiments of the present invention connect a local mobile phone to a computer that is to receive confidential information; then, connecting the remote mobile phone with the local mobile phone; and finally, inputting the required keyboard code of the computer to receive the confidential information through the remote mobile phone. On the premise of ensuring safety, the invention realizes the convenience and high efficiency of remote operation of confidential information input in the fields of finance and communication, and saves time and cost.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic diagram of a system for implementing a remote security keyboard in an embodiment of the present invention;
FIG. 2 is a first flowchart illustrating a method for implementing a remote security keyboard according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a second method for implementing a remote security keyboard according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating a method for implementing a remote security keyboard in an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the present invention provides a specific implementation manner of a system for implementing a remote security keyboard, and referring to fig. 1, the system specifically includes the following contents:
local first terminal, local second terminal and remote terminal, wherein:
the local first terminal is connected with the local second terminal;
the remote terminal is remotely connected with the local first terminal;
the remote terminal is used for sending a keyboard code required by a local second terminal to the local first terminal and receiving a judgment result which is forwarded by the local first terminal and is used for judging whether the keyboard code is correct or not by the local second terminal;
the local first terminal is used for acquiring image data of the local second terminal, sending the image data to the remote terminal and forwarding a keyboard code sent by the remote terminal to the local second terminal;
the local second terminal is used for receiving the keyboard code forwarded by the local first terminal, judging whether the keyboard code is correct or not, sending a judgment result to the remote terminal from the local first terminal, and monitoring the keyboard code.
In a preferred embodiment, the local first terminal may be connected to the local second terminal through a USB data line, and it should be noted that the local second terminal has a specific USB data interface and a corresponding driver to securely communicate with the local first terminal.
The local first terminal is configured to forward data between the remote terminal and the local second terminal, specifically: and forwarding the keyboard code sent by the remote terminal to the local second terminal, acquiring the image data of the local second terminal in real time, and forwarding a judgment result of whether the keyboard code is correct or not by the local second terminal. It should be noted that the local first terminal only sends the keypad code (without other data) to the local second terminal, so as to ensure the communication security.
Preferably, the remote terminal is remotely connected to the local first terminal through a wireless network, and is configured to receive a keypad code required by the local second terminal, send the keypad code to the local first terminal (the keypad code is input by a user), and receive a determination result of the local second terminal forwarded by the local first terminal.
And after the local second terminal is connected with the local first terminal, receiving the keyboard code forwarded by the local first terminal, judging whether the keyboard code is correct, generating a judgment result, and finally sending the judgment result to the remote terminal from the local first terminal.
It can be understood that the system for implementing a remote secure keyboard provided in the embodiment of the present invention includes a local first terminal, a local second terminal, and a remote terminal, where: the local first terminal is connected with the local second terminal; the remote terminal is remotely connected with a local first terminal; the remote terminal is used for receiving the keyboard code required by the local second terminal, sending the keyboard code to the local first terminal, receiving the judgment result of the local second terminal forwarded by the local first terminal, and sending the judgment result to the user; the local first terminal is used for acquiring image data of the local second terminal and sending the image data to the remote terminal; the local second terminal is used for receiving the keyboard codes forwarded by the local first terminal, judging the keyboard codes and sending the judgment result to the remote terminal from the local first terminal. On the premise of ensuring safety, the invention realizes convenience and high efficiency of remote operation of keyboard code input and greatly saves time cost. The defect that in the prior art, the service cannot be expanded because the confidential information control personnel are not local is overcome.
In an embodiment, the system for implementing a remote security keyboard further includes a camera device, and the camera device is connected to the local first terminal and is configured to collect the image data in real time.
Referring to fig. 1, the local first terminal acquires data of the local second terminal in real time through the camera device, and transmits the data to the remote terminal in real time, so that a user can master related information of the local second terminal in real time and input correct keyboard coding original data in time. In addition, the local first terminal does not perform network communication or USB network sharing with the local second terminal, but only simulates the standard keyboard of the local second terminal, thereby realizing the isolation of the internet environment of the mobile phone from a single computer (or an internal network).
In a typical scenario, the remote terminal and the local first terminal are both smart phones, and the local second terminal is a computer. Specifically, a supervisor for grasping the password of the service is not near the password computer to be received due to business trip, and just needs to implement the service related to the password urgently, the supervisor can connect the mobile phone (remote mobile phone) with the local mobile phone (the local mobile phone and the password computer to be received are in the same position), and receive the screen information of the password computer to be received by means of the camera device of the local mobile phone, and input the password into the password computer to be received through the local mobile phone, so that the service is completed. Preferably, the local mobile phone does not retain any keyboard information transmitted by the remote mobile phone, so that the local mobile phone cannot acquire the keyboard input information after the operation is finished, and the security of the high-level authority password is ensured.
The embodiment of the present invention further provides a specific implementation manner of a method for implementing a remote security keyboard, where the method is applied to a remote terminal, and referring to fig. 2, the method specifically includes the following steps:
step 100: and sending the required keyboard code of the local second terminal to the local first terminal.
It will be appreciated that the remote terminal receives the confidential information entered by the user and transmits the information in keypad encoded form to the local first terminal (which forwards the information to the local second terminal).
Step 200: and receiving a judgment result of whether the keyboard code of the local second terminal is correct or not, wherein the judgment result is forwarded by the local first terminal.
After step 100, the local second terminal determines the keypad code, generates a determination result, and sends the determination result to the remote terminal (which is forwarded to the remote terminal by the local first terminal), and the remote terminal displays the determination result to the user for reference.
It can be understood that, in the method for implementing a remote secure keyboard provided in the embodiment of the present invention, first, a keyboard code required by the local second terminal is received and sent to the local first terminal, and then, a judgment result of the local second terminal for the keyboard code forwarded by the local first terminal is received and sent to the user. On the premise of ensuring safety, the invention realizes the convenience and high efficiency of remote operation of inputting confidential information and greatly saves time and cost. The defect that in the prior art, the service cannot be expanded because the confidential information control personnel are not local is overcome.
In an embodiment, the remote terminal and the local second terminal transmit the keypad code by using a preset encryption method.
Preferably, the preset encryption method may include: an external U shield, a TEE encryption method, an SE chip encryption method, an internal U shield, a soft certificate and the like. It can be understood that, in step 201, it can be ensured that the transmission information is stolen during the connection process between the remote mobile phone and the local mobile phone, thereby preventing the service related to the secret information from being utilized by a lawbreaker.
In one embodiment, the local first terminal forwards only the keypad code sent by the remote terminal to the local second terminal; the remote terminal and the local first terminal are both smart phones, and the local second terminal is a computer.
The above technical features have been explained and exemplified in detail in the system for implementing a remote security keyboard, and will not be described herein again.
The embodiment of the present invention further provides a specific implementation manner of a method for implementing a remote security keyboard, where the method is applied to a local second terminal, and referring to fig. 3, the method specifically includes the following steps:
step 300: a keypad code sent by the remote terminal and forwarded by the local first terminal is received.
Step 400: and judging whether the keyboard code is correct or not, and forwarding a judgment result to the remote terminal from the local first terminal.
Steps 300 and 400 are described herein in a banking scenario in which the remote terminal and the local first terminal are both smart phones and the local second terminal is a computer (to-be-received crypto computer). The supervisor for mastering the service password is not near the password computer to be received due to business difference, and just needs to implement the service related to the password urgently, the supervisor can connect the mobile phone (remote mobile phone) with the local mobile phone (the local mobile phone and the password computer to be received are positioned at the same position), and receives the screen information of the password computer to be received by means of the camera device of the local mobile phone, and inputs the password into the password computer to be received through the local mobile phone, so that the service is completed. Preferably, the local mobile phone does not retain any keyboard information transmitted by the remote mobile phone, so that the local mobile phone cannot acquire the keyboard input information after the operation is finished, and the security of the high-level authority password is ensured.
In one embodiment, the local first terminal is connected to the local second terminal through a USB data line, and monitors the keyboard code.
It should be noted that the local first terminal does not perform network communication or USB network sharing with the local second terminal, but only simulates the standard keyboard of the local second terminal, thereby achieving isolation of the mobile internet environment from the local second terminal stand-alone (or intranet).
In an embodiment, the storage mode of the local first terminal is random access.
A Random Access Memory (RAM), also called a main Memory, is an internal Memory that directly exchanges data with the CPU. It can be read and written at any time (except for refreshing), and has high speed, and is usually used as a temporary data storage medium of an operating system or other programs in operation. The RAM can write (store) or read (take out) information from any one of designated addresses at any time when it is operated. The biggest difference with the ROM is the volatility of data, i.e. the stored data will be lost as soon as power is turned off. The local mobile phone adopting the random access mode can bring the following beneficial effects: the program of the local mobile phone does not reserve any keyboard information transmitted by the remote mobile phone, so that the local mobile phone cannot acquire the keyboard input information after the operation is finished, and the security of the high-level authority confidential information is ensured.
In one embodiment, the monitoring the keypad code comprises:
and controlling the communication connection with the local first terminal in real time according to the sending speed of the keyboard code and/or the proportion of the control code in the character stream.
It can be understood that the input of the keyboard code is initiated by the user, if the input speed of the keyboard code is too fast (exceeds a preset value), the operation is determined to be illegal, the local second terminal immediately cuts off the communication connection with the local first terminal to ensure information security, and in addition, whether the keyboard code is illegal or not can be determined according to the occupation ratio of the control code in the character stream (in the transmission process, the most basic unit of transmission data is the character stream).
To further explain the scheme, the invention provides a specific application example of the method for implementing the remote secure keyboard by taking the bank large-amount storage service as an example, and the specific application example specifically includes the following contents, and refer to fig. 4.
In this specific application example, the local mobile phone corresponds to the local first terminal, the to-be-received password computer corresponds to the local second terminal, and the remote mobile phone corresponds to the remote terminal.
S0: and connecting the local mobile phone with the password computer to be received.
Specifically, local personnel access a local handset to the computer system via a USB cable. It should be noted that the local mobile phone does not perform network communication or USB network sharing with the to-be-received password computer, but only simulates the standard keyboard of the to-be-received password computer, thereby achieving isolation of the mobile phone internet environment from the single computer (or internal network) of the to-be-received password computer.
S1: and carrying out encrypted connection on the remote mobile phone and the local mobile phone.
In order to ensure reliability and safety, the encryption mode comprises an external U shield, a built-in U shield based on a TEE and SE chip security certificate, a soft certificate and the like. It can be understood that step S1 can ensure that the transmission information is stolen during the connection between the remote handset and the local handset, thereby avoiding the use of the service related to the password by the lawbreaker. It can be understood that the remote keyboard operator acquires the screen information of the to-be-received password computer by means of the camera of the local mobile phone, instead of acquiring the screen information by connecting the to-be-received password computer through a network, so that the local mobile phone is only one keyboard under the control of a program, and can also undertake the work of all local USB interface keyboards.
S2: and the supervisor inputs the required password of the password computer to be received through the remote mobile phone.
The remote mobile phone needs to be provided with a remote program, and the remote program needs to accept the keyboard input of the mobile phone and encrypt the keyboard code with an encryption medium. Meanwhile, the video conversation can be carried out with the other side, and the image of the computer screen of the other side can be seen. The local program uses the encryption medium to decrypt after receiving the data, and simulates a physical keyboard to send keyboard codes to the USB port. And simultaneously, starting a mobile phone camera to acquire a local computer screen image.
S3: the local mobile phone decrypts the password and transmits the password to the computer.
In step S2 and step S3, the keyboard (or the simulated keyboard of the mobile phone) code of the remote personnel is transmitted to the local mobile phone by way of encrypted communication of the mobile phone under the transmission of the encrypted network, the local mobile phone is connected to the USB interface of the computer by using the USB communication line, and the encrypted information transmitted from the remote mobile phone is decrypted, so as to transmit the encrypted information to the local computer in the original keyboard code form, thereby realizing the remote operation of the computer.
A supervisor acquires screen information by means of a camera of the local mobile phone and does not connect with a local computer through a network to acquire the screen information, so that the local mobile phone is only a keyboard under the control of a program and can bear the work of all local USB interface keyboards. In addition, the program of the local mobile phone does not reserve any keyboard information transmitted by the remote mobile phone, so that the local mobile phone cannot acquire the keyboard input information after the operation is finished, and the safety of the high-level authority password is ensured. Of course, the local personnel must also be reliable, otherwise he can disconnect the communication and take over the operation using the physical keyboard after entering the specific user remotely.
As can be seen from the above description, the method for implementing a remote security keyboard provided in the embodiments of the present invention uses a mobile phone to simulate a standard computer keyboard to remotely control a computer. The typical scene is that high-authority control personnel access a keyboard into a mobile phone through a USB port at other places and remotely work through the mobile phone; local personnel access the local mobile phone to the computer system through a USB line, and receive a keyboard coding instruction of the remote mobile phone by using the wireless network to drive the computer to work. Under the transmission of an encryption network, the keyboard (or the mobile phone simulation keyboard) code of a remote person is transmitted to a local mobile phone in a mobile phone encryption communication mode, the local mobile phone is connected to a computer USB interface by a USB communication line, and the encryption information transmitted by the remote mobile phone is decrypted, so that the original keyboard code form is transmitted to a local computer, and the remote operation of the computer is realized. On the premise of ensuring safety, the invention realizes the convenience and high efficiency of remote operation of password input in the fields of finance and communication, and saves time and cost.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the hardware + program class embodiment, since it is substantially similar to the method embodiment, the description is simple, and the relevant points can be referred to the partial description of the method embodiment.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
Although the present application provides method steps as in an embodiment or a flowchart, more or fewer steps may be included based on conventional or non-inventive labor. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual apparatus or client product executes, it may execute sequentially or in parallel (e.g., in the context of parallel processors or multi-threaded processing) according to the embodiments or methods shown in the figures.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A system for implementing a remote secure keyboard, comprising: local first terminal, local second terminal and remote terminal, wherein:
the local first terminal is connected with the local second terminal;
the remote terminal is remotely connected with the local first terminal;
the remote terminal is used for sending a keyboard code required by a local second terminal to the local first terminal and receiving a judgment result which is forwarded by the local first terminal and is used for judging whether the keyboard code is correct or not by the local second terminal;
the local first terminal is used for acquiring image data of the local second terminal, sending the image data to the remote terminal and forwarding a keyboard code sent by the remote terminal to the local second terminal;
the local second terminal is used for receiving the keyboard code forwarded by the local first terminal, judging whether the keyboard code is correct or not, sending a judgment result to the remote terminal from the local first terminal, and monitoring the keyboard code.
2. The system for implementing a remote security keyboard of claim 1, further comprising a camera device connected to the local first terminal for collecting the image data in real time.
3. The system for implementing a remote secure keyboard of claim 1, wherein the remote terminal and the local first terminal are both smart phones and the local second terminal is a computer.
4. A method for realizing a remote security keyboard is applied to a remote terminal, and is characterized by comprising the following steps:
sending a keyboard code required by the local second terminal to the local first terminal; and the local first terminal forwards the keyboard code to a local second terminal;
and receiving a judgment result of whether the keyboard code of the local second terminal is correct or not, wherein the judgment result is forwarded by the local first terminal.
5. The method of claim 4, wherein the remote terminal and the local second terminal transmit the keypad code using a predetermined encryption method.
6. The method for implementing a remote security keyboard according to claim 5, wherein the preset encryption method comprises: an external U shield, a TEE encryption method, an SE chip encryption method, an internal U shield and a soft certificate.
7. The method of claim 4, wherein the local first terminal forwards only the keypad code sent by the remote terminal to the local second terminal;
the remote terminal and the local first terminal are both smart phones, and the local second terminal is a computer.
8. A method for realizing a remote security keyboard is applied to a local second terminal, and is characterized by comprising the following steps:
receiving a keypad code transmitted by the remote terminal and forwarded by the local first terminal;
and judging whether the keyboard code is correct or not, and forwarding a judgment result to the remote terminal from the local first terminal.
9. The method for implementing a remote security keyboard of claim 8, wherein the local first terminal is connected to the local second terminal through a USB data line and monitors the keyboard code;
the remote terminal and the local first terminal are both smart phones, and the local second terminal is a computer.
10. The method of claim 9, wherein monitoring the keypad code comprises:
and controlling the communication connection with the local first terminal in real time according to the sending speed of the keyboard code and/or the proportion of the control code in the character stream.
CN202010396355.2A 2020-05-12 2020-05-12 System and method for realizing remote safety keyboard Pending CN111625806A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010396355.2A CN111625806A (en) 2020-05-12 2020-05-12 System and method for realizing remote safety keyboard

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010396355.2A CN111625806A (en) 2020-05-12 2020-05-12 System and method for realizing remote safety keyboard

Publications (1)

Publication Number Publication Date
CN111625806A true CN111625806A (en) 2020-09-04

Family

ID=72270958

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010396355.2A Pending CN111625806A (en) 2020-05-12 2020-05-12 System and method for realizing remote safety keyboard

Country Status (1)

Country Link
CN (1) CN111625806A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007082989A1 (en) * 2006-01-19 2007-07-26 Telcont Oy Set-up of a remote-control connection to a terminal device to be controlled
CN101132571A (en) * 2006-08-22 2008-02-27 薛飞 Method and system for displaying and operating remote computer on mobile phone
JP2010003207A (en) * 2008-06-23 2010-01-07 Nippon Telegr & Teleph Corp <Ntt> Remote operation target device and remote terminal authenticating method
CN101951364A (en) * 2010-08-25 2011-01-19 深圳市傲冠软件股份有限公司 Method and system for realizing security audit function in remote control process
US20160112384A1 (en) * 2014-10-19 2016-04-21 Waterfall Security Solutions Ltd. Secure remote desktop
CN110324212A (en) * 2018-03-30 2019-10-11 比亚迪股份有限公司 Mobile terminal and long-range control method and tele-control system based on it
US20200028839A1 (en) * 2017-03-30 2020-01-23 Optim Corporation System, method, and program for remotely supporting work

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007082989A1 (en) * 2006-01-19 2007-07-26 Telcont Oy Set-up of a remote-control connection to a terminal device to be controlled
CN101132571A (en) * 2006-08-22 2008-02-27 薛飞 Method and system for displaying and operating remote computer on mobile phone
JP2010003207A (en) * 2008-06-23 2010-01-07 Nippon Telegr & Teleph Corp <Ntt> Remote operation target device and remote terminal authenticating method
CN101951364A (en) * 2010-08-25 2011-01-19 深圳市傲冠软件股份有限公司 Method and system for realizing security audit function in remote control process
US20160112384A1 (en) * 2014-10-19 2016-04-21 Waterfall Security Solutions Ltd. Secure remote desktop
US20200028839A1 (en) * 2017-03-30 2020-01-23 Optim Corporation System, method, and program for remotely supporting work
CN110324212A (en) * 2018-03-30 2019-10-11 比亚迪股份有限公司 Mobile terminal and long-range control method and tele-control system based on it

Similar Documents

Publication Publication Date Title
US20170302646A1 (en) Identity authentication method and apparatus
CN108769027B (en) Secure communication method, device, mobile terminal and storage medium
CN106487659B (en) Information encryption method, information encryption device and terminal
CN104270353B (en) information security transmission method and system, receiving terminal and sending terminal
CN102970139A (en) Data security validation method and device
CN109672523A (en) Information ciphering method, device, equipment and readable storage medium storing program for executing based on filter
CN107196907A (en) A kind of guard method of Android SO files and device
CN105631655A (en) HCE-based mobile payment method, device and mobile terminal
CN112987942B (en) Method, device and system for inputting information by keyboard, electronic equipment and storage medium
CN114422237B (en) Data transmission method and device, electronic equipment and medium
CN113630412B (en) Resource downloading method, resource downloading device, electronic equipment and storage medium
CN111818466B (en) Information sending and receiving method and device, electronic equipment and readable storage medium
CN104392153A (en) Software protection method and system
CN105871840B (en) A kind of certificate management method and system
CN105072094B (en) A kind of method and car-mounted terminal of voice data encryption
CN105391673A (en) Safe access method and device
CN111625806A (en) System and method for realizing remote safety keyboard
CN106453335B (en) Data transmission method and device
CN115442164A (en) Multi-user log encryption and decryption method, device, equipment and storage medium
CN112637195B (en) Method and device for controlling electronic equipment and electronic equipment
CN106156571B (en) Encrypting fingerprint tool, encrypting fingerprint tool encrypting and deciphering system and encipher-decipher method
CN113032753A (en) Identity verification method and device
CN112882951A (en) Vehicle small program testing method, device, equipment, storage medium and program product
TWM605621U (en) Information transmission encryption protection system
CN106559393B (en) Method, device and system for encrypting call

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination