CN116108444A - Text safety input method and system - Google Patents

Text safety input method and system Download PDF

Info

Publication number
CN116108444A
CN116108444A CN202211441020.3A CN202211441020A CN116108444A CN 116108444 A CN116108444 A CN 116108444A CN 202211441020 A CN202211441020 A CN 202211441020A CN 116108444 A CN116108444 A CN 116108444A
Authority
CN
China
Prior art keywords
text
execution environment
module
trusted execution
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211441020.3A
Other languages
Chinese (zh)
Inventor
朱述波
朱恒毅
潘朝阳
王涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Rongka Technology Co ltd
Original Assignee
Wuxi Rongka Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Rongka Technology Co ltd filed Critical Wuxi Rongka Technology Co ltd
Priority to CN202211441020.3A priority Critical patent/CN116108444A/en
Publication of CN116108444A publication Critical patent/CN116108444A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
    • G06F3/0233Character input methods

Abstract

The invention discloses a text safe input method and a text safe input system, wherein the method comprises the following steps: in a trusted execution environment, acquiring touch information of a user according to input operation of the user and generating a text association request according to the touch information of the user; in a trusted execution environment or a rich execution environment, acquiring related characters corresponding to touch information from a pre-stored character word stock according to the character association request so as to generate a related character message; and in the trusted execution environment, acquiring related characters corresponding to the touch information according to the related character message, and displaying the related characters for selection. According to the text safe input method and system, the display and touch input functions are executed in the trusted execution environment, so that a text input information system is simple to realize, and text input and display safety is guaranteed.

Description

Text safety input method and system
Technical Field
The invention relates to the technical field of interfaces and inputs, in particular to a text safe input method and system based on a Trustzone technology.
Background
The existing text input method system is realized under android by a IMF (Input Method Framework) framework, when a user uses the system, the user clicks and inputs the text input method system under android, the touch system collects input information, the input information is transmitted into the text input method service system, and finally text results obtained by the input method system are selected by the user and displayed on an android interface. Therefore, the touch input characters and display data of the conventional mobile phone text input method system are extremely easy to be acquired by lawbreakers, so that personal information is revealed and modified, and malicious registration of personal identity information on websites and exposure and acquisition of related payment transfer information are caused.
Therefore, the security application using the smart phone Trustzone technology as a carrier is more and more widespread, although an interface for user input exists under the Trustzone, only the input display of numbers, letters and special symbols exists, and the requirements of Chinese security input in China cannot be met.
There is a need to provide a method for supporting secure text input, improving the security of personal text input, such as personal information registration, personal payment transfer information, etc.
Disclosure of Invention
In view of the above problems, the present invention aims to provide a text safe input method and system based on the trust zone technology, which enable a text input information system to be simple to implement and ensure the safety of text input and display by inputting and displaying in a trusted execution environment.
According to an aspect of the present invention, there is provided a text security input method applied to a terminal device, the terminal device including a trusted execution environment TEE and a rich execution environment REE, the security input method including: in a trusted execution environment, acquiring touch information of a user according to input operation of the user and generating a text association request according to the touch information of the user; in a trusted execution environment or a rich execution environment, acquiring related characters corresponding to touch information from a pre-stored character word stock according to the character association request so as to generate a related character message; and in the trusted execution environment, acquiring related characters corresponding to the touch information according to the related character message, and displaying the related characters for selection.
Optionally, obtaining, in the rich execution environment, related text corresponding to the touch information from a pre-stored text word stock according to the text association request, so as to generate a related text message includes: sending the text association request from the trusted execution environment to a rich execution environment; the rich execution environment calls a word library prestored in the rich execution environment according to the word association request to acquire related words corresponding to the touch information; and generating an associated text message according to the associated text corresponding to the touch information.
Optionally, the method further comprises: and sending the associated text message from the rich execution environment to the trusted execution environment.
Optionally, the method further comprises: when the application program calls the security input, entering a trusted execution environment and displaying a security input interface; and executing input operation on the safety input interface.
Optionally, the text includes at least one of Chinese, korean, and Japanese.
According to another aspect of the present invention, there is provided a text security input system applied to a terminal device, the terminal device including a trusted execution environment TEE and a rich execution environment REE, wherein the text security input system includes: the safe touch control module is positioned in the trusted execution environment and is used for acquiring touch control information of a user according to input operation of the user; the safety display module is positioned in the trusted execution environment and used for displaying related characters corresponding to the touch information for selection; the control module is positioned in the trusted execution environment, is respectively connected with the safety touch control module and the safety display module and is used for generating a text association request according to the touch control information of the user.
Optionally, the method further comprises: the text association module is positioned in a trusted execution environment or a rich execution environment and is used for acquiring related text corresponding to the touch information from a pre-stored text word stock according to the text association request so as to generate a related text message; and the text word library module is positioned in a trusted execution environment or a rich execution environment, is connected with the text association module and is used for pre-storing text information.
Optionally, when the word association module and the word library module are located in a rich execution environment, the method further includes: the first calling module is positioned in the trusted execution environment and connected with the control module, and is used for sending the text association request from the trusted execution environment to the rich execution environment; and the second calling module is positioned in the rich execution environment, connected with the text association module and used for receiving the text association request and sending the text association request to the text association module.
Optionally, after the text association module generates the associated text message, the second calling module sends the associated text message from the rich execution environment to the trusted execution environment, and the first calling module receives the associated text message.
Optionally, the text includes at least one of Chinese, korean, and Japanese.
According to the text safety input method and system, all functions of the text input method are executed in the trusted execution environment under the Trustzone platform, so that the safety of the text input method system can be effectively improved, information in safety display is prevented from being accessed, modified, covered and the like, information input by a user is prevented from being acquired and modified, personal information and the like are effectively protected, and the requirement of the user on the information safety of the text input method is met.
Further, the text association service and the text word library are placed in a rich execution environment under the trust zone platform, and the safety input and safety display functions are executed in the trusted execution environment, so that the requirement of a user on the information safety of the Chinese input method can be met, and the occupation of the resource space of the trusted execution environment is reduced.
Drawings
The above and other objects, features and advantages of the present invention will become more apparent from the following description of embodiments of the present invention with reference to the accompanying drawings, in which:
FIG. 1 shows a block diagram of a text security input system in accordance with a first embodiment of the invention;
FIG. 2 shows a flow chart of a text safe entry method according to a first embodiment of the invention;
FIG. 3 shows a schematic diagram of a text security input system in accordance with a second embodiment of the invention;
fig. 4 shows a flow chart of a text security input method according to a second embodiment of the invention.
Detailed Description
Embodiments of the technical scheme of the present invention will be described in detail below with reference to the accompanying drawings. The following examples are only for more clearly illustrating the technical aspects of the present invention, and thus are merely examples, and are not intended to limit the scope of the present invention.
It should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
As used in this specification and the appended claims, the term "if" may be interpreted in context as "when … …" or "upon" or "in response to a determination" or "in response to detection. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
It is noted that unless otherwise indicated, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this invention pertains.
Trustzone: trust zone, ARM hardware architecture.
TEE: trusted Execution Environment, trusted execution environment.
REE: rich Execution Environment, rich execution environments.
RPC: remote Procedure Call, remote procedure call.
security ui: a secure user interface.
secure touch: safe touch.
And (3) safety display: under the display interface, the screen cannot be captured and recorded.
In order to provide a thorough understanding of the present invention, detailed steps and detailed structures will be presented in the following description in order to explain the technical solution of the present invention. Preferred embodiments of the present invention are described in detail below, however, the present invention may have other embodiments in addition to these detailed descriptions.
FIG. 1 shows a block diagram of a text security input system in accordance with a first embodiment of the invention; fig. 2 shows a flow chart of a text security input method according to a first embodiment of the invention.
The ARM TrustZone hardware isolation technology and the trusted execution environment are used as basic platforms, the safe Chinese input environment with universality is realized, and under the scenes of inputting characters such as personal information registration, personal payment transfer and the like, a user is enabled to input in the trusted execution environment, so that the safety of user information is ensured.
Referring to fig. 1, an architecture diagram 100 of a text security input system according to a first embodiment of the present invention includes: a trusted execution environment TEE 110 and a rich execution environment REE, the trusted execution environment 110 for running a secure operating system; rich Execution Environment (REE) (refer to fig. 3) for running a general operating system.
The software and hardware resources accessed by the TEE are isolated from the REEs, the software and hardware resources on the terminal can be respectively identified as two execution environment states, the software and hardware resources identified as the safe execution state can only be accessed by the TEE execution environment, and the software and hardware resources identified as the unsafe execution state can be accessed by the two execution environments. The TEE provides protection and isolation of peripheral hardware resources, can provide a secure execution environment for authorized trusted software, and is widely used in payment, authentication, content protection, and the like.
In this embodiment, the terminal is, for example, a mobile device, including a smart phone, a tablet computer, and the like.
In the embodiment shown in fig. 1, a trusted application control module 111, a secure touch module 112, a secure display module 113, a text association module 114, and a text library module 115 are installed in the TEE. The control module 111 is connected to the security touch module 112, the security display module 113 and the text association module 114, and the text word stock module 115 is connected to the text association module 114.
When the user inputs sensitive information, the corresponding application program calls the safety input, so that the user enters the TEE and displays a safety input interface, and the user performs input operation under the safety input interface.
Specifically, after the application program invokes the security input, the user inputs the security input through the security touch module 112, the control module 111 obtains touch input information of the user and generates a text association request, the text association module 114 obtains related text corresponding to the touch information from text information prestored in the text word stock module 115 according to the text association request to generate a related text message, and the control module 111 displays the related text according to the related text message through the security display module 113 for the user to select and then inputs the related text message into the corresponding information box.
Fig. 2 shows a flowchart of a text security input method, and the text security input method of the first embodiment will be described in detail with reference to fig. 1.
In this embodiment, the corresponding application program is first caused to invoke the secure input by some operations, that is, to trigger the secure text input mode, to enter the secure display system of the TEE, and then to switch to the secure text input of the TEE. When the user clicks the input position of the sensitive information (such as personal information filling) on the display interface of the terminal, the user can trigger to enter the secure display system and then switch to secure text input, so that the information security of the user is ensured.
Further, after switching to the safe text input of the TEE, the user performs text information input under the safe touch module.
Step S10: the user inputs text information.
In this step, the user performs text information entry in sequence via the security touch module 112 according to the content list on the display interface. Wherein the security touch module 112 is, for example, a key press or a touch screen key press.
Further, the user may switch different input methods according to needs, including pinyin input method, wubi input method, handwriting input method, and the like, for example.
Step S20: and acquiring touch information of the user according to the input operation of the user.
In this step, the control module 111 performs preliminary arrangement on the touch information of the user by acquiring the sensing condition of the key or the touch screen, including sequentially recording the touch information of the user.
Step S30: and generating a text association request according to the touch information of the user.
The control module 111 makes an association request to the text association module 114 according to the text association request generated from the acquired user key information.
Step S40: and referring to the text font library according to the text association request, and generating an associated text message.
In this step, it is specifically divided into step S41: the word association module 114 invokes the word library module 115 according to the received word association request, and the word library module 115 retrieves relevant word information according to the user touch information corresponding to the word association request; step S42: the text association module 114 generates an associated text message with the associated text information.
The text information is pre-stored in the text word stock module 115, and is located in the SFS (Secure filesystem ) file system in the TEE. The text association module 114 generates an associated text message according to the corresponding relationship between the user touch information and the text in the text word stock module 115.
The word association is the way that the input method software associates the next word to be input by the user according to the possibility of the close co-occurrence of Chinese words and words, thereby reducing the input actions of the user. For example, if the user adopts the pinyin input method, the associated text message may include homonyms, related words of near pronunciation, text that may form words and sentences with the input pronunciation, and so on.
Step S50: and displaying the associated fonts according to the associated text messages.
In this step, the control module 111 displays association information on the terminal via the security display module 113 according to the association text message.
The information that the terminal can view at the last time is not necessarily capable of displaying all the contents of the associated text message, so that the information displayed at first is the information with the highest association degree with the touch information of the user in the associated text message, and other information users can view through changing the display information. The security display module 113 displays the information in the associated text messages in the order from high to low.
Step S60: the user selects a text character corresponding to the key input information.
In this step, the user selects the target information from the plurality of information of the associated text message displayed by the security display module 113.
Step S70: and acquiring selection information of the user.
In this step, the control module 111 obtains the target information selected by the user in the associated text message according to the touch operation of the user on the terminal interface.
Step S80: the literal characters are input into the information frame and displayed.
And inputting the selected target text characters into an information frame and displaying the information frame.
In this embodiment, since the information display is performed using the security display module 113, the user information input to the information frame can be secured.
According to the text safety input method and system, through executing all functions of the text input method in the trusted execution environment under the Trustzone platform, the safety of the text input method system can be effectively improved, information in safety display is prevented from being accessed, modified, covered and the like, information input by a user is prevented from being acquired and modified, personal information and the like are effectively protected, and therefore the requirement of the user on the information safety of the text input method is met.
The text safety input method and the text safety input system provided by the application can be deployed to platforms such as high pass, MTK and the like on the basis of the Trustzone. All TEE-based platforms can be replaced.
FIG. 3 shows a schematic diagram of a text security input system in accordance with a second embodiment of the invention; fig. 4 shows a flow chart of a text security input method according to a second embodiment of the invention. Compared with the text safety input method and system of the first embodiment, the text association module and the text library module are placed in the REE in the second embodiment, so that the resource occupation and load of the TEE are reduced.
Referring to fig. 3 and 4, a configuration diagram 200 of a text security input system according to a second embodiment of the present invention includes: a trusted execution environment TEE 110 and a rich execution environment REE 120, the trusted execution environment 110 for running a secure operating system; the rich execution environment 120 is used to run a common operating system.
A trusted application control module 111, a secure touch module 112 and a secure display module 113 are installed in the TEE; the REE is provided with a text association module 121 and a text library module 122. In order that the applications in the REEs and TEE can access each other, further comprising: a first calling module (TEE RPC Agent) 116 located in the TEE and a second calling module (re RPC Agent) 123 located in the re.
The control module 111 is connected to the security touch module 112, the security display module 113, and the first calling module 116, the text association module 121 is connected to the text word library module 122, and the second calling module 123, and the first calling module 116 is also connected to the second calling module 123. The first call module 116 is configured to request connection with the second call module 123, and is configured to process a connection request of the second call module 123; the second call module 123 is configured to process the connection request of the first call module 116, and request connection with the first call module 116.
The control module 111 in the TEE sends a text association request to the text association module 121 in the re via the first call module 116 and the second call module 123, and the text association module 121 in the re sends an associated text message to the control module 111 in the TEE via the second call module 123 and the first call module 116.
Specifically, the text security input system 200 shown in fig. 3 is used to perform the text security input method shown in fig. 4, and specific steps are as follows, and steps identical to those of the first embodiment will not be described in detail below, and only steps different from those of the first embodiment will be described in detail below.
Step S10: the user inputs text information.
Step S20: and acquiring touch information of the user according to the input operation of the user.
Step S30: and generating a text association request according to the touch information of the user.
The step S30 specifically further includes: step S31: and sending the text association request to the first calling module. In this step, after the control module 111 generates the text association request according to the user touch information, the text association request needs to be sent to the text association module 121, but since the text association module 121 is located in the re and the control module 111 is located in the TEE, the text association request and the text association request cannot be directly contacted, and the text association request needs to be sent to the first calling module 116 through the first calling module 116 and the second calling module 123, so that the android text association service is requested by the control module 111 in this step.
Step S32: the first calling module requests to connect with the second calling module. In this step, the first calling module 116 requests connection with the second calling module 123, thereby realizing connection of TEE and REE, and further sending a text association request to the second calling module 123.
Step S33: and sending the text association request to a text association module. In this step, the second calling module 123 sends a text association request to the text association module 121.
Step S40: and referring to the text font library according to the text association request, and generating an associated text message.
The step S40 specifically further includes: step S41: the word association module calls a word library module according to the received word association request, and the word library module retrieves relevant word information according to the user key information corresponding to the word association request.
In this step, the text association module 121 invokes the text word stock module 122 according to the received text association request, and the text word stock module 122 retrieves the related text information according to the user key information corresponding to the text association request.
Step S42: the text association module generates an associated text message from the associated text information.
In this step, after the text word stock module 122 searches the related text information according to the user key information corresponding to the text association request, the text association module 121 gathers and gathers the information searched by the text word stock module 122 and generates the related text message.
Step S43: the control module acquires the associated text message.
In this step, the associated text message generated by the text associating module 121 is sent to the first calling module 116 in the TEE via the second calling module 123, and then sent to the control module 111.
Step S50: and displaying the associated fonts according to the associated text messages.
Step S60: the user selects a text character corresponding to the key input information.
Step S70: and acquiring selection information of the user.
Step S80: the literal characters are input into the information frame and displayed.
In the text safety input method and the text safety input system of the second embodiment of the application, the text association module and the text library module are placed in the rich execution environment under the trust zone platform, and the safety touch and safety display functions are executed in the trusted execution environment, so that the requirement of a user on the information safety of the Chinese input method can be met, and meanwhile, the occupation of the resource space of the trusted execution environment is reduced.
Embodiments in accordance with the present invention, as described above, are not intended to be exhaustive or to limit the invention to the precise embodiments disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention and various modifications as are suited to the particular use contemplated. The invention is limited only by the claims and the full scope and equivalents thereof.

Claims (10)

1. A text security input method, applied to a terminal device, where the terminal device includes a trusted execution environment TEE and a rich execution environment REE, the security input method includes:
in a trusted execution environment, acquiring touch information of a user according to input operation of the user and generating a text association request according to the touch information of the user;
in a trusted execution environment or a rich execution environment, acquiring related characters corresponding to touch information from a pre-stored character word stock according to the character association request so as to generate a related character message;
and in the trusted execution environment, acquiring related characters corresponding to the touch information according to the related character message, and displaying the related characters for selection.
2. The text-safe input method of claim 1, wherein obtaining related text corresponding to touch information from a pre-stored text word stock according to the text association request in a rich execution environment to generate an associated text message comprises:
sending the text association request from the trusted execution environment to a rich execution environment;
the rich execution environment calls a word library prestored in the rich execution environment according to the word association request to acquire related words corresponding to the touch information;
and generating an associated text message according to the associated text corresponding to the touch information.
3. The text security input method of claim 2, further comprising:
and sending the associated text message from the rich execution environment to the trusted execution environment.
4. The text security input method of claim 1, further comprising:
when the application program calls the security input, entering a trusted execution environment and displaying a security input interface;
and executing input operation on the safety input interface.
5. The text-safe input method of claim 1, wherein the text comprises at least one of chinese, korean, and japanese.
6. A text security input system applied to a terminal device, the terminal device comprising a trusted execution environment TEE and a rich execution environment REE, wherein the text security input system comprises:
the safe touch control module is positioned in the trusted execution environment and is used for acquiring touch control information of a user according to input operation of the user;
the safety display module is positioned in the trusted execution environment and used for displaying related characters corresponding to the touch information for selection;
the control module is positioned in the trusted execution environment, is respectively connected with the safety touch control module and the safety display module and is used for generating a text association request according to the touch control information of the user.
7. The text-safe input system of claim 6, further comprising:
the text association module is positioned in a trusted execution environment or a rich execution environment and is used for acquiring related text corresponding to the touch information from a pre-stored text word stock according to the text association request so as to generate a related text message;
and the text word library module is positioned in a trusted execution environment or a rich execution environment, is connected with the text association module and is used for pre-storing text information.
8. The text-safe input system of claim 7, wherein the text-to-text module and the text-to-word library module are located in a rich execution environment, further comprising:
the first calling module is positioned in the trusted execution environment and connected with the control module, and is used for sending the text association request from the trusted execution environment to the rich execution environment;
and the second calling module is positioned in the rich execution environment, connected with the text association module and used for receiving the text association request and sending the text association request to the text association module.
9. The text-safe input system of claim 8, wherein the text association module sends the associated text message from the rich execution environment to the trusted execution environment after generating the associated text message, and the first call module receives the associated text message.
10. The text-safe input system of claim 6, wherein the text includes at least one of chinese, korean, and japanese.
CN202211441020.3A 2022-11-17 2022-11-17 Text safety input method and system Pending CN116108444A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211441020.3A CN116108444A (en) 2022-11-17 2022-11-17 Text safety input method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211441020.3A CN116108444A (en) 2022-11-17 2022-11-17 Text safety input method and system

Publications (1)

Publication Number Publication Date
CN116108444A true CN116108444A (en) 2023-05-12

Family

ID=86256917

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211441020.3A Pending CN116108444A (en) 2022-11-17 2022-11-17 Text safety input method and system

Country Status (1)

Country Link
CN (1) CN116108444A (en)

Similar Documents

Publication Publication Date Title
JP6732891B2 (en) Malware alert
US10097547B2 (en) Security verification method, apparatus and terminal
US8020215B2 (en) Anti keylog editor of activex base
US20130145475A1 (en) Method and apparatus for securing touch input
US20080115078A1 (en) Method for secure data entry in an application
US20040073809A1 (en) System and method for securing a user verification on a network using cursor control
CN106921799A (en) A kind of mobile terminal safety means of defence and mobile terminal
CA2857624A1 (en) Method and apparatus for securing touch input
US10992646B2 (en) Data transmission method and data transmission apparatus
EP3176719B1 (en) Methods and devices for acquiring certification document
WO2014027859A1 (en) Device and method for processing transaction request in processing environment of trust zone
US20170169594A1 (en) Method and electronic device for implementing video recommendation
US9035745B2 (en) Biometric authentication
CN105844180A (en) Starting method and device of input method keyboard
US20060164396A1 (en) Synthesizing mouse events from input device events
CN113867585B (en) Interface display method, device, electronic equipment and storage medium
US9131089B2 (en) Image processing system including image forming apparatus having touch panel
CN116108444A (en) Text safety input method and system
JP2021514503A (en) How to process data
CA2774802A1 (en) Windows kernel alteration searching method
US20190057206A1 (en) Generation of a captcha on a handheld touch screen device
CN111666581A (en) Data protection method, device, equipment and medium
CN106156586B (en) Control method and electronic equipment
CN116506215B (en) Access processing method, device, electronic equipment and storage medium
US20230113779A1 (en) Information processing apparatus, method for controlling information processing apparatus, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination