CN1327325C - Graphics keyboard based security input method for computer information - Google Patents

Graphics keyboard based security input method for computer information Download PDF

Info

Publication number
CN1327325C
CN1327325C CNB2004100509501A CN200410050950A CN1327325C CN 1327325 C CN1327325 C CN 1327325C CN B2004100509501 A CNB2004100509501 A CN B2004100509501A CN 200410050950 A CN200410050950 A CN 200410050950A CN 1327325 C CN1327325 C CN 1327325C
Authority
CN
China
Prior art keywords
character
input method
graphic keyboard
computer information
method based
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CNB2004100509501A
Other languages
Chinese (zh)
Other versions
CN1728062A (en
Inventor
(要求不公开姓名)
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHAOSHANG BANK CO Ltd
Original Assignee
ZHAOSHANG BANK CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHAOSHANG BANK CO Ltd filed Critical ZHAOSHANG BANK CO Ltd
Priority to CNB2004100509501A priority Critical patent/CN1327325C/en
Publication of CN1728062A publication Critical patent/CN1728062A/en
Application granted granted Critical
Publication of CN1327325C publication Critical patent/CN1327325C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Input From Keyboards Or The Like (AREA)

Abstract

The present invention relates to a safe input method for computer information based on a graphics keyboard, which comprises the steps that an input character set is determined in advance; an input interface area is determined on a display screen; characters in the character set determined in advance are drawn in a graphics or image mode and are displayed on the input interface area one by one; each character and the position relation of the character drawn and displayed in the input interface area are stored in a computer storage; when a user uses a mouse for hitting any point in the input interface area, an HOOK program embedded in user programs is utilized to capture the hitting point of the mouse; position information stored in the computer storage is retrieved, characters corresponding to the position information are output to be used as users' input. The safe input method provided by the present invention can effectively enhance the safety of data input of terminal users and eliminate the phenomenon that horse programs and other programs are possible to intercept and steal number and character input signals of conventional keyboards, so that the system safety is improved greatly.

Description

Computer information safe input method based on graphic keyboard
Technical field
The present invention relates to computer security technique, more particularly, relate to a kind of computer information safe input method based on graphic keyboard.
Background technology
Computer utility be unable to do without input and output, wherein keyboard input is the most frequently used also information input medium the most easily, especially to importing a spot of numeral, character information is especially true, though and also there are the hidden danger of secure context in conventional keyboard input digit and alphabetical process facility, for example, stealing the keyboard input is the function that a kind of popular trojan horse program all possesses, any one computer level is not high, there is not the people of programming development ability can both use and propagate trojan horse program, the trojan horse program major part that the user computer of having discovered and seized infects is from these people's propagation, make the time by keyboard input digit or character, the numeral that might import and character are stolen by the trojan horse program of computer infected, feasible key message such as password by keyboard, encrypted messages etc. may illegally be usurped, and have very big potential safety hazard.
Summary of the invention
The technical problem to be solved in the present invention provides a kind of safe computer information safe input method, can be used in the safety input of computerized information, raising is by the threshold of assault, and reduction comprises that the bad program of trojan horse program is to comprising the harm of significant data securities such as Internet bank's account number and password to a great extent.
The above-mentioned technical matters of the present invention solves like this, construct a kind of by changing the mode of significant datas such as user's keyboard input password, the input alphabet, the digital form that provide a kind of raising to comprise the applications of computer network system data safety of system of the Internet bank etc., and then strengthen the security of customer data and application system.Specifically comprise a kind of computer information safe input method of structure, it is characterized in that, may further comprise the steps: pre-determine the input character set based on graphic keyboard; On display screen, determine the inputting interface zone; To belong to each character that pre-determines in the character set draws and is presented at one by one on the described inputting interface zone with figure or image mode; The position relation that each character and this character are drawn and are presented in the described inputting interface zone is kept in the computer memory; When the user belongs to any one point in described inputting interface zone by click, intercept and capture the click position by " HOOK " program that is embedded in the user program; Retrieve the positional information of preserving in the described computer memory, output and of the input of this positional information corresponding characters as the user.
Above-mentioned according to the computer information safe input method based on graphic keyboard of the present invention in, it is characterized in that, when importing, be to determine at random in the inputting interface zone that display screen is determined at every turn.
Above-mentioned according to the computer information safe input method based on graphic keyboard of the present invention in, it is characterized in that when importing, each belongs to the display position of character on described inputting interface zone that pre-determines character set is changeable at every turn.
Above-mentioned according to the computer information safe input method based on graphic keyboard of the present invention in, describedly pre-determine input character set and comprise from comprise " 0 "-" 9 ", " a "-" z ", " A "-" Z ", ". ", " * ", "-", "+", " ", " ← ", " ↑ ", " → ", " ↓ " set and select the relevant subclass of current application program.
Above-mentioned according to the computer information safe input method based on graphic keyboard of the present invention in, it is characterized in that, described each character is drawn with figure or image mode is performed such: according to the normal font of shown character, select at random to comprise that inclination, distortion, elongation, background increase pit, background and increase snowflake, background and increase a kind of distortion of carrying out normal font in the vision noise methods such as lines, determine the required figure that comprises parameter such as background color and form of distortion simultaneously at random and shown.
Implement the computer information safe input method based on graphic keyboard provided by the invention, can effectively be applied to the network computer application system, ensure the security of terminal user's data input, by the HOOK program is set at terminal program, carry out the digital inputting interface and the input process of the inventive method, can effectively stop trojan horse program and other program possible to the intercepting of conventional keyboard digital, character input signal and steal, thereby improve the security of user data and whole application system greatly.
Description of drawings
Fig. 1 utilizes the inventive method to produce the synoptic diagram of the graphic keyboard that is used to import on display screen;
Fig. 2 is the synoptic diagram that utilizes the inventive method to produce to be used to the graphic keyboard of clicking input on display screen;
Fig. 3 is the logic flow synoptic diagram of an embodiment that the present invention is based on the computer information safe input method of graphic keyboard;
Embodiment
In conjunction with the accompanying drawings and embodiments, the inventive method is described in further detail.
1, the main points of computer information safe input method of the present invention
The present invention solve the computer information safe input method at be the input of a small amount of critical data, for example, account number, these data that must import of password.The present invention solves the safe input problem of critical data by the local nonstandardized technique of network terminal application program loading routine, based on viewpoint be when needing to import in the program, jump out the keyboard of a graphic presentation from display screen, the alphabet that has user's present input data to use on this keyboard, the numeral of 1-9 for example, the English alphabet of A-Z, carriage return or acknowledgement key can also be arranged, decimal key etc., the present invention is except adopting the graphics mode display button, also have two randomnesss, the one, the band of position that keyboard shows on screen is uncertain, but the position on the keyboard area of each button may also be uncertain, but these are uncertainly produced and record and do not influence the collection of input data by user program.
2, safety drawing keyboard
In one embodiment of the invention, " safety drawing keyboard " program is the program that a graphical interfaces shows and handles, and the user comes the substituting for key input by the button that draws in this interface of click.It has following characteristics, and these characteristics all are to be used for containing attacking or the difficulty of the dangerous program attack that increase system at least may hide:
1, the shown interface of this program comprises 0-9, and numeral and letter keys such as A-Z can be imported according to the user and require to determine this set.
The relative position of 2, the position of interfaces windows, and button all can random variation in showing each time
3, " 0 " of each demonstration, characters such as " A " all is that program is drawn voluntarily, compares with normal font, and certain distortion is all arranged, the degree and the mode of distortion are at random, and distortion comprises 1) tilt 2) distortion, 3) elongate, 4) background increases pit, snowflake, vision noises such as lines.
4, user terminal program oneself is created hook (HOOK) program and is intercepted and captured click message, avoids being intercepted and captured by other programs in the system.
3, embodiment
Fig. 1-Fig. 3 shows one embodiment of the present of invention.Can be implemented by following steps from the visible the inventive method of the process flow diagram shown in Fig. 3.
1) as Fig. 1, at first determining will be at the where display graphics keyboard 200 of screen 100, chosen position (X0 at random, Y0) and big or small dx and dy (frame 301), create the graphic keyboard window, as Fig. 2, it is oval keyboard window herein, also can be other shapes,, the background of keyboard is made as transparent (frame 302) as rectangle etc.(dx, random offset dy) is at (X0+dx, Y0+dy) graphing keyboard on the position downwards to the right to produce one.
2) according to keyboard position (4 row) or lexicographic order (6 row) (frame 303) 36 buttons (frame 304) that draw successively, comprise 26 letter keys and 10 numerical keys.Distance between the row between the row also can be set at random.
3) method of the single button of picture: determine to press key range (position, long * wide) (frame 305), draw some differing in size, the round dot that color is different (frame 306), determine a certain background primary colours (frame 307), select from left to right or the drafting of gradual manner from top to down button background (frame 308).The character that calculating will show tilts or distortion (frame 309) by certain angle, and the bitmap (frame 310) after twisting and elongate with direction by a certain percentage is with button background stack (frame 311).
4) continuity of destruction stroke: to whole graphic keyboard, draw the different lines of some thickness length (frame 312), disturb lines as shown in Figure 2, to destroy the continuity of each alphabetical stroke, the increase program is used the difficulty of mode identification technology analyzed pattern corresponding characters.
5) position and the size (frame 313) of each button of record in internal memory.
6) finish the drafting of graphic keyboard after, intercept and capture user's click message, compared with the key position in the internal memory in the click position, determine user's input (frame 314).Do not return this click message then to system.
Reach better effect for implementing the present invention, need predict, the convenience that comprehensive user uses, the suitably randomness of design configuration key position and the randomness of distortion the attack method of trojan horse program.Simultaneously, should also be clear that message kind and number and whole these message of intercepting and capturing in the HOOK program that click produces in the windows system.

Claims (10)

1, a kind of computer information safe input method based on graphic keyboard is characterized in that, may further comprise the steps: a) pre-determine the input character set; B) on display screen, determine the inputting interface zone; C) will belong to each character that pre-determines in the character set draws and is presented at one by one on the described inputting interface zone with figure or image mode; D) the position relation that each character and this character are drawn and are presented in the described inputting interface zone is kept in the computer memory; E) when the user belongs to any one point in described inputting interface zone by click, intercept and capture the click position by " HOOK " program that is embedded in the user program; F) positional information of preserving in the described computer memory of retrieval, output and of the input of this positional information corresponding characters as the user.
2, the computer information safe input method based on graphic keyboard according to claim 1 is characterized in that, when importing, is to determine at random in the inputting interface zone that display screen is determined at every turn.
3, the computer information safe input method based on graphic keyboard according to claim 1 and 2 is characterized in that, when importing, each belongs to the display position of character on described inputting interface zone that pre-determines character set is changeable at every turn.
4, the computer information safe input method based on graphic keyboard according to claim 3, it is characterized in that, describedly pre-determine input character set and comprise from comprise " 0 "-" 9 ", " a "-" z ", " A "-" Z ", ". ", " * ", "-", "+", " ", " ← ", " ↑ ", " → ", " ↓ " set and select the relevant subclass of current application program.
5, the computer information safe input method based on graphic keyboard according to claim 3, it is characterized in that, described each character is drawn with figure or image mode is performed such: according to the normal font of shown character, select at random to comprise that inclination, distortion, elongation, background increase pit, background and increase snowflake, background and increase a kind of distortion of carrying out normal font in the vision noise method of lines, determine the required figure that comprises parameter such as background color and form of distortion simultaneously at random and shown.
6, the computer information safe input method based on graphic keyboard according to claim 1, it is characterized in that, described step b) may further comprise the steps: select the position (X0 on the display screen at random, Y0) create the graphic keyboard window, produce a downward (dx to the right, dy) random offset, (X0+dx, Y0+dy) rendering context is set to transparent graphic keyboard on the position; Described step c) may further comprise the steps: c1) according to keyboard position or lexicographic order a plurality of buttons that draw successively, the distance between each button row, column is set at random; C2) draw single button: the indication range of c3) determining single button with position, three parameters of length and width, in indication range, draw some differing in size, the round dot that color is different, c4) determine a certain background primary colours, select from left to right or gradual manner is from top to down drawn the button background, c5) calculate the character that will show and tilt by certain angle, the bitmap after twisting and elongate with direction by a certain percentage superposes with the button background.
7, the computer information safe input method based on graphic keyboard according to claim 6, it is characterized in that described step c1) also comprise before the whole described graphic keyboard that is depicted as is drawn the different lines of some thickness length in order to destroy the successional step of each alphabetical stroke.
8, the computer information safe input method based on graphic keyboard according to claim 6, it is characterized in that, at described step c3) also be included in the position of each button of record in the internal memory and the step of size, wherein, size is meant by the length in the bond parameter and wide.
9, the computer information safe input method based on graphic keyboard according to claim 6 is characterized in that, also be included in intercept and capture user's click message and determine user's button input after, step from this click message to system that do not return is set.
10, the computer information safe input method based on graphic keyboard according to claim 1 is characterized in that, described method is to realize by the user program that is arranged on the terminal.
CNB2004100509501A 2004-07-30 2004-07-30 Graphics keyboard based security input method for computer information Expired - Lifetime CN1327325C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100509501A CN1327325C (en) 2004-07-30 2004-07-30 Graphics keyboard based security input method for computer information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100509501A CN1327325C (en) 2004-07-30 2004-07-30 Graphics keyboard based security input method for computer information

Publications (2)

Publication Number Publication Date
CN1728062A CN1728062A (en) 2006-02-01
CN1327325C true CN1327325C (en) 2007-07-18

Family

ID=35927375

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100509501A Expired - Lifetime CN1327325C (en) 2004-07-30 2004-07-30 Graphics keyboard based security input method for computer information

Country Status (1)

Country Link
CN (1) CN1327325C (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8161395B2 (en) 2006-11-13 2012-04-17 Cisco Technology, Inc. Method for secure data entry in an application
CN101075873B (en) * 2007-06-28 2012-10-03 腾讯科技(深圳)有限公司 Method and system for inputting content
CN101593256B (en) * 2008-05-26 2010-09-08 北京飞天诚信科技有限公司 Safe input method based on Windows operating system
CN102566924B (en) * 2011-12-26 2014-01-01 重庆新媒农信科技有限公司 Soft keyboard operation processing method capable of enhancing safety protection
CN103597428B (en) * 2012-06-14 2017-02-15 软质层科技公司 System and method for secure data entry
CN105279445A (en) * 2014-06-09 2016-01-27 全宏科技股份有限公司 Data input and transmission method and system
CN104820799A (en) * 2015-04-07 2015-08-05 深圳天珑无线科技有限公司 Terminal having touch display screen and password protection method thereof
CN107589833A (en) * 2017-08-08 2018-01-16 阿里巴巴集团控股有限公司 Safety protecting method, device and VR terminal devices based on VR scenes
CN110297678B (en) * 2018-03-22 2024-02-06 北京搜狗科技发展有限公司 Input method interface processing method and device
CN109978972B (en) * 2019-03-20 2023-04-25 郑州阿帕斯科技有限公司 Method and device for editing characters in picture

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1274883A (en) * 2000-07-11 2000-11-29 中国石油天然气总公司油气开发计算机软件工程研究中心 Simplified spelling-touching screen mouse Chinese character input method
US20030025715A1 (en) * 2001-07-18 2003-02-06 International Business Machines Corporation Method and apparatus for generating input events

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1274883A (en) * 2000-07-11 2000-11-29 中国石油天然气总公司油气开发计算机软件工程研究中心 Simplified spelling-touching screen mouse Chinese character input method
US20030025715A1 (en) * 2001-07-18 2003-02-06 International Business Machines Corporation Method and apparatus for generating input events

Also Published As

Publication number Publication date
CN1728062A (en) 2006-02-01

Similar Documents

Publication Publication Date Title
US9990488B2 (en) Secure data entry
US7624277B1 (en) Content alteration for prevention of unauthorized scripts
US9027122B2 (en) Isolation tool for user assistance in solving a captcha test
CN101183412B (en) Method and device for secure data entry in an application
US8212833B2 (en) Secure computer screen entry system and method
CA2569634C (en) Method and system to generate an image for monitoring user interaction with a computer
US20060174339A1 (en) An arrangement and method of graphical password authentication
EP2410450A1 (en) Method for providing a challenge based on a content
JP2011216114A (en) High performance content alteration architecture and technique
CN1327325C (en) Graphics keyboard based security input method for computer information
Kumar et al. A systematic survey on CAPTCHA recognition: types, creation and breaking techniques
Zheng et al. A stroke-based textual password authentication scheme
Khan et al. Cyber security using arabic captcha scheme.
CN106778151A (en) Method for identifying ID and device based on person's handwriting
Nguyen et al. On the security of text-based 3D CAPTCHAs
Roshanbin et al. ADAMAS: Interweaving unicode and color to enhance CAPTCHA security
US20160239656A1 (en) Test for distinguishing between a human and a computer program
Chaudhari et al. 3D drag-n-drop CAPTCHA enhanced security through CAPTCHA
CN112883951B (en) Method, system and storage medium for protecting sensitive content
CN113190310B (en) Verification code design method based on random position object semantic recognition
JP6168645B2 (en) Reverse Turing test method and access authentication method
CN106326700A (en) Password safety input method and device of touch display screen of POS (Point Of Sale) machine
Roshanbin Interweaving unicode, color, and human interactions to enhance CAPTCHA security
US20130340091A1 (en) Method of creating ui layouts with desired level of entropy
CN105320906A (en) Information safety protecting method and device for mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant