KR101768030B1 - Input device and method for security keyboard - Google Patents

Input device and method for security keyboard Download PDF

Info

Publication number
KR101768030B1
KR101768030B1 KR1020160031720A KR20160031720A KR101768030B1 KR 101768030 B1 KR101768030 B1 KR 101768030B1 KR 1020160031720 A KR1020160031720 A KR 1020160031720A KR 20160031720 A KR20160031720 A KR 20160031720A KR 101768030 B1 KR101768030 B1 KR 101768030B1
Authority
KR
South Korea
Prior art keywords
security
keyboard
coordinate information
information
general
Prior art date
Application number
KR1020160031720A
Other languages
Korean (ko)
Inventor
홍만표
김지민
지청민
Original Assignee
아주대학교산학협력단
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 아주대학교산학협력단 filed Critical 아주대학교산학협력단
Priority to KR1020160031720A priority Critical patent/KR101768030B1/en
Application granted granted Critical
Publication of KR101768030B1 publication Critical patent/KR101768030B1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04886Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
    • H04M1/72519
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2201/00Electronic components, circuits, software, systems or apparatus used in telephone systems
    • H04M2201/38Displays

Abstract

The present invention relates to a security keyboard input device and an input method thereof and, more specifically, to a security keyboard input device using a virtual key pad and an input method thereof. According to an embodiment of the present invention, the security keyboard input device comprises: an input unit which generates common coordinate information, corresponding to users manipulation of a common key board, outputs the common coordinate information, generates first security coordinate information, corresponding to users manipulation of a first security keyboard, and outputs the first security coordinate information; and a control unit which controls the common keyboard to be displayed in a predetermined common keyboard area, controls the first security keyboard, corresponding to the input common coordinate information, to be displayed in a first security keyboard area, and generates an input signal corresponding to the first security coordinate information. According to the present invention, when a user touches the keypad, the security keyboard is displayed in a new area. Therefore, leakage of users input information can be prevented even when leakage of users touch coordinate information occurs.

Description

TECHNICAL FIELD [0001] The present invention relates to a security keyboard input device,

The present invention relates to a security keyboard input device and an input method thereof, and more particularly, to a security keyboard input device using a virtual keyboard and an input method thereof.

Recently, with the rapid development of the Internet and computer technology, important tasks such as internet banking, stock trading and electronic payment in internet shopping mall have been performed through mobile communication terminals. In a financial transaction or an electronic commerce through a mobile communication terminal, a user goes through an authentication process of inputting user's personal information such as an ID and a password in order to prove his / her identity. However, there is a risk that keyboard input information may be leaked through a spyware or a keystroke logger installed in a smartphone by a third party in inputting personal information through a keyboard.

In order to solve such a problem, a method of detecting a malicious program such as spyware by installing an antivirus or a spyware removal tool on the mobile communication terminal is used. However, such a method can not detect a case in which a malicious modification or a new malicious program occurs, and thus there is a problem in preventing damage in advance.

Another conventional method for preventing keyboard hacking is disclosed in Korean Patent Registration No. 0496462 entitled " Method for preventing keystroke hacking ". The Korean Patent Publication describes a method of displaying a virtual keyboard on a screen of a user terminal and receiving a key input from a user through a virtual keyboard. However, this method has a problem in that, when a hacking program for collecting coordinate information inputted by a user is installed in a user terminal, a third party can obtain input information by analyzing the input coordinate information of the user.

Technical Solution According to the present invention, there is provided a security keyboard input device and an input method for preventing a leakage of user's input information even if a touch coordinate information of a user is leaked.

The security keyboard input device according to an embodiment of the present invention generates and outputs general coordinate information corresponding to a user's general keyboard operation and generates first security coordinate information corresponding to the first security keyboard operation of the user, ; And controls the general keyboard to be displayed in a predetermined general keyboard area, controls the first security keyboard corresponding to the input general coordinate information to be displayed in the first security keyboard area, And a control unit for generating an input signal.

According to an embodiment of the present invention, the control unit may determine whether the general coordinate information corresponds to a predetermined security order, and to control the first security keyboard to be displayed in the first security keyboard area have.

According to an embodiment, the control unit may generate an input signal corresponding to the general coordinate information if it does not correspond to the security order.

According to an embodiment of the present invention, the control unit controls the first security keyboard to be displayed on the first security keyboard area using first key group information corresponding to the general coordinate information, It may be part of the key information contained in the generic keyboard.

According to an embodiment, the first key group information may correspond to vertical coordinate information of the general coordinate information.

According to an embodiment of the present invention, the first key group information corresponds to n pieces of key information adjacent to the general coordinate information, the general keyboard includes m pieces of key information, m is a natural number of 2 or more, m < / RTI >

According to an embodiment of the present invention, when the first security coordinate information is inputted, the controller determines whether or not the security enhanced mode is set, and if the security enhanced mode is determined, the second security keyboard corresponding to the first security coordinate information is displayed Can be controlled.

According to an embodiment, the control unit may control the second security keyboard to be displayed in a second security keyboard area different from the first security keyboard area.

According to an embodiment of the present invention, the control unit controls the second security keyboard to be displayed using second key group information corresponding to the first security coordinate information, and the second key group information is displayed on the first security keyboard The arrangement or information may be different from the contained key information.

According to an embodiment, the input unit generates and outputs second security coordinate information corresponding to the second security keyboard operation of the user, and the control unit generates an input signal corresponding to the second security coordinate information .

According to another aspect of the present invention, there is provided a security keyboard input method including: displaying a general keyboard in a predetermined general keyboard area; Generating general coordinate information corresponding to the user's general keyboard operation; Displaying a first security keyboard corresponding to the general coordinate information on a first security keyboard area; Generating first security coordinate information corresponding to the first secure keyboard operation of the user; And generating an input signal corresponding to the secure coordinate information.

According to an embodiment of the present invention, the security keyboard input method further includes determining whether the general coordinate information corresponds to a preset security sequence number when the general coordinate information is generated, wherein the first security keyboard is displayed on the first security keyboard area May include controlling the first security keyboard to be displayed in the first security keyboard area if the security sequence number corresponds to the security sequence number.

According to an embodiment of the present invention, the secure keyboard input method may further include generating an input signal corresponding to the general coordinate information if the security order does not correspond to the security order.

According to an embodiment, the step of displaying the first security keyboard on the first security keyboard area may include: using the first key group information corresponding to the general coordinate information, And the first key group information may be a part of key information included in the general keyboard.

According to an embodiment, the first key group information may correspond to vertical coordinate information of the general coordinate information.

According to an embodiment of the present invention, the first key group information corresponds to n pieces of key information adjacent to the general coordinate information, the general keyboard includes m pieces of key information, m is a natural number of 2 or more, m < / RTI >

According to an embodiment of the present invention, the secure keyboard input method may include: determining whether the first security coordinate information is input in a security enhanced mode; And displaying a second security keyboard corresponding to the first security coordinate information when the security enhanced mode is determined.

According to an embodiment, the step of displaying the second security keyboard may include displaying the second security keyboard in a second security keyboard area different from the first security keyboard area.

According to an embodiment, the step of displaying the second security keyboard may include displaying the second security keyboard using second key group information corresponding to the first security coordinate information, The key group information may be different in arrangement or information from the key information included in the first security keyboard.

According to an embodiment, the secure keyboard input method further comprises: generating second security coordinate information corresponding to the second secure keyboard operation of the user; And generating an input signal corresponding to the second security coordinate information.

The security keyboard input device and the input method thereof according to the embodiments of the present invention can prevent the user's input information from being leaked even if the touch coordinate information of the user is leaked because the security keyboard is displayed in a new area according to the key input of the user have.

BRIEF DESCRIPTION OF THE DRAWINGS A brief description of each drawing is provided to more fully understand the drawings recited in the description of the invention.
1 is a block diagram of a security keyboard input system according to an embodiment of the present invention;
2 is a block diagram of a security keyboard input device according to an embodiment of the present invention;
3 illustrates an operation in which a first secure keyboard is displayed in accordance with one embodiment of the present invention.
4 illustrates an operation in which a first secure keyboard is displayed in accordance with another embodiment of the present invention.
Figure 5 illustrates an operation in which a first secure keyboard is displayed in accordance with another embodiment of the present invention.
6 illustrates an operation in which a first secure keyboard is displayed in accordance with another embodiment of the present invention.
7 illustrates an operation in which a second secure keyboard is displayed in accordance with one embodiment of the present invention.
FIG. 8 is a flowchart of a method of inputting a security keyboard according to an embodiment of the present invention; FIG.

While the present invention has been described in connection with certain exemplary embodiments, it is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, is intended to cover various modifications and similarities. It should be understood, however, that the invention is not intended to be limited to the particular embodiments, but includes all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, the present invention will be described in detail with reference to the accompanying drawings. In addition, numerals (e.g., first, second, etc.) used in the description of the present invention are merely an identifier for distinguishing one component from another. Also, in this specification, when an element is referred to as being "connected" or "connected" with another element, the element may be directly connected or directly connected to the other element, It should be understood that, unless an opposite description is present, it may be connected or connected via another element in the middle. It should be noted that the terms such as " unit, "" to, "and" to module ", as used herein, mean units for processing at least one function or operation, Or a combination of hardware and software.

It is to be clarified that the division of constituent parts in this specification is merely a division by each main function of each constituent part. That is, two or more constituent parts to be described below may be combined into one constituent part, or one constituent part may be divided into two or more functions according to functions that are more subdivided. In addition, each of the constituent units described below may additionally perform some or all of the functions of other constituent units in addition to the main functions of the constituent units themselves, and that some of the main functions, And may be carried out in a dedicated manner. Embodiments of the present invention will be described in detail with reference to the drawings.

1 is a block diagram of a security keyboard input system according to an embodiment of the present invention.

1, a security keyboard input system 100 according to an exemplary embodiment of the present invention includes a server 110 and a secure keyboard input device 130, and includes a server 110 and a secure keyboard input device 130, May be wired or wirelessly connected via network 120. Hereinafter, the operation of each component of the security keyboard input system 100 according to an embodiment of the present invention will be described.

The server 110 provides an online service to the secure keyboard input device 130 connected through the network 120. [ For example, the server 110 may provide an on-line financial service (e.g., a credit card payment service via online, a money transfer service on-line, etc.) to the secure keyboard input device 130. When the secure keyboard input device 130 logs in to the server 110 in order to receive the financial service, the server 110 may request to provide the user's personal information in order to authenticate the user. The server 110 may authenticate the personal information received from the security keyboard input device 130 and provide the online financial service requested by the security keyboard input device 130 when it is determined that the user is a legitimate user. In this case, the server 110 may be a credit card company or a server operated by a bank.

The network 120 may connect the server 110 and the secure keyboard input device 130 in a wired and / or wireless manner. Accordingly, the server 110 and the security keyboard input device 130 can exchange various information through the network 120. [ The network 120 can be applied regardless of the type of a communication network that can connect the server 110 and the security keyboard input device 130 such as the Internet, an intranet, a mobile network, have. Thus, the type of network 120 does not limit the scope of rights of the present invention.

The security keyboard input device 130 can exchange various information with the connected server 110. The security keyboard input device 130 may be any type of device that can be connected to the server 110 such as a mobile terminal, a tablet computer, a laptop computer, a desktop computer, But can be applied irrespective of the type. In particular, the security keyboard input device 130 may generate the information through a security keyboard according to a predetermined method when generating security-required information. When security-required information is generated through a keyboard (hereinafter, referred to as a 'general keyboard') that is basically set in the security keyboard input device 130, keyboard input information is leaked by a spyware or a keystroke logger, Because it can be leaked. Hereinafter, the operation in which the secure keyboard input device 130 generates information requiring security will be described in more detail with reference to FIG.

2 is a block diagram of a security keyboard input device according to an embodiment of the present invention.

2, the security keyboard input device 130 includes a control unit 210, an input unit 220, a display unit 230, and a communication unit 240.

First, the control unit 210 controls the overall operation of the security keyboard input device 130. In particular, the control unit 210 controls each component of the security keyboard input device 130 to perform various operations corresponding to the operation of the user's input unit 220, which will be described later.

The input unit 220 may be an apparatus for generating information on a coordinate value corresponding to a user's operation. For example, if the secure keyboard input device 130 is a device such as a laptop computer or a desktop computer, to which a keyboard device is connected, the input device 220 may be a mouse, a touch pad, or the like. For example, when the security keyboard input device 130 is a device in which a keyboard device such as a mobile communication terminal, a tablet computer, or the like is not connected, the input unit 220 may be a touch screen or the like integrated with the display unit 230 have.

The display unit 230 displays various information output from the control unit 220 so that the user can visually recognize the information. The display unit 130 may be a device such as a liquid crystal display (LCD) or an organic light emitting display (OLED).

The communication unit 240 may be a device connected to the network 120 to exchange various information with the server 110. In particular, the communication unit 240 may transmit information (for example, personal information such as an ID and a password) generated by the control unit 210 to the server 110. Hereinafter, an operation of each component of the security keyboard input device 130 to generate information requiring security through a predetermined security keyboard will be described.

First, the control unit 210 controls the general keyboard to be displayed in a predetermined area (hereinafter, referred to as 'general keyboard area') according to the operation of the input unit 220 of the user. For example, when the security keyboard input device 130 is a mobile communication terminal, the control unit 210 may control the general keyboard to be displayed at the lower end of the entire area of the display unit 230.

Then, the input unit 220 can generate and output coordinate information (hereinafter, referred to as 'general coordinate information') corresponding to the user's general keyboard area operation. When the general coordinate information is inputted, the controller 210 can determine whether or not it corresponds to a preset security order. For example, it is assumed that the first key, the third key, and the sixth key are input through the security keyboard, and the remaining keys are preset to be input through the normal keyboard. At this time, the control unit 210 may determine whether the input general coordinate information corresponds to the first, third, or sixth key. Therefore, if the user inputs personal information composed of 7 keys (for example, 1234567), '1', '3' and '6' can be input through the security keyboard, and '2', '4' 5 'and' 7 'will be able to be input via the normal keyboard.

The control unit 210 may generate an input signal corresponding to the general coordinate information if the input general coordinate information does not correspond to the security order. When the user operates an area corresponding to 'e' through a general keyboard, the control unit 210 can generate an input signal corresponding to 'e'.

The control unit 210 may control the first security keyboard corresponding to the first general coordinate information to be displayed in the first security keyboard area set in advance if the inputted general coordinate information corresponds to the security order. Here, the controller 210 may generate the first security keyboard using the first key group information corresponding to the general coordinate information. For example, when the user operates an area corresponding to 'e' through a general keyboard, the input unit 220 can generate and output general coordinate information corresponding to 'e' The first key group information corresponding to " e "

Here, the first key group information may be a part of the key information included in the general keyboard. When the alphabet key information from A to Z is included in the general keyboard, the first key group information may be a part of the alphabets A to Z. If the ordinary keyboard includes digits 1 to 0 and special characters, the first key group information may be the digits 1 to 0 and some of the special characters.

In addition, the first key group information may be information corresponding to the vertical coordinate information of the general coordinate information. For example, when the general keyboard corresponds to a QWERTY keyboard, the first key group information may include information corresponding to one row in which the vertical coordinate information among the QWERTY keyboards is the same. W, e, r, t, y, u, and u, which are the same as the vertical coordinate information of 'e' of the QWERTY keyboard, when the user manipulates 'e' the first key group information corresponding to i, o, p 'can be read. If the user manipulates' d ', the control unit 210 determines whether the' d 'of the QWERTY keyboard corresponds to' a, s, d, f, g, h, j, k, The first key group information may be read.

In addition, when the general keyboard includes m pieces of key information, the first key group information may be information corresponding to n pieces of key information adjacent to the general coordinate information (note that m is a natural number of 2 or more and n is less than m Of the natural number). It is assumed that a common keyboard, which is a QWERTY keyboard, contains 26 pieces of key information corresponding to a to z, and a user manipulates 'd' in the general keyboard. At this time, the control unit 210 may read 'd' corresponding to 'e', 'f', z, x, s' adjacent to 'd' and 'd' corresponding to general coordinate information as the first key group information. Here, the meaning of 'adjacent' may mean that it is located within a predetermined range centered on general coordinate information. Accordingly, the control unit 210 may read the first key group information using the key information corresponding to the coordinate information within a preset range around the general coordinate information.

As described above, the control unit 210 may read the first key group information corresponding to the general coordinate information, and control the first security keyboard to be displayed on the first security keyboard area. Here, the first secure keyboard area may be a display area different from the normal keyboard area. If the normal keyboard area corresponds to the lower portion of the display area, the first security keyboard area may correspond to the center of the display area or correspond to the middle area.

Thereafter, the input unit 220 may generate and output first security coordinate information corresponding to the first security keyboard operation of the user, and when the first security coordinate information is input, the controller 210 determines whether the security enhanced mode . For example, it is assumed that the third key and the sixth key are preset to be input according to the enhanced security mode. At this time, the controller 210 may determine whether the input first security coordinate information corresponds to the third or sixth key. In the above example (when the personal information to be input by the user is 1234567), the user will be able to input '3' and '6' through the security enhancement mode.

The control unit 210 may generate an input signal corresponding to the first security coordinate information if the input first security coordinate information does not correspond to the security enhanced mode. When the user operates the area corresponding to 'e' through the first security keyboard, the control unit 210 can generate an input signal corresponding to 'e'.

The control unit 210 may control the second security keyboard corresponding to the first security coordinate information to be displayed in the second security keyboard area set in advance if it is determined that the inputted first security coordinate information corresponds to the security enhanced mode. Here, the controller 210 may generate the second security keyboard using the second key group information corresponding to the first security coordinate information. For example, when the user operates the area corresponding to 'e' through the first security keyboard, the input unit 220 can generate and output the first security coordinate information corresponding to 'e' May read the second key group information corresponding to the first security coordinate area (i.e., corresponding to 'e'). At this time, the second key group information may be different in arrangement or information from the key information (first key group information) included in the first security keyboard.

For example, if the first key group information corresponds to 'q, w, e, r, t, y, u, t, y, u, i, o, p ', but their arrangement may be different. If the first key group information is arranged in the order of 'q, w, e, r, t, y, u, i, o, p' y, t, r, e, w, and q '.

As another example, the second key group information may include information that is completely different from the first key group information. The second key group information is' w, s, e, d, f, r 'when the first key group information is' q, w, e, r, t, y, u, . In this case, it is obvious that the second key group information should include 'e' corresponding to the first security coordinate information.

Here, the second security keyboard area may be a display area different from the first security keyboard area. If the first security keyboard area corresponds to the center of the display area, the second security keyboard area may correspond to the middle or upper part of the display area.

Then, the input unit 220 can generate and output second security coordinate information corresponding to the second security keyboard operation of the user, and when the second security coordinate information is inputted, the control unit 210 outputs the second security coordinate information corresponding to the second security coordinate information An input signal can be generated.

Thereafter, if it is determined that the input of personal information is completed, the user can operate the input unit 220 corresponding to the submit button, and the input unit 220 can generate and output the submit signal. The control unit 210 may generate personal information including at least one input signal generated when the submission signal is input, and may output the generated personal information to the communication unit 240. The communication unit 240 can transmit the inputted personal information to the server 110. [ When the user authentication is completed through the received personal information, the server 110 can provide the online service requested from the security keyboard input device 130.

In the above description, it is assumed that only the key corresponding to the security order is input through the security keyboard. However, it is obvious that all the keys may be preset by the security keyboard. In the above description, the second security keyboard is displayed according to the security enhanced mode. However, the security enhanced mode may not be executed according to the embodiment.

As described above, in the security keyboard input device 130 according to the embodiment of the present invention, when the user touches the general keyboard, the first security keyboard and / The user's personal information may not be leaked even if the touch coordinates of the user are leaked. 3 to 7, the operation of the security keyboard input device 130 according to an embodiment of the present invention will be described by way of example.

3 is a diagram illustrating an operation in which a first security keyboard is displayed according to an embodiment of the present invention. 4 is a diagram illustrating an operation in which a first security keyboard is displayed according to another embodiment of the present invention. FIG. 5 is a diagram illustrating an operation in which a first security keyboard is displayed according to another embodiment of the present invention. FIG. 6 is a view illustrating an operation in which a first security keyboard is displayed according to another embodiment of the present invention FIG. 7 is a diagram illustrating an operation in which a second security keyboard is displayed according to an embodiment of the present invention.

Referring to FIG. 3, it is exemplified that a first security keyboard is displayed in the first security area 320, corresponding to a user's general keyboard 'e' operation. Here, the first key group information 310 may include information corresponding to one row having the same vertical coordinate information among the QWERTY keyboards. W, e, r, t, y, u, i, o, p 'having the same vertical coordinate information as' e' of the QWERTY keyboard, which is a general keyboard. In addition, the first security keyboard illustrated in FIG. 3 displays information corresponding to 'u, w, I, y, p' in the first row in order, while the first key group information is divided into two rows and displayed , And information corresponding to 'r, t, q, o, e' in the second row can be displayed in order. Accordingly, the user can input personal information by operating the first security keyboard.

Referring to FIG. 4, it is exemplified that a first security keyboard is displayed in the first security area 420 in correspondence with a user's general keyboard '4' operation. Here, the first key group information 410 may include information corresponding to one row in which the vertical coordinate information of the general keyboard is the same. The first key group information may correspond to '1, 2, 3, 4, 5, 6, 7, 8, 9, 4, the first key group information is divided into two lines and displayed. In the first line, information corresponding to '9, 4, 5, 8, 2' is displayed in order , And information corresponding to '1, 6, 7, 0, 3' in the second row can be displayed in order. Accordingly, the user can input personal information by operating the first security keyboard.

Referring to FIG. 5, it is exemplified that a special character is displayed on a general keyboard by a user operating a special key 510 of the general keyboard. When the user operates '#' in the general keyboard, the first security keyboard can be displayed in the first security area 530 in '#'. Here, the first key group information 520 may include information corresponding to one row in which the vertical coordinate information among the general keyboards is the same. The first key group information may correspond to '!, @, #, ~, /, ^, &, *, (,)', In which the vertical coordinate information of '#' 5, the first key group information is divided into two lines and displayed. In the first line, information corresponding to '@, &, ^, ^, (,' is sequentially displayed , And information corresponding to '~, *,!, / /)' In the second line may be displayed in order. Accordingly, the user can input personal information by operating the first security keyboard.

Referring to FIG. 6, it is exemplified that the first security keyboard is displayed in the first security area 630 in correspondence with the operation of the user's general keyboard 'e' 610. Here, the first key group information 620 may include n pieces of information corresponding to n pieces of general coordinate information corresponding to a user's operation of the general keyboard. The first key group information may correspond to 'd' of the general keyboard, 'e', r, f, z, x, s' and 'd' corresponding to the operation of the user. 6, the first key group information is divided into two lines and displayed. In the first line, information corresponding to 's, e, f, and z' is displayed in order, In the second row, information corresponding to 'd, x, z' can be displayed in order. Accordingly, the user can input personal information by operating the first security keyboard.

Referring to FIG. 7, it is illustrated in FIG. 6 that a second security keyboard is displayed in the second security area 720 in correspondence with the operation of the 'e' 640 of the first security keyboard. Here, it is exemplified that the second key group information includes information completely different from the first key group information of FIG. The second key group information may correspond to '3, z, r, s, d, e, 4, w' that are completely different from 'e, r, f, z, x, It is. 7, the second key group information is divided into two lines and displayed, and information corresponding to '3, z, r, s' is sequentially displayed in the first row, In the second row, information corresponding to 'd, e, 4, w' may be displayed in order. Accordingly, the user can input 'd' (710) by operating the second security keyboard.

8 is a flowchart of a method of inputting a security keyboard according to an embodiment of the present invention.

Hereinafter, a security keyboard input method according to an embodiment of the present invention will be described with reference to FIG. Each step to be described below may be performed by the respective components of the secure keyboard input device 130 described with reference to FIG. 2. However, for convenience of explanation, the security keyboard input device 130 performs Will be collectively referred to. Therefore, the subject performing each step performed below can be omitted.

In step S800, the secure keyboard input device 130 displays the normal keyboard in the normal keyboard area according to the operation of the user. For example, when the security keyboard input device 130 is a mobile communication terminal, the general keyboard may be displayed at the lower end of the entire area of the display unit 230. [

In step S805, when the user operates the general keyboard, the secure keyboard input device 130 may generate general coordinate information corresponding to the general keyboard area operation of the user (step S810). The security keyboard input device 130 may determine whether or not the general coordinate information corresponds to a preset security order. For example, it is assumed that the first key, the third key, and the sixth key are input through the security keyboard, and the remaining keys are preset to be input through the normal keyboard. At this time, the secure keyboard input device 130 may determine whether the input general coordinate information corresponds to the first, third, or sixth key.

In step S815, the secure keyboard input device 130 may generate an input signal corresponding to the general coordinate information if the generated general coordinate information does not correspond to the security order number. When the user manipulates the area corresponding to 'e' through the normal keyboard, the secure keyboard input device 130 can generate an input signal corresponding to 'e'.

In step S820, the secure keyboard input device 130 may read the first key group information corresponding to the first general coordinate information if the generated general coordinate information corresponds to the security order number. For example, if the user manipulates an area corresponding to 'e' via a normal keyboard, the secure keyboard input device 130 may generate general coordinate information corresponding to 'e' E., Corresponding to " e "). Here, the first key group information may be a part of the key information included in the general keyboard. When the alphabet key information from A to Z is included in the general keyboard, the first key group information may be a part of the alphabets A to Z. If the ordinary keyboard includes digits 1 to 0 and special characters, the first key group information may be the digits 1 to 0 and some of the special characters. In addition, the first key group information may be information corresponding to the vertical coordinate information of the general coordinate information. In addition, when the general keyboard includes m pieces of key information, the first key group information may be information corresponding to n pieces of key information adjacent to the general coordinate information (note that m is a natural number of 2 or more and n is less than m Of the natural number).

In step S825, the secure keyboard input device 130 may display the first security keyboard in the first secure keyboard area using the first key group information corresponding to the general coordinate information. Here, the first secure keyboard area may be a display area different from the normal keyboard area.

In step S830, the secure keyboard input device 130 may generate first secure coordinate information corresponding to the user's first secure keyboard operation to determine whether the first secure coordinate information corresponds to the enhanced security mode (step < RTI ID = 0.0 > S840). For example, it is assumed that the third key and the sixth key are preset to be input according to the enhanced security mode. At this time, the security keyboard input device 130 may determine whether the input first security coordinate information corresponds to the third or sixth key.

In step S845, the secure keyboard input device 130 may generate an input signal corresponding to the first security coordinate information if the inputted first security coordinate information does not correspond to the security enhanced mode. When the user manipulates the area corresponding to 'e' through the first security keyboard, the secure keyboard input device 130 can generate an input signal corresponding to 'e'.

In step S850, the security keyboard input device 130 may read the second key group information corresponding to the first security coordinate information when it is determined that the input first security coordinate information corresponds to the security enhanced mode. At this time, the second key group information may be different in arrangement or information from the key information (first key group information) included in the first security keyboard.

In step S860, the secure keyboard input device 130 may display the second security keyboard in the second secure keyboard area using the second key group information. Here, the second security keyboard area may be a display area different from the first security keyboard area.

In step S870, the secure keyboard input device 130 may generate an input signal corresponding to the user's second secure keyboard operation (step S880). When the user manipulates the area corresponding to 'e' through the second security keyboard, the secure keyboard input device 130 can generate an input signal corresponding to 'e'.

In step S890, when the submit button is operated according to a user's operation, the security keyboard input device 130 may generate personal information including one or more input signals generated and transmit the personal information to the server 110. [ When the user authentication is completed through the received personal information, the server 110 can provide the online service requested from the security keyboard input device 130.

As described above, in the security keyboard input method according to the embodiment of the present invention, when the user touches the general keyboard, the first security keyboard and / or the second security keyboard are displayed in a new area with different information or layout, Even if the touch coordinates are leaked, the user's personal information may not be leaked.

The above-described security keyboard input method according to an embodiment of the present invention can be implemented as a computer-readable code on a computer-readable recording medium. The computer-readable recording medium includes all kinds of recording media storing data that can be decoded by a computer system. For example, it may be a ROM (Read Only Memory), a RAM (Random Access Memory), a magnetic tape, a magnetic disk, a flash memory, an optical data storage device, or the like. In addition, the computer-readable recording medium may be distributed and executed in a computer system connected to a computer network, and may be stored and executed as a code readable in a distributed manner.

While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, It will be understood that the invention may be varied and varied without departing from the scope of the invention.

110: Server
120: Network
130: Security keyboard input device
210:
220:
230:
240:
310: First key group information
320: 1st security keyboard
720: SECOND SECURITY KEYBOARD

Claims (20)

An input unit for generating and outputting general coordinate information corresponding to a user's general keyboard operation and generating and outputting first security coordinate information corresponding to the user's first security keyboard operation; And
Controls the general keyboard to be displayed in a predetermined general keyboard area, controls the first security keyboard corresponding to the input general coordinate information to be displayed in the first security keyboard area, A control unit for generating an input signal;
, ≪ / RTI &
Wherein the first security keyboard area is a display area different from the general keyboard area,
Wherein,
When the first security coordinate information is input, determines whether the security enhanced mode is entered, and controls the second security keyboard to be displayed corresponding to the first security coordinate information when the security enhanced mode is determined.
The method according to claim 1,
Wherein,
When the general coordinate information is input, judges whether it corresponds to a preset security order, and controls the first security keyboard to be displayed in the first security keyboard area if the security order corresponds to the security order.
3. The method of claim 2,
Wherein,
And generates an input signal corresponding to the general coordinate information if it does not correspond to the security order.
The method according to claim 1,
Wherein,
Controlling the first security keyboard to be displayed on the first security keyboard area using first key group information corresponding to the general coordinate information,
Wherein the first key group information is part of the key information included in the general keyboard.
5. The method of claim 4,
Wherein the first key group information corresponds to vertical coordinate information of the general coordinate information.
5. The method of claim 4,
Wherein the first key group information corresponds to n pieces of key information adjacent to the general coordinate information,
Wherein the general keyboard includes m key information, m is a natural number of 2 or more, and n is a natural number less than the m.
delete The method according to claim 1,
Wherein,
Wherein the second security keyboard is controlled to be displayed in a second security keyboard area different from the first security keyboard area.
The method according to claim 1,
Wherein,
Controlling the second security keyboard to be displayed using second key group information corresponding to the first security coordinate information,
Wherein the second key group information is different in layout or information from the key information included in the first security keyboard.
The method according to claim 1,
Wherein the input unit comprises:
And generates and outputs second security coordinate information corresponding to the second security keyboard operation of the user,
And generates an input signal corresponding to the second security coordinate information.
A security keyboard input method comprising:
The general keyboard being displayed in a pre-set general keyboard area;
Generating general coordinate information corresponding to the user's general keyboard operation;
Wherein a first security keyboard corresponding to the general coordinate information is displayed in a first security keyboard area, wherein the first security keyboard area is a display area different from the normal keyboard area;
Generating first security coordinate information corresponding to the first secure keyboard operation of the user;
Determining whether the first security coordinate information is input in the security enhanced mode;
Generating an input signal corresponding to the first security coordinate information if it is determined not to be the secure enforcement mode;
Displaying a second security keyboard corresponding to the first security coordinate information if the security enhanced mode is determined;
The method comprising the steps of:
12. The method of claim 11,
Determining whether the general coordinate information corresponds to a preset security order;
Further comprising:
Wherein the first secure keyboard is displayed in the first secure keyboard area,
And controlling the first security keyboard to be displayed in the first security keyboard area if the security key number corresponds to the security sequence number.
13. The method of claim 12,
Generating an input signal corresponding to the general coordinate information if it does not correspond to the security order;
Further comprising the steps of:
The method of claim 11, wherein
Wherein the first secure keyboard is displayed in the first secure keyboard area,
Displaying the first security keyboard on the first security keyboard area using first key group information corresponding to the general coordinate information;
, ≪ / RTI &
Wherein the first key group information is part of the key information included in the general keyboard.
15. The method of claim 14,
Wherein the first key group information corresponds to vertical coordinate information of the general coordinate information.
15. The method of claim 14,
Wherein the first key group information corresponds to n pieces of key information adjacent to the general coordinate information,
Wherein the general keyboard includes m key information, m is a natural number of 2 or more, and n is a natural number less than the m.
delete 12. The method of claim 11,
Wherein the displaying the second secure keyboard comprises:
Displaying the second security keyboard in a second security keyboard area different from the first security keyboard area;
The method comprising the steps of:
12. The method of claim 11,
Wherein the displaying the second secure keyboard comprises:
Displaying the second security keyboard using second key group information corresponding to the first security coordinate information;
, ≪ / RTI &
Wherein the second key group information is different in layout or information from the key information included in the first security keyboard.
12. The method of claim 11,
Generating second security coordinate information corresponding to the second secure keyboard operation of the user; And
Generating an input signal corresponding to the second security coordinate information;
Further comprising the steps of:
KR1020160031720A 2016-03-16 2016-03-16 Input device and method for security keyboard KR101768030B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020160031720A KR101768030B1 (en) 2016-03-16 2016-03-16 Input device and method for security keyboard

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020160031720A KR101768030B1 (en) 2016-03-16 2016-03-16 Input device and method for security keyboard

Publications (1)

Publication Number Publication Date
KR101768030B1 true KR101768030B1 (en) 2017-08-14

Family

ID=60141979

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020160031720A KR101768030B1 (en) 2016-03-16 2016-03-16 Input device and method for security keyboard

Country Status (1)

Country Link
KR (1) KR101768030B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102239769B1 (en) * 2019-11-29 2021-04-13 호원대학교산학협력단 Network security method using ship maintenance support network system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102239769B1 (en) * 2019-11-29 2021-04-13 호원대학교산학협력단 Network security method using ship maintenance support network system

Similar Documents

Publication Publication Date Title
US11823186B2 (en) Secure wireless card reader
US10565359B2 (en) Authentication method and system
US9697513B2 (en) User terminal and payment system
US20140098141A1 (en) Method and Apparatus for Securing Input of Information via Software Keyboards
US20100242104A1 (en) Methods and systems for secure authentication
US20160127134A1 (en) User authentication system and method
US20180268415A1 (en) Biometric information personal identity authenticating system and method using financial card information stored in mobile communication terminal
CN103714460A (en) Method for validating a transaction with a secure input and a non-secure output
US20110191856A1 (en) Receiving input data
US9760739B2 (en) Information processing device
US20130246268A1 (en) Method and system for dedicated secure processors for handling secure processing in a handheld communication device
KR20170133307A (en) Online financial transactions, identity authentication system and method using real cards
KR20110094732A (en) Security module, system and method for securing electronic banking using the same
JP2015007941A (en) Password input method, input terminal, and input system
US9619802B1 (en) Interception of touch pad events for handling in a secure environment
KR20130027313A (en) Method and system for authenticating using input pattern
KR101122197B1 (en) Method of displaying virtual keypad for preventing the leaking of information
KR101768030B1 (en) Input device and method for security keyboard
KR20110002967A (en) Method and system for providing authentication service by using biometrics and portable memory unit therefor
US11341231B2 (en) Data security system for analyzing historical authentication entry attempts to identify misappropriation of security credential and enforce password change
KR20120107610A (en) The apparatus for verifying user in portable appliance and the method thereof
WO2022001707A1 (en) Method and system for receiving a secure input, using a secure input means
US11256795B2 (en) Graphical user interface for generation and validation of secure authentication codes
US20220374507A1 (en) Improved systems and methods for secure data input and authentication
US20150339054A1 (en) Method and system for inputting and uploading data

Legal Events

Date Code Title Description
AMND Amendment
AMND Amendment
X701 Decision to grant (after re-examination)
GRNT Written decision to grant