KR101768030B1 - Input device and method for security keyboard - Google Patents
Input device and method for security keyboard Download PDFInfo
- Publication number
- KR101768030B1 KR101768030B1 KR1020160031720A KR20160031720A KR101768030B1 KR 101768030 B1 KR101768030 B1 KR 101768030B1 KR 1020160031720 A KR1020160031720 A KR 1020160031720A KR 20160031720 A KR20160031720 A KR 20160031720A KR 101768030 B1 KR101768030 B1 KR 101768030B1
- Authority
- KR
- South Korea
- Prior art keywords
- security
- keyboard
- coordinate information
- information
- general
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04886—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
-
- H04M1/72519—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2201/00—Electronic components, circuits, software, systems or apparatus used in telephone systems
- H04M2201/38—Displays
Abstract
Description
The present invention relates to a security keyboard input device and an input method thereof, and more particularly, to a security keyboard input device using a virtual keyboard and an input method thereof.
Recently, with the rapid development of the Internet and computer technology, important tasks such as internet banking, stock trading and electronic payment in internet shopping mall have been performed through mobile communication terminals. In a financial transaction or an electronic commerce through a mobile communication terminal, a user goes through an authentication process of inputting user's personal information such as an ID and a password in order to prove his / her identity. However, there is a risk that keyboard input information may be leaked through a spyware or a keystroke logger installed in a smartphone by a third party in inputting personal information through a keyboard.
In order to solve such a problem, a method of detecting a malicious program such as spyware by installing an antivirus or a spyware removal tool on the mobile communication terminal is used. However, such a method can not detect a case in which a malicious modification or a new malicious program occurs, and thus there is a problem in preventing damage in advance.
Another conventional method for preventing keyboard hacking is disclosed in Korean Patent Registration No. 0496462 entitled " Method for preventing keystroke hacking ". The Korean Patent Publication describes a method of displaying a virtual keyboard on a screen of a user terminal and receiving a key input from a user through a virtual keyboard. However, this method has a problem in that, when a hacking program for collecting coordinate information inputted by a user is installed in a user terminal, a third party can obtain input information by analyzing the input coordinate information of the user.
Technical Solution According to the present invention, there is provided a security keyboard input device and an input method for preventing a leakage of user's input information even if a touch coordinate information of a user is leaked.
The security keyboard input device according to an embodiment of the present invention generates and outputs general coordinate information corresponding to a user's general keyboard operation and generates first security coordinate information corresponding to the first security keyboard operation of the user, ; And controls the general keyboard to be displayed in a predetermined general keyboard area, controls the first security keyboard corresponding to the input general coordinate information to be displayed in the first security keyboard area, And a control unit for generating an input signal.
According to an embodiment of the present invention, the control unit may determine whether the general coordinate information corresponds to a predetermined security order, and to control the first security keyboard to be displayed in the first security keyboard area have.
According to an embodiment, the control unit may generate an input signal corresponding to the general coordinate information if it does not correspond to the security order.
According to an embodiment of the present invention, the control unit controls the first security keyboard to be displayed on the first security keyboard area using first key group information corresponding to the general coordinate information, It may be part of the key information contained in the generic keyboard.
According to an embodiment, the first key group information may correspond to vertical coordinate information of the general coordinate information.
According to an embodiment of the present invention, the first key group information corresponds to n pieces of key information adjacent to the general coordinate information, the general keyboard includes m pieces of key information, m is a natural number of 2 or more, m < / RTI >
According to an embodiment of the present invention, when the first security coordinate information is inputted, the controller determines whether or not the security enhanced mode is set, and if the security enhanced mode is determined, the second security keyboard corresponding to the first security coordinate information is displayed Can be controlled.
According to an embodiment, the control unit may control the second security keyboard to be displayed in a second security keyboard area different from the first security keyboard area.
According to an embodiment of the present invention, the control unit controls the second security keyboard to be displayed using second key group information corresponding to the first security coordinate information, and the second key group information is displayed on the first security keyboard The arrangement or information may be different from the contained key information.
According to an embodiment, the input unit generates and outputs second security coordinate information corresponding to the second security keyboard operation of the user, and the control unit generates an input signal corresponding to the second security coordinate information .
According to another aspect of the present invention, there is provided a security keyboard input method including: displaying a general keyboard in a predetermined general keyboard area; Generating general coordinate information corresponding to the user's general keyboard operation; Displaying a first security keyboard corresponding to the general coordinate information on a first security keyboard area; Generating first security coordinate information corresponding to the first secure keyboard operation of the user; And generating an input signal corresponding to the secure coordinate information.
According to an embodiment of the present invention, the security keyboard input method further includes determining whether the general coordinate information corresponds to a preset security sequence number when the general coordinate information is generated, wherein the first security keyboard is displayed on the first security keyboard area May include controlling the first security keyboard to be displayed in the first security keyboard area if the security sequence number corresponds to the security sequence number.
According to an embodiment of the present invention, the secure keyboard input method may further include generating an input signal corresponding to the general coordinate information if the security order does not correspond to the security order.
According to an embodiment, the step of displaying the first security keyboard on the first security keyboard area may include: using the first key group information corresponding to the general coordinate information, And the first key group information may be a part of key information included in the general keyboard.
According to an embodiment, the first key group information may correspond to vertical coordinate information of the general coordinate information.
According to an embodiment of the present invention, the first key group information corresponds to n pieces of key information adjacent to the general coordinate information, the general keyboard includes m pieces of key information, m is a natural number of 2 or more, m < / RTI >
According to an embodiment of the present invention, the secure keyboard input method may include: determining whether the first security coordinate information is input in a security enhanced mode; And displaying a second security keyboard corresponding to the first security coordinate information when the security enhanced mode is determined.
According to an embodiment, the step of displaying the second security keyboard may include displaying the second security keyboard in a second security keyboard area different from the first security keyboard area.
According to an embodiment, the step of displaying the second security keyboard may include displaying the second security keyboard using second key group information corresponding to the first security coordinate information, The key group information may be different in arrangement or information from the key information included in the first security keyboard.
According to an embodiment, the secure keyboard input method further comprises: generating second security coordinate information corresponding to the second secure keyboard operation of the user; And generating an input signal corresponding to the second security coordinate information.
The security keyboard input device and the input method thereof according to the embodiments of the present invention can prevent the user's input information from being leaked even if the touch coordinate information of the user is leaked because the security keyboard is displayed in a new area according to the key input of the user have.
BRIEF DESCRIPTION OF THE DRAWINGS A brief description of each drawing is provided to more fully understand the drawings recited in the description of the invention.
1 is a block diagram of a security keyboard input system according to an embodiment of the present invention;
2 is a block diagram of a security keyboard input device according to an embodiment of the present invention;
3 illustrates an operation in which a first secure keyboard is displayed in accordance with one embodiment of the present invention.
4 illustrates an operation in which a first secure keyboard is displayed in accordance with another embodiment of the present invention.
Figure 5 illustrates an operation in which a first secure keyboard is displayed in accordance with another embodiment of the present invention.
6 illustrates an operation in which a first secure keyboard is displayed in accordance with another embodiment of the present invention.
7 illustrates an operation in which a second secure keyboard is displayed in accordance with one embodiment of the present invention.
FIG. 8 is a flowchart of a method of inputting a security keyboard according to an embodiment of the present invention; FIG.
While the present invention has been described in connection with certain exemplary embodiments, it is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, is intended to cover various modifications and similarities. It should be understood, however, that the invention is not intended to be limited to the particular embodiments, but includes all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, the present invention will be described in detail with reference to the accompanying drawings. In addition, numerals (e.g., first, second, etc.) used in the description of the present invention are merely an identifier for distinguishing one component from another. Also, in this specification, when an element is referred to as being "connected" or "connected" with another element, the element may be directly connected or directly connected to the other element, It should be understood that, unless an opposite description is present, it may be connected or connected via another element in the middle. It should be noted that the terms such as " unit, "" to, "and" to module ", as used herein, mean units for processing at least one function or operation, Or a combination of hardware and software.
It is to be clarified that the division of constituent parts in this specification is merely a division by each main function of each constituent part. That is, two or more constituent parts to be described below may be combined into one constituent part, or one constituent part may be divided into two or more functions according to functions that are more subdivided. In addition, each of the constituent units described below may additionally perform some or all of the functions of other constituent units in addition to the main functions of the constituent units themselves, and that some of the main functions, And may be carried out in a dedicated manner. Embodiments of the present invention will be described in detail with reference to the drawings.
1 is a block diagram of a security keyboard input system according to an embodiment of the present invention.
1, a security keyboard input system 100 according to an exemplary embodiment of the present invention includes a
The
The
The security
2 is a block diagram of a security keyboard input device according to an embodiment of the present invention.
2, the security
First, the
The
The
The
First, the
Then, the
The
The
Here, the first key group information may be a part of the key information included in the general keyboard. When the alphabet key information from A to Z is included in the general keyboard, the first key group information may be a part of the alphabets A to Z. If the ordinary keyboard includes
In addition, the first key group information may be information corresponding to the vertical coordinate information of the general coordinate information. For example, when the general keyboard corresponds to a QWERTY keyboard, the first key group information may include information corresponding to one row in which the vertical coordinate information among the QWERTY keyboards is the same. W, e, r, t, y, u, and u, which are the same as the vertical coordinate information of 'e' of the QWERTY keyboard, when the user manipulates 'e' the first key group information corresponding to i, o, p 'can be read. If the user manipulates' d ', the
In addition, when the general keyboard includes m pieces of key information, the first key group information may be information corresponding to n pieces of key information adjacent to the general coordinate information (note that m is a natural number of 2 or more and n is less than m Of the natural number). It is assumed that a common keyboard, which is a QWERTY keyboard, contains 26 pieces of key information corresponding to a to z, and a user manipulates 'd' in the general keyboard. At this time, the
As described above, the
Thereafter, the
The
The
For example, if the first key group information corresponds to 'q, w, e, r, t, y, u, t, y, u, i, o, p ', but their arrangement may be different. If the first key group information is arranged in the order of 'q, w, e, r, t, y, u, i, o, p' y, t, r, e, w, and q '.
As another example, the second key group information may include information that is completely different from the first key group information. The second key group information is' w, s, e, d, f, r 'when the first key group information is' q, w, e, r, t, y, u, . In this case, it is obvious that the second key group information should include 'e' corresponding to the first security coordinate information.
Here, the second security keyboard area may be a display area different from the first security keyboard area. If the first security keyboard area corresponds to the center of the display area, the second security keyboard area may correspond to the middle or upper part of the display area.
Then, the
Thereafter, if it is determined that the input of personal information is completed, the user can operate the
In the above description, it is assumed that only the key corresponding to the security order is input through the security keyboard. However, it is obvious that all the keys may be preset by the security keyboard. In the above description, the second security keyboard is displayed according to the security enhanced mode. However, the security enhanced mode may not be executed according to the embodiment.
As described above, in the security
3 is a diagram illustrating an operation in which a first security keyboard is displayed according to an embodiment of the present invention. 4 is a diagram illustrating an operation in which a first security keyboard is displayed according to another embodiment of the present invention. FIG. 5 is a diagram illustrating an operation in which a first security keyboard is displayed according to another embodiment of the present invention. FIG. 6 is a view illustrating an operation in which a first security keyboard is displayed according to another embodiment of the present invention FIG. 7 is a diagram illustrating an operation in which a second security keyboard is displayed according to an embodiment of the present invention.
Referring to FIG. 3, it is exemplified that a first security keyboard is displayed in the
Referring to FIG. 4, it is exemplified that a first security keyboard is displayed in the
Referring to FIG. 5, it is exemplified that a special character is displayed on a general keyboard by a user operating a
Referring to FIG. 6, it is exemplified that the first security keyboard is displayed in the
Referring to FIG. 7, it is illustrated in FIG. 6 that a second security keyboard is displayed in the
8 is a flowchart of a method of inputting a security keyboard according to an embodiment of the present invention.
Hereinafter, a security keyboard input method according to an embodiment of the present invention will be described with reference to FIG. Each step to be described below may be performed by the respective components of the secure
In step S800, the secure
In step S805, when the user operates the general keyboard, the secure
In step S815, the secure
In step S820, the secure
In step S825, the secure
In step S830, the secure
In step S845, the secure
In step S850, the security
In step S860, the secure
In step S870, the secure
In step S890, when the submit button is operated according to a user's operation, the security
As described above, in the security keyboard input method according to the embodiment of the present invention, when the user touches the general keyboard, the first security keyboard and / or the second security keyboard are displayed in a new area with different information or layout, Even if the touch coordinates are leaked, the user's personal information may not be leaked.
The above-described security keyboard input method according to an embodiment of the present invention can be implemented as a computer-readable code on a computer-readable recording medium. The computer-readable recording medium includes all kinds of recording media storing data that can be decoded by a computer system. For example, it may be a ROM (Read Only Memory), a RAM (Random Access Memory), a magnetic tape, a magnetic disk, a flash memory, an optical data storage device, or the like. In addition, the computer-readable recording medium may be distributed and executed in a computer system connected to a computer network, and may be stored and executed as a code readable in a distributed manner.
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, It will be understood that the invention may be varied and varied without departing from the scope of the invention.
110: Server
120: Network
130: Security keyboard input device
210:
220:
230:
240:
310: First key group information
320: 1st security keyboard
720: SECOND SECURITY KEYBOARD
Claims (20)
Controls the general keyboard to be displayed in a predetermined general keyboard area, controls the first security keyboard corresponding to the input general coordinate information to be displayed in the first security keyboard area, A control unit for generating an input signal;
, ≪ / RTI &
Wherein the first security keyboard area is a display area different from the general keyboard area,
Wherein,
When the first security coordinate information is input, determines whether the security enhanced mode is entered, and controls the second security keyboard to be displayed corresponding to the first security coordinate information when the security enhanced mode is determined.
Wherein,
When the general coordinate information is input, judges whether it corresponds to a preset security order, and controls the first security keyboard to be displayed in the first security keyboard area if the security order corresponds to the security order.
Wherein,
And generates an input signal corresponding to the general coordinate information if it does not correspond to the security order.
Wherein,
Controlling the first security keyboard to be displayed on the first security keyboard area using first key group information corresponding to the general coordinate information,
Wherein the first key group information is part of the key information included in the general keyboard.
Wherein the first key group information corresponds to vertical coordinate information of the general coordinate information.
Wherein the first key group information corresponds to n pieces of key information adjacent to the general coordinate information,
Wherein the general keyboard includes m key information, m is a natural number of 2 or more, and n is a natural number less than the m.
Wherein,
Wherein the second security keyboard is controlled to be displayed in a second security keyboard area different from the first security keyboard area.
Wherein,
Controlling the second security keyboard to be displayed using second key group information corresponding to the first security coordinate information,
Wherein the second key group information is different in layout or information from the key information included in the first security keyboard.
Wherein the input unit comprises:
And generates and outputs second security coordinate information corresponding to the second security keyboard operation of the user,
And generates an input signal corresponding to the second security coordinate information.
The general keyboard being displayed in a pre-set general keyboard area;
Generating general coordinate information corresponding to the user's general keyboard operation;
Wherein a first security keyboard corresponding to the general coordinate information is displayed in a first security keyboard area, wherein the first security keyboard area is a display area different from the normal keyboard area;
Generating first security coordinate information corresponding to the first secure keyboard operation of the user;
Determining whether the first security coordinate information is input in the security enhanced mode;
Generating an input signal corresponding to the first security coordinate information if it is determined not to be the secure enforcement mode;
Displaying a second security keyboard corresponding to the first security coordinate information if the security enhanced mode is determined;
The method comprising the steps of:
Determining whether the general coordinate information corresponds to a preset security order;
Further comprising:
Wherein the first secure keyboard is displayed in the first secure keyboard area,
And controlling the first security keyboard to be displayed in the first security keyboard area if the security key number corresponds to the security sequence number.
Generating an input signal corresponding to the general coordinate information if it does not correspond to the security order;
Further comprising the steps of:
Wherein the first secure keyboard is displayed in the first secure keyboard area,
Displaying the first security keyboard on the first security keyboard area using first key group information corresponding to the general coordinate information;
, ≪ / RTI &
Wherein the first key group information is part of the key information included in the general keyboard.
Wherein the first key group information corresponds to vertical coordinate information of the general coordinate information.
Wherein the first key group information corresponds to n pieces of key information adjacent to the general coordinate information,
Wherein the general keyboard includes m key information, m is a natural number of 2 or more, and n is a natural number less than the m.
Wherein the displaying the second secure keyboard comprises:
Displaying the second security keyboard in a second security keyboard area different from the first security keyboard area;
The method comprising the steps of:
Wherein the displaying the second secure keyboard comprises:
Displaying the second security keyboard using second key group information corresponding to the first security coordinate information;
, ≪ / RTI &
Wherein the second key group information is different in layout or information from the key information included in the first security keyboard.
Generating second security coordinate information corresponding to the second secure keyboard operation of the user; And
Generating an input signal corresponding to the second security coordinate information;
Further comprising the steps of:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160031720A KR101768030B1 (en) | 2016-03-16 | 2016-03-16 | Input device and method for security keyboard |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160031720A KR101768030B1 (en) | 2016-03-16 | 2016-03-16 | Input device and method for security keyboard |
Publications (1)
Publication Number | Publication Date |
---|---|
KR101768030B1 true KR101768030B1 (en) | 2017-08-14 |
Family
ID=60141979
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020160031720A KR101768030B1 (en) | 2016-03-16 | 2016-03-16 | Input device and method for security keyboard |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101768030B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102239769B1 (en) * | 2019-11-29 | 2021-04-13 | 호원대학교산학협력단 | Network security method using ship maintenance support network system |
-
2016
- 2016-03-16 KR KR1020160031720A patent/KR101768030B1/en active IP Right Grant
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102239769B1 (en) * | 2019-11-29 | 2021-04-13 | 호원대학교산학협력단 | Network security method using ship maintenance support network system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11823186B2 (en) | Secure wireless card reader | |
US10565359B2 (en) | Authentication method and system | |
US9697513B2 (en) | User terminal and payment system | |
US20140098141A1 (en) | Method and Apparatus for Securing Input of Information via Software Keyboards | |
US20100242104A1 (en) | Methods and systems for secure authentication | |
US20160127134A1 (en) | User authentication system and method | |
US20180268415A1 (en) | Biometric information personal identity authenticating system and method using financial card information stored in mobile communication terminal | |
CN103714460A (en) | Method for validating a transaction with a secure input and a non-secure output | |
US20110191856A1 (en) | Receiving input data | |
US9760739B2 (en) | Information processing device | |
US20130246268A1 (en) | Method and system for dedicated secure processors for handling secure processing in a handheld communication device | |
KR20170133307A (en) | Online financial transactions, identity authentication system and method using real cards | |
KR20110094732A (en) | Security module, system and method for securing electronic banking using the same | |
JP2015007941A (en) | Password input method, input terminal, and input system | |
US9619802B1 (en) | Interception of touch pad events for handling in a secure environment | |
KR20130027313A (en) | Method and system for authenticating using input pattern | |
KR101122197B1 (en) | Method of displaying virtual keypad for preventing the leaking of information | |
KR101768030B1 (en) | Input device and method for security keyboard | |
KR20110002967A (en) | Method and system for providing authentication service by using biometrics and portable memory unit therefor | |
US11341231B2 (en) | Data security system for analyzing historical authentication entry attempts to identify misappropriation of security credential and enforce password change | |
KR20120107610A (en) | The apparatus for verifying user in portable appliance and the method thereof | |
WO2022001707A1 (en) | Method and system for receiving a secure input, using a secure input means | |
US11256795B2 (en) | Graphical user interface for generation and validation of secure authentication codes | |
US20220374507A1 (en) | Improved systems and methods for secure data input and authentication | |
US20150339054A1 (en) | Method and system for inputting and uploading data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AMND | Amendment | ||
AMND | Amendment | ||
X701 | Decision to grant (after re-examination) | ||
GRNT | Written decision to grant |