KR20090036820A - Hacking protection input system and method of the virtual keyboard - Google Patents

Hacking protection input system and method of the virtual keyboard Download PDF

Info

Publication number
KR20090036820A
KR20090036820A KR1020070102086A KR20070102086A KR20090036820A KR 20090036820 A KR20090036820 A KR 20090036820A KR 1020070102086 A KR1020070102086 A KR 1020070102086A KR 20070102086 A KR20070102086 A KR 20070102086A KR 20090036820 A KR20090036820 A KR 20090036820A
Authority
KR
South Korea
Prior art keywords
virtual keyboard
input
keyboard
key
dummy
Prior art date
Application number
KR1020070102086A
Other languages
Korean (ko)
Inventor
김성민
Original Assignee
김진우
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 김진우 filed Critical 김진우
Priority to KR1020070102086A priority Critical patent/KR20090036820A/en
Publication of KR20090036820A publication Critical patent/KR20090036820A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
    • G06F3/0233Character input methods
    • G06F3/0236Character input methods using selection techniques to select from displayed items
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04886Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

A hacking protection input system and a method of the virtual keyboard are provided to prevent the exposure of key input information caused by input coordinate hacking by inserting a dummy key to a virtual keyboard and changing the input values of keys on the virtual keyboard. A web browser(40) provides a text box to a user to receives the information necessary to the provision of a service such as IDs or secret codes. A virtual keyboard(20) receives a key input by being outputted in keyboard type on a screen, and a virtual keyboard driver includes an input sensor(31), a data transmitting unit(33) and a keyboard controller(32). The input sensor calculates a correspondent key value by sensing the input of keys on a virtual keyboard, and the keyboard controller generates a virtual keyboard and inserts a dummy key to the virtual keyboard. The keyboard controller controls the size and position of the virtual keyboard as well as the arrangement of the virtual keyboard. The data transmitter transfers the key input data inputted to the virtual keyboard to a web browser.

Description

Hacking protection input system and method of the virtual keyboard

The present invention relates to a virtual keyboard hacking prevention input system and an operation method, and more particularly, by inserting a dummy key that does not have an input key value according to input coordinates when the virtual keyboard is driven into the virtual keyboard. The present invention relates to a virtual keyboard hacking prevention input system and an operation method of improving security by changing an input coordinate value to prevent leakage of key input information according to input coordinate hacking.

Recently, with the rapid development of the Internet and computer technology, important tasks such as Internet banking, stock trading, and electronic payment in the Internet shopping mall are performed through personal computers (PCs) of individuals or companies.

In such a financial transaction or electronic commerce through a PC, the user goes through an authentication process of inputting an ID, password, certificate password, credit card number or social security number to prove his or her identity.

However, in the process of inputting such important information through the keyboard, the personal information obtained by retrieving the keyboard input information through spyware or keystroke logger installed on the PC by a malicious third party is obtained. There are a growing number of illegal thefts.

As a conventional keyboard hacking prevention method for solving such a problem, there is a method of installing an antivirus or a spyware removal tool on a PC to detect and remove malicious programs such as spyware. However, when the modified or new malicious program occurs, it is possible to cope only after the damage situation is reported, and thus there is a limit in preventing the damage in advance.

Another conventional keyboard hacking prevention method is a "key input theft prevention method" described in Korean Patent Publication No. 0496462. The document includes a virtual keyboard generation module that determines whether a key logger exists in a user computer connected to a predetermined server through a communication network, and displays a virtual keyboard on a screen of the user computer when the key logger exists. By this operation, a method of receiving a key input from the user through the virtual keyboard is described.

However, if the hacking program for collecting the coordinate input of the mouse is installed in the user's computer, a malicious third party obtains the input key information by analyzing the repeated mouse input coordinates of the user and analyzing the input key information. There is a problem that can be.

The present invention is to solve the above problems according to the prior art. That is, an object of the present invention is to insert a dummy key that does not have an input key value according to the input coordinates when the virtual keyboard is driven into the virtual keyboard, thereby changing the input coordinate values of the virtual keyboard keyboards to prevent the leakage of key input information according to the input coordinate hacking. It's there.

The present invention as a technical concept for achieving the above object, Web browser for providing a text box to the user to receive the information required for providing the service, such as ID or password; A virtual keyboard which is outputted in the form of a keyboard on the screen and receives a key input; Inserting a dummy key having no input key value according to input coordinates into the virtual keyboard, controlling the operation of the virtual keyboard, and processing key input data input to the virtual keyboard to the web browser. A virtual keyboard driver for transmitting; It provides a virtual keyboard hacking prevention input system, characterized in that configured to include.

According to the present invention, when a virtual key is inserted by a hacking program by changing the input coordinate values of keyboard keys by inserting a dummy key having no input key value according to the input coordinates when the virtual keyboard is driven. In addition, there is an effect that can protect the keystroke information.

Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.

1 is a view showing the configuration of a virtual keyboard hacking prevention input system according to a first embodiment of the present invention.

As shown, the virtual keyboard hacking prevention input system according to the first embodiment of the present invention is a web browser that provides a text box to the user in order to receive information necessary to provide a service, such as a mouse 10, ID or password 40 and the virtual keyboard 20 which is output in the form of a keyboard on the screen and receives a key input through a mouse, and controls the insertion of a dummy key into the virtual keyboard 20 and controls the operation of the virtual keyboard 20. And a virtual keyboard driver 30 for processing key input data input to the virtual keyboard 20 and transmitting the same to the web browser 40.

The virtual keyboard driver 30 includes an input sensing unit 31, a data transmitting unit 33, and a keyboard control unit 32.

The input detector 31 detects a mouse input input to the keyboard of the virtual keyboard 20 and calculates a corresponding key value. In addition, when a dummy key input is detected, the corresponding key value is not calculated.

The data transmitter 33 transmits the input key data to the web browser 40.

The keyboard controller 32 generates the virtual keyboard 20, controls the insertion of the dummy key into the virtual keyboard 20, and controls the size and position of the virtual keyboard, rearrangement of the keyboard, and the like.

2 is a diagram showing the form of a virtual keyboard applied to the first embodiment of the present invention.

As shown, the virtual keyboard applied to the first embodiment of the present invention is a qwerty-type keyboard capable of inputting numbers and letters, and includes a number key 110 at the top and a letter key 120 at the bottom. Is located. Of course, the order of the numeric keys 110 and the character keys 120 may be changed. In addition, the keys may be positioned in a straight line so that the horizontal and vertical lines coincide with each other, or the keys may be positioned diagonally in the vertical direction like a general QWERTY-type keyboard.

3 is a diagram illustrating a dummy key inserted into a virtual keyboard applied to the first embodiment of the present invention.

As shown, the dummy key 100 is inserted into the virtual keyboard 20 applied to the first embodiment of the present invention. The dummy key 100 is a key having no input key value according to the input coordinates. That is, even if a dummy key is clicked with a mouse, the corresponding key value is not calculated.

Since the dummy key 100 is inserted at an arbitrary position, even if the input coordinates of the mouse are leaked by the hacking program, a malicious third party cannot estimate the corresponding key input value. The dummy key 100 is inserted into one of the character keys 120, but the dummy key 100 may be randomly inserted between the numeric key 110 or other keys.

In addition, one dummy key 100 may be inserted or one or more dummy keys 100 may be inserted, but when a large number of dummy keys 100 are inserted, it may interfere with the user's convenience. 0 randomly inserts 0 to 2 dummy keys 100 per horizontal line unit.

4 is a view showing a modification of the state that the dummy key is inserted into the virtual keyboard applied to the first embodiment of the present invention.

As shown in the drawing, dummy keys 100 are inserted in a line unit in the longitudinal direction in the virtual keyboard 20 applied to the first embodiment of the present invention.

When the keys are arranged in a straight line such that the keyboard layout of the virtual keyboard 20 is aligned vertically and vertically, the dummy keys 100 may be inserted into all of the vertical straight keys, and diagonally diagonally as in a normal QWERTY keyboard. When positioning the keys so that all the dummy keys 100 can be inserted in the same line as the keyboard arrangement direction of the QAZ keys, the dummy keys 100 can be inserted in the same line as the keyboard arrangement direction of the OKM keys. You may.

In addition, although the dummy key 100 is inserted only in the character key 120 portion, the dummy key 100 may be inserted into the numeric key 110 or other keys.

Hereinafter, a method for operating the virtual keyboard hacking prevention input system according to the first embodiment of the present invention using the virtual keyboard hacking prevention input system configured as described above will be described in detail with reference to FIG. 5.

5 is a flowchart illustrating a method for operating a virtual keyboard hacking prevention input system according to a first embodiment of the present invention.

First, when the user clicks the mouse on the text box of the web browser 40 for keyboard input or the cursor is automatically positioned on the text box of the web browser 40, the keyboard control unit 32 of the virtual keyboard driver is configured to correspond to the text box. In operation S100, the focus is moved to the text box. For example, when the user clicks the mouse on the transfer password input window to transfer the account using internet banking, the corresponding text box has the focus, and the keyboard controller 32 detects the focus movement.

On the other hand, the keyboard controller 32 generates a virtual keyboard 20 that is output in the form of a keyboard on the screen to receive a key input (S110).

Thereafter, the keyboard controller 32 inserts the dummy key 100 into the virtual keyboard 20 and rearranges the keys (S120). As shown in FIG. 3, 0 to 2 dummy keys 100 may be inserted at random per horizontal line unit. Alternatively, as shown in FIG. 4, the dummy keys 100 may be inserted into the virtual keyboard 20 in units of lines in the longitudinal direction. Here, the virtual keyboard 20 is generated with the dummy key 100 randomly inserted as described above, and the relative position of each keyboard can be calculated while the coordinates of each keyboard are changed, so that the mouse input coordinates are hacked. Password can be prevented from being leaked.

When the step S120 is completed, the input detection unit 31 of the virtual keyboard driver detects a mouse input when a specific keyboard on the virtual keyboard 20 is clicked by a user (S130) and inputs the keyboard selected by the mouse. The key value is calculated (S140). Here, the corresponding key value is calculated using the dummy key 100 inserted in step S120, the relative position of each key, and the coordinates at which the mouse is clicked.

After completion of the input key value calculating step (S140), the data transmitter 33 of the virtual keyboard driver transmits the input key value data to the web browser 40 so that the text corresponding to the text box is output (S150).

Thereafter, the keyboard controller 32 determines whether the input through the virtual keyboard 20 is terminated (S160), and when it is determined that the input is terminated, terminates the virtual keyboard 20 to be removed from the screen (S170). If the input is not terminated, the following steps are repeatedly performed from the mouse input sensing step S130. Here, when the text box loses focus by the user clicking the end button of the virtual keyboard 20 or another button on the web browser 40, the keyboard controller 32 detects this and the input is finished. To judge.

On the other hand, if it is determined that the input is not terminated in the input end determination step (S160), as shown in Figure 6, by changing the position of the dummy key 100 in the virtual keyboard 20 to reinsert and rearrange the keyboard After (S161), the following steps may be repeatedly performed from the step S130. As described above, whenever one mouse input is terminated, the dummy key 100 is reinserted into the virtual keyboard 20 before the next input, thereby further reducing the possibility of password leakage due to hacking of the mouse input coordinates.

7 is a diagram showing the form of a virtual keyboard applied to the second embodiment of the present invention.

The virtual keyboard applied to the second embodiment of the present invention is a numeric keyboard for inputting a number such as a password. As shown in FIG. 7A, a series of numbers are sequentially arranged along the circumference in a clockwise direction. It consists of a circular keyboard.

As shown in FIG. 7B, a dummy key 100 is inserted into the virtual keyboard 20. Dummy keys are inserted between 8 and 9, but at least one dummy key may be randomly inserted between the numeric keys. Since the dummy key 100 is randomly inserted into the virtual keyboard 20, even if the input coordinates of the mouse are leaked by the hacking program, a malicious third party cannot estimate the corresponding key input value.

Here, the external shape of the virtual keyboard 20 may be configured to be a polygon such as a triangle or a rectangle, not a circle, and a series of numbers are sequentially arranged along the outer circumference of the polygon.

The present invention described above is not limited to the above-described embodiments and the accompanying drawings, and it is common in the art that various substitutions, modifications, and changes can be made without departing from the technical spirit of the present invention. It will be clear to those who have knowledge of God.

1 is a view showing the configuration of a virtual keyboard hacking prevention input system according to a first embodiment of the present invention.

2 is a view showing the form of a virtual keyboard applied to the first embodiment of the present invention.

3 is a view showing a state in which a dummy key is inserted into a virtual keyboard applied to the first embodiment of the present invention.

4 is a view showing a modification of the state that the dummy key is inserted into the virtual keyboard applied to the first embodiment of the present invention.

5 is a flowchart illustrating a method for operating a virtual keyboard hacking prevention input system according to a first embodiment of the present invention.

6 is a flowchart showing a modification of the method for operating a virtual keyboard hacking prevention input system according to the first embodiment of the present invention.

7 is a view showing the form of a virtual keyboard applied to the second embodiment of the present invention.

<Description of the symbols for the main parts of the drawings>

10: mouse 20: virtual keyboard

30: virtual keyboard driver 31: input detection unit

32: keyboard control unit 33: data transmitter

40: web browser 100: dummy key

Claims (9)

A web browser providing a text box to a user to receive information necessary for providing a service such as an ID or a password; A virtual keyboard that is output in the form of a keyboard on the screen and receives a key input; Inserting a dummy key having no input key value according to input coordinates into the virtual keyboard, controlling the operation of the virtual keyboard, and processing key input data input to the virtual keyboard to the web browser. A virtual keyboard driver for transmitting; Virtual keyboard hacking prevention input system, characterized in that configured to include. The method of claim 1, The virtual keyboard driver, An input sensing unit which senses an input of the virtual keyboard keyboard and calculates a corresponding key value; A data transmitter for transmitting the input key data to the web browser; A keyboard controller configured to generate the virtual keyboard, insert a dummy key into the virtual keyboard, and control the size and position of the virtual keyboard and rearrangement of the keyboard; Virtual keyboard hacking prevention input system, characterized in that configured to include. The method of claim 2, The input detection unit, The virtual keyboard hacking prevention input system, characterized in that the key value is not calculated when a dummy key input is detected. Detecting focus being moved to a text box of a web browser; Generating a virtual keyboard receiving a key input; Inserting a dummy key into the virtual keyboard and rearranging the keyboards of the virtual keyboard; When a specific keyboard of the virtual keyboard is clicked by a user, detecting input coordinates of the clicked keyboard; Calculating an input key value of the corresponding keyboard based on the detected input coordinates; Transmitting the calculated input key value to a web browser to output the corresponding text in a text box; Terminating the virtual keyboard if it is determined that the virtual keyboard input is terminated; Method for operating a virtual keyboard hacking prevention input system, characterized in that configured to include. The method of claim 4, wherein Inserting a dummy key into the virtual keyboard, Method for operating a virtual keyboard hacking prevention input system, characterized in that the at least one dummy key is inserted into the virtual keyboard at an arbitrary position. The method of claim 4, wherein The virtual keyboard, Method for operating a virtual keyboard hacking prevention input system, characterized in that consisting of a qwerty type keyboard. The method of claim 6, Inserting a dummy key into the virtual keyboard, Method of operating a virtual keyboard hacking prevention input system, characterized in that the dummy key is inserted in the unit of the same line in the longitudinal direction. The method of claim 4, wherein If it is determined that the input is not terminated in the virtual keyboard termination step, Reinserting the dummy key by repositioning the dummy key on the virtual keyboard, rearranging the keyboards of the virtual keyboard, and moving to the input coordinate sensing step; Virtual keyboard hacking prevention input system operation method, characterized in that it further comprises. The method of claim 4, wherein The virtual keyboard, Method of operating a virtual keyboard hacking prevention input system, characterized in that consisting of a circular keyboard sequentially arranged in a series of circumference clockwise.
KR1020070102086A 2007-10-10 2007-10-10 Hacking protection input system and method of the virtual keyboard KR20090036820A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020070102086A KR20090036820A (en) 2007-10-10 2007-10-10 Hacking protection input system and method of the virtual keyboard

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020070102086A KR20090036820A (en) 2007-10-10 2007-10-10 Hacking protection input system and method of the virtual keyboard

Publications (1)

Publication Number Publication Date
KR20090036820A true KR20090036820A (en) 2009-04-15

Family

ID=40761681

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020070102086A KR20090036820A (en) 2007-10-10 2007-10-10 Hacking protection input system and method of the virtual keyboard

Country Status (1)

Country Link
KR (1) KR20090036820A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101042227B1 (en) * 2009-11-24 2011-06-16 이니텍(주) A Method for Preventing from Hacking with Virtual Keyboard
KR101239363B1 (en) * 2011-02-18 2013-03-05 (주)바이너리소프트 Apparatus and method for inputting a password in a mobile
KR101373457B1 (en) * 2011-12-02 2014-03-26 비씨카드(주) Method and apparatus for authenticating password of user device using dummy key
KR101505295B1 (en) * 2013-06-25 2015-03-23 숭실대학교산학협력단 Key input method and apparatus
CN105022494A (en) * 2014-04-30 2015-11-04 虹映科技股份有限公司 Safe input method and system of virtual keyboard
KR101648779B1 (en) * 2015-04-02 2016-08-17 (주)케이스마텍 Method for secure text input in information terminal
KR101701871B1 (en) * 2015-12-14 2017-02-02 계명대학교 산학협력단 Method and apparatus of generating a security virtual key pad
KR101721474B1 (en) * 2015-12-14 2017-03-30 계명대학교 산학협력단 Method and apparatus of generating a virtual key pad strengthening security
KR20200082723A (en) * 2018-12-31 2020-07-08 우석대학교 산학협력단 Vulnerability countermeasure virtual keyboard providing device and method and computer readable medium storing program of the same
US10905941B2 (en) 2017-02-02 2021-02-02 Phoenixdarts Co., Ltd. Dart game apparatus and computer program stored in computer-readable medium for providing multimedia information

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101042227B1 (en) * 2009-11-24 2011-06-16 이니텍(주) A Method for Preventing from Hacking with Virtual Keyboard
KR101239363B1 (en) * 2011-02-18 2013-03-05 (주)바이너리소프트 Apparatus and method for inputting a password in a mobile
KR101373457B1 (en) * 2011-12-02 2014-03-26 비씨카드(주) Method and apparatus for authenticating password of user device using dummy key
KR101505295B1 (en) * 2013-06-25 2015-03-23 숭실대학교산학협력단 Key input method and apparatus
CN105022494A (en) * 2014-04-30 2015-11-04 虹映科技股份有限公司 Safe input method and system of virtual keyboard
KR101648779B1 (en) * 2015-04-02 2016-08-17 (주)케이스마텍 Method for secure text input in information terminal
KR101701871B1 (en) * 2015-12-14 2017-02-02 계명대학교 산학협력단 Method and apparatus of generating a security virtual key pad
KR101721474B1 (en) * 2015-12-14 2017-03-30 계명대학교 산학협력단 Method and apparatus of generating a virtual key pad strengthening security
US10905941B2 (en) 2017-02-02 2021-02-02 Phoenixdarts Co., Ltd. Dart game apparatus and computer program stored in computer-readable medium for providing multimedia information
KR20200082723A (en) * 2018-12-31 2020-07-08 우석대학교 산학협력단 Vulnerability countermeasure virtual keyboard providing device and method and computer readable medium storing program of the same

Similar Documents

Publication Publication Date Title
KR20090036820A (en) Hacking protection input system and method of the virtual keyboard
CA2624712C (en) Method and system for secure password/pin input via mouse scroll wheel
KR100745489B1 (en) Preventing method for hacking key input data
CN107742362B (en) PIN verification
US8024559B2 (en) Security authentication system and method
AU2008218262B2 (en) Methods and systems for graphical image authentication
US20080184363A1 (en) Coordinate Based Computer Authentication System and Methods
US20140098141A1 (en) Method and Apparatus for Securing Input of Information via Software Keyboards
US20110202762A1 (en) Method and apparatus for carrying out secure electronic communication
US20030146931A1 (en) Method and apparatus for inputting secret information using multiple screen pointers
JP5121190B2 (en) Input device and automatic teller machine
US20120095919A1 (en) Systems and methods for authenticating aspects of an online transaction using a secure peripheral device having a message display and/or user input
KR100880862B1 (en) Security method for user input data to electronic device
US20120317410A1 (en) Protecting data from data leakage or misuse while supporting multiple channels and physical interfaces
CN100492247C (en) Method for protection against fraudulent modification of data and corresponding equipment and intelligent card
KR100912955B1 (en) Hacking protection input system and method of the virtual keyboard
KR101042227B1 (en) A Method for Preventing from Hacking with Virtual Keyboard
KR100975854B1 (en) Apparatus and Method for The Password Security on Online
KR20090036813A (en) Vertual keyboard hacking protection method using mouse input coordinates
KR101015633B1 (en) A method and a computer readable media for secure data input
KR101152610B1 (en) The Method of Virtual Keyboard
KR101768030B1 (en) Input device and method for security keyboard
KR100854302B1 (en) Keyboard hacking protection method using the virtual keyboard
KR20140030406A (en) Privacy protection method for number and letter entry
KR100854303B1 (en) Keyboard hacking protection method using the scroll-type virtual keyboard

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E601 Decision to refuse application