KR20090036820A - Hacking protection input system and method of the virtual keyboard - Google Patents
Hacking protection input system and method of the virtual keyboard Download PDFInfo
- Publication number
- KR20090036820A KR20090036820A KR1020070102086A KR20070102086A KR20090036820A KR 20090036820 A KR20090036820 A KR 20090036820A KR 1020070102086 A KR1020070102086 A KR 1020070102086A KR 20070102086 A KR20070102086 A KR 20070102086A KR 20090036820 A KR20090036820 A KR 20090036820A
- Authority
- KR
- South Korea
- Prior art keywords
- virtual keyboard
- input
- keyboard
- key
- dummy
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/02—Input arrangements using manually operated switches, e.g. using keyboards or dials
- G06F3/023—Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
- G06F3/0233—Character input methods
- G06F3/0236—Character input methods using selection techniques to select from displayed items
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04886—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- User Interface Of Digital Computer (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
Description
The present invention relates to a virtual keyboard hacking prevention input system and an operation method, and more particularly, by inserting a dummy key that does not have an input key value according to input coordinates when the virtual keyboard is driven into the virtual keyboard. The present invention relates to a virtual keyboard hacking prevention input system and an operation method of improving security by changing an input coordinate value to prevent leakage of key input information according to input coordinate hacking.
Recently, with the rapid development of the Internet and computer technology, important tasks such as Internet banking, stock trading, and electronic payment in the Internet shopping mall are performed through personal computers (PCs) of individuals or companies.
In such a financial transaction or electronic commerce through a PC, the user goes through an authentication process of inputting an ID, password, certificate password, credit card number or social security number to prove his or her identity.
However, in the process of inputting such important information through the keyboard, the personal information obtained by retrieving the keyboard input information through spyware or keystroke logger installed on the PC by a malicious third party is obtained. There are a growing number of illegal thefts.
As a conventional keyboard hacking prevention method for solving such a problem, there is a method of installing an antivirus or a spyware removal tool on a PC to detect and remove malicious programs such as spyware. However, when the modified or new malicious program occurs, it is possible to cope only after the damage situation is reported, and thus there is a limit in preventing the damage in advance.
Another conventional keyboard hacking prevention method is a "key input theft prevention method" described in Korean Patent Publication No. 0496462. The document includes a virtual keyboard generation module that determines whether a key logger exists in a user computer connected to a predetermined server through a communication network, and displays a virtual keyboard on a screen of the user computer when the key logger exists. By this operation, a method of receiving a key input from the user through the virtual keyboard is described.
However, if the hacking program for collecting the coordinate input of the mouse is installed in the user's computer, a malicious third party obtains the input key information by analyzing the repeated mouse input coordinates of the user and analyzing the input key information. There is a problem that can be.
The present invention is to solve the above problems according to the prior art. That is, an object of the present invention is to insert a dummy key that does not have an input key value according to the input coordinates when the virtual keyboard is driven into the virtual keyboard, thereby changing the input coordinate values of the virtual keyboard keyboards to prevent the leakage of key input information according to the input coordinate hacking. It's there.
The present invention as a technical concept for achieving the above object, Web browser for providing a text box to the user to receive the information required for providing the service, such as ID or password; A virtual keyboard which is outputted in the form of a keyboard on the screen and receives a key input; Inserting a dummy key having no input key value according to input coordinates into the virtual keyboard, controlling the operation of the virtual keyboard, and processing key input data input to the virtual keyboard to the web browser. A virtual keyboard driver for transmitting; It provides a virtual keyboard hacking prevention input system, characterized in that configured to include.
According to the present invention, when a virtual key is inserted by a hacking program by changing the input coordinate values of keyboard keys by inserting a dummy key having no input key value according to the input coordinates when the virtual keyboard is driven. In addition, there is an effect that can protect the keystroke information.
Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.
1 is a view showing the configuration of a virtual keyboard hacking prevention input system according to a first embodiment of the present invention.
As shown, the virtual keyboard hacking prevention input system according to the first embodiment of the present invention is a web browser that provides a text box to the user in order to receive information necessary to provide a service, such as a
The
The
The
The
2 is a diagram showing the form of a virtual keyboard applied to the first embodiment of the present invention.
As shown, the virtual keyboard applied to the first embodiment of the present invention is a qwerty-type keyboard capable of inputting numbers and letters, and includes a
3 is a diagram illustrating a dummy key inserted into a virtual keyboard applied to the first embodiment of the present invention.
As shown, the
Since the
In addition, one
4 is a view showing a modification of the state that the dummy key is inserted into the virtual keyboard applied to the first embodiment of the present invention.
As shown in the drawing,
When the keys are arranged in a straight line such that the keyboard layout of the
In addition, although the
Hereinafter, a method for operating the virtual keyboard hacking prevention input system according to the first embodiment of the present invention using the virtual keyboard hacking prevention input system configured as described above will be described in detail with reference to FIG. 5.
5 is a flowchart illustrating a method for operating a virtual keyboard hacking prevention input system according to a first embodiment of the present invention.
First, when the user clicks the mouse on the text box of the
On the other hand, the
Thereafter, the
When the step S120 is completed, the
After completion of the input key value calculating step (S140), the
Thereafter, the
On the other hand, if it is determined that the input is not terminated in the input end determination step (S160), as shown in Figure 6, by changing the position of the
7 is a diagram showing the form of a virtual keyboard applied to the second embodiment of the present invention.
The virtual keyboard applied to the second embodiment of the present invention is a numeric keyboard for inputting a number such as a password. As shown in FIG. 7A, a series of numbers are sequentially arranged along the circumference in a clockwise direction. It consists of a circular keyboard.
As shown in FIG. 7B, a
Here, the external shape of the
The present invention described above is not limited to the above-described embodiments and the accompanying drawings, and it is common in the art that various substitutions, modifications, and changes can be made without departing from the technical spirit of the present invention. It will be clear to those who have knowledge of God.
1 is a view showing the configuration of a virtual keyboard hacking prevention input system according to a first embodiment of the present invention.
2 is a view showing the form of a virtual keyboard applied to the first embodiment of the present invention.
3 is a view showing a state in which a dummy key is inserted into a virtual keyboard applied to the first embodiment of the present invention.
4 is a view showing a modification of the state that the dummy key is inserted into the virtual keyboard applied to the first embodiment of the present invention.
5 is a flowchart illustrating a method for operating a virtual keyboard hacking prevention input system according to a first embodiment of the present invention.
6 is a flowchart showing a modification of the method for operating a virtual keyboard hacking prevention input system according to the first embodiment of the present invention.
7 is a view showing the form of a virtual keyboard applied to the second embodiment of the present invention.
<Description of the symbols for the main parts of the drawings>
10: mouse 20: virtual keyboard
30: virtual keyboard driver 31: input detection unit
32: keyboard control unit 33: data transmitter
40: web browser 100: dummy key
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020070102086A KR20090036820A (en) | 2007-10-10 | 2007-10-10 | Hacking protection input system and method of the virtual keyboard |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020070102086A KR20090036820A (en) | 2007-10-10 | 2007-10-10 | Hacking protection input system and method of the virtual keyboard |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20090036820A true KR20090036820A (en) | 2009-04-15 |
Family
ID=40761681
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020070102086A KR20090036820A (en) | 2007-10-10 | 2007-10-10 | Hacking protection input system and method of the virtual keyboard |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20090036820A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101042227B1 (en) * | 2009-11-24 | 2011-06-16 | 이니텍(주) | A Method for Preventing from Hacking with Virtual Keyboard |
KR101239363B1 (en) * | 2011-02-18 | 2013-03-05 | (주)바이너리소프트 | Apparatus and method for inputting a password in a mobile |
KR101373457B1 (en) * | 2011-12-02 | 2014-03-26 | 비씨카드(주) | Method and apparatus for authenticating password of user device using dummy key |
KR101505295B1 (en) * | 2013-06-25 | 2015-03-23 | 숭실대학교산학협력단 | Key input method and apparatus |
CN105022494A (en) * | 2014-04-30 | 2015-11-04 | 虹映科技股份有限公司 | Safe input method and system of virtual keyboard |
KR101648779B1 (en) * | 2015-04-02 | 2016-08-17 | (주)케이스마텍 | Method for secure text input in information terminal |
KR101701871B1 (en) * | 2015-12-14 | 2017-02-02 | 계명대학교 산학협력단 | Method and apparatus of generating a security virtual key pad |
KR101721474B1 (en) * | 2015-12-14 | 2017-03-30 | 계명대학교 산학협력단 | Method and apparatus of generating a virtual key pad strengthening security |
KR20200082723A (en) * | 2018-12-31 | 2020-07-08 | 우석대학교 산학협력단 | Vulnerability countermeasure virtual keyboard providing device and method and computer readable medium storing program of the same |
US10905941B2 (en) | 2017-02-02 | 2021-02-02 | Phoenixdarts Co., Ltd. | Dart game apparatus and computer program stored in computer-readable medium for providing multimedia information |
-
2007
- 2007-10-10 KR KR1020070102086A patent/KR20090036820A/en not_active Application Discontinuation
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101042227B1 (en) * | 2009-11-24 | 2011-06-16 | 이니텍(주) | A Method for Preventing from Hacking with Virtual Keyboard |
KR101239363B1 (en) * | 2011-02-18 | 2013-03-05 | (주)바이너리소프트 | Apparatus and method for inputting a password in a mobile |
KR101373457B1 (en) * | 2011-12-02 | 2014-03-26 | 비씨카드(주) | Method and apparatus for authenticating password of user device using dummy key |
KR101505295B1 (en) * | 2013-06-25 | 2015-03-23 | 숭실대학교산학협력단 | Key input method and apparatus |
CN105022494A (en) * | 2014-04-30 | 2015-11-04 | 虹映科技股份有限公司 | Safe input method and system of virtual keyboard |
KR101648779B1 (en) * | 2015-04-02 | 2016-08-17 | (주)케이스마텍 | Method for secure text input in information terminal |
KR101701871B1 (en) * | 2015-12-14 | 2017-02-02 | 계명대학교 산학협력단 | Method and apparatus of generating a security virtual key pad |
KR101721474B1 (en) * | 2015-12-14 | 2017-03-30 | 계명대학교 산학협력단 | Method and apparatus of generating a virtual key pad strengthening security |
US10905941B2 (en) | 2017-02-02 | 2021-02-02 | Phoenixdarts Co., Ltd. | Dart game apparatus and computer program stored in computer-readable medium for providing multimedia information |
KR20200082723A (en) * | 2018-12-31 | 2020-07-08 | 우석대학교 산학협력단 | Vulnerability countermeasure virtual keyboard providing device and method and computer readable medium storing program of the same |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR20090036820A (en) | Hacking protection input system and method of the virtual keyboard | |
CA2624712C (en) | Method and system for secure password/pin input via mouse scroll wheel | |
KR100745489B1 (en) | Preventing method for hacking key input data | |
CN107742362B (en) | PIN verification | |
US8024559B2 (en) | Security authentication system and method | |
AU2008218262B2 (en) | Methods and systems for graphical image authentication | |
US20080184363A1 (en) | Coordinate Based Computer Authentication System and Methods | |
US20140098141A1 (en) | Method and Apparatus for Securing Input of Information via Software Keyboards | |
US20110202762A1 (en) | Method and apparatus for carrying out secure electronic communication | |
US20030146931A1 (en) | Method and apparatus for inputting secret information using multiple screen pointers | |
JP5121190B2 (en) | Input device and automatic teller machine | |
US20120095919A1 (en) | Systems and methods for authenticating aspects of an online transaction using a secure peripheral device having a message display and/or user input | |
KR100880862B1 (en) | Security method for user input data to electronic device | |
US20120317410A1 (en) | Protecting data from data leakage or misuse while supporting multiple channels and physical interfaces | |
CN100492247C (en) | Method for protection against fraudulent modification of data and corresponding equipment and intelligent card | |
KR100912955B1 (en) | Hacking protection input system and method of the virtual keyboard | |
KR101042227B1 (en) | A Method for Preventing from Hacking with Virtual Keyboard | |
KR100975854B1 (en) | Apparatus and Method for The Password Security on Online | |
KR20090036813A (en) | Vertual keyboard hacking protection method using mouse input coordinates | |
KR101015633B1 (en) | A method and a computer readable media for secure data input | |
KR101152610B1 (en) | The Method of Virtual Keyboard | |
KR101768030B1 (en) | Input device and method for security keyboard | |
KR100854302B1 (en) | Keyboard hacking protection method using the virtual keyboard | |
KR20140030406A (en) | Privacy protection method for number and letter entry | |
KR100854303B1 (en) | Keyboard hacking protection method using the scroll-type virtual keyboard |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |