KR20150100130A - System and method for providing security keyboard - Google Patents

System and method for providing security keyboard Download PDF

Info

Publication number
KR20150100130A
KR20150100130A KR1020140021524A KR20140021524A KR20150100130A KR 20150100130 A KR20150100130 A KR 20150100130A KR 1020140021524 A KR1020140021524 A KR 1020140021524A KR 20140021524 A KR20140021524 A KR 20140021524A KR 20150100130 A KR20150100130 A KR 20150100130A
Authority
KR
South Korea
Prior art keywords
character
key button
user
keyboard
characters
Prior art date
Application number
KR1020140021524A
Other languages
Korean (ko)
Inventor
박승배
Original Assignee
주식회사 엠엘정보기술
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 엠엘정보기술 filed Critical 주식회사 엠엘정보기술
Priority to KR1020140021524A priority Critical patent/KR20150100130A/en
Publication of KR20150100130A publication Critical patent/KR20150100130A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

According to an embodiment of the present invention, there is provided a security keyboard providing system, comprising: a character string generating unit for generating a character string set including one or more characters; A keyboard generating unit for generating a security keyboard by associating the strings of the character string with the key buttons; A selection character determination unit for receiving a key button selection signal from the user terminal and matching a character corresponding to the key button selection signal; A personal information obtaining unit for obtaining user personal information by combining the matched characters; Is provided.

Description

[0001] SYSTEM AND METHOD FOR PROVIDING SECURITY KEYBOARD [0002]

The present invention relates to a security keyboard providing system, and more particularly, to a security keyboard providing system in which a plurality of characters can be assigned to one key button.

In the modern information society, there are a large number of various types of user terminals (e.g., personal computers, smart phones, tablet computers, financial automation terminals, automatic ticket issuers, access control systems, etc.). Most of these user terminals have input means for receiving information from a user, and a virtual keyboard that is graphically displayed on a screen as input means is used. As a representative example, a virtual keyboard is displayed on a monitor in online banking using a computer, and personal information such as an account password or a security card number can be input by using a mouse.

Meanwhile, in recent years, the number of users using personal portable terminal user terminals such as smart phones and tablet computers is rapidly increasing. Users access various kinds of personal business (email confirmation and transmission, financial business, web shopping, etc.) and leisure activity (movie watching, game, etc.) by accessing the Internet using these personal portable terminal user terminals. Typically, such a smartphone or tablet computer does not have a separate keyboard device, but displays a virtual keyboard on a touch screen and receives user's personal information (ID, password, etc.) through the virtual keyboard. Here, the personal information of the user includes a certificate password, an i-PIN ID, an i-PIN password, a passbook or card password, and a game item transaction password.

The presently widely used virtual keyboard is composed of a conventional QWERTY keyboard, and is configured to allow selective input by arranging letters and numbers in each key of the QWERTY keyboard. However, when the virtual keyboard of the QWERTY keyboard is applied to the IT user terminal of the narrow screen such as the smart phone, since the size of each key is small, it is difficult to recognize the letter or number assigned to each key, There is a problem that an input error occurs due to a wrong key touch.

An object of the present invention is to provide a key button capable of generating a character string including a plurality of characters and associating the character string with one key button, thereby selecting and inputting one of the plurality of characters.

According to an embodiment of the present invention, a character string generating unit generates a character string set including one or more characters; A keyboard generating unit for generating a security keyboard by associating the strings of the character string with respective key buttons; An input character determination unit receiving a key button selection signal from the user terminal and determining a character corresponding to the key button selection signal as an input character; A personal information acquiring unit for acquiring the input characters as user personal information; Is provided.

In the present invention, when two characters correspond to the one key button, the first character is selected when the user touches the key button once, and the second character is selected when the user touches the key button twice.

In the present invention, when two characters correspond to the one key button, the first character is selected when the user drags the key button below a certain length, and when the second character is dragged beyond the specific length, Is selected.

In the present invention, the key button selection signal includes drag information starting from the area of the key button, and the drag information includes a dragging direction or dragging length information.

In the present invention, when two characters correspond to the one key button, the first character is selected when the dragging length is equal to or less than the reference value, and the second character is selected when the dragging length is greater than the reference value.

In the present invention, the number of characters included in the character string sets may be the same or different.

According to another embodiment of the present invention, there is provided a character string generation method comprising: a character string generation step of generating a character string set including at least one character; A keyboard generating step of generating a security keyboard by associating the strings of the character string with key buttons, respectively; A selection character determination step of receiving a key button selection signal from a user terminal and determining a character corresponding to the key button selection signal as an input character; A personal information obtaining step of obtaining the input characters as user's personal information; A method of providing a secure keyboard is provided.

In the present invention, the positions of the character and key buttons included in the first security keyboard and the second security keyboard may be changed according to the setting of the user.

According to the present invention, even if the user knows the position touched by the user, the character inputted by the user can not be known, so that leakage of the user's personal information can be prevented.

1 is a diagram illustrating a security keyboard providing system to which the present invention is applied.
2 is a view illustrating a personal information input screen according to an embodiment of the present invention.
3 is a diagram illustrating a basic security keyboard according to an embodiment of the present invention.
4 is a flowchart illustrating a process of displaying a security keyboard by a user terminal according to the present invention.
5 is a block diagram illustrating an internal configuration of a security keyboard providing server according to an embodiment of the present invention.
6 is a diagram illustrating a security keyboard generated by a keyboard generating unit.
7 is a diagram illustrating an example of various security key buttons.
8 is a flowchart illustrating an operation procedure of a security keyboard system according to an embodiment of the present invention.

The following detailed description of the invention refers to the accompanying drawings, which illustrate, by way of illustration, specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It should be understood that the various embodiments of the present invention are different, but need not be mutually exclusive. For example, the specific shapes, structures, and characteristics described herein may be implemented by changing from one embodiment to another without departing from the spirit and scope of the invention. It should also be understood that the location or arrangement of individual components within each embodiment may be varied without departing from the spirit and scope of the present invention. Therefore, the following detailed description is not to be taken in a limiting sense, and the scope of the present invention should be construed as encompassing the scope of the appended claims and all equivalents thereof. In the drawings, like reference numbers designate the same or similar components throughout the several views.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings in order to facilitate a person skilled in the art to which the present invention pertains.

In the specification of the present invention, the term " character " is an arbitrary symbol constituting personal information to be input by a user, and is used in a broad sense including all alphabetic characters, numbers, Hangeul characters, and special characters. Typically, the keys constituting the virtual keyboard include at least one character (alphabet, number, Hangeul character, special character) corresponding to the corresponding key, and the user sequentially selects the character keys corresponding to the personal information, The personal information is input.

1 is a diagram illustrating a security keyboard providing system to which the present invention is applied.

A user terminal 1 to which the present invention is applied includes a screen 11, an input sensing unit 12, an output control unit 13, a control unit 14, a storage unit 15, and a communication unit 16 Respectively. The screen 11 may be a conventional display-only device (e.g., a monitor) or a touch screen capable of both screen output and information input. When the user touches the screen 11 or selects a pointing device (not shown) by clicking or touching the input sensing unit 12, the input sensing unit 12 recognizes the selected pointing device and provides the control unit 14 with the recognition result. The output control unit 13 displays the screen configured on the control unit 14 on the screen 11. The control unit 14 obtains the security keyboard information from the storage unit 15 or the communication unit 16 to configure the security keyboard screen according to the present invention to be displayed on the screen 11 through the output control unit 13, And recognizes the menu or key buttons selected by the user through the input unit 12 and stores the inputted symbols in the storage unit 15. [ The storage unit 15 stores information inputted by the user under the control of the control unit 14 (for example, menu input information, inputted personal information string information, and character key selection information) Save the program to perform the method. The communication unit 16 communicates with a remote server through a wired communication network or a wireless communication network.

Through the communication unit 16, the user terminal 1 communicates with the security keyboard system 2 of the present invention. The security keyboard system 2 is a server for communicating with the user terminal 1 and includes a web service provision server 17 for providing a web service requested by the user to the user terminal 1, 1, an authentication server 18 for authenticating whether the user is a legitimate user based on personal information input from the user terminal 1, a security keyboard is generated and provided to the user terminal 1, and operation information of the security keyboard received from the user terminal 1 And a security keyboard provision server 19 for acquiring user's personal information. At this time, any two or more servers among the web service provision server 17, the authentication server 18, and the security keyboard provision server 19 may be physically implemented as one system or as separate systems . In the specification of the present invention, the web service provision server 17 includes a server for providing a service through an application program (including an application).

The user sequentially selects the character keys corresponding to the personal information by using the security keyboard displayed on the screen 11 of the user terminal 1. The selected information is recognized by the input sensing unit 12 and sent to the control unit 14 . The control unit 14 transmits the character key selection information input by the user via the security keyboard to the web service provision server 17 or the authentication server 18 via the communication unit 16 and requests authentication.

The user terminal 1 downloads a program for performing the security keyboard providing method according to the present invention from the security keyboard system 2. When the user terminal 1 accesses the web service provision server 17, the latest version of the program for performing the secure keyboard provision method according to the present invention is downloaded and executed through the security keyboard provision server 19.

Although the web service provision server 17 is shown in the drawing, the concept of the present invention is not limited thereto, and various application programs (applications) provided through a smart phone will also be included in the scope of the present invention.

That is, the security keyboard is installed on the server on the web, and when the user attempts to log in from the user terminal, the server can transmit the login page and the security keyboard program to the user terminal side. On the other hand, in an application (including an application), a security keyboard may be part of a service component. For example, when a user terminal attempts to download an application program provided with a security keyboard from an application program supply server (an application is an app store), the server does not transmit the security keyboard to the user terminal but requires the security keyboard To the user terminal. In other words, the web sends a secure keyboard to the user terminal every time the user logs in, while the application (including the application) downloads the application from the server to the information kiosk. The security keyboard providing system of the present invention is a concept including both a method of providing a security keyboard on the web and a method of providing a secure keyboard on an application program.

2 is a view illustrating a personal information input screen according to an embodiment of the present invention.

When a user accesses a web service provision server and wants to use a web service provided by the server, the web service provision server typically performs a process of authenticating the user's personal information. To this end, the web service provision server provides the personal information providing screen as shown in FIG. 2 to the user terminal 1 used by the user. The user terminal 1 has a personal information input screen (for example, a login web page, Web page, or various password input web page, etc.) on the screen screen.

3 is a diagram illustrating an existing basic input keyboard.

In the past, when the user selects (touches or clicks) the personal information input window on the personal information input screen as shown in FIG. 2 to detect input preparation (S22), the user terminal 1 displays the basic input keyboard on the screen. Here, the basic input keyboard refers to a conventional QWERTY keyboard, but is not limited thereto, and any arrangement of security keyboards capable of inputting any character belonging to personal information may be used. The existing basic input keyboar as shown in FIG. 3 may be provided as a substitute keyboard if the security keyboard of the present invention is not used by a user's request or by default setting.

4 is a flowchart illustrating a process of displaying a security keyboard by a user terminal according to the present invention.

When the user accesses the web service provision server 17, the user terminal 1 receives the personal information input screen as shown in Fig. 3 from the web service provision server 17 and displays it on the screen screen (S51).

When the user selects (touches or clicks) the personal information input window on the personal information input screen to detect input preparation (S52), the user terminal displays the security keyboard as shown in FIG. 6 including a plurality of characters in one key button From the keyboard providing server 19, displays it on the screen, and acquires personal information (S53). FIG. 6 is a screen showing an example of a security keyboard including a character string in one key button, which will be described in detail below.

The user inputs personal information to be input using the security keyboard. When the personal information is input (S54), the personal information input from the authentication server 18 is authenticated (S55).

The security keyboard as shown in FIG. 3 has a disadvantage that it can obtain the character string information inputted by the user if only the position touched by the user is known. Previously, to compensate for this vulnerability, we used a method of changing the arrangement position of the key buttons by separately providing space or key buttons that do not display characters. However, when there is a space or a key button in which a character is not displayed, a region where a key button containing a relatively small character is located becomes narrow, causing frequent errors in touch.

If the security keyboard according to an exemplary embodiment of the present invention is used, the size of the key button is maintained at a predetermined level or more, and the user can not know the character inputted by the user even if the user inputs the position. The security keyboard according to an embodiment of the present invention is generated by the security keyboard provision server 19. Hereinafter, a detailed configuration of the security keyboard provision server 19 will be described.

5 is a block diagram illustrating an internal configuration of a security keyboard providing server according to an embodiment of the present invention.

5, the security keyboard providing server 19 of the present invention includes a character string generating unit 191, a keyboard generating unit 192, a selected character determining unit 193, and a personal information obtaining unit 194. [

Although each of the configurations of the security keyboard provision server 19 is shown and described as being implemented on the security keyboard system 2 in the description according to FIG. 5 and the description below, in each embodiment of the present invention, The function may also be implemented in the user terminal 1. Alternatively, only functions of some configurations may be implemented in the user terminal 1. [

First, the character string generation unit 191 generates a character string set including at least one character. In the specification of the present invention, 'string' refers to an array including one or more characters. For example, (a), (a, b, c), (c, a)

According to an embodiment of the present invention, all characters to be displayed can be grouped into strings. For example, in general, since all the letters a through z must be displayed on the keyboard, the character string generator 191 can form a set of character strings that can include all the characters a through z. For example, the character string set generated by the character string generating unit 191 is {(q, w), (r, e), (y, t) (a), (f, d), (g, h), (k, j), (l, m), (z, x), (v, c), The character set in the above example is referred to as a character set example (a) in the following, and the character set example (a) is a modification of the arrangement order of a general QWERTY keyboard to generate a character string set in which two alphabets are combined.

The character string set generated by the character string generation unit 191 is regarded as a different character string set when the character order in the character string is changed and when the order of the strings is changed. That is, the character set example (a) is { (w, q), (r, e), (y, t), (u, i) ), (g, h), (k, j), (l, m), (z, x), (v, c), (b, n)} or {(r, e), ( q, w ), (y, t), (u, i), p, o, s, a, f, d, g, h, k, j, (z, x), (v, c), (b, n)}.

In addition, the string generating unit 191 can generate a string set in which redundant characters exist and a string in which redundant characters exist. For example, we can use (x, y ), (r, e), (y, t) h), (q, w) , (k, j), (l, m), (z, x), (v, c), (b, n)} or {(q, w), ( r, r), (e, e) , (y, t), (u, i), (p, o), (s, a), (f, d), (g, h), (k, j) , (l, m), (z, x), (v, c), (b, n)}.

In addition, the character string generation unit 191 may generate a character string set including only a part of normal characters. For example, the set of strings {(r, e), (y, t), (u, i), (p, o), (s, a) , (f, d), (g, h), (k, j), (l, m), (z, x), (v, c), (b, n)

Next, the keyboard generating unit 192 generates the security keyboard by associating the strings of the character string with the key buttons. That is, the keyboard generating unit 192 allocates one key button for each character string to configure the entire security keyboard. Therefore, the number of the key buttons of the entire keyboard may be the number of the strings to be displayed. Of course, in addition to the character string to be displayed, a key button including another character string may be additionally provided.

6 is a diagram illustrating a security keyboard generated by the keyboard generating unit 192. As shown in FIG.

The example of FIG. 5 illustrates a security keyboard generated by the keyboard generating unit 192 based on the character string set (a) described above. Referring to FIG. 5, the values of ((q, w), (r, e), (y, t), (u, (b, n)} are all assigned to one key button, as shown in (b) of FIG. Each key button shown in FIG. 5 is referred to as a security key button 42.

As described above, since the character string generated by the character string generating unit 191 is created corresponding to the character string generated by the character string generating unit 191, a single or a plurality of characters corresponding to or duplicated in a single security key button 42 . In addition, even within the same security keyboard, the number of characters included in one key button 42 may be different.

7 is a diagram illustrating an example of various security key buttons.

FIG. 7A is an example in which a single / single character is mapped in one key button 42 like an existing security keyboard. FIG. 7B is an example in which two one-letter characters are corresponded to one key button 42. FIG. FIG. 7C is an example in which one key character corresponds to one character in the key button 42, but the size of the key button is reduced by directly adjoining the two buttons. FIG. 7D is an example in which four one-character letters are associated with one key button 42. FIG.

As shown in FIGS. 6 and 7, when a character string other than one character is corresponded to one key button 42, a criterion for determining which character is selected when the user touches the key button 42 is required .

Accordingly, the selection character determiner 193 receives the key button selection signal from the user terminal, and matches the character corresponding to the key selection signal. The key selection signal may include the number of times the user has touched the corresponding key button, the length of the dragged key button, or the direction of the dragged direction.

For example, the selection character determiner 193 may match the 's' character when the user touches (selects) the key button shown in FIG. 7B, and may match the 'a' character when the user touches twice have. If you want to enter 'aa', you can touch the key button 2 times, press the space key, and then touch the key button 2 times again. If there are three characters corresponding to the key button, the third character can be matched when the key button is touched three times.

In another example, the selected character determiner 193 may match the 's' character when the user drags the key button shown in FIG. 7B below a certain length, and may match the 'a' character when dragged over a certain length . The starting point from which the key button is dragged may be located within the corresponding key button area.

If there are three characters corresponding to the key button, the third character can be matched if the key is touched once. Alternatively, you can match the first character when you touch the character once, the second character when you drag it short, and the third character when you drag it long. The character setting method according to the touch or drag can be freely modified within the basic embodiment of the present invention. The dragging method as described above can relieve the trouble of touching one key button plural times.

Next, the personal information obtaining unit 194 obtains the user's personal information by combining the characters matched by the selected character determining unit 193. [ The obtained user personal information is transmitted to the authentication server 18 and used for user authentication.

In the above, an example of the security keyboard as shown in FIG. 6 in which a plurality of characters are associated with one key button according to an embodiment of the present invention has been described.

8 is a flowchart illustrating an operation procedure of a security keyboard system according to an embodiment of the present invention.

The flowchart of FIG. 8 illustrates the step of displaying the security keyboard of step S53 of FIG. 4 and acquiring personal information.

First, it is determined whether there is a security keyboard request signal from the user (S21). If there is no security keyboard request signal, the general input keyboard is displayed (S26).

When there is a security keyboard jamming signal from the user, the string generating unit 191 generates a set of character strings (S22).

Next, the keyboard generator 192 associates the strings of all the character strings with respect to the key buttons (S23), and generates a security keyboard to provide the generated keys to the user terminal (S24). At this time, the character string included in the keypad of the security keyboard may include all the characters for receiving the user's personal information.

Next, the selection character determiner 193 receives the key button selection preference for the general input keyboard or the security keyboard of the present invention from the user terminal, and determines the character corresponding to the key button selection signal as the input character (S29 ). As described above, the key button selection signal may be a number of times the key button is touched a plurality of times or a direction in which the key button is dragged.

Finally, the personal information obtaining unit 194 obtains the user's personal information by combining the input characters.

The security keyboard providing system as described above can provide a security keyboard that can not guess personal information with touch information while maintaining the size of a key button touched by a user at a certain level or more.

The embodiments of the present invention described above can be implemented in the form of program instructions that can be executed through various computer components and recorded in a computer-readable recording medium. The computer-readable recording medium may include program commands, data files, data structures, and the like, alone or in combination. The program instructions recorded on the computer-readable recording medium may be those specifically designed and configured for the present invention or may be those known and used by those skilled in the computer software arts. Examples of computer-readable media include magnetic media such as hard disks, floppy disks and magnetic tape, optical recording media such as CD-ROM and DVD, magneto-optical media such as floptical disks, medium, and hardware devices specifically configured to store and execute program instructions, such as ROM, RAM, flash memory, and the like. Examples of program instructions include machine language code, such as those generated by a compiler, as well as high-level language code that can be executed by a computer using an interpreter or the like. The hardware device may be modified into one or more software modules for performing the processing according to the present invention, and vice versa.

The specific acts described in the present invention are, by way of example, not intended to limit the scope of the invention in any way. For brevity of description, descriptions of conventional electronic configurations, control systems, software, and other functional aspects of such systems may be omitted. Also, the connections or connecting members of the lines between the components shown in the figures are illustrative of functional connections and / or physical or circuit connections, which may be replaced or additionally provided by a variety of functional connections, physical Connection, or circuit connections. Also, unless explicitly mentioned, such as " essential ", " importantly ", etc., it may not be a necessary component for application of the present invention.

The use of the terms " above " and similar indication words in the specification of the present invention (particularly in the claims) may refer to both singular and plural. In addition, in the present invention, when a range is described, it includes the invention to which the individual values belonging to the above range are applied (unless there is contradiction thereto), and each individual value constituting the above range is described in the detailed description of the invention The same. Finally, the steps may be performed in any suitable order, unless explicitly stated or contrary to the description of the steps constituting the method according to the invention. The present invention is not necessarily limited to the order of description of the above steps. The use of all examples or exemplary language (e.g., etc.) in this invention is for the purpose of describing the present invention only in detail and is not to be limited by the scope of the claims, It is not. It will also be appreciated by those skilled in the art that various modifications, combinations, and alterations may be made depending on design criteria and factors within the scope of the appended claims or equivalents thereof.

While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, Those skilled in the art will appreciate that various modifications and changes may be made thereto without departing from the scope of the present invention.

Accordingly, the spirit of the present invention should not be construed as being limited to the above-described embodiments, and all ranges that are equivalent to or equivalent to the claims of the present invention as well as the claims .

1: user terminal 11: screen
12: input sensing unit 13: output control unit
14: control unit 15:
16: communication unit 17: Web service provision server
18: Authentication server 19: Security keyboard provided server

Claims (10)

A character string generation unit for generating a character string set including at least one character;
A keyboard generating unit for generating a security keyboard by associating the strings of the character string with the key buttons;
A selection character determination unit for receiving a key button selection signal from the user terminal and determining a character corresponding to the key button selection signal as an input character;
A personal information obtaining unit for setting the input characters as user personal information;
The security keyboard providing system comprising:
The method according to claim 1,
Wherein the first character is selected when the user touches the key button once and the second character is selected when the user touches the key button twice when two characters correspond to one key button.
The method according to claim 1,
The first character is selected when the user drags the key button to a certain length or less when the two characters correspond to one key button, and the second character is selected when the user drags the key button beyond the specific length, Delivery system.
The method according to claim 1,
Wherein the key button selection signal includes drag information starting from an area of the key button, and the drag information includes a direction of dragging or length information to be dragged.
5. The method of claim 4,
Wherein when the one key button corresponds to two characters, the first character is selected when the dragging length is less than or equal to the reference value, and the second character is selected when the dragging length is greater than the reference value.
The method according to claim 1,
Wherein the number of characters included in the character string sets is the same or different.
A character string generating step of generating a character string set including at least one character;
A keyboard generating step of generating a security keyboard by associating the strings of the character string with key buttons, respectively;
A selection character determination step of receiving a key button selection signal from a user terminal and determining a character corresponding to the key button selection signal as an input character;
A personal information obtaining step of obtaining the input characters as user's personal information;
The method comprising the steps of:
8. The method of claim 7,
Wherein the first character is selected when the user touches the key button once and the second character is selected when the user touches the key button twice when two characters correspond to one key button.
8. The method of claim 7,
A first character is selected when the user drags the key button to a certain length or less when the two characters correspond to the one key button and a second character is selected when the user drags the key button beyond the specific length, Delivery method.
8. The method of claim 7,
In the present invention, the position of a character and a key button included in the security keyboard may be changed according to a setting of a user.
KR1020140021524A 2014-02-24 2014-02-24 System and method for providing security keyboard KR20150100130A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020140021524A KR20150100130A (en) 2014-02-24 2014-02-24 System and method for providing security keyboard

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020140021524A KR20150100130A (en) 2014-02-24 2014-02-24 System and method for providing security keyboard

Publications (1)

Publication Number Publication Date
KR20150100130A true KR20150100130A (en) 2015-09-02

Family

ID=54241890

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020140021524A KR20150100130A (en) 2014-02-24 2014-02-24 System and method for providing security keyboard

Country Status (1)

Country Link
KR (1) KR20150100130A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20190034025A (en) * 2017-09-22 2019-04-01 주식회사 코스콤 Security key arrangement method and apparatus
CN111124147A (en) * 2019-11-11 2020-05-08 北京芯盾集团有限公司 Device for realizing sensitive information safety input based on single key function customization
CN113342303A (en) * 2021-05-31 2021-09-03 维沃移动通信有限公司 Information input method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20190034025A (en) * 2017-09-22 2019-04-01 주식회사 코스콤 Security key arrangement method and apparatus
CN111124147A (en) * 2019-11-11 2020-05-08 北京芯盾集团有限公司 Device for realizing sensitive information safety input based on single key function customization
CN111124147B (en) * 2019-11-11 2023-07-21 北京芯盾集团有限公司 Device for realizing sensitive information safety input based on single-key function user definition
CN113342303A (en) * 2021-05-31 2021-09-03 维沃移动通信有限公司 Information input method and device
CN113342303B (en) * 2021-05-31 2024-05-24 维沃移动通信有限公司 Information input method and device

Similar Documents

Publication Publication Date Title
US10313882B2 (en) Dynamic unlock mechanisms for mobile devices
US10223517B2 (en) Gesture-to-password translation
EP3443724B1 (en) Web service picture passwords
US9706400B2 (en) User authentication based on reshuffling displayed images provided on a user device
US9716706B2 (en) Systems and methods for providing a covert password manager
KR101711270B1 (en) User authentication and authorization using personas
US9946867B1 (en) Input mirroring
RU2632122C2 (en) Method and password verification device for inspecting input password and computer system containing password verification device
JP2015513159A (en) How to provide a personalized virtual keyboard
US10440007B1 (en) Symbolic feedback for user input
EP3827362A1 (en) Web browser incorporating social and community features
US10666663B2 (en) Detecting fraudulent user access to online web services via user flow
KR20150100130A (en) System and method for providing security keyboard
WO2018130852A1 (en) Improved authentication
TWI659337B (en) Method and computer program product of displaying a dynamic virtual keyboard
AU2015249192A1 (en) User authentication and authorization using personas

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E601 Decision to refuse application