KR20150100130A - System and method for providing security keyboard - Google Patents
System and method for providing security keyboard Download PDFInfo
- Publication number
- KR20150100130A KR20150100130A KR1020140021524A KR20140021524A KR20150100130A KR 20150100130 A KR20150100130 A KR 20150100130A KR 1020140021524 A KR1020140021524 A KR 1020140021524A KR 20140021524 A KR20140021524 A KR 20140021524A KR 20150100130 A KR20150100130 A KR 20150100130A
- Authority
- KR
- South Korea
- Prior art keywords
- character
- key button
- user
- keyboard
- characters
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
According to an embodiment of the present invention, there is provided a security keyboard providing system, comprising: a character string generating unit for generating a character string set including one or more characters; A keyboard generating unit for generating a security keyboard by associating the strings of the character string with the key buttons; A selection character determination unit for receiving a key button selection signal from the user terminal and matching a character corresponding to the key button selection signal; A personal information obtaining unit for obtaining user personal information by combining the matched characters; Is provided.
Description
The present invention relates to a security keyboard providing system, and more particularly, to a security keyboard providing system in which a plurality of characters can be assigned to one key button.
In the modern information society, there are a large number of various types of user terminals (e.g., personal computers, smart phones, tablet computers, financial automation terminals, automatic ticket issuers, access control systems, etc.). Most of these user terminals have input means for receiving information from a user, and a virtual keyboard that is graphically displayed on a screen as input means is used. As a representative example, a virtual keyboard is displayed on a monitor in online banking using a computer, and personal information such as an account password or a security card number can be input by using a mouse.
Meanwhile, in recent years, the number of users using personal portable terminal user terminals such as smart phones and tablet computers is rapidly increasing. Users access various kinds of personal business (email confirmation and transmission, financial business, web shopping, etc.) and leisure activity (movie watching, game, etc.) by accessing the Internet using these personal portable terminal user terminals. Typically, such a smartphone or tablet computer does not have a separate keyboard device, but displays a virtual keyboard on a touch screen and receives user's personal information (ID, password, etc.) through the virtual keyboard. Here, the personal information of the user includes a certificate password, an i-PIN ID, an i-PIN password, a passbook or card password, and a game item transaction password.
The presently widely used virtual keyboard is composed of a conventional QWERTY keyboard, and is configured to allow selective input by arranging letters and numbers in each key of the QWERTY keyboard. However, when the virtual keyboard of the QWERTY keyboard is applied to the IT user terminal of the narrow screen such as the smart phone, since the size of each key is small, it is difficult to recognize the letter or number assigned to each key, There is a problem that an input error occurs due to a wrong key touch.
An object of the present invention is to provide a key button capable of generating a character string including a plurality of characters and associating the character string with one key button, thereby selecting and inputting one of the plurality of characters.
According to an embodiment of the present invention, a character string generating unit generates a character string set including one or more characters; A keyboard generating unit for generating a security keyboard by associating the strings of the character string with respective key buttons; An input character determination unit receiving a key button selection signal from the user terminal and determining a character corresponding to the key button selection signal as an input character; A personal information acquiring unit for acquiring the input characters as user personal information; Is provided.
In the present invention, when two characters correspond to the one key button, the first character is selected when the user touches the key button once, and the second character is selected when the user touches the key button twice.
In the present invention, when two characters correspond to the one key button, the first character is selected when the user drags the key button below a certain length, and when the second character is dragged beyond the specific length, Is selected.
In the present invention, the key button selection signal includes drag information starting from the area of the key button, and the drag information includes a dragging direction or dragging length information.
In the present invention, when two characters correspond to the one key button, the first character is selected when the dragging length is equal to or less than the reference value, and the second character is selected when the dragging length is greater than the reference value.
In the present invention, the number of characters included in the character string sets may be the same or different.
According to another embodiment of the present invention, there is provided a character string generation method comprising: a character string generation step of generating a character string set including at least one character; A keyboard generating step of generating a security keyboard by associating the strings of the character string with key buttons, respectively; A selection character determination step of receiving a key button selection signal from a user terminal and determining a character corresponding to the key button selection signal as an input character; A personal information obtaining step of obtaining the input characters as user's personal information; A method of providing a secure keyboard is provided.
In the present invention, the positions of the character and key buttons included in the first security keyboard and the second security keyboard may be changed according to the setting of the user.
According to the present invention, even if the user knows the position touched by the user, the character inputted by the user can not be known, so that leakage of the user's personal information can be prevented.
1 is a diagram illustrating a security keyboard providing system to which the present invention is applied.
2 is a view illustrating a personal information input screen according to an embodiment of the present invention.
3 is a diagram illustrating a basic security keyboard according to an embodiment of the present invention.
4 is a flowchart illustrating a process of displaying a security keyboard by a user terminal according to the present invention.
5 is a block diagram illustrating an internal configuration of a security keyboard providing server according to an embodiment of the present invention.
6 is a diagram illustrating a security keyboard generated by a keyboard generating unit.
7 is a diagram illustrating an example of various security key buttons.
8 is a flowchart illustrating an operation procedure of a security keyboard system according to an embodiment of the present invention.
The following detailed description of the invention refers to the accompanying drawings, which illustrate, by way of illustration, specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It should be understood that the various embodiments of the present invention are different, but need not be mutually exclusive. For example, the specific shapes, structures, and characteristics described herein may be implemented by changing from one embodiment to another without departing from the spirit and scope of the invention. It should also be understood that the location or arrangement of individual components within each embodiment may be varied without departing from the spirit and scope of the present invention. Therefore, the following detailed description is not to be taken in a limiting sense, and the scope of the present invention should be construed as encompassing the scope of the appended claims and all equivalents thereof. In the drawings, like reference numbers designate the same or similar components throughout the several views.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings in order to facilitate a person skilled in the art to which the present invention pertains.
In the specification of the present invention, the term " character " is an arbitrary symbol constituting personal information to be input by a user, and is used in a broad sense including all alphabetic characters, numbers, Hangeul characters, and special characters. Typically, the keys constituting the virtual keyboard include at least one character (alphabet, number, Hangeul character, special character) corresponding to the corresponding key, and the user sequentially selects the character keys corresponding to the personal information, The personal information is input.
1 is a diagram illustrating a security keyboard providing system to which the present invention is applied.
A
Through the
The user sequentially selects the character keys corresponding to the personal information by using the security keyboard displayed on the
The
Although the web
That is, the security keyboard is installed on the server on the web, and when the user attempts to log in from the user terminal, the server can transmit the login page and the security keyboard program to the user terminal side. On the other hand, in an application (including an application), a security keyboard may be part of a service component. For example, when a user terminal attempts to download an application program provided with a security keyboard from an application program supply server (an application is an app store), the server does not transmit the security keyboard to the user terminal but requires the security keyboard To the user terminal. In other words, the web sends a secure keyboard to the user terminal every time the user logs in, while the application (including the application) downloads the application from the server to the information kiosk. The security keyboard providing system of the present invention is a concept including both a method of providing a security keyboard on the web and a method of providing a secure keyboard on an application program.
2 is a view illustrating a personal information input screen according to an embodiment of the present invention.
When a user accesses a web service provision server and wants to use a web service provided by the server, the web service provision server typically performs a process of authenticating the user's personal information. To this end, the web service provision server provides the personal information providing screen as shown in FIG. 2 to the
3 is a diagram illustrating an existing basic input keyboard.
In the past, when the user selects (touches or clicks) the personal information input window on the personal information input screen as shown in FIG. 2 to detect input preparation (S22), the
4 is a flowchart illustrating a process of displaying a security keyboard by a user terminal according to the present invention.
When the user accesses the web
When the user selects (touches or clicks) the personal information input window on the personal information input screen to detect input preparation (S52), the user terminal displays the security keyboard as shown in FIG. 6 including a plurality of characters in one key button From the
The user inputs personal information to be input using the security keyboard. When the personal information is input (S54), the personal information input from the
The security keyboard as shown in FIG. 3 has a disadvantage that it can obtain the character string information inputted by the user if only the position touched by the user is known. Previously, to compensate for this vulnerability, we used a method of changing the arrangement position of the key buttons by separately providing space or key buttons that do not display characters. However, when there is a space or a key button in which a character is not displayed, a region where a key button containing a relatively small character is located becomes narrow, causing frequent errors in touch.
If the security keyboard according to an exemplary embodiment of the present invention is used, the size of the key button is maintained at a predetermined level or more, and the user can not know the character inputted by the user even if the user inputs the position. The security keyboard according to an embodiment of the present invention is generated by the security
5 is a block diagram illustrating an internal configuration of a security keyboard providing server according to an embodiment of the present invention.
5, the security
Although each of the configurations of the security
First, the character
According to an embodiment of the present invention, all characters to be displayed can be grouped into strings. For example, in general, since all the letters a through z must be displayed on the keyboard, the
The character string set generated by the character
In addition, the
In addition, the character
Next, the
6 is a diagram illustrating a security keyboard generated by the
The example of FIG. 5 illustrates a security keyboard generated by the
As described above, since the character string generated by the character
7 is a diagram illustrating an example of various security key buttons.
FIG. 7A is an example in which a single / single character is mapped in one
As shown in FIGS. 6 and 7, when a character string other than one character is corresponded to one
Accordingly, the
For example, the
In another example, the selected
If there are three characters corresponding to the key button, the third character can be matched if the key is touched once. Alternatively, you can match the first character when you touch the character once, the second character when you drag it short, and the third character when you drag it long. The character setting method according to the touch or drag can be freely modified within the basic embodiment of the present invention. The dragging method as described above can relieve the trouble of touching one key button plural times.
Next, the personal
In the above, an example of the security keyboard as shown in FIG. 6 in which a plurality of characters are associated with one key button according to an embodiment of the present invention has been described.
8 is a flowchart illustrating an operation procedure of a security keyboard system according to an embodiment of the present invention.
The flowchart of FIG. 8 illustrates the step of displaying the security keyboard of step S53 of FIG. 4 and acquiring personal information.
First, it is determined whether there is a security keyboard request signal from the user (S21). If there is no security keyboard request signal, the general input keyboard is displayed (S26).
When there is a security keyboard jamming signal from the user, the
Next, the
Next, the
Finally, the personal
The security keyboard providing system as described above can provide a security keyboard that can not guess personal information with touch information while maintaining the size of a key button touched by a user at a certain level or more.
The embodiments of the present invention described above can be implemented in the form of program instructions that can be executed through various computer components and recorded in a computer-readable recording medium. The computer-readable recording medium may include program commands, data files, data structures, and the like, alone or in combination. The program instructions recorded on the computer-readable recording medium may be those specifically designed and configured for the present invention or may be those known and used by those skilled in the computer software arts. Examples of computer-readable media include magnetic media such as hard disks, floppy disks and magnetic tape, optical recording media such as CD-ROM and DVD, magneto-optical media such as floptical disks, medium, and hardware devices specifically configured to store and execute program instructions, such as ROM, RAM, flash memory, and the like. Examples of program instructions include machine language code, such as those generated by a compiler, as well as high-level language code that can be executed by a computer using an interpreter or the like. The hardware device may be modified into one or more software modules for performing the processing according to the present invention, and vice versa.
The specific acts described in the present invention are, by way of example, not intended to limit the scope of the invention in any way. For brevity of description, descriptions of conventional electronic configurations, control systems, software, and other functional aspects of such systems may be omitted. Also, the connections or connecting members of the lines between the components shown in the figures are illustrative of functional connections and / or physical or circuit connections, which may be replaced or additionally provided by a variety of functional connections, physical Connection, or circuit connections. Also, unless explicitly mentioned, such as " essential ", " importantly ", etc., it may not be a necessary component for application of the present invention.
The use of the terms " above " and similar indication words in the specification of the present invention (particularly in the claims) may refer to both singular and plural. In addition, in the present invention, when a range is described, it includes the invention to which the individual values belonging to the above range are applied (unless there is contradiction thereto), and each individual value constituting the above range is described in the detailed description of the invention The same. Finally, the steps may be performed in any suitable order, unless explicitly stated or contrary to the description of the steps constituting the method according to the invention. The present invention is not necessarily limited to the order of description of the above steps. The use of all examples or exemplary language (e.g., etc.) in this invention is for the purpose of describing the present invention only in detail and is not to be limited by the scope of the claims, It is not. It will also be appreciated by those skilled in the art that various modifications, combinations, and alterations may be made depending on design criteria and factors within the scope of the appended claims or equivalents thereof.
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, Those skilled in the art will appreciate that various modifications and changes may be made thereto without departing from the scope of the present invention.
Accordingly, the spirit of the present invention should not be construed as being limited to the above-described embodiments, and all ranges that are equivalent to or equivalent to the claims of the present invention as well as the claims .
1: user terminal 11: screen
12: input sensing unit 13: output control unit
14: control unit 15:
16: communication unit 17: Web service provision server
18: Authentication server 19: Security keyboard provided server
Claims (10)
A keyboard generating unit for generating a security keyboard by associating the strings of the character string with the key buttons;
A selection character determination unit for receiving a key button selection signal from the user terminal and determining a character corresponding to the key button selection signal as an input character;
A personal information obtaining unit for setting the input characters as user personal information;
The security keyboard providing system comprising:
Wherein the first character is selected when the user touches the key button once and the second character is selected when the user touches the key button twice when two characters correspond to one key button.
The first character is selected when the user drags the key button to a certain length or less when the two characters correspond to one key button, and the second character is selected when the user drags the key button beyond the specific length, Delivery system.
Wherein the key button selection signal includes drag information starting from an area of the key button, and the drag information includes a direction of dragging or length information to be dragged.
Wherein when the one key button corresponds to two characters, the first character is selected when the dragging length is less than or equal to the reference value, and the second character is selected when the dragging length is greater than the reference value.
Wherein the number of characters included in the character string sets is the same or different.
A keyboard generating step of generating a security keyboard by associating the strings of the character string with key buttons, respectively;
A selection character determination step of receiving a key button selection signal from a user terminal and determining a character corresponding to the key button selection signal as an input character;
A personal information obtaining step of obtaining the input characters as user's personal information;
The method comprising the steps of:
Wherein the first character is selected when the user touches the key button once and the second character is selected when the user touches the key button twice when two characters correspond to one key button.
A first character is selected when the user drags the key button to a certain length or less when the two characters correspond to the one key button and a second character is selected when the user drags the key button beyond the specific length, Delivery method.
In the present invention, the position of a character and a key button included in the security keyboard may be changed according to a setting of a user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020140021524A KR20150100130A (en) | 2014-02-24 | 2014-02-24 | System and method for providing security keyboard |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020140021524A KR20150100130A (en) | 2014-02-24 | 2014-02-24 | System and method for providing security keyboard |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20150100130A true KR20150100130A (en) | 2015-09-02 |
Family
ID=54241890
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020140021524A KR20150100130A (en) | 2014-02-24 | 2014-02-24 | System and method for providing security keyboard |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20150100130A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190034025A (en) * | 2017-09-22 | 2019-04-01 | 주식회사 코스콤 | Security key arrangement method and apparatus |
CN111124147A (en) * | 2019-11-11 | 2020-05-08 | 北京芯盾集团有限公司 | Device for realizing sensitive information safety input based on single key function customization |
CN113342303A (en) * | 2021-05-31 | 2021-09-03 | 维沃移动通信有限公司 | Information input method and device |
-
2014
- 2014-02-24 KR KR1020140021524A patent/KR20150100130A/en not_active Application Discontinuation
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190034025A (en) * | 2017-09-22 | 2019-04-01 | 주식회사 코스콤 | Security key arrangement method and apparatus |
CN111124147A (en) * | 2019-11-11 | 2020-05-08 | 北京芯盾集团有限公司 | Device for realizing sensitive information safety input based on single key function customization |
CN111124147B (en) * | 2019-11-11 | 2023-07-21 | 北京芯盾集团有限公司 | Device for realizing sensitive information safety input based on single-key function user definition |
CN113342303A (en) * | 2021-05-31 | 2021-09-03 | 维沃移动通信有限公司 | Information input method and device |
CN113342303B (en) * | 2021-05-31 | 2024-05-24 | 维沃移动通信有限公司 | Information input method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10313882B2 (en) | Dynamic unlock mechanisms for mobile devices | |
US10223517B2 (en) | Gesture-to-password translation | |
EP3443724B1 (en) | Web service picture passwords | |
US9706400B2 (en) | User authentication based on reshuffling displayed images provided on a user device | |
US9716706B2 (en) | Systems and methods for providing a covert password manager | |
KR101711270B1 (en) | User authentication and authorization using personas | |
US9946867B1 (en) | Input mirroring | |
RU2632122C2 (en) | Method and password verification device for inspecting input password and computer system containing password verification device | |
JP2015513159A (en) | How to provide a personalized virtual keyboard | |
US10440007B1 (en) | Symbolic feedback for user input | |
EP3827362A1 (en) | Web browser incorporating social and community features | |
US10666663B2 (en) | Detecting fraudulent user access to online web services via user flow | |
KR20150100130A (en) | System and method for providing security keyboard | |
WO2018130852A1 (en) | Improved authentication | |
TWI659337B (en) | Method and computer program product of displaying a dynamic virtual keyboard | |
AU2015249192A1 (en) | User authentication and authorization using personas |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |