WO2008077326A1 - A character inputting method and system thereof - Google Patents

A character inputting method and system thereof Download PDF

Info

Publication number
WO2008077326A1
WO2008077326A1 PCT/CN2007/070968 CN2007070968W WO2008077326A1 WO 2008077326 A1 WO2008077326 A1 WO 2008077326A1 CN 2007070968 W CN2007070968 W CN 2007070968W WO 2008077326 A1 WO2008077326 A1 WO 2008077326A1
Authority
WO
WIPO (PCT)
Prior art keywords
character
user
characters
comparison table
input
Prior art date
Application number
PCT/CN2007/070968
Other languages
French (fr)
Chinese (zh)
Inventor
Fan Wang
Qingming Wang
Zhibin Fan
Xiang Ren
Xudong Chen
Original Assignee
Tencent Technology (Shenzhen) Company Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology (Shenzhen) Company Limited filed Critical Tencent Technology (Shenzhen) Company Limited
Publication of WO2008077326A1 publication Critical patent/WO2008077326A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
    • G06F3/0233Character input methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system

Definitions

  • the present invention relates to the field of character input technology, and more particularly to a character input method and a character input system. Background of the invention
  • FIG. 1 is a schematic diagram of a soft keyboard in the prior art.
  • This soft keyboard input method prevents others from listening from the keyboard, but it also has many shortcomings, for example: The user clicks on the software to operate much slower than typing directly on the keyboard, and is prone to error; in addition, if others can It is convenient to see the click operation performed by the user on the screen, and the characters input by the user can be easily obtained. Summary of the invention
  • the present invention discloses a character input method, which comprises the following steps:
  • the character comparison table is used to indicate a correspondence between the plain text character and the secret character character
  • the invention also discloses a system for character input, the system comprising:
  • a first device configured to provide a character comparison table to the user, and receive a secret character input by the user
  • a second device configured to convert the ciphertext characters input by the user into the first device into plaintext characters according to the character comparison table.
  • the present invention since the present invention first provides the user with a character comparison table for indicating the correspondence between the plaintext character and the ciphertext character, and then receives the ciphertext character corresponding to the plaintext character input by the user according to the character comparison table. And converting the ciphertext character into a plaintext character according to the character comparison table.
  • the technical solution of the present invention reduces the risk of input character leakage and improves the security of input characters.
  • FIG. 1 is a schematic view of a soft keyboard in the prior art
  • FIG. 2 is a schematic flow chart of a first embodiment of the present invention
  • 3 is a schematic diagram of a character comparison table in the first embodiment of the present invention
  • FIG. 4 is a schematic flowchart of a second embodiment of the present invention
  • FIG. 5 is a schematic flowchart of a third embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a character input system according to an embodiment of the present invention. Mode for carrying out the invention
  • the main idea of the present invention is to provide a character comparison table for the user, and the character comparison table is used to indicate the correspondence between the plaintext character and the ciphertext character, and the user can obtain the corresponding correspondence according to the plaintext character and the character comparison table to be input by the user.
  • the ciphertext character and then input the ciphertext character
  • the system receives the ciphertext character input by the user, and then converts the ciphertext character into a plaintext character according to the character comparison table, so that the plaintext character to be input by the user can be obtained, and even Other users listen to the keyboard or observe the user's input operation, obtain the ciphertext characters input by the user, and can not get the original plaintext characters, thus ensuring the security of the character input.
  • the plaintext character is not directly input, but the ciphertext character is input, and as long as the plaintext character corresponding to the ciphertext character is changed, a plurality of plaintext characters can be finally obtained by the limited ciphertext character.
  • This allows a variety of characters to be entered with limited keys. For example, it is often difficult to directly input characters. If there is a plain text character corresponding to the ciphertext character "a" in the character comparison table, then "a" can be input by the cartridge to finally obtain "/,.”
  • the scenario in which the user logs in to the IM tool to input a password character is taken as an example to illustrate the technical solution of the present invention.
  • FIG. 2 is a schematic flow chart of a first embodiment of the present invention. Referring to Figure 2, the process includes Next steps:
  • Step 201 When the user runs the IM client to prepare for login, the IM client displays the character comparison table on the interface to provide to the user.
  • the character comparison table here may be generated by the IM client and sent to the IM server after being generated, so that the IM server converts the ciphertext characters input by the user.
  • the character comparison table can also be generated by the IM server. For example, when the IM client runs, it requests a character comparison table from the IM server, and then the IM server generates a character comparison table and sends it to the requesting IM client, or the IM server sends the previously generated character comparison table to the requested IM client. .
  • the IM client or IM server for generating the character lookup table may update the character lookup table.
  • the IM client or IM server for generating the character lookup table may update the character lookup table.
  • FIG. 3 is a schematic diagram of a character comparison table in the first embodiment of the present invention.
  • the IM client directly displays a character comparison table on the login interface, wherein the first row and the second row are in the same column.
  • the characters correspond to the characters in the same column of the third row and the fourth row, and the order of the characters may be in the order of the characters in the table itself, or may be in a random disorder order, such as the first behavior 1234567890, or may be random. Appears as 7890123456 or 4567890123.
  • the user can input the ciphertext characters corresponding to the plaintext characters from the keyboard according to the displayed correspondence.
  • the IM client can also use the character comparison table displayed in the interface as a soft keyboard, so that the user can click on the displayed characters to compare the characters in the table, thereby avoiding input from the keyboard and further enhancing security.
  • the IM client can also adjust the order and capitalization of characters according to an instruction input by the user, for example, when the user presses the shift key or clicks the shift key in the soft keyboard.
  • the IM client switches the characters of the first line and the second line in Figure 3 once, or rearranges the order of each line of characters; when the user presses the Caps Lock key or clicks Caps Lock in the soft keyboard
  • the IM client switches the characters of the third line and the fourth line in Fig. 3 once between upper and lower case.
  • the state of the shift key and the Caps Lock key can be the initial state, and the state of the previous login is not memorized.
  • Step 202 Taking the password as an example, the user can obtain the corresponding ciphertext character according to the provided character comparison table and the password that is to be input, that is, the source plaintext character, and then the user inputs the obtained secret in the password input box. Character characters, and confirm.
  • the ciphertext character is "snatfuvlh;;],” according to the character comparison table shown in FIG. 3, and then the user inputs "snatfuvlh;;” in the password input box through the keyboard. , ".
  • the user can also input the ciphertext character "snatfuvlh;;]," via the soft keyboard.
  • Step 203 After receiving the ciphertext character password input by the user, the IM client sends the IM software number of the user together with the input ciphertext character password to the IM server.
  • Step 204 After receiving the IM software number and the ciphertext character password of the user sent by the IM client, the IM server obtains the saved password, that is, the target plaintext character, according to the user's IM software number, and encrypts according to the character comparison table.
  • the characters are converted into plaintext characters, and then the comparison is converted to the plaintext characters and the target plaintext characters, and it is determined whether the two are the same. If they are the same, the user is allowed to log in. If they are not the same, the verification fails. The user is prohibited from logging in.
  • the IM server can further prompt the user to enter a password error.
  • IM client and the IM server respectively perform operations of displaying a character collation table, receiving ciphertext characters, and converting ciphertext characters into plaintext characters.
  • all operations will be performed by one device.
  • the second embodiment illustrates the technical solution of the present invention by taking a password as an example when logging in to the local operating system of the computer.
  • 4 is a schematic flow chart of a second embodiment of the present invention. Referring to Figure 4, a second embodiment of the present invention includes the following steps:
  • Step 401 When the user is ready to log in to the operating system after booting, the operating system displays the character comparison table on the interface to provide the user with the character.
  • the character comparison table here is generated by the operating system. Also, the character comparison table can be regenerated every time the user logs in, or the character comparison table can be updated to further ensure security.
  • the manner in which the operating system displays the character comparison table may also be various, and may be the same as the display manner in the first embodiment, and details are not described herein again.
  • Step 402 The user can obtain the ciphertext character password according to the provided character comparison table and the plain text password that is to be input by the user, and then the user inputs the obtained ciphertext character in the password input box of the operating system login interface, and confirms.
  • the user can directly input ciphertext characters through the keyboard. If the operating system provides a soft keyboard function, the user can also input ciphertext characters through the soft keyboard.
  • Step 403 After receiving the ciphertext character password input by the user, the operating system obtains the saved password according to the user name, that is, the target plaintext character, and converts the ciphertext character into a plaintext character according to the character comparison table, and then compares and converts the plaintext character. And the target plain text characters, and determine whether the two are the same. If they are the same, the user is authenticated to allow the user to log in to the operating system. If they are different, the verification fails. The user is prohibited from logging in. The operating system can further prompt the user to enter the password error. re-enter.
  • the technical solution of the present invention is described by taking a password as an example when logging in to a certain page of the server. FIG.
  • Step 501 When the user opens the server login page to prepare for login, the server login module displays the character comparison table on the login page to provide the user with the user.
  • the character comparison table here is generated by the login module. Also, the character comparison table can be regenerated every time the user logs in, or the character comparison table can be updated to further ensure security.
  • the manner in which the login module displays the character comparison table may also be various, and may be the same as the display manner in the first embodiment, and details are not described herein again.
  • Step 502 The user can obtain the ciphertext character password according to the provided character comparison table and the plain text password that is to be input by the user, and then the user inputs the obtained ciphertext character in the password input box of the server login page, and confirms.
  • the user can directly input ciphertext characters through the keyboard. If the login module provides a soft keyboard function on the login page or the user's client screen, the user can also input ciphertext characters through the soft keyboard.
  • Step 503 After receiving the ciphertext character password input by the user, the login module obtains the saved password according to the user name, that is, the target plaintext character, and converts the ciphertext character into a plaintext character according to the character comparison table, and then compares and converts the plaintext character. And the target plain text characters, and determine whether the two are the same. If they are the same, the user is allowed to log in to the server-side page. If they are not the same, the verification fails. The user is prohibited from logging in. The login module can further prompt the user to enter the password error. You can enter it again.
  • an embodiment of the present invention further provides a character input system. FIG.
  • the character input system in the embodiment of the present invention includes a first device and a second device.
  • the first device is configured to provide a character comparison table to the user, and receive the ciphertext characters input by the user, and then send the ciphertext characters input by the user to the second device.
  • the second device is used according to the character comparison table, The ciphertext characters entered by the user are converted to plain text characters.
  • the first device and the second device are separate and located in different devices, i.e., the first device is located in the IM client and the second device is located in the IM server.
  • both the first device and the second device can generate and update the character comparison table and send to the other party.
  • the first device can provide the character look-up table to the user by displaying the character look-up table on its screen.
  • the first device may further include a keyboard module or a soft keyboard module, the keyboard module is configured to receive the ciphertext characters input by the user through the keyboard, and the soft keyboard module is configured to display the soft keyboard on the screen, and Receive ciphertext characters entered by the user by clicking the soft keyboard.
  • the first device transmits the ciphertext characters to the second device, and the second device further compares the plaintext characters with the target plaintext characters and determines whether the two are the same.
  • the first device and the second device in the character input system are located in the same device, that is, in the second embodiment both Located in the local computer, the two are part of the local computer operating system, and in the third embodiment, both are located in the server-side login module.
  • both the first device and the second device can generate and update the character comparison table, but since they are in the same device, they may not need to be sent to the other party, but may be stored locally and shared.
  • the character comparison table can be.
  • the first device can provide the character look-up table to the user by displaying the character look-up table on its screen.
  • the first device may further include a keyboard module or a soft keyboard module, the keyboard module is configured to receive the ciphertext characters input by the user through the keyboard, and the soft keyboard module is configured to display the soft keyboard on the screen, and Receive ciphertext characters entered by the user by clicking the soft keyboard.
  • the first device transmits the ciphertext characters to the second device, and the second device further compares the plaintext characters with the target plaintext characters and determines whether the two are the same.
  • both the first device and the second device can generate and update the character The table is compared, but since it is in the same device, it may not need to be sent to the other party, but stored locally and shared by the generated character comparison table.
  • the first device can provide the character lookup table to the user by displaying the character lookup table in the login page.
  • the first device may further comprise a keyboard module or a soft keyboard module, the keyboard module is configured to receive the ciphertext characters input by the user through the keyboard, and the soft keyboard module is used on the login page or the client of the user.
  • a soft keyboard is displayed on the screen and receives the ciphertext characters entered by the user by clicking on the soft keyboard.
  • the first device sends the ciphertext characters to the second device, and the second device further compares the plaintext characters with the target plaintext characters and determines whether the two are the same.
  • the present invention first provides a character comparison table for indicating a correspondence between a plaintext character and a ciphertext character, and then receives a ciphertext character corresponding to the plaintext character input by the user according to the character comparison table. And converting the ciphertext character into a plaintext character according to the character comparison table.
  • the technical solution of the present invention reduces the risk of input character leakage and improves the security of input characters.
  • the character comparison table it is possible to further input a plurality of characters using a limited key by using the setting of the correspondence relationship.

Abstract

A character inputting method and a system thereof. The method comprises the steps as follows: providing a character contrast table to the user, the character contrast table rendering the corresponding relation between the plain text character and the cryptograph text character; receiving the cryptograph text character which the user inputted; converting the cryptograph text character into the plain text character based on the character contrast table. In course of the implement, if the other obtained the cryptograph text character which the user inputted by way of monitoring the keyboard, then he can't acquire the plain text character which the user want to input, and even if the other saw the content which inputted by the user, he can't acquire the plain text character which the user want to input.

Description

一种字符输入方法及其系统  Character input method and system thereof
技术领域 Technical field
本发明涉及字符输入技术领域, 特别是一种字符输入方法以及字 符输入系统。 发明背景  The present invention relates to the field of character input technology, and more particularly to a character input method and a character input system. Background of the invention
在曰常生活中, 人们经常要在各种场合输入字符。 例如, 在登录计 算机操作系统时输入用户名和密码, 在使用计算机的过程中输入各种数 据, 在使用即时通讯(IM, Instant Messaging ) 工具、 电子邮箱等软件 时需要输入帐户和密码,在自动取款机( ATM, Automatic Teller Machine ) 上输入银行卡的密码, 等等。  In everyday life, people often have to type characters in a variety of situations. For example, enter the user name and password when logging in to the computer operating system, enter various data during the process of using the computer, and enter the account and password when using the software such as instant messaging (IM), email, etc. Enter the password for the bank card on the ATM (Automatic Teller Machine), and so on.
人们在输入上述各种字符时, 尤其是输入密码之类的字符时, 都需 要保密, 防止他人获取所输入的字符。  When people enter the above various characters, especially when entering characters such as passwords, they need to be kept secret to prevent others from getting the characters they input.
在现有的计算机网络中, 一般可以通过监听用户的键盘输入来获取 用户输入的字符。 因此, 有些软件就采取了在屏幕上显示一个软键盘, 然后用户使用鼠标点击屏幕中软键盘上的图标从而输入相应的字符的 方案。 图 1为现有技术中软键盘的示意图。 这种软键盘输入的方式虽然 防止了别人从键盘的监听, 但是也具有很多缺点, 例如: 用户点击软件 操作的速度比直接在键盘上进行输入要慢很多, 而且容易出错; 另外, 如果他人可以很方便地看到该用户在屏幕上所进行的点击操作, 那么就 可以轻易地获取该用户所输入的字符。 发明内容  In existing computer networks, the characters entered by the user can generally be obtained by listening to the user's keyboard input. Therefore, some software adopts a scheme of displaying a soft keyboard on the screen, and then the user uses the mouse to click an icon on the soft keyboard in the screen to input the corresponding character. 1 is a schematic diagram of a soft keyboard in the prior art. This soft keyboard input method prevents others from listening from the keyboard, but it also has many shortcomings, for example: The user clicks on the software to operate much slower than typing directly on the keyboard, and is prone to error; in addition, if others can It is convenient to see the click operation performed by the user on the screen, and the characters input by the user can be easily obtained. Summary of the invention
本发明提出了一种字符输入方法, 其目的在于提高用户输入字符的 安全性, 防止别人获取用户所输入的字符。 本发明的另一个目的是提出 一种字符输入系统。 The invention provides a character input method, which aims to improve the input character of a user. Security, preventing others from getting the characters entered by the user. Another object of the present invention is to propose a character input system.
为了实现上述目的, 本发明公开了一种字符输入方法, 该方法包括 以下步骤:  In order to achieve the above object, the present invention discloses a character input method, which comprises the following steps:
向用户提供字符对照表, 该字符对照表用以表示明文字符和密文字 符之间的对应关系;  Providing a character comparison table to the user, the character comparison table is used to indicate a correspondence between the plain text character and the secret character character;
接收用户输入的密文字符;  Receiving ciphertext characters input by the user;
根据所述字符对照表将所述密文字符转换为明文字符。  Converting the ciphertext characters into plaintext characters according to the character comparison table.
本发明还公开了一种字符输入的系统, 该系统包括:  The invention also discloses a system for character input, the system comprising:
第一装置, 用于向用户提供字符对照表, 并接收用户输入的密文字 符;  a first device, configured to provide a character comparison table to the user, and receive a secret character input by the user;
第二装置, 用于根据字符对照表, 将用户输入第一装置的密文字符 转换为明文字符。  And a second device, configured to convert the ciphertext characters input by the user into the first device into plaintext characters according to the character comparison table.
从上述方案中可以看出, 由于本发明首先向用户提供用以表示明文 字符和密文字符之间对应关系的字符对照表, 然后接收用户根据字符对 照表输入的与明文字符对应的密文字符, 再根据字符对照表将所述密文 字符转换为明文字符, 在此过程中, 即使他人通过监听键盘获取了用户 输入的密文字符, 也无法获取用户所要输入的明文字符, 而且, 他人即 使看到用户输入的内容, 同样也无法获取用户所要输入的明文字符。 因 此, 通过本发明的技术方案降低了输入字符泄露带来的风险问题, 提高 了输入字符的安全性。 附图简要说明  As can be seen from the above solution, since the present invention first provides the user with a character comparison table for indicating the correspondence between the plaintext character and the ciphertext character, and then receives the ciphertext character corresponding to the plaintext character input by the user according to the character comparison table. And converting the ciphertext character into a plaintext character according to the character comparison table. In this process, even if another person obtains the ciphertext character input by the user through the monitor keyboard, the plaintext character that the user wants to input cannot be obtained, and even if others When you see the content entered by the user, you can't get the plain text characters you want to enter. Therefore, the technical solution of the present invention reduces the risk of input character leakage and improves the security of input characters. BRIEF DESCRIPTION OF THE DRAWINGS
图 1为现有技术中软键盘的示意图;  1 is a schematic view of a soft keyboard in the prior art;
图 2为本发明第一实施例的流程示意图; 图 3为本发明第一实施例中的字符对照表的示意图; 图 4为本发明第二实施例的流程示意图; 2 is a schematic flow chart of a first embodiment of the present invention; 3 is a schematic diagram of a character comparison table in the first embodiment of the present invention; FIG. 4 is a schematic flowchart of a second embodiment of the present invention;
图 5为本发明第三实施例的流程示意图  FIG. 5 is a schematic flowchart of a third embodiment of the present invention
图 6为本发明实施例中字符输入系统的结构示意图。 实施本发明的方式  FIG. 6 is a schematic structural diagram of a character input system according to an embodiment of the present invention. Mode for carrying out the invention
为使本发明的目的、 技术方案和优点更加清楚, 以下举实施例对本 发明进一步详细说明。  In order to make the objects, technical solutions and advantages of the present invention more comprehensible, the present invention will be further described in detail below.
本发明的主要思想是, 向用户提供一个字符对照表, 该字符对照表 用以表示明文字符和密文字符之间的对应关系, 用户根据其所要输入的 明文字符以及字符对照表即可得到对应的密文字符, 然后输入该密文字 符, 系统接收到用户输入的密文字符后, 再根据字符对照表将密文字符 转换为明文字符, 这样就可以得到用户所要输入的明文字符, 并且即使 其它用户监听键盘或者观察用户的输入操作, 获取了用户输入的密文字 符, 也不能得到原来的明文字符, 从而保证了字符输入的安全性。  The main idea of the present invention is to provide a character comparison table for the user, and the character comparison table is used to indicate the correspondence between the plaintext character and the ciphertext character, and the user can obtain the corresponding correspondence according to the plaintext character and the character comparison table to be input by the user. The ciphertext character, and then input the ciphertext character, the system receives the ciphertext character input by the user, and then converts the ciphertext character into a plaintext character according to the character comparison table, so that the plaintext character to be input by the user can be obtained, and even Other users listen to the keyboard or observe the user's input operation, obtain the ciphertext characters input by the user, and can not get the original plaintext characters, thus ensuring the security of the character input.
另外, 由于使用了字符对照表, 不直接输入明文字符, 而是输入密 文字符, 那么只要改变与密文字符对应的明文字符, 就可以通过有限的 密文字符而最终得到多种明文字符, 从而可以利用有限的按键输入多种 字符。 例如, 通常很难直接输入字符 如果在字符对照表中有明 文字符 与密文字符 "a" 相对应, 那么可以通过筒单地输入 "a" 而最终获得 " /,,。 在本发明第一实施例中, 以用户登录 IM工具输入密码字符的场景 为例说明本发明的技术方案。  In addition, since the character comparison table is used, the plaintext character is not directly input, but the ciphertext character is input, and as long as the plaintext character corresponding to the ciphertext character is changed, a plurality of plaintext characters can be finally obtained by the limited ciphertext character. This allows a variety of characters to be entered with limited keys. For example, it is often difficult to directly input characters. If there is a plain text character corresponding to the ciphertext character "a" in the character comparison table, then "a" can be input by the cartridge to finally obtain "/,." In the embodiment, the scenario in which the user logs in to the IM tool to input a password character is taken as an example to illustrate the technical solution of the present invention.
图 2为本发明第一实施例的流程示意图。 参照图 2, 该流程包括以 下步骤: 2 is a schematic flow chart of a first embodiment of the present invention. Referring to Figure 2, the process includes Next steps:
步骤 201 , 当用户运行 IM客户端准备登录时, IM客户端在界面上 将字符对照表显示出来, 从而提供给用户。  Step 201: When the user runs the IM client to prepare for login, the IM client displays the character comparison table on the interface to provide to the user.
这里的字符对照表可以是由 IM客户端产生的, 并在产生之后发送 给 IM服务器, 以便于 IM服务器转换用户输入的密文字符。  The character comparison table here may be generated by the IM client and sent to the IM server after being generated, so that the IM server converts the ciphertext characters input by the user.
同样, 字符对照表也可以是由 IM服务器产生的。 例如, 当 IM客户 端运行时向 IM服务器请求字符对照表,然后 IM服务器产生字符对照表 并发送给请求的 IM客户端, 或者, IM服务器将事先产生的字符对照表 发送给请求的 IM客户端。  Similarly, the character comparison table can also be generated by the IM server. For example, when the IM client runs, it requests a character comparison table from the IM server, and then the IM server generates a character comparison table and sends it to the requesting IM client, or the IM server sends the previously generated character comparison table to the requested IM client. .
为了进一步提高安全性, 用于产生字符对照表的 IM客户端或者 IM 服务器可以更新所述字符对照表。 这样, 即使其他人获取了之前旧的字 符对照表, 但由于本次输入采用了更新后的新字符对照表, 其他人也不 能获取用户所要输入的明文字符。  To further improve security, the IM client or IM server for generating the character lookup table may update the character lookup table. Thus, even if other people have obtained the old character comparison table, since this input uses the updated new character comparison table, others cannot obtain the plaintext characters that the user wants to input.
另外, IM客户端显示字符对照表的方式也可以多种多样。 例如, 图 3为本发明第一实施例中的字符对照表的示意图, 如图 3所示, IM客户 端直接将字符对照表显示在登录界面上, 其中第一行与第二行同一列的 字符相对应、 第三行与第四行同一列的字符相对应, 并且字符的顺序可 以按照字符对照表本身的顺序, 也可以是随机打乱的顺序, 例如第一行 为 1234567890, 也可以为随机出现为 7890123456或者 4567890123。 用 户可以根据所显示的对应关系从键盘输入与明文字符对应的密文字符。 进一步, IM客户端还可以将界面中显示的字符对照表作为软键盘, 那 么用户可以用鼠标点击所显示字符对照表中的字符, 从而避免了从键盘 输入, 进一步增强了安全性。  In addition, the manner in which the IM client displays the character comparison table can also be varied. For example, FIG. 3 is a schematic diagram of a character comparison table in the first embodiment of the present invention. As shown in FIG. 3, the IM client directly displays a character comparison table on the login interface, wherein the first row and the second row are in the same column. The characters correspond to the characters in the same column of the third row and the fourth row, and the order of the characters may be in the order of the characters in the table itself, or may be in a random disorder order, such as the first behavior 1234567890, or may be random. Appears as 7890123456 or 4567890123. The user can input the ciphertext characters corresponding to the plaintext characters from the keyboard according to the displayed correspondence. Further, the IM client can also use the character comparison table displayed in the interface as a soft keyboard, so that the user can click on the displayed characters to compare the characters in the table, thereby avoiding input from the keyboard and further enhancing security.
进一步, IM客户端还可以根据用户输入的指令来调整字符的顺序和 大小写, 例如, 当用户按下切换( shift )键或点击软键盘中的 shift键时, IM客户端将图 3 中第一行和第二行的字符切换一次, 或者将每行字符 的前后顺序重新排列显示; 当用户按下大写锁定( Caps Lock )键或点击 软键盘中的 Caps Lock键时, IM客户端将图 3中第三行和第四行的字符 在大小写之间切换一次。 另外, 当下一次登录时, shift键和 Caps Lock 键的状态可以为初始状态, 不记忆之前一次登录时的状态。 Further, the IM client can also adjust the order and capitalization of characters according to an instruction input by the user, for example, when the user presses the shift key or clicks the shift key in the soft keyboard. The IM client switches the characters of the first line and the second line in Figure 3 once, or rearranges the order of each line of characters; when the user presses the Caps Lock key or clicks Caps Lock in the soft keyboard When the key is pressed, the IM client switches the characters of the third line and the fourth line in Fig. 3 once between upper and lower case. In addition, when the next login, the state of the shift key and the Caps Lock key can be the initial state, and the state of the previous login is not memorized.
步骤 202, 以输入密码为例, 用户根据所提供的字符对照表和自己 所要输入的密码, 即源明文字符, 就可以得到对应的密文字符, 然后用 户在密码输入框内输入所得到的密文字符, 并确认。  Step 202: Taking the password as an example, the user can obtain the corresponding ciphertext character according to the provided character comparison table and the password that is to be input, that is, the source plaintext character, and then the user inputs the obtained secret in the password input box. Character characters, and confirm.
例如, 用户所要输入的密码为 "fangshiyu2214" 时, 根据图 3所示 的字符对照表得到密文字符为 "snatfuvlh;;]," , 然后用户通过键盘在密码 输入框内输入 " snatfuvlh;;], "。  For example, when the password to be entered by the user is "fangshiyu2214", the ciphertext character is "snatfuvlh;;]," according to the character comparison table shown in FIG. 3, and then the user inputs "snatfuvlh;;" in the password input box through the keyboard. , ".
在本步骤中, 如果 IM客户端提供软键盘功能, 用户也可以通过软 键盘输入密文字符 "snatfuvlh;;],"。  In this step, if the IM client provides a soft keyboard function, the user can also input the ciphertext character "snatfuvlh;;]," via the soft keyboard.
步骤 203, IM客户端接收用户输入的密文字符密码之后, 将用户的 IM软件号码和输入的密文字符密码一起发送给 IM服务器。  Step 203: After receiving the ciphertext character password input by the user, the IM client sends the IM software number of the user together with the input ciphertext character password to the IM server.
步骤 204, IM服务器收到 IM客户端发送来的用户的 IM软件号码 和密文字符密码后, 根据用户的 IM软件号码获取保存的密码, 即目标 明文字符, 并根据所述字符对照表将密文字符转换为明文字符, 然后比 较转换得到明文字符和目标明文字符, 并判断两者是否相同。 如果相同 则通过验证, 允许用户登录, 如果不相同, 则说明验证没通过, 禁止用 户登录, IM服务器还可以进一步提示用户输入密码错误。 在上述第一实施例中,由 IM客户端和 IM服务器分别进行显示字符 对照表、 接收密文字符和将密文字符转换为明文字符的操作。 在下面的 第二实施例中, 将由一个设备完成所有操作。 第二实施例以登录计算机本地操作系统时输入密码为例说明本发明 的技术方案。 图 4为本发明第二实施例的流程示意图。 参照图 4本发明 第二实施例包括以下步骤: Step 204: After receiving the IM software number and the ciphertext character password of the user sent by the IM client, the IM server obtains the saved password, that is, the target plaintext character, according to the user's IM software number, and encrypts according to the character comparison table. The characters are converted into plaintext characters, and then the comparison is converted to the plaintext characters and the target plaintext characters, and it is determined whether the two are the same. If they are the same, the user is allowed to log in. If they are not the same, the verification fails. The user is prohibited from logging in. The IM server can further prompt the user to enter a password error. In the first embodiment described above, the IM client and the IM server respectively perform operations of displaying a character collation table, receiving ciphertext characters, and converting ciphertext characters into plaintext characters. In the second embodiment below, all operations will be performed by one device. The second embodiment illustrates the technical solution of the present invention by taking a password as an example when logging in to the local operating system of the computer. 4 is a schematic flow chart of a second embodiment of the present invention. Referring to Figure 4, a second embodiment of the present invention includes the following steps:
步骤 401 , 当用户开机后, 准备登录操作系统时, 操作系统在界面 上将字符对照表显示出来, 从而提供给用户。  Step 401: When the user is ready to log in to the operating system after booting, the operating system displays the character comparison table on the interface to provide the user with the character.
这里的字符对照表是由操作系统产生的。 并且, 可以在用户每次登 录时都重新产生字符对照表, 或者更新字符对照表, 从而进一步确保安 全性。  The character comparison table here is generated by the operating system. Also, the character comparison table can be regenerated every time the user logs in, or the character comparison table can be updated to further ensure security.
操作系统显示字符对照表的方式也可以多种多样, 也可以跟第一实 施例中的显示方式相同, 这里不再赘述。  The manner in which the operating system displays the character comparison table may also be various, and may be the same as the display manner in the first embodiment, and details are not described herein again.
步骤 402, 用户根据所提供的字符对照表和自己所要输入的明文字 符密码就可以得到密文字符密码, 然后用户在操作系统登录界面的密码 输入框内输入所得到的密文字符, 并确认。  Step 402: The user can obtain the ciphertext character password according to the provided character comparison table and the plain text password that is to be input by the user, and then the user inputs the obtained ciphertext character in the password input box of the operating system login interface, and confirms.
同样, 在本步骤中, 用户可以通过键盘直接输入密文字符, 如果操 作系统提供软键盘功能, 用户也可以通过软键盘输入密文字符。  Similarly, in this step, the user can directly input ciphertext characters through the keyboard. If the operating system provides a soft keyboard function, the user can also input ciphertext characters through the soft keyboard.
步骤 403 , 操作系统接收用户输入的密文字符密码之后, 根据用户 名获取保存的密码, 即目标明文字符, 并根据所述字符对照表将密文字 符转换为明文字符, 然后比较转换得到明文字符和目标明文字符, 并判 断两者是否相同, 如果相同则通过验证, 允许用户登录操作系统, 如果 不相同, 则说明验证没通过, 禁止用户登录, 操作系统还可以进一步提 示用户输入密码错误, 可以再次输入。 在第三实施例中, 以登录服务器端的某个页面时输入密码为例说明 本发明的技术方案。 图 5为本发明第三实施例的流程示意图。 参照图 5 本发明第三实施例包括以下步骤: 步骤 501 , 当用户打开服务器端登录页面准备登录时, 服务器端登 录模块在登录页面上将字符对照表显示出来, 从而提供给用户。 Step 403: After receiving the ciphertext character password input by the user, the operating system obtains the saved password according to the user name, that is, the target plaintext character, and converts the ciphertext character into a plaintext character according to the character comparison table, and then compares and converts the plaintext character. And the target plain text characters, and determine whether the two are the same. If they are the same, the user is authenticated to allow the user to log in to the operating system. If they are different, the verification fails. The user is prohibited from logging in. The operating system can further prompt the user to enter the password error. re-enter. In the third embodiment, the technical solution of the present invention is described by taking a password as an example when logging in to a certain page of the server. FIG. 5 is a schematic flow chart of a third embodiment of the present invention. Referring to Figure 5, a third embodiment of the present invention includes the following steps: Step 501: When the user opens the server login page to prepare for login, the server login module displays the character comparison table on the login page to provide the user with the user.
这里的字符对照表是由登录模块产生的。 并且, 可以在用户每次登 录时都重新产生字符对照表, 或者更新字符对照表, 从而进一步确保安 全性。  The character comparison table here is generated by the login module. Also, the character comparison table can be regenerated every time the user logs in, or the character comparison table can be updated to further ensure security.
登录模块显示字符对照表的方式也可以多种多样, 也可以跟第一实 施例中的显示方式相同, 这里不再赘述。  The manner in which the login module displays the character comparison table may also be various, and may be the same as the display manner in the first embodiment, and details are not described herein again.
步骤 502, 用户根据所提供的字符对照表和自己所要输入的明文字 符密码就可以得到密文字符密码, 然后用户在服务器端登录页面的密码 输入框内输入所得到的密文字符, 并确认。  Step 502: The user can obtain the ciphertext character password according to the provided character comparison table and the plain text password that is to be input by the user, and then the user inputs the obtained ciphertext character in the password input box of the server login page, and confirms.
同样, 在本步骤中, 用户可以通过键盘直接输入密文字符, 如果登 录模块在登录页面或者用户的客户端屏幕上提供软键盘功能, 用户也可 以通过软键盘输入密文字符。  Similarly, in this step, the user can directly input ciphertext characters through the keyboard. If the login module provides a soft keyboard function on the login page or the user's client screen, the user can also input ciphertext characters through the soft keyboard.
步骤 503 , 登录模块接收用户输入的密文字符密码之后, 根据用户 名获取保存的密码, 即目标明文字符, 并根据所述字符对照表将密文字 符转换为明文字符, 然后比较转换得到明文字符和目标明文字符, 并判 断两者是否相同,如果相同则通过验证,允许用户登录服务器端的页面, 如果不相同, 则说明验证没通过, 禁止用户登录, 登录模块还可以进一 步提示用户输入密码错误, 可以再次输入。 为了实现上述方法, 本发明实施例还提供了一种字符输入系统。 图 6为本发明实施例中字符输入系统的结构示意图。 参照图 6, 本 发明实施例中的字符输入系统包括第一装置和第二装置。 其中, 第一装 置用于向用户提供字符对照表, 并接收用户输入的密文字符, 然后将用 户输入的密文字符发送给第二装置。 第二装置用于根据字符对照表, 将 用户输入的密文字符转换为明文字符。 Step 503: After receiving the ciphertext character password input by the user, the login module obtains the saved password according to the user name, that is, the target plaintext character, and converts the ciphertext character into a plaintext character according to the character comparison table, and then compares and converts the plaintext character. And the target plain text characters, and determine whether the two are the same. If they are the same, the user is allowed to log in to the server-side page. If they are not the same, the verification fails. The user is prohibited from logging in. The login module can further prompt the user to enter the password error. You can enter it again. In order to implement the above method, an embodiment of the present invention further provides a character input system. FIG. 6 is a schematic structural diagram of a character input system according to an embodiment of the present invention. Referring to Figure 6, the character input system in the embodiment of the present invention includes a first device and a second device. The first device is configured to provide a character comparison table to the user, and receive the ciphertext characters input by the user, and then send the ciphertext characters input by the user to the second device. The second device is used according to the character comparison table, The ciphertext characters entered by the user are converted to plain text characters.
在第一实施例中, 第一装置和第二装置是分开的, 位于不同的设备 之中, 即第一装置位于 IM客户端中, 而第二装置位于 IM服务器中。  In the first embodiment, the first device and the second device are separate and located in different devices, i.e., the first device is located in the IM client and the second device is located in the IM server.
其中, 第一装置和第二装置都可以产生并更新所述字符对照表, 并 发送给对方。 而且, 第一装置可以通过将字符对照表显示在其屏幕上来 向用户提供该字符对照表。 为了接收用户输入的密文字符 , 第一装置 可以进一步包括键盘模块或软键盘模块, 键盘模块用于接收用户通过键 盘输入的密文字符, 而软键盘模块用于在屏幕上显示软键盘, 并接收用 户通过点击软键盘输入的密文字符。 在接收了用户输入的密文字符以 后, 第一装置将其发送给第二装置, 第二装置进一步用于对比所述明文 字符和目标明文字符并判断两者是否相同。  Wherein, both the first device and the second device can generate and update the character comparison table and send to the other party. Moreover, the first device can provide the character look-up table to the user by displaying the character look-up table on its screen. In order to receive the ciphertext characters input by the user, the first device may further include a keyboard module or a soft keyboard module, the keyboard module is configured to receive the ciphertext characters input by the user through the keyboard, and the soft keyboard module is configured to display the soft keyboard on the screen, and Receive ciphertext characters entered by the user by clicking the soft keyboard. After receiving the ciphertext characters input by the user, the first device transmits the ciphertext characters to the second device, and the second device further compares the plaintext characters with the target plaintext characters and determines whether the two are the same.
与在第一实施例中不同, 在第二实施例和第三实施例中, 字符输入 系统中的第一装置和第二装置是位于同一设备中的 , 即在第二实施例中 两者都位于本地计算机中, 两者合为本地计算机操作系统的一部分, 而 在第三实施例中, 两者都位于服务器端登录模块中。  Unlike in the first embodiment, in the second embodiment and the third embodiment, the first device and the second device in the character input system are located in the same device, that is, in the second embodiment both Located in the local computer, the two are part of the local computer operating system, and in the third embodiment, both are located in the server-side login module.
在第二实施例中, 第一装置和第二装置都可以产生并更新所述字符 对照表, 但是由于在同一个设备中, 因此可以不需要发送给对方, 而是 存储在本地并共享所产生的字符对照表即可。 而且, 第一装置可以通过 将字符对照表显示在其屏幕上来向用户提供该字符对照表。 为了接收用 户输入的密文字符, 第一装置可以进一步包括键盘模块或软键盘模块, 键盘模块用于接收用户通过键盘输入的密文字符, 而软键盘模块用于在 屏幕上显示软键盘, 并接收用户通过点击软键盘输入的密文字符。 在接 收了用户输入的密文字符以后, 第一装置将其发送给第二装置, 第二装 置进一步用于对比所述明文字符和目标明文字符并判断两者是否相同。  In the second embodiment, both the first device and the second device can generate and update the character comparison table, but since they are in the same device, they may not need to be sent to the other party, but may be stored locally and shared. The character comparison table can be. Moreover, the first device can provide the character look-up table to the user by displaying the character look-up table on its screen. In order to receive the ciphertext characters input by the user, the first device may further include a keyboard module or a soft keyboard module, the keyboard module is configured to receive the ciphertext characters input by the user through the keyboard, and the soft keyboard module is configured to display the soft keyboard on the screen, and Receive ciphertext characters entered by the user by clicking the soft keyboard. After receiving the ciphertext characters input by the user, the first device transmits the ciphertext characters to the second device, and the second device further compares the plaintext characters with the target plaintext characters and determines whether the two are the same.
在第三实施例中, 第一装置和第二装置都可以产生并更新所述字符 对照表, 但是由于在同一个设备中, 因此可以不需要发送给对方, 而是 存储在本地并共享所产生的字符对照表即可。 而且, 第一装置可以通过 将字符对照表显示在登录页面中从而向用户提供该字符对照表。 为了接 收用户输入的密文字符, 第一装置可以进一步包括键盘模块或软键盘模 块, 键盘模块用于接收用户通过键盘输入的密文字符, 而软键盘模块用 于在登录页面或用户的客户端屏幕上显示软键盘, 并接收用户通过点击 软键盘输入的密文字符。 在接收了用户输入的密文字符以后, 第一装置 将其发送给第二装置, 第二装置进一步用于对比所述明文字符和目标明 文字符并判断两者是否相同。 In the third embodiment, both the first device and the second device can generate and update the character The table is compared, but since it is in the same device, it may not need to be sent to the other party, but stored locally and shared by the generated character comparison table. Moreover, the first device can provide the character lookup table to the user by displaying the character lookup table in the login page. In order to receive the ciphertext characters input by the user, the first device may further comprise a keyboard module or a soft keyboard module, the keyboard module is configured to receive the ciphertext characters input by the user through the keyboard, and the soft keyboard module is used on the login page or the client of the user. A soft keyboard is displayed on the screen and receives the ciphertext characters entered by the user by clicking on the soft keyboard. After receiving the ciphertext characters input by the user, the first device sends the ciphertext characters to the second device, and the second device further compares the plaintext characters with the target plaintext characters and determines whether the two are the same.
从上述实施例可以看出, 由于本发明首先向用户提供用以表示明文 字符和密文字符之间对应关系的字符对照表, 然后接收用户根据字符对 照表输入的与明文字符对应的密文字符, 再根据字符对照表将所述密文 字符转换为明文字符, 在此过程中, 即使他人通过监听键盘获取了用户 输入的密文字符, 也无法获取用户所要输入的明文字符, 而且, 他人即 使看到用户输入的内容, 同样也无法获取用户所要输入的明文字符。 因 此, 通过本发明的技术方案降低了输入字符泄露带来的风险问题, 提高 了输入字符的安全性。 另外, 在使用字符对照表时, 可以利用对应关系 的设置, 进一步能够利用有限按键输入多种字符。  As can be seen from the above embodiment, the present invention first provides a character comparison table for indicating a correspondence between a plaintext character and a ciphertext character, and then receives a ciphertext character corresponding to the plaintext character input by the user according to the character comparison table. And converting the ciphertext character into a plaintext character according to the character comparison table. In this process, even if another person obtains the ciphertext character input by the user through the monitor keyboard, the plaintext character that the user wants to input cannot be obtained, and even if others When you see the content entered by the user, you can't get the plain text characters you want to enter. Therefore, the technical solution of the present invention reduces the risk of input character leakage and improves the security of input characters. In addition, when the character comparison table is used, it is possible to further input a plurality of characters using a limited key by using the setting of the correspondence relationship.
以上所述仅为本发明的较佳实施例而已, 并不用以限制本发明, 凡 在本发明的精神和原则之内, 所作的任何修改、 等同替换、 改进等, 均 应包含在本发明的保护范围之内。  The above is only the preferred embodiment of the present invention, and is not intended to limit the present invention. Any modifications, equivalents, improvements, etc., which are included in the spirit and scope of the present invention, should be included in the present invention. Within the scope of protection.

Claims

权利要求书 Claim
1、 一种字符输入方法, 其特征在于, 该方法包括: A character input method, characterized in that the method comprises:
向用户提供字符对照表, 该字符对照表用以表示明文字符和密文字 符之间的对应关系;  Providing a character comparison table to the user, the character comparison table is used to indicate a correspondence between the plain text character and the secret character character;
接收用户输入的密文字符;  Receiving ciphertext characters input by the user;
根据所述字符对照表将所述密文字符转换为明文字符。  Converting the ciphertext characters into plaintext characters according to the character comparison table.
2、根据权利要求 1所述的方法, 其特征在于, 在所述向用户提供字 符对照表之前, 该方法进一步包括: 建立所述字符对照表和 /或更新所述 字符对照表。  The method according to claim 1, wherein before the providing the character comparison table to the user, the method further comprises: establishing the character comparison table and/or updating the character comparison table.
3、根据权利要求 1所述的方法, 其特征在于, 在所述向用户提供字 符对照表之后, 并在所述接收用户输入的密文字符之前, 该方法进一步 包括: 用户通过键盘和 /或软键盘输入所述密文字符。  The method according to claim 1, wherein after the providing a character comparison table to the user, and before receiving the ciphertext character input by the user, the method further comprises: the user using the keyboard and/or The soft keyboard inputs the ciphertext characters.
4、根据权利要求 1所述的方法, 其特征在于, 在所述将密文字符转 换为明文字符之后, 该方法进一步包括对比所述明文字符和目标明文字 符并判断两者是否相同的步骤。  The method according to claim 1, wherein after the converting the ciphertext characters into plaintext characters, the method further comprises the step of comparing the plaintext characters with the target plaintext characters and determining whether the two are the same.
5、根据权利要求 3所述的方法, 其特征在于, 在所述向用户提供字 符对照表之后, 并在所述用户通过键盘和 /或软键盘输入密文字符之前, 该方法进一步包括: 用户根据源明文字符和所述字符对照表获得所述密 文字符。  5. The method according to claim 3, wherein after the providing a character comparison table to the user, and before the user inputs the ciphertext characters through the keyboard and/or the soft keyboard, the method further comprises: The ciphertext character is obtained according to the source plaintext character and the character comparison table.
6、 一种字符输入的系统, 其特征在于, 该系统包括:  6. A system for character input, characterized in that the system comprises:
第一装置, 用于向用户提供字符对照表, 并接收用户输入的密文字 符;  a first device, configured to provide a character comparison table to the user, and receive a secret character input by the user;
第二装置, 用于根据字符对照表, 将用户输入第一装置的密文字符 转换为明文字符。 And a second device, configured to convert the ciphertext characters input by the user into the first device into plaintext characters according to the character comparison table.
7、 根据权利要求 6所述的系统, 其特征在于, 7. The system of claim 6 wherein:
所述第二装置, 进一步用于产生和 /或更新字符对照表, 并发送给第 一装置; 或者,  The second device is further configured to generate and/or update a character comparison table and send the same to the first device; or
所述第一装置, 进一步用于产生和 /或更新字符对照表, 并发送给第 二装置。  The first device is further configured to generate and/or update a character comparison table and send the same to the second device.
8、根据权利要求 6所述的系统, 其特征在于, 所述第一装置进一步 包括键盘模块和 /或软键盘模块, 其中:  The system according to claim 6, wherein the first device further comprises a keyboard module and/or a soft keyboard module, wherein:
所述键盘模块, 用于接收用户从键盘输入的密文字符;  The keyboard module is configured to receive a ciphertext character input by a user from a keyboard;
所述软键盘模块, 用于在屏幕上显示软键盘, 并接收用户通过点击 软键盘输入的密文字符。  The soft keyboard module is configured to display a soft keyboard on the screen and receive a ciphertext character input by the user by clicking the soft keyboard.
9、 根据权利要求 6所述的系统, 其特征在于, 所述第二模块, 进 一步用于对比所述明文字符和目标明文字符并判断两者是否相同。  9. The system according to claim 6, wherein the second module is further configured to compare the plaintext character and the target plaintext character and determine whether the two are the same.
10、 根据权利要求 6所述的系统, 其特征在于, 所述第一模块和第 二模块位于同一设备中, 或者位于不同设备中。  10. The system according to claim 6, wherein the first module and the second module are located in the same device or in different devices.
PCT/CN2007/070968 2006-12-26 2007-10-26 A character inputting method and system thereof WO2008077326A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN 200610167181 CN101075284A (en) 2006-12-26 2006-12-26 Method and system for inputting character
CN200610167181.2 2006-12-26

Publications (1)

Publication Number Publication Date
WO2008077326A1 true WO2008077326A1 (en) 2008-07-03

Family

ID=38976329

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2007/070968 WO2008077326A1 (en) 2006-12-26 2007-10-26 A character inputting method and system thereof

Country Status (3)

Country Link
CN (1) CN101075284A (en)
TW (1) TW200921451A (en)
WO (1) WO2008077326A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368728A (en) * 2013-07-18 2013-10-23 百度在线网络技术(北京)有限公司 Safe logging-in method, system and device
CN105743860A (en) * 2014-12-10 2016-07-06 北京数码视讯科技股份有限公司 Method and device for converting characters

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9588595B2 (en) * 2011-09-12 2017-03-07 Microsoft Technology Licensing, Llc Password reveal selector
CN103679448B (en) * 2013-11-29 2017-02-22 天地融科技股份有限公司 Password inputting method and password inputting system
CN106709294B (en) * 2015-11-12 2020-07-21 北京搜狗科技发展有限公司 User authentication method and device
CN111899022B (en) * 2020-08-07 2021-11-30 深圳前海星际同辉科技有限公司 Transaction information management method, device, equipment and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS63276158A (en) * 1987-05-08 1988-11-14 Hitachi Ltd Password input control system
CN1825796A (en) * 2006-03-29 2006-08-30 刘大扬 Network encryption system based on picture keyboard and operating method thereof
CN1896927A (en) * 2005-07-15 2007-01-17 光宝科技股份有限公司 Character inputting system and method
CN1952855A (en) * 2005-10-20 2007-04-25 联想(北京)有限公司 Cipher input method and system preventing peeper

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS63276158A (en) * 1987-05-08 1988-11-14 Hitachi Ltd Password input control system
CN1896927A (en) * 2005-07-15 2007-01-17 光宝科技股份有限公司 Character inputting system and method
CN1952855A (en) * 2005-10-20 2007-04-25 联想(北京)有限公司 Cipher input method and system preventing peeper
CN1825796A (en) * 2006-03-29 2006-08-30 刘大扬 Network encryption system based on picture keyboard and operating method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368728A (en) * 2013-07-18 2013-10-23 百度在线网络技术(北京)有限公司 Safe logging-in method, system and device
CN105743860A (en) * 2014-12-10 2016-07-06 北京数码视讯科技股份有限公司 Method and device for converting characters

Also Published As

Publication number Publication date
TW200921451A (en) 2009-05-16
TWI356323B (en) 2012-01-11
CN101075284A (en) 2007-11-21

Similar Documents

Publication Publication Date Title
US10187211B2 (en) Verification of password using a keyboard with a secure password entry mode
US6996718B1 (en) System and method for providing access to multiple user accounts via a common password
US7770002B2 (en) Multi-factor authentication
EP2839603B1 (en) Abstracted and randomized one-time passwords for transactional authentication
US20040250082A1 (en) Digital signature generation method, digital signature authentication method, digital signature generation request program and digital signature authentication request program
JP2009020853A (en) Security authentication system and method thereof
EP1964043A1 (en) Security tokens including displayable claims
US20100313028A1 (en) Electronic Signature Method and Electronic Signature Tool
CN112425114A (en) Password manager protected by public-private key pair
EP2150915B1 (en) Secure login protocol
US20100031328A1 (en) Site-specific credential generation using information cards
WO2008077326A1 (en) A character inputting method and system thereof
WO2011116570A1 (en) Method for safely inputting information on mobile terminal and mobile terminal thereof
US7143440B2 (en) User authentication system and method
JP5260533B2 (en) User authentication system and method
US7347366B2 (en) Method and apparatus to provide authentication using an authentication card
JP2007310515A (en) Password authentication system, password authentication server, password authentication method and program
JP2007299353A (en) Password generator and program for making computer operate as password generator
CN116076055A (en) Method and system for verifying user identification
CN117332389A (en) Application program login method, device, equipment, medium and product
JP2002351841A (en) Password generation and storing method, and authentication method
JP2022188998A (en) Identity authentication system and identity authentication method
JP2009031995A (en) Information processor and information processing system
JP2017219918A (en) Service provision system, service provision method, and program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07817159

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS (EPO FORM 1205A DATED 30-10-2009)

122 Ep: pct application non-entry in european phase

Ref document number: 07817159

Country of ref document: EP

Kind code of ref document: A1