CN100561397C - A kind of method and system of secure log - Google Patents
A kind of method and system of secure log Download PDFInfo
- Publication number
- CN100561397C CN100561397C CNB2004100280263A CN200410028026A CN100561397C CN 100561397 C CN100561397 C CN 100561397C CN B2004100280263 A CNB2004100280263 A CN B2004100280263A CN 200410028026 A CN200410028026 A CN 200410028026A CN 100561397 C CN100561397 C CN 100561397C
- Authority
- CN
- China
- Prior art keywords
- soft keyboard
- user
- input information
- login
- button
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Abstract
The invention discloses a kind of method and system of secure log, wherein method is: soft keyboard is hit lives and demonstration, and soft keyboard receives the input log-on message then, and last log-on message passes to the login input frame after being handled by the user's input information processing module.Described system comprises: soft keyboard, soft keyboard display module, user's input information receiver module, user's input information processing module.
Description
Technical field
The present invention relates to computer software, network technology and log-on message typing safety technique field, relate in particular to a kind of method and system of secure log.
Background technology
In the system login process, in order to confirm identifying user identity, the user must have username and password, owing to having viral wooden horse on the various reasons, particularly subscriber set.Key position/order remains unchanged, the soft keyboard character information of this click location of click information analysis when viral wooden horse can be inputed password according to the user, thus analyze user's password.Button does not have the background camouflage and has used regular font, click information when viral wooden horse can be inputed password according to the user, and the image information of this position of soft keyboard on the anacom screen is judged the character information of this position, thereby analyzes user's password.
Common log-on message input method can cause user's log-on message to be stolen, and user's identity can be falsely used, and can cause unknowable loss to the user like this.
Summary of the invention
In order to solve above problem, the present invention proposes a kind of method and system of secure log.Purpose is the method and system that a kind of effective protection user login information input is provided to the system login user.
A kind of method of secure log, its method realization system comprises: soft keyboard, the soft keyboard display module, the user's input information receiver module, the user's input information processing module, this method may further comprise the steps: soft keyboard is hit lives and the demonstration soft keyboard, and described its display format of demonstration soft keyboard can be: the button background shows, camouflage shows, the combination of three kinds of modes of irregular demonstration; Soft keyboard receives user's input information then; Last log-on message passes to the login input frame after being handled by the user's input information processing module.
The method of described secure log, described user's input information can be: the user logins code, and perhaps password is perhaps with the combination of upper type.
The method of described secure log, described login input frame refer to the login input frame in the login interface of the system that the user need login.
A kind of system of secure log, comprise: soft keyboard, the user's input information receiver module receives the input information from soft keyboard, after the user's input information processing module is carried out respective handling to the information of input, be sent to the login input frame at system login interface, also comprise the soft keyboard display module that is used to show soft keyboard, the button background display function of described soft keyboard display module utilizes the pattern mode to set off the background of button; Camouflage Presentation Function with described soft keyboard display module: by on button, increasing the symbol that the noise point that disturbs is covered up button; Irregular Presentation Function with described soft keyboard display module: when each soft keyboard showed, the button ordering on the soft keyboard all can change and be irregular.
The system of described secure log, described soft keyboard can be the standard interface plug-in unit of computer operating system, perhaps a system module.
The system of described secure log, this system can be in conjunction with using but are not limited to instantaneous communication system, information management system and financial system.
Methods such as the noise point of the background of the present invention by button, camouflage and irregular character information output have increased greatly and have analyzed the difficulty of certain position character information of keyboard, thereby have greatly reduced the possibility that input information is analyzed and steal.
Description of drawings
Fig. 1: be method performing step process flow diagram of the present invention;
Fig. 2: for system of the present invention realizes module map;
Fig. 3: be soft keyboard demonstration program synoptic diagram of the present invention.
Embodiment
With reference to accompanying drawing 1, a kind of method of secure log, its method realization system comprises: soft keyboard (seeing accompanying drawing 3), soft keyboard display module 201, user's input information receiver module 202, user's input information processing module 203, this method may further comprise the steps: at first soft keyboard is hit and is lived 101; After soft keyboard showed 102, soft keyboard received user's input information 103, comprises information such as user's name and password; Last log-on message is handled 104 accordingly by user's input information processing module 203, finishes in the login input frame that log-on message after the processing is sent to login system 105.
Its display format of soft keyboard that realizes safe login method can be: the button background shows that perhaps camouflage shows, perhaps irregular demonstration is perhaps with the combination of upper type.
A kind of system of secure log, comprise: soft keyboard (seeing accompanying drawing 3), the input information that user's input information receiver module 202 receives from soft keyboard, after the information of 203 pairs of inputs of user's input information processing module is carried out respective handling, be sent to the login input frame at system login interface, also comprise the soft keyboard display module 201 that is used to show soft keyboard.
The Presentation Function of realizing the soft keyboard display module 201 of secure log system comprises: the button background display function, and the camouflage Presentation Function, irregular Presentation Function, wherein: the button background display function, utilize mode such as pattern to set off the background of button; The camouflage Presentation Function is by increasing the symbol that the noise point that disturbs is covered up button on button; Irregular Presentation Function, when each soft keyboard showed, the button ordering on the soft keyboard all can change and be irregular.The background of button, the noise point of camouflage and the output of irregular character information increased greatly and analyzed the difficulty of certain position character information of keyboard, thereby greatly reduced the possibility that input information is analyzed and steal.
Realize the system of secure log, described soft keyboard can be the standard interface plug-in unit of computer operating system, perhaps a system module.
The system of described secure log, this system can be in conjunction with using but are not limited to instantaneous communication system, information management system and financial system.
Realize that soft keyboard display effect of the present invention can be with reference to the accompanying drawings 3.
Below provide a kind of example that combines with instant communication software that the present invention uses:
The present invention can be applied in the middle of the login link of instant communication software, communicates when the user need start instant communication software, and the user must carry out the checking flow process of identity earlier.The flow process of this checking is in order to ensure user's personal interests, so the present invention can cater to the demand of user information safety.
When the user starts instant communication software, at first be login interface, the present invention the startup button of soft keyboard occurs by the mode of merge module on login interface, start soft keyboard display module 201 of the present invention by button.Subsequently, import log-on message to user's input information receiver module 202 by the button of soft keyboard, this information comprises: log-on messages such as user's name, password, check code.User profile after the reception is handled by user's input information processing module 203, at last the user's input information after handling is sent in the log-on message input frame of login interface.
By such user profile input method, protect the information security of login effectively.
The above only is a better embodiment of the present invention, is not to be used for limiting scope of the present invention.Scope of the present invention is only limited by appended claim.
Claims (6)
1, a kind of method of secure log, its method realization system comprises: soft keyboard, the soft keyboard display module, the user's input information receiver module, the user's input information processing module is characterized in that may further comprise the steps:
A) soft keyboard is hit and lives and the demonstration soft keyboard, and the display mode of soft keyboard is: button background, camouflage show, the combination of three kinds of modes of irregular demonstration;
B) soft keyboard receives user's input information;
C) log-on message passes to the login input frame after being handled by the user's input information processing module.
2, the method for secure log as claimed in claim 1 is characterized in that, user's input information is among the described step b: the user logins code, and perhaps password is perhaps with the combination of upper type.
3, the method for secure log as claimed in claim 1 is characterized in that, the login input frame refers to the login input frame in the login interface of the system that the user need login among the described step c.
4, a kind of system of secure log, comprise: soft keyboard, the user's input information receiver module receives the input information from soft keyboard, after the user's input information processing module is carried out respective handling to the information of input, be sent to the login input frame at system login interface, it is characterized in that: also comprise the soft keyboard display module that is used to show soft keyboard, wherein:
The soft keyboard display module utilizes the pattern mode to set off the background of button;
Cover up the symbol of button by the noise point that on button, increase to disturb with the soft keyboard display module;
With the irregular demonstration of soft keyboard display module, when each soft keyboard showed, the button ordering on the soft keyboard all can change and be irregular.
5, the system of secure log as claimed in claim 4 is characterized in that, described soft keyboard is: the standard interface plug-in unit of computer operating system, perhaps a system module.
6, the system of secure log as claimed in claim 4 is characterized in that, this system is in conjunction with application with instant communication system, information management system and financial system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100280263A CN100561397C (en) | 2004-07-08 | 2004-07-08 | A kind of method and system of secure log |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100280263A CN100561397C (en) | 2004-07-08 | 2004-07-08 | A kind of method and system of secure log |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1719368A CN1719368A (en) | 2006-01-11 |
CN100561397C true CN100561397C (en) | 2009-11-18 |
Family
ID=35931220
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2004100280263A Active CN100561397C (en) | 2004-07-08 | 2004-07-08 | A kind of method and system of secure log |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100561397C (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101075873B (en) * | 2007-06-28 | 2012-10-03 | 腾讯科技(深圳)有限公司 | Method and system for inputting content |
CN103366137A (en) * | 2012-04-06 | 2013-10-23 | 腾讯科技(深圳)有限公司 | Method and device for inputting information |
KR101280249B1 (en) * | 2012-12-14 | 2013-07-05 | 배정은 | Selective data input system and method thereof |
KR102195900B1 (en) * | 2013-12-20 | 2020-12-29 | 삼성전자주식회사 | Method and apparatus for sending and receiving of encrypted message between devices |
CN103996011A (en) * | 2014-06-05 | 2014-08-20 | 福建天晴数码有限公司 | Method and device for protecting codes to be input safely |
CN105389486B (en) * | 2015-11-05 | 2018-07-06 | 同济大学 | A kind of authentication method based on mouse behavior |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1127896A (en) * | 1994-12-29 | 1996-07-31 | 三星电子株式会社 | Portable information terminal and method for input ting information using soft keyboard |
US5928364A (en) * | 1995-11-30 | 1999-07-27 | Casio Computer Co., Ltd. | Secret data storage device, secret data reading method, and control program storing medium |
CN1472655A (en) * | 2002-07-31 | 2004-02-04 | 网元国际金流股份有限公司 | System and method for inputting and delivering user personal data to servo with safe style |
-
2004
- 2004-07-08 CN CNB2004100280263A patent/CN100561397C/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1127896A (en) * | 1994-12-29 | 1996-07-31 | 三星电子株式会社 | Portable information terminal and method for input ting information using soft keyboard |
US5928364A (en) * | 1995-11-30 | 1999-07-27 | Casio Computer Co., Ltd. | Secret data storage device, secret data reading method, and control program storing medium |
CN1472655A (en) * | 2002-07-31 | 2004-02-04 | 网元国际金流股份有限公司 | System and method for inputting and delivering user personal data to servo with safe style |
Also Published As
Publication number | Publication date |
---|---|
CN1719368A (en) | 2006-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9729532B2 (en) | User identity authenticating method and device for preventing malicious harassment | |
TWI758260B (en) | Website login method and login system based on mobile phone short message | |
CN106487762B (en) | user identity recognition method, identity recognition application client and server | |
KR101851398B1 (en) | Apparus and method for authorizing combining code using quick response code | |
WO2016101384A1 (en) | Dual-system switch based data security processing method and apparatus | |
EP3065074A1 (en) | Fingerprint authentication method and device, intelligent terminal, and computer storage medium | |
CN104700007A (en) | Gesture impression password setting and application method | |
CN103945380A (en) | Method and system for network login authentication based on graphic code | |
CN107241336B (en) | Identity verification method and device | |
CN102291376B (en) | Method and system for realizing mobile terminal-supporting electronic transaction | |
JP2009545065A (en) | Virtual user authentication system and virtual user authentication method | |
CN109995748B (en) | Verification code processing method, device and system | |
CN109672523A (en) | Information ciphering method, device, equipment and readable storage medium storing program for executing based on filter | |
WO2023050524A1 (en) | Im-based user identity authentication method and apparatus, and server and storage medium | |
CN100561397C (en) | A kind of method and system of secure log | |
CN102957701A (en) | Method and system for verifying telnet server brute force attack prevention | |
CN109104430B (en) | Identity authentication method, identity authentication device and computer readable storage medium | |
CN107707529A (en) | A kind of client validation method for realizing limitation identifying code transmission times | |
US20150326558A1 (en) | Architecture for platform security using a dedicated security device for user interaction | |
Varshney et al. | Push notification based login using BLE devices | |
CN112235177A (en) | Method, device and system for sending authentication information through instant messaging | |
CN107172076B (en) | Security verification method, mobile terminal and server side | |
WO2021106381A1 (en) | Information processing device, information processing method, authentication device, authentication method, authentication system, authentication method in authentication system, and computer program | |
WO2023029476A1 (en) | Method for determining account information when user is in non-login state, and system | |
CN112785312A (en) | Information sharing method and device, electronic equipment and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |