CN109117678A - A kind of information transferring method and system - Google Patents
A kind of information transferring method and system Download PDFInfo
- Publication number
- CN109117678A CN109117678A CN201810905710.7A CN201810905710A CN109117678A CN 109117678 A CN109117678 A CN 109117678A CN 201810905710 A CN201810905710 A CN 201810905710A CN 109117678 A CN109117678 A CN 109117678A
- Authority
- CN
- China
- Prior art keywords
- mapping
- information input
- input equipment
- key assignments
- opposite equip
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides a kind of information transferring method and system, this method comprises: whether the key of information input equipment detection information input equipment is triggered;When information input equipment detects that the key of information input equipment is triggered, the first key assignments that the key being triggered generates is obtained;Information input equipment obtains information input equipment side mapping ruler;Information input equipment executes map operation to the first key assignments according to information input equipment side mapping ruler, obtains the mapping value of the first key assignments;The mapping value of first key assignments is sent to opposite equip. by information input equipment;Opposite equip. receives the mapping value for the first key assignments that information input equipment road is sent;Opposite equip. obtains opposite equip. corresponding with information input equipment side mapping ruler;Opposite equip. executes mapping restoring operation using mapping value of the opposite equip. side mapping ruler to the first key assignments, obtains the first key assignments.
Description
Technical field
The present invention relates to a kind of electronic technology field more particularly to a kind of information transferring method and systems.
Background technique
In the prior art, when being communicated using keyboard with external equipment, keyboard generate key value information transmission mistake
Cheng Zhong is easy the interception by rogue program, and key value information is easy to be intercepted and crack, and leads to the data of keyboard and external equipment
There are biggish security risks for interaction.
Summary of the invention
Present invention seek to address that the above problem.
The main purpose of the present invention is to provide a kind of information transferring methods;
Another object of the present invention is to provide a kind of information transmission systems.
In order to achieve the above objectives, technical solution of the present invention is specifically achieved in that
It includes: that information input equipment detects the information input and sets that one aspect of the present invention, which provides a kind of information transferring method,
Whether standby key is triggered;When the information input equipment detects that the key of the information input equipment is triggered, obtain
The first key assignments that the key being triggered generates;The information input equipment obtains information input equipment side mapping ruler;Institute
It states information input equipment and map operation is executed to first key assignments according to information input equipment side mapping ruler, obtain institute
State the mapping value of the first key assignments;The mapping value of first key assignments is sent to the opposite equip. by the information input equipment;
The opposite equip. receives the mapping value for first key assignments that the information input equipment road is sent;The opposite equip. obtains
Opposite equip. corresponding with information input equipment side mapping ruler;The opposite equip. is mapped using the opposite equip. side
Rule executes mapping restoring operation to the mapping value of first key assignments, obtains first key assignments.
Wherein, the information input equipment executes first key assignments according to information input equipment side mapping ruler
Map operation, the mapping value for obtaining first key assignments includes: that the information input equipment obtains fixed mapping parameters;The letter
First key assignments and the fixed mapping parameters are carried out default mapping operations by breath input equipment, obtain first key assignments
Mapping value.
Wherein, the information input equipment executes first key assignments according to information input equipment side mapping ruler
Map operation, the mapping value for obtaining first key assignments includes: that the information input equipment is calculated according to the adjustment of default mapping parameters
Method obtains mapping parameters used in this map operation, mapping parameters used in this described map operation and previous map operation
Mapping parameters used are different;The information input equipment is by mapping used in first key assignments and this described map operation
Parameter carries out default mapping operations, obtains the mapping value of first key assignments.
Another aspect of the present invention provides a kind of information transmission system, comprising: information input equipment and opposite equip.;The letter
Input equipment is ceased, whether the key for detecting the information input equipment is triggered;Detect the information input equipment
When key is triggered, the first key assignments that the key being triggered generates is obtained;Obtain information input equipment side mapping ruler simultaneously
Map operation is executed to first key assignments according to information input equipment side mapping ruler, obtains reflecting for first key assignments
Penetrate value;And the mapping value of first key assignments is sent to the opposite equip.;The opposite equip. is also used to receive described
The mapping value for first key assignments that information input equipment is sent;Obtain opposite equip. corresponding with information input equipment side
Mapping ruler;And mapping reduction behaviour is executed using mapping value of the opposite equip. side mapping ruler to first key assignments
Make, obtains first key assignments.
Wherein, the information input equipment is specifically used for obtaining fixed mapping parameters;And by first key assignments with it is described
Fixed mapping parameters carry out default mapping operations, obtain the mapping value of first key assignments.
Wherein, the information input equipment is grasped specifically for obtaining this mapping according to default mapping parameters adjustment algorithm
Make mapping parameters used, mapping parameters used in mapping parameters used in this described map operation and previous map operation are not
Together;Mapping parameters used in first key assignments and this described map operation are subjected to default mapping operations, obtain described the
The mapping value of one key assignments.
As seen from the above technical solution provided by the invention, information input equipment first carries out the key assignments got in advance
If the mapping value to the key assignments of mapping operations, after the mapping value is sent to opposite equip., since mapping ruler only has information
Input equipment and opposite equip. can obtain, thus compared to key assignments itself is directly transmitted, it, can be with by the mapping value of transmission key assignments
It prevents key assignments from being intercepted and captured and being cracked by Malware, improves the transmission security of key assignments.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment
Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this
For the those of ordinary skill in field, without creative efforts, it can also be obtained according to these attached drawings other
Attached drawing.
Fig. 1 is the flow chart for the information transferring method that the embodiment of the present invention 1 provides;
Fig. 2 is the structural schematic diagram for the information transmission system that the embodiment of the present invention 2 provides.
Specific embodiment
With reference to the attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on this
The embodiment of invention, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, belongs to protection scope of the present invention.
In the description of the present invention, it is to be understood that, term " center ", " longitudinal direction ", " transverse direction ", "upper", "lower",
The orientation or positional relationship of the instructions such as "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outside" is
It is based on the orientation or positional relationship shown in the drawings, is merely for convenience of description of the present invention and simplification of the description, rather than instruction or dark
Show that signified device or element must have a particular orientation, be constructed and operated in a specific orientation, therefore should not be understood as pair
Limitation of the invention.In addition, term " first ", " second " are used for description purposes only, it is not understood to indicate or imply opposite
Importance or quantity or position.
In the description of the present invention, it should be noted that unless otherwise clearly defined and limited, term " installation ", " phase
Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can
To be mechanical connection, it is also possible to be electrically connected;It can be directly connected, can also can be indirectly connected through an intermediary
Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition
Concrete meaning in invention.
The embodiment of the present invention is described in further detail below in conjunction with attached drawing.
Embodiment 1
The present embodiment provides a kind of information transferring methods, as shown in Figure 1, including the following steps:
101, whether the key that information input equipment detects the information input equipment is triggered;The information input equipment
When detecting that the key of the information input equipment is triggered, the first key assignments that the key being triggered generates is obtained;
In the present embodiment, information input equipment for example can be keyboard;Opposite equip. for example can be the host computers such as computer,
Either background server.
In the present embodiment, for example, information input equipment be keyboard when, the key on keyboard is pressed, and keyboard obtains this and presses
The first key assignments that key generates.
102, the information input equipment obtains information input equipment side mapping ruler;
The realization that information input equipment described in this step obtains information input equipment side mapping ruler includes but not
It is limited to as follows:
(1) it is obtained by presetting mode:
Information input equipment side mapping ruler is preset in information input equipment, alternatively, in information input equipment
Preset multiple information input equipment sides mapping ruler, information input equipment is according to preset strategy from multiple information input equipments
One is chosen in the mapping ruler of side is used as information input equipment side mapping ruler.
(2) mode obtains through consultation: information input equipment and opposite equip. negotiate mapping ruler, obtain information input
Equipment side mapping ruler, meanwhile, opposite equip. can also obtain opposite equip. side mapping ruler.
In the present embodiment, the implementation for negotiating mapping ruler is including but not limited to following several: mode one, information input
The mapping ruler itself supported or the carrying of mapping ruler mark are sent to opposite end in negotiating mapping ruler request and set by equipment
Standby, opposite equip. determines a mapping ruler conduct from the mapping ruler that information input equipment is supported or mapping ruler mark
The mapping ruler that follow-up input equipment and opposite equip. use jointly, opposite equip. by the mapping ruler determined or
Mapping ruler mark, which is carried, to be sent in negotiating mapping ruler response to information input equipment;Mode two, information input equipment
The mapping mode that opposite equip. is supported is obtained, and therefrom determines that a mapping ruler is set as follow-up input equipment with opposite end
The mapping ruler determined or mapping ruler mark are carried and are being assisted by the standby mapping ruler used jointly, information input equipment
It is sent in L mappings rule request to opposite equip.;If opposite equip. is determined using the mapping ruler or mapping received
Rule mark, then sending to opposite equip. indicates that the negotiation mapping ruler of confirmation responds to information input equipment.
The mapping value obtained after map operation is carried out to initial data using information input equipment side mapping ruler, it can
Successfully to carry out mapping reduction by opposite equip. side mapping ruler, to obtain initial data, equally, the opposite equip. is used
Side mapping ruler carries out the mapping value obtained after map operation to initial data, can pass through information input equipment side mapping ruler
Mapping reduction is carried out, successfully to obtain initial data.
In the present embodiment, negotiating mapping ruler can be initiated by information input equipment, naturally it is also possible to be sent out by opposite equip.
It rises.
In the present embodiment, information input equipment side mapping ruler may exist in the safety chip of information input equipment, with
Improve the storage security of information input equipment side mapping ruler.
It,, can be with as a kind of optional way of the present embodiment before this step to further increase transmission security
Execute following steps: information input equipment and opposite equip. establish the exit passageway that data are transmitted, and the information input equipment obtains
Information input equipment side security key is obtained, the opposite equip. obtains opposite equip. side security key;
In the present embodiment, information input equipment side security key can be symmetrical close with opposite equip. side security key
Key may be unsymmetrical key.Data using information input equipment side secure key encryption can pass through opposite equip.
Side security key is successfully decrypted, and equally, the data using opposite equip. side secure key encryption can pass through information input
Equipment side security key can also successfully be decrypted.In the present embodiment, information input equipment and opposite equip. establish data biography
After defeated exit passageway, the data transmitted between information input equipment and opposite equip. are all made of after security key is encrypted and pass
It is defeated, with the safety of improve data transfer.
For example, the data interacted between information input equipment and opposite equip. are not having during negotiating mapping ruler
It can be transmitted in exit passageway after being encrypted after establishing exit passageway with plaintext transmission before establishing exit passageway.
For example, being illustrated so that information input equipment initiates to negotiate mapping ruler as an example, the input of information input equipment elder generation use information is set
Standby side security key is requested after encrypting mapping ruler is negotiated, then is sent to opposite equip. by exit passageway, and opposite end is set
The standby negotiation mapping ruler request ciphertext being docked to using opposite equip. side security key is decrypted.Later, opposite equip. is adopted
Negotiation mapping ruler is responded with opposite equip. side security key after encrypting, then information input is sent to by exit passageway
Equipment, information input equipment receives and use information input equipment side security key is decrypted to mapping ruler response is negotiated
Afterwards, it obtains negotiating mapping ruler response.Information input equipment and opposite equip. are negotiated to map rule by exit passageway in this implementation
Then, the safety that mapping ruler transmits in negotiations process can be improved.
As a kind of optional implementation of the present embodiment, the safety chip of information input equipment passes through the exit passageway
Negotiate mapping ruler with the opposite equip..
For the safety for further increasing transmission, in the present embodiment, optionally, and before this step, information input equipment
Two-way authentication process can also be carried out with opposite equip., or opposite equip. can be carried out with information input equipment single
To authentication process or opposite equip. unidirectional authentication process is carried out to information input equipment.The authentication
Process for example can be the authentication based on digital certificate.
After above-mentioned two-way authentication process (or unidirectional authentication process) passes through, then execute foundation peace
The process of full tunnel, to improve the safety of data interaction between information input equipment and opposite equip..
A kind of optional implementation of the present embodiment establishes data by the safety chip and opposite equip. of information input equipment
The exit passageway of transmission, and enter information into equipment side security key and be stored in the safety chip of information input equipment, guarantee
The safety of security key storage.
As a kind of optional implementation of the present embodiment, information input equipment supports two kinds of input patterns, and one is general
Logical mode uses existing way to carry out data interaction under the general mode before information input equipment and opposite equip., another
Kind is encryption mode, and exit passageway can be established under the encryption mode, between information input equipment and opposite equip. and is negotiated
Mapping ruler, and data interaction is carried out by exit passageway.
Thus, before this step, data inputting method provided in this embodiment can be the following steps are included: common
Under mode, the information input equipment detects whether to receive the first mode switching command that the opposite equip. is sent, and is connecing
When receiving the first mode switching command, controls the information input equipment and switch to encryption mode;Alternatively, in general mode
Under, information input equipment detects whether the mode switching key on the information input equipment is triggered, and is detecting the letter
When mode switching key on breath input equipment is triggered, controls the information input equipment and switch to encryption mode;This step
In, the information input equipment and opposite equip. establish the exit passageway that data are transmitted, specifically: it is in an encrypted mode, described
Information input equipment and the opposite equip. establish the exit passageway of data transmission.
103, the information input equipment executes first key assignments according to information input equipment side mapping ruler
Map operation obtains the mapping value of first key assignments;
In the present embodiment, the implementation that information input equipment executes map operation is including but not limited to following several:
As a kind of optional way of this implementation, information input equipment realizes map operation: institute according to fixed mapping mode
It states information input equipment and obtains fixed mapping parameters;The information input equipment joins first key assignments and the fixed mapping
Number carries out default mapping operations, obtains the mapping value of first key assignments.
For example, the key assignments of acquisition is K1 when mapping for the first time, fixed mapping parameters are A1, obtain after presetting mapping operations
The mapping value arrived is f (K1)=K1 ⊕ A1=K1 ';When second of mapping, the key assignments of acquisition is K2, and fixed mapping parameters are A1,
The mapping value obtain after default mapping operations is f (K2)=K2 ⊕ A1=K2 ';When n-th maps, the key assignments of acquisition is
Kn, the mapping value obtain after default mapping operations are f (Kn)=Kn ⊕ A1=Kn '.As can be seen that using fixed mapping side
When formula carries out default mapping operations, the fixation mapping parameters used every time are all the same.
As another optional way of this implementation, information input equipment can also realize mapping according to transformed mappings mode
Operation, i.e., the mapping parameters used every time are all different: the information input equipment is obtained according to default mapping parameters adjustment algorithm
Mapping parameters used in this map operation are taken, used in mapping parameters used in this described map operation and previous map operation
Mapping parameters it is different;The information input equipment is by mapping parameters used in first key assignments and this described map operation
Default mapping operations are carried out, the mapping value of first key assignments is obtained.
For example, default mapping parameters adjustment algorithm can be A2=A1+1, A3=A2+1, An=An-1+1;Or A2=A1+
K1, A3=A2+K2, An=An-1+Kn-1 or A2=K1 ', A3=K2 ', An=Kn '.Wherein, A1 indicates used when first mapping
Mapping parameters, A2 indicates mapping parameters used when second mapping, and so on, An indicates used when n-th mapping
Mapping parameters.
When first mapping, the key assignments of acquisition is K1, mapping parameters A1, carries out the mapping value obtained after default mapping operations
For f (K1)=K1 ⊕ A1=K1 ';When second of mapping, the key assignments of acquisition is K2, mapping parameters A2, carries out default mapping fortune
The mapping value obtained after calculation is f (K2)=K2 ⊕ A2=K2 ';When n-th maps, the key assignments of acquisition is Kn, carries out default mapping
The mapping value obtained after operation is f (Kn)=Kn ⊕ A2=Kn '.
For another example, it presets mapping parameters adjustment algorithm to realize based on mapping parameters matrix, mapping parameters matrix isWhen first mapping, the key assignments of acquisition is K1, mapping parameters a11, obtain after default mapping operations
Mapping value is f (K1)=K1 ⊕ a11;When second of mapping, the key assignments of acquisition is K2, mapping parameters a12, carries out default mapping
The mapping value obtained after operation is f (K2)=K2 ⊕ a12;When third time maps, the key assignments of acquisition is K3, mapping parameters a21,
The mapping value obtain after default mapping operations is f (K3)=K3 ⊕ a21;When the 4th mapping, the key assignments of acquisition is K4, is reflected
Penetrating parameter is a22, and the mapping value obtain after default mapping operations is f (K4)=K4 ⊕ a22;When the 5th mapping, obtain
Key assignments be K5, mapping parameters a11, carrying out the mapping value obtained after default mapping operations is f (K5)=K5 ⊕ a11;With this
Analogize.
For another example, it presets mapping parameters adjustment algorithm and is based on mapping parameters matrix and transition matrix realization, mapping parameters matrix
ForTransition matrix isWhen first mapping, the key assignments of acquisition is K1, mapping parameters a11, is carried out
The mapping value obtained after default mapping operations is f (K1)=K1 ⊕ a11;When second of mapping, the key assignments of acquisition is K2, mapping ginseng
Number is a11*c1, and the mapping value obtain after default mapping operations is f (K2)=K2 ⊕ (a11*c1);When third time maps,
The key assignments of acquisition is K3, mapping parameters a11*c2, and the mapping value obtain after default mapping operations is f (K3)=K3 ⊕
(a11*c2);When the 4th mapping, the key assignments of acquisition is K4, mapping parameters a12*c1, is obtained after carrying out default mapping operations
Mapping value be f (K4)=K4 ⊕ (a12*c1);And so on.
104, the mapping value of first key assignments is sent to the opposite equip. by the information input equipment;
In the present embodiment, information input equipment and opposite equip. can be wired connection, such as (information input is set keyboard
It is standby) host computer (opposite equip.) is connected to by keyboard connecting line, naturally it is also possible to it is to be wirelessly connected, such as (information is defeated for keyboard
Enter equipment) it is connected to host computer (opposite equip.) by wireless communications such as bluetooth, WiFi or mobile networks, or pass through key
Disk (information input equipment) is connected to background server (opposite equip.) by wireless communications such as WiFi, mobile networks.
In the present embodiment information input equipment can by wired connection or radio connection reflecting the first key assignments
It penetrates value and is sent to opposite equip..
Key assignments itself is directly transmitted compared to the prior art, and information input equipment is by sending the first key assignments in the present embodiment
Mapping value, can be improved key assignments transmission safety.
To further increase transmission security, can also use cipher mode transmission map value, one as the present embodiment
The optional implementation of kind, this step can also take following implementation:
The information input equipment is using information input equipment side security key to the mapping value of first key assignments
It is encrypted, obtains the mapping value ciphertext of first key assignments;The information input equipment will be described by the exit passageway
The mapping value ciphertext of first key assignments is sent to the opposite equip..
105, the opposite equip. receives the mapping value for first key assignments that the information input equipment is sent;
Opposite end can receive what information input equipment was sent by wired connection or radio connection in the present embodiment
Which kind of mode is the mapping value of first key assignments specifically use, and the reality of the mapping value of the first key assignments is sent depending on information input equipment
Existing mode.
To further increase transmission security, as a kind of optional implementation of the present embodiment, this step can be used
Following implementation:
The opposite equip. receives first key assignments that the information input equipment is sent by the exit passageway
Mapping value ciphertext;The opposite equip. obtains opposite equip. corresponding with information input equipment side security key;It is described right
End equipment is decrypted to obtain described using mapping value ciphertext of the opposite equip. side security key to first key assignments
The mapping value of one key assignments;
In the present embodiment, opposite equip. also can be by opposite equip. side obtained security key and the information input equipment phase
It is corresponding to be stored.Opposite equip. and information input equipment can be one-to-one relationship, and opposite equip., which directly acquires, to be deposited
The security key of storage.
Certainly, opposite equip. and information input equipment can be one-to-many relationship, at this point, opposite equip. will be from storage
Opposite equip. corresponding with information input equipment side security key is selected in multiple security keys.It can be according to information when selection
The marks such as title, the sequence number of input equipment are selected, it is to be understood that the mark of the information input equipment can be at this time
It is sent to pair in the data interaction of any secondary information input equipment and opposite equip. before this step by information input equipment
End equipment.
106, the opposite equip. obtains opposite equip. corresponding with information input equipment side mapping ruler;It is described right
End equipment executes mapping restoring operation using mapping value of the opposite equip. side mapping ruler to first key assignments, obtains institute
State the first key assignments.
Opposite equip. side mapping ruler is mapping ruler corresponding with information input side mapping ruler, thus, it adopts
Mapping reduction can be carried out to the mapping value of first key assignments with opposite equip. side mapping ruler.
In the present embodiment, opposite equip. reflects the mapping value of first key assignments using opposite equip. side mapping ruler
Penetrate reduction, it can be deduced that the first key assignments, this completes the first key assignments from information input equipment safe transmission to opposite equip..It should
Opposite equip. side mapping ruler may refer to the associated description of aforementioned information input equipment side mapping ruler, and details are not described herein.
In the present embodiment, information input equipment first carries out the reflecting to the key assignments of default mapping operations to the key assignments got
Value is penetrated, and the mapping value is sent to opposite equip., since mapping ruler only has information input equipment and opposite equip. that can obtain
, thus compared to directly transmit key assignments itself, by transmit key assignments mapping value, can prevent key assignments by Malware intercept and capture with
It cracks, improves the transmission security of key assignments.
Embodiment 2
The present embodiment provides a kind of information transmission systems, as shown in Figure 2, comprising: information input equipment 10 and opposite equip.
20;
Whether the information input equipment 10, the key for detecting the information input equipment 10 are triggered;It detects
When the key of the information input equipment 10 is triggered, the first key assignments that the key being triggered generates is obtained;Obtain the information
Input equipment side mapping ruler simultaneously executes map operation to first key assignments according to information input equipment side mapping ruler,
Obtain the mapping value of first key assignments;And the mapping value of first key assignments is sent to the opposite equip. 20;
The opposite equip. 20 is also used to receive the mapping for first key assignments that the information input equipment 10 is sent
Value;Obtain opposite equip. side mapping ruler corresponding with the information input equipment 10;And it is reflected using the opposite equip. side
It penetrates rule and mapping restoring operation is executed to the mapping value of first key assignments, obtain first key assignments.
As a kind of optional implementation of the present embodiment, the information input equipment 10 is reflected specifically for obtaining fixation
Penetrate parameter;And first key assignments and the fixed mapping parameters are subjected to default mapping operations, obtain first key assignments
Mapping value.
As a kind of optional implementation of the present embodiment, the information input equipment 10, specifically for being reflected according to default
Penetrate parameter tuning algorithm and obtain mapping parameters used in this map operation, mapping parameters used in this described map operation with
Mapping parameters used in previous map operation are different;By mapping parameters used in first key assignments and this described map operation
Default mapping operations are carried out, the mapping value of first key assignments is obtained.
In the present embodiment, information input equipment first carries out the reflecting to the key assignments of default mapping operations to the key assignments got
Value is penetrated, and the mapping value is sent to opposite equip., it, can by transmitting the mapping value of key assignments compared to key assignments itself is directly transmitted
To prevent key assignments from being intercepted and captured and being cracked by Malware, the transmission security of key assignments is improved.
In the present embodiment, being discussed in detail referring also to above-described embodiment 1 in relation to mapping parameters and default mapping operations
In associated description, details are not described herein.
The correlation function of information input equipment and opposite equip. is realized referring also in above-described embodiment 1 in the present embodiment
Associated description, details are not described herein.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes
It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion
Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussed suitable
Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned
In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage
Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware
Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal
Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries
It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium
In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, each functional unit in each embodiment of the present invention can integrate in a processing module
It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould
Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any
One or more embodiment or examples in can be combined in any suitable manner.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example
Property, it is not considered as limiting the invention, those skilled in the art are not departing from the principle of the present invention and objective
In the case where can make changes, modifications, alterations, and variations to the above described embodiments within the scope of the invention.The scope of the present invention
By appended claims and its equivalent limit.
Claims (6)
1. a kind of information transferring method characterized by comprising
Whether the key that information input equipment detects the information input equipment is triggered;
When the information input equipment detects that the key of the information input equipment is triggered, obtains the key being triggered and generate
The first key assignments;
The information input equipment obtains information input equipment side mapping ruler;
The information input equipment executes map operation to first key assignments according to information input equipment side mapping ruler,
Obtain the mapping value of first key assignments;
The mapping value of first key assignments is sent to the opposite equip. by the information input equipment;
The opposite equip. receives the mapping value for first key assignments that the information input equipment road is sent;
The opposite equip. obtains opposite equip. corresponding with information input equipment side mapping ruler;
The opposite equip. executes mapping reduction using mapping value of the opposite equip. side mapping ruler to first key assignments
Operation, obtains first key assignments.
2. the method according to claim 1, wherein the information input equipment is according to the information input equipment
Side mapping ruler executes map operation to first key assignments, and the mapping value for obtaining first key assignments includes:
The information input equipment obtains fixed mapping parameters;
First key assignments and the fixed mapping parameters are carried out default mapping operations by the information input equipment, are obtained described
The mapping value of first key assignments.
3. the method according to claim 1, wherein the information input equipment is according to the information input equipment
Side mapping ruler executes map operation to first key assignments, and the mapping value for obtaining first key assignments includes:
The information input equipment obtains mapping parameters used in this map operation, institute according to default mapping parameters adjustment algorithm
It is different from mapping parameters used in previous map operation to state mapping parameters used in this map operation;
First key assignments and mapping parameters used in this described map operation are carried out default reflect by the information input equipment
Operation is penetrated, the mapping value of first key assignments is obtained.
4. a kind of information transmission system characterized by comprising information input equipment and opposite equip.;
Whether the information input equipment, the key for detecting the information input equipment are triggered;Detect the information
When the key of input equipment is triggered, the first key assignments that the key being triggered generates is obtained;Obtain the information input equipment side
Mapping ruler simultaneously executes map operation to first key assignments according to information input equipment side mapping ruler, obtains described the
The mapping value of one key assignments;And the mapping value of first key assignments is sent to the opposite equip.;
The opposite equip. is also used to receive the mapping value for first key assignments that the information input equipment is sent;Obtain with
The corresponding opposite equip. side mapping ruler of the information input equipment;And using opposite equip. side mapping ruler to described
The mapping value of first key assignments executes mapping restoring operation, obtains first key assignments.
5. system according to claim 4, which is characterized in that
The information input equipment is specifically used for obtaining fixed mapping parameters;And first key assignments and the fixation are mapped
Parameter carries out default mapping operations, obtains the mapping value of first key assignments.
6. system according to claim 4, which is characterized in that
The information input equipment reflects used in this map operation specifically for obtaining according to default mapping parameters adjustment algorithm
Parameter is penetrated, mapping parameters used in this described map operation are different from mapping parameters used in previous map operation;It will be described
Mapping parameters used in first key assignments and this described map operation carry out default mapping operations, obtain reflecting for first key assignments
Penetrate value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810905710.7A CN109117678A (en) | 2018-08-10 | 2018-08-10 | A kind of information transferring method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810905710.7A CN109117678A (en) | 2018-08-10 | 2018-08-10 | A kind of information transferring method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109117678A true CN109117678A (en) | 2019-01-01 |
Family
ID=64851726
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810905710.7A Pending CN109117678A (en) | 2018-08-10 | 2018-08-10 | A kind of information transferring method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109117678A (en) |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1604004A (en) * | 2004-11-04 | 2005-04-06 | 白根弟 | Method for preventing input information stealing by Trojan or virus |
CN1690934A (en) * | 2004-04-30 | 2005-11-02 | 大唐移动通信设备有限公司 | Method for dynamically setting functions of keyboard press keys for mobile communication terminal |
CN101593254A (en) * | 2008-05-26 | 2009-12-02 | 联想(北京)有限公司 | A kind of notebook computer secured inputting method and system |
CN102664887A (en) * | 2012-04-19 | 2012-09-12 | 江汉大学 | Input information protecting method, device and system |
CN102915113A (en) * | 2012-08-24 | 2013-02-06 | 深圳创维-Rgb电子有限公司 | Method and apparatus for supporting data input |
CN104156642A (en) * | 2014-07-22 | 2014-11-19 | 杭州晟元芯片技术有限公司 | Security password input system and method based on security touch screen control chip |
CN104463040A (en) * | 2014-12-18 | 2015-03-25 | 恒宝股份有限公司 | Secure input method and system for password |
CN106027560A (en) * | 2016-07-06 | 2016-10-12 | 连山管控(北京)信息技术有限公司 | Intelligent terminal oriented security transmission method and system |
CN106775282A (en) * | 2016-11-10 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | Operate the method and device of terminal |
CN107229489A (en) * | 2016-12-02 | 2017-10-03 | 天地融科技股份有限公司 | A kind of multi-application smart card and its selective method for application and device |
CN108073835A (en) * | 2018-01-03 | 2018-05-25 | 北京知道创宇信息技术有限公司 | Password mapping method, system and keyboard |
CN108197501A (en) * | 2017-12-28 | 2018-06-22 | 天地融科技股份有限公司 | Information input equipment inputs encryption method, device and the information input equipment of information |
CN108334794A (en) * | 2017-12-28 | 2018-07-27 | 天地融科技股份有限公司 | A kind of information input encryption method and system for information input equipment |
CN108900532A (en) * | 2018-01-05 | 2018-11-27 | 艾科立方(香港)公司 | For the electronic equipment of Message Processing, method and storage medium |
-
2018
- 2018-08-10 CN CN201810905710.7A patent/CN109117678A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1690934A (en) * | 2004-04-30 | 2005-11-02 | 大唐移动通信设备有限公司 | Method for dynamically setting functions of keyboard press keys for mobile communication terminal |
CN1604004A (en) * | 2004-11-04 | 2005-04-06 | 白根弟 | Method for preventing input information stealing by Trojan or virus |
CN101593254A (en) * | 2008-05-26 | 2009-12-02 | 联想(北京)有限公司 | A kind of notebook computer secured inputting method and system |
CN102664887A (en) * | 2012-04-19 | 2012-09-12 | 江汉大学 | Input information protecting method, device and system |
CN102915113A (en) * | 2012-08-24 | 2013-02-06 | 深圳创维-Rgb电子有限公司 | Method and apparatus for supporting data input |
CN104156642A (en) * | 2014-07-22 | 2014-11-19 | 杭州晟元芯片技术有限公司 | Security password input system and method based on security touch screen control chip |
CN104463040A (en) * | 2014-12-18 | 2015-03-25 | 恒宝股份有限公司 | Secure input method and system for password |
CN106027560A (en) * | 2016-07-06 | 2016-10-12 | 连山管控(北京)信息技术有限公司 | Intelligent terminal oriented security transmission method and system |
CN106775282A (en) * | 2016-11-10 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | Operate the method and device of terminal |
CN107229489A (en) * | 2016-12-02 | 2017-10-03 | 天地融科技股份有限公司 | A kind of multi-application smart card and its selective method for application and device |
CN108197501A (en) * | 2017-12-28 | 2018-06-22 | 天地融科技股份有限公司 | Information input equipment inputs encryption method, device and the information input equipment of information |
CN108334794A (en) * | 2017-12-28 | 2018-07-27 | 天地融科技股份有限公司 | A kind of information input encryption method and system for information input equipment |
CN108073835A (en) * | 2018-01-03 | 2018-05-25 | 北京知道创宇信息技术有限公司 | Password mapping method, system and keyboard |
CN108900532A (en) * | 2018-01-05 | 2018-11-27 | 艾科立方(香港)公司 | For the electronic equipment of Message Processing, method and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102936980B (en) | Method and device for controlling electronic lock | |
US8130958B2 (en) | Transmit power control for wireless security | |
CN101901318B (en) | Trusted hardware equipment and using method thereof | |
CN103532719B (en) | Dynamic password generation method, dynamic password generation system, as well as processing method and processing system of transaction request | |
CN105847247A (en) | Authentication system and working method thereof | |
CN104303481B (en) | Method and apparatus for the certification of long-range portable wireless apparatus | |
US20130237190A1 (en) | Method and apparatus for remote portable wireless device authentication | |
CN108833101A (en) | Data transmission method, internet of things equipment and the authentication platform of internet of things equipment | |
CN103516525B (en) | Dynamic password generation method and system | |
WO2016112675A1 (en) | Financial self-service system processing method | |
CN102413467B (en) | A kind of SRVCC switching handling methods, device and its terminal | |
CN107005927A (en) | Cut-in method, equipment and the system of user equipment (UE) | |
CN106027457B (en) | A kind of ID card information transmission method and system | |
CN106156677B (en) | Identity card card reading method and system | |
CN105325021B (en) | Method and apparatus for remote portable wireless device authentication | |
CN109618334A (en) | Control method and relevant device | |
WO2016116890A1 (en) | Method and system for establishing a secure communication tunnel | |
CN106027250A (en) | Identity card information safety transmission method and system | |
CN110972136A (en) | Internet of things safety communication module, terminal, safety control system and authentication method | |
CN111245783A (en) | Isolated environment data transmission device and method based on digital encryption technology | |
JP6408627B2 (en) | Remote device control system and remote device control method | |
CN106027249B (en) | Identity card card reading method and system | |
CN112425116B (en) | Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment | |
CN109117678A (en) | A kind of information transferring method and system | |
CN114786177B (en) | Edge node access processing method, mobile terminal and edge node |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190101 |
|
RJ01 | Rejection of invention patent application after publication |