CN109117678A - A kind of information transferring method and system - Google Patents

A kind of information transferring method and system Download PDF

Info

Publication number
CN109117678A
CN109117678A CN201810905710.7A CN201810905710A CN109117678A CN 109117678 A CN109117678 A CN 109117678A CN 201810905710 A CN201810905710 A CN 201810905710A CN 109117678 A CN109117678 A CN 109117678A
Authority
CN
China
Prior art keywords
mapping
information input
input equipment
key assignments
opposite equip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810905710.7A
Other languages
Chinese (zh)
Inventor
李东声
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tendyron Corp
Tendyron Technology Co Ltd
Original Assignee
Tendyron Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tendyron Technology Co Ltd filed Critical Tendyron Technology Co Ltd
Priority to CN201810905710.7A priority Critical patent/CN109117678A/en
Publication of CN109117678A publication Critical patent/CN109117678A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a kind of information transferring method and system, this method comprises: whether the key of information input equipment detection information input equipment is triggered;When information input equipment detects that the key of information input equipment is triggered, the first key assignments that the key being triggered generates is obtained;Information input equipment obtains information input equipment side mapping ruler;Information input equipment executes map operation to the first key assignments according to information input equipment side mapping ruler, obtains the mapping value of the first key assignments;The mapping value of first key assignments is sent to opposite equip. by information input equipment;Opposite equip. receives the mapping value for the first key assignments that information input equipment road is sent;Opposite equip. obtains opposite equip. corresponding with information input equipment side mapping ruler;Opposite equip. executes mapping restoring operation using mapping value of the opposite equip. side mapping ruler to the first key assignments, obtains the first key assignments.

Description

A kind of information transferring method and system
Technical field
The present invention relates to a kind of electronic technology field more particularly to a kind of information transferring method and systems.
Background technique
In the prior art, when being communicated using keyboard with external equipment, keyboard generate key value information transmission mistake Cheng Zhong is easy the interception by rogue program, and key value information is easy to be intercepted and crack, and leads to the data of keyboard and external equipment There are biggish security risks for interaction.
Summary of the invention
Present invention seek to address that the above problem.
The main purpose of the present invention is to provide a kind of information transferring methods;
Another object of the present invention is to provide a kind of information transmission systems.
In order to achieve the above objectives, technical solution of the present invention is specifically achieved in that
It includes: that information input equipment detects the information input and sets that one aspect of the present invention, which provides a kind of information transferring method, Whether standby key is triggered;When the information input equipment detects that the key of the information input equipment is triggered, obtain The first key assignments that the key being triggered generates;The information input equipment obtains information input equipment side mapping ruler;Institute It states information input equipment and map operation is executed to first key assignments according to information input equipment side mapping ruler, obtain institute State the mapping value of the first key assignments;The mapping value of first key assignments is sent to the opposite equip. by the information input equipment; The opposite equip. receives the mapping value for first key assignments that the information input equipment road is sent;The opposite equip. obtains Opposite equip. corresponding with information input equipment side mapping ruler;The opposite equip. is mapped using the opposite equip. side Rule executes mapping restoring operation to the mapping value of first key assignments, obtains first key assignments.
Wherein, the information input equipment executes first key assignments according to information input equipment side mapping ruler Map operation, the mapping value for obtaining first key assignments includes: that the information input equipment obtains fixed mapping parameters;The letter First key assignments and the fixed mapping parameters are carried out default mapping operations by breath input equipment, obtain first key assignments Mapping value.
Wherein, the information input equipment executes first key assignments according to information input equipment side mapping ruler Map operation, the mapping value for obtaining first key assignments includes: that the information input equipment is calculated according to the adjustment of default mapping parameters Method obtains mapping parameters used in this map operation, mapping parameters used in this described map operation and previous map operation Mapping parameters used are different;The information input equipment is by mapping used in first key assignments and this described map operation Parameter carries out default mapping operations, obtains the mapping value of first key assignments.
Another aspect of the present invention provides a kind of information transmission system, comprising: information input equipment and opposite equip.;The letter Input equipment is ceased, whether the key for detecting the information input equipment is triggered;Detect the information input equipment When key is triggered, the first key assignments that the key being triggered generates is obtained;Obtain information input equipment side mapping ruler simultaneously Map operation is executed to first key assignments according to information input equipment side mapping ruler, obtains reflecting for first key assignments Penetrate value;And the mapping value of first key assignments is sent to the opposite equip.;The opposite equip. is also used to receive described The mapping value for first key assignments that information input equipment is sent;Obtain opposite equip. corresponding with information input equipment side Mapping ruler;And mapping reduction behaviour is executed using mapping value of the opposite equip. side mapping ruler to first key assignments Make, obtains first key assignments.
Wherein, the information input equipment is specifically used for obtaining fixed mapping parameters;And by first key assignments with it is described Fixed mapping parameters carry out default mapping operations, obtain the mapping value of first key assignments.
Wherein, the information input equipment is grasped specifically for obtaining this mapping according to default mapping parameters adjustment algorithm Make mapping parameters used, mapping parameters used in mapping parameters used in this described map operation and previous map operation are not Together;Mapping parameters used in first key assignments and this described map operation are subjected to default mapping operations, obtain described the The mapping value of one key assignments.
As seen from the above technical solution provided by the invention, information input equipment first carries out the key assignments got in advance If the mapping value to the key assignments of mapping operations, after the mapping value is sent to opposite equip., since mapping ruler only has information Input equipment and opposite equip. can obtain, thus compared to key assignments itself is directly transmitted, it, can be with by the mapping value of transmission key assignments It prevents key assignments from being intercepted and captured and being cracked by Malware, improves the transmission security of key assignments.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill in field, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is the flow chart for the information transferring method that the embodiment of the present invention 1 provides;
Fig. 2 is the structural schematic diagram for the information transmission system that the embodiment of the present invention 2 provides.
Specific embodiment
With reference to the attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on this The embodiment of invention, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, belongs to protection scope of the present invention.
In the description of the present invention, it is to be understood that, term " center ", " longitudinal direction ", " transverse direction ", "upper", "lower", The orientation or positional relationship of the instructions such as "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outside" is It is based on the orientation or positional relationship shown in the drawings, is merely for convenience of description of the present invention and simplification of the description, rather than instruction or dark Show that signified device or element must have a particular orientation, be constructed and operated in a specific orientation, therefore should not be understood as pair Limitation of the invention.In addition, term " first ", " second " are used for description purposes only, it is not understood to indicate or imply opposite Importance or quantity or position.
In the description of the present invention, it should be noted that unless otherwise clearly defined and limited, term " installation ", " phase Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can To be mechanical connection, it is also possible to be electrically connected;It can be directly connected, can also can be indirectly connected through an intermediary Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition Concrete meaning in invention.
The embodiment of the present invention is described in further detail below in conjunction with attached drawing.
Embodiment 1
The present embodiment provides a kind of information transferring methods, as shown in Figure 1, including the following steps:
101, whether the key that information input equipment detects the information input equipment is triggered;The information input equipment When detecting that the key of the information input equipment is triggered, the first key assignments that the key being triggered generates is obtained;
In the present embodiment, information input equipment for example can be keyboard;Opposite equip. for example can be the host computers such as computer, Either background server.
In the present embodiment, for example, information input equipment be keyboard when, the key on keyboard is pressed, and keyboard obtains this and presses The first key assignments that key generates.
102, the information input equipment obtains information input equipment side mapping ruler;
The realization that information input equipment described in this step obtains information input equipment side mapping ruler includes but not It is limited to as follows:
(1) it is obtained by presetting mode:
Information input equipment side mapping ruler is preset in information input equipment, alternatively, in information input equipment Preset multiple information input equipment sides mapping ruler, information input equipment is according to preset strategy from multiple information input equipments One is chosen in the mapping ruler of side is used as information input equipment side mapping ruler.
(2) mode obtains through consultation: information input equipment and opposite equip. negotiate mapping ruler, obtain information input Equipment side mapping ruler, meanwhile, opposite equip. can also obtain opposite equip. side mapping ruler.
In the present embodiment, the implementation for negotiating mapping ruler is including but not limited to following several: mode one, information input The mapping ruler itself supported or the carrying of mapping ruler mark are sent to opposite end in negotiating mapping ruler request and set by equipment Standby, opposite equip. determines a mapping ruler conduct from the mapping ruler that information input equipment is supported or mapping ruler mark The mapping ruler that follow-up input equipment and opposite equip. use jointly, opposite equip. by the mapping ruler determined or Mapping ruler mark, which is carried, to be sent in negotiating mapping ruler response to information input equipment;Mode two, information input equipment The mapping mode that opposite equip. is supported is obtained, and therefrom determines that a mapping ruler is set as follow-up input equipment with opposite end The mapping ruler determined or mapping ruler mark are carried and are being assisted by the standby mapping ruler used jointly, information input equipment It is sent in L mappings rule request to opposite equip.;If opposite equip. is determined using the mapping ruler or mapping received Rule mark, then sending to opposite equip. indicates that the negotiation mapping ruler of confirmation responds to information input equipment.
The mapping value obtained after map operation is carried out to initial data using information input equipment side mapping ruler, it can Successfully to carry out mapping reduction by opposite equip. side mapping ruler, to obtain initial data, equally, the opposite equip. is used Side mapping ruler carries out the mapping value obtained after map operation to initial data, can pass through information input equipment side mapping ruler Mapping reduction is carried out, successfully to obtain initial data.
In the present embodiment, negotiating mapping ruler can be initiated by information input equipment, naturally it is also possible to be sent out by opposite equip. It rises.
In the present embodiment, information input equipment side mapping ruler may exist in the safety chip of information input equipment, with Improve the storage security of information input equipment side mapping ruler.
It,, can be with as a kind of optional way of the present embodiment before this step to further increase transmission security Execute following steps: information input equipment and opposite equip. establish the exit passageway that data are transmitted, and the information input equipment obtains Information input equipment side security key is obtained, the opposite equip. obtains opposite equip. side security key;
In the present embodiment, information input equipment side security key can be symmetrical close with opposite equip. side security key Key may be unsymmetrical key.Data using information input equipment side secure key encryption can pass through opposite equip. Side security key is successfully decrypted, and equally, the data using opposite equip. side secure key encryption can pass through information input Equipment side security key can also successfully be decrypted.In the present embodiment, information input equipment and opposite equip. establish data biography After defeated exit passageway, the data transmitted between information input equipment and opposite equip. are all made of after security key is encrypted and pass It is defeated, with the safety of improve data transfer.
For example, the data interacted between information input equipment and opposite equip. are not having during negotiating mapping ruler It can be transmitted in exit passageway after being encrypted after establishing exit passageway with plaintext transmission before establishing exit passageway. For example, being illustrated so that information input equipment initiates to negotiate mapping ruler as an example, the input of information input equipment elder generation use information is set Standby side security key is requested after encrypting mapping ruler is negotiated, then is sent to opposite equip. by exit passageway, and opposite end is set The standby negotiation mapping ruler request ciphertext being docked to using opposite equip. side security key is decrypted.Later, opposite equip. is adopted Negotiation mapping ruler is responded with opposite equip. side security key after encrypting, then information input is sent to by exit passageway Equipment, information input equipment receives and use information input equipment side security key is decrypted to mapping ruler response is negotiated Afterwards, it obtains negotiating mapping ruler response.Information input equipment and opposite equip. are negotiated to map rule by exit passageway in this implementation Then, the safety that mapping ruler transmits in negotiations process can be improved.
As a kind of optional implementation of the present embodiment, the safety chip of information input equipment passes through the exit passageway Negotiate mapping ruler with the opposite equip..
For the safety for further increasing transmission, in the present embodiment, optionally, and before this step, information input equipment Two-way authentication process can also be carried out with opposite equip., or opposite equip. can be carried out with information input equipment single To authentication process or opposite equip. unidirectional authentication process is carried out to information input equipment.The authentication Process for example can be the authentication based on digital certificate.
After above-mentioned two-way authentication process (or unidirectional authentication process) passes through, then execute foundation peace The process of full tunnel, to improve the safety of data interaction between information input equipment and opposite equip..
A kind of optional implementation of the present embodiment establishes data by the safety chip and opposite equip. of information input equipment The exit passageway of transmission, and enter information into equipment side security key and be stored in the safety chip of information input equipment, guarantee The safety of security key storage.
As a kind of optional implementation of the present embodiment, information input equipment supports two kinds of input patterns, and one is general Logical mode uses existing way to carry out data interaction under the general mode before information input equipment and opposite equip., another Kind is encryption mode, and exit passageway can be established under the encryption mode, between information input equipment and opposite equip. and is negotiated Mapping ruler, and data interaction is carried out by exit passageway.
Thus, before this step, data inputting method provided in this embodiment can be the following steps are included: common Under mode, the information input equipment detects whether to receive the first mode switching command that the opposite equip. is sent, and is connecing When receiving the first mode switching command, controls the information input equipment and switch to encryption mode;Alternatively, in general mode Under, information input equipment detects whether the mode switching key on the information input equipment is triggered, and is detecting the letter When mode switching key on breath input equipment is triggered, controls the information input equipment and switch to encryption mode;This step In, the information input equipment and opposite equip. establish the exit passageway that data are transmitted, specifically: it is in an encrypted mode, described Information input equipment and the opposite equip. establish the exit passageway of data transmission.
103, the information input equipment executes first key assignments according to information input equipment side mapping ruler Map operation obtains the mapping value of first key assignments;
In the present embodiment, the implementation that information input equipment executes map operation is including but not limited to following several:
As a kind of optional way of this implementation, information input equipment realizes map operation: institute according to fixed mapping mode It states information input equipment and obtains fixed mapping parameters;The information input equipment joins first key assignments and the fixed mapping Number carries out default mapping operations, obtains the mapping value of first key assignments.
For example, the key assignments of acquisition is K1 when mapping for the first time, fixed mapping parameters are A1, obtain after presetting mapping operations The mapping value arrived is f (K1)=K1 ⊕ A1=K1 ';When second of mapping, the key assignments of acquisition is K2, and fixed mapping parameters are A1, The mapping value obtain after default mapping operations is f (K2)=K2 ⊕ A1=K2 ';When n-th maps, the key assignments of acquisition is Kn, the mapping value obtain after default mapping operations are f (Kn)=Kn ⊕ A1=Kn '.As can be seen that using fixed mapping side When formula carries out default mapping operations, the fixation mapping parameters used every time are all the same.
As another optional way of this implementation, information input equipment can also realize mapping according to transformed mappings mode Operation, i.e., the mapping parameters used every time are all different: the information input equipment is obtained according to default mapping parameters adjustment algorithm Mapping parameters used in this map operation are taken, used in mapping parameters used in this described map operation and previous map operation Mapping parameters it is different;The information input equipment is by mapping parameters used in first key assignments and this described map operation Default mapping operations are carried out, the mapping value of first key assignments is obtained.
For example, default mapping parameters adjustment algorithm can be A2=A1+1, A3=A2+1, An=An-1+1;Or A2=A1+ K1, A3=A2+K2, An=An-1+Kn-1 or A2=K1 ', A3=K2 ', An=Kn '.Wherein, A1 indicates used when first mapping Mapping parameters, A2 indicates mapping parameters used when second mapping, and so on, An indicates used when n-th mapping Mapping parameters.
When first mapping, the key assignments of acquisition is K1, mapping parameters A1, carries out the mapping value obtained after default mapping operations For f (K1)=K1 ⊕ A1=K1 ';When second of mapping, the key assignments of acquisition is K2, mapping parameters A2, carries out default mapping fortune The mapping value obtained after calculation is f (K2)=K2 ⊕ A2=K2 ';When n-th maps, the key assignments of acquisition is Kn, carries out default mapping The mapping value obtained after operation is f (Kn)=Kn ⊕ A2=Kn '.
For another example, it presets mapping parameters adjustment algorithm to realize based on mapping parameters matrix, mapping parameters matrix isWhen first mapping, the key assignments of acquisition is K1, mapping parameters a11, obtain after default mapping operations Mapping value is f (K1)=K1 ⊕ a11;When second of mapping, the key assignments of acquisition is K2, mapping parameters a12, carries out default mapping The mapping value obtained after operation is f (K2)=K2 ⊕ a12;When third time maps, the key assignments of acquisition is K3, mapping parameters a21, The mapping value obtain after default mapping operations is f (K3)=K3 ⊕ a21;When the 4th mapping, the key assignments of acquisition is K4, is reflected Penetrating parameter is a22, and the mapping value obtain after default mapping operations is f (K4)=K4 ⊕ a22;When the 5th mapping, obtain Key assignments be K5, mapping parameters a11, carrying out the mapping value obtained after default mapping operations is f (K5)=K5 ⊕ a11;With this Analogize.
For another example, it presets mapping parameters adjustment algorithm and is based on mapping parameters matrix and transition matrix realization, mapping parameters matrix ForTransition matrix isWhen first mapping, the key assignments of acquisition is K1, mapping parameters a11, is carried out The mapping value obtained after default mapping operations is f (K1)=K1 ⊕ a11;When second of mapping, the key assignments of acquisition is K2, mapping ginseng Number is a11*c1, and the mapping value obtain after default mapping operations is f (K2)=K2 ⊕ (a11*c1);When third time maps, The key assignments of acquisition is K3, mapping parameters a11*c2, and the mapping value obtain after default mapping operations is f (K3)=K3 ⊕ (a11*c2);When the 4th mapping, the key assignments of acquisition is K4, mapping parameters a12*c1, is obtained after carrying out default mapping operations Mapping value be f (K4)=K4 ⊕ (a12*c1);And so on.
104, the mapping value of first key assignments is sent to the opposite equip. by the information input equipment;
In the present embodiment, information input equipment and opposite equip. can be wired connection, such as (information input is set keyboard It is standby) host computer (opposite equip.) is connected to by keyboard connecting line, naturally it is also possible to it is to be wirelessly connected, such as (information is defeated for keyboard Enter equipment) it is connected to host computer (opposite equip.) by wireless communications such as bluetooth, WiFi or mobile networks, or pass through key Disk (information input equipment) is connected to background server (opposite equip.) by wireless communications such as WiFi, mobile networks.
In the present embodiment information input equipment can by wired connection or radio connection reflecting the first key assignments It penetrates value and is sent to opposite equip..
Key assignments itself is directly transmitted compared to the prior art, and information input equipment is by sending the first key assignments in the present embodiment Mapping value, can be improved key assignments transmission safety.
To further increase transmission security, can also use cipher mode transmission map value, one as the present embodiment The optional implementation of kind, this step can also take following implementation:
The information input equipment is using information input equipment side security key to the mapping value of first key assignments It is encrypted, obtains the mapping value ciphertext of first key assignments;The information input equipment will be described by the exit passageway The mapping value ciphertext of first key assignments is sent to the opposite equip..
105, the opposite equip. receives the mapping value for first key assignments that the information input equipment is sent;
Opposite end can receive what information input equipment was sent by wired connection or radio connection in the present embodiment Which kind of mode is the mapping value of first key assignments specifically use, and the reality of the mapping value of the first key assignments is sent depending on information input equipment Existing mode.
To further increase transmission security, as a kind of optional implementation of the present embodiment, this step can be used Following implementation:
The opposite equip. receives first key assignments that the information input equipment is sent by the exit passageway Mapping value ciphertext;The opposite equip. obtains opposite equip. corresponding with information input equipment side security key;It is described right End equipment is decrypted to obtain described using mapping value ciphertext of the opposite equip. side security key to first key assignments The mapping value of one key assignments;
In the present embodiment, opposite equip. also can be by opposite equip. side obtained security key and the information input equipment phase It is corresponding to be stored.Opposite equip. and information input equipment can be one-to-one relationship, and opposite equip., which directly acquires, to be deposited The security key of storage.
Certainly, opposite equip. and information input equipment can be one-to-many relationship, at this point, opposite equip. will be from storage Opposite equip. corresponding with information input equipment side security key is selected in multiple security keys.It can be according to information when selection The marks such as title, the sequence number of input equipment are selected, it is to be understood that the mark of the information input equipment can be at this time It is sent to pair in the data interaction of any secondary information input equipment and opposite equip. before this step by information input equipment End equipment.
106, the opposite equip. obtains opposite equip. corresponding with information input equipment side mapping ruler;It is described right End equipment executes mapping restoring operation using mapping value of the opposite equip. side mapping ruler to first key assignments, obtains institute State the first key assignments.
Opposite equip. side mapping ruler is mapping ruler corresponding with information input side mapping ruler, thus, it adopts Mapping reduction can be carried out to the mapping value of first key assignments with opposite equip. side mapping ruler.
In the present embodiment, opposite equip. reflects the mapping value of first key assignments using opposite equip. side mapping ruler Penetrate reduction, it can be deduced that the first key assignments, this completes the first key assignments from information input equipment safe transmission to opposite equip..It should Opposite equip. side mapping ruler may refer to the associated description of aforementioned information input equipment side mapping ruler, and details are not described herein.
In the present embodiment, information input equipment first carries out the reflecting to the key assignments of default mapping operations to the key assignments got Value is penetrated, and the mapping value is sent to opposite equip., since mapping ruler only has information input equipment and opposite equip. that can obtain , thus compared to directly transmit key assignments itself, by transmit key assignments mapping value, can prevent key assignments by Malware intercept and capture with It cracks, improves the transmission security of key assignments.
Embodiment 2
The present embodiment provides a kind of information transmission systems, as shown in Figure 2, comprising: information input equipment 10 and opposite equip. 20;
Whether the information input equipment 10, the key for detecting the information input equipment 10 are triggered;It detects When the key of the information input equipment 10 is triggered, the first key assignments that the key being triggered generates is obtained;Obtain the information Input equipment side mapping ruler simultaneously executes map operation to first key assignments according to information input equipment side mapping ruler, Obtain the mapping value of first key assignments;And the mapping value of first key assignments is sent to the opposite equip. 20;
The opposite equip. 20 is also used to receive the mapping for first key assignments that the information input equipment 10 is sent Value;Obtain opposite equip. side mapping ruler corresponding with the information input equipment 10;And it is reflected using the opposite equip. side It penetrates rule and mapping restoring operation is executed to the mapping value of first key assignments, obtain first key assignments.
As a kind of optional implementation of the present embodiment, the information input equipment 10 is reflected specifically for obtaining fixation Penetrate parameter;And first key assignments and the fixed mapping parameters are subjected to default mapping operations, obtain first key assignments Mapping value.
As a kind of optional implementation of the present embodiment, the information input equipment 10, specifically for being reflected according to default Penetrate parameter tuning algorithm and obtain mapping parameters used in this map operation, mapping parameters used in this described map operation with Mapping parameters used in previous map operation are different;By mapping parameters used in first key assignments and this described map operation Default mapping operations are carried out, the mapping value of first key assignments is obtained.
In the present embodiment, information input equipment first carries out the reflecting to the key assignments of default mapping operations to the key assignments got Value is penetrated, and the mapping value is sent to opposite equip., it, can by transmitting the mapping value of key assignments compared to key assignments itself is directly transmitted To prevent key assignments from being intercepted and captured and being cracked by Malware, the transmission security of key assignments is improved.
In the present embodiment, being discussed in detail referring also to above-described embodiment 1 in relation to mapping parameters and default mapping operations In associated description, details are not described herein.
The correlation function of information input equipment and opposite equip. is realized referring also in above-described embodiment 1 in the present embodiment Associated description, details are not described herein.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussed suitable Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be of the invention Embodiment person of ordinary skill in the field understood.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, each functional unit in each embodiment of the present invention can integrate in a processing module It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any One or more embodiment or examples in can be combined in any suitable manner.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example Property, it is not considered as limiting the invention, those skilled in the art are not departing from the principle of the present invention and objective In the case where can make changes, modifications, alterations, and variations to the above described embodiments within the scope of the invention.The scope of the present invention By appended claims and its equivalent limit.

Claims (6)

1. a kind of information transferring method characterized by comprising
Whether the key that information input equipment detects the information input equipment is triggered;
When the information input equipment detects that the key of the information input equipment is triggered, obtains the key being triggered and generate The first key assignments;
The information input equipment obtains information input equipment side mapping ruler;
The information input equipment executes map operation to first key assignments according to information input equipment side mapping ruler, Obtain the mapping value of first key assignments;
The mapping value of first key assignments is sent to the opposite equip. by the information input equipment;
The opposite equip. receives the mapping value for first key assignments that the information input equipment road is sent;
The opposite equip. obtains opposite equip. corresponding with information input equipment side mapping ruler;
The opposite equip. executes mapping reduction using mapping value of the opposite equip. side mapping ruler to first key assignments Operation, obtains first key assignments.
2. the method according to claim 1, wherein the information input equipment is according to the information input equipment Side mapping ruler executes map operation to first key assignments, and the mapping value for obtaining first key assignments includes:
The information input equipment obtains fixed mapping parameters;
First key assignments and the fixed mapping parameters are carried out default mapping operations by the information input equipment, are obtained described The mapping value of first key assignments.
3. the method according to claim 1, wherein the information input equipment is according to the information input equipment Side mapping ruler executes map operation to first key assignments, and the mapping value for obtaining first key assignments includes:
The information input equipment obtains mapping parameters used in this map operation, institute according to default mapping parameters adjustment algorithm It is different from mapping parameters used in previous map operation to state mapping parameters used in this map operation;
First key assignments and mapping parameters used in this described map operation are carried out default reflect by the information input equipment Operation is penetrated, the mapping value of first key assignments is obtained.
4. a kind of information transmission system characterized by comprising information input equipment and opposite equip.;
Whether the information input equipment, the key for detecting the information input equipment are triggered;Detect the information When the key of input equipment is triggered, the first key assignments that the key being triggered generates is obtained;Obtain the information input equipment side Mapping ruler simultaneously executes map operation to first key assignments according to information input equipment side mapping ruler, obtains described the The mapping value of one key assignments;And the mapping value of first key assignments is sent to the opposite equip.;
The opposite equip. is also used to receive the mapping value for first key assignments that the information input equipment is sent;Obtain with The corresponding opposite equip. side mapping ruler of the information input equipment;And using opposite equip. side mapping ruler to described The mapping value of first key assignments executes mapping restoring operation, obtains first key assignments.
5. system according to claim 4, which is characterized in that
The information input equipment is specifically used for obtaining fixed mapping parameters;And first key assignments and the fixation are mapped Parameter carries out default mapping operations, obtains the mapping value of first key assignments.
6. system according to claim 4, which is characterized in that
The information input equipment reflects used in this map operation specifically for obtaining according to default mapping parameters adjustment algorithm Parameter is penetrated, mapping parameters used in this described map operation are different from mapping parameters used in previous map operation;It will be described Mapping parameters used in first key assignments and this described map operation carry out default mapping operations, obtain reflecting for first key assignments Penetrate value.
CN201810905710.7A 2018-08-10 2018-08-10 A kind of information transferring method and system Pending CN109117678A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810905710.7A CN109117678A (en) 2018-08-10 2018-08-10 A kind of information transferring method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810905710.7A CN109117678A (en) 2018-08-10 2018-08-10 A kind of information transferring method and system

Publications (1)

Publication Number Publication Date
CN109117678A true CN109117678A (en) 2019-01-01

Family

ID=64851726

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810905710.7A Pending CN109117678A (en) 2018-08-10 2018-08-10 A kind of information transferring method and system

Country Status (1)

Country Link
CN (1) CN109117678A (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604004A (en) * 2004-11-04 2005-04-06 白根弟 Method for preventing input information stealing by Trojan or virus
CN1690934A (en) * 2004-04-30 2005-11-02 大唐移动通信设备有限公司 Method for dynamically setting functions of keyboard press keys for mobile communication terminal
CN101593254A (en) * 2008-05-26 2009-12-02 联想(北京)有限公司 A kind of notebook computer secured inputting method and system
CN102664887A (en) * 2012-04-19 2012-09-12 江汉大学 Input information protecting method, device and system
CN102915113A (en) * 2012-08-24 2013-02-06 深圳创维-Rgb电子有限公司 Method and apparatus for supporting data input
CN104156642A (en) * 2014-07-22 2014-11-19 杭州晟元芯片技术有限公司 Security password input system and method based on security touch screen control chip
CN104463040A (en) * 2014-12-18 2015-03-25 恒宝股份有限公司 Secure input method and system for password
CN106027560A (en) * 2016-07-06 2016-10-12 连山管控(北京)信息技术有限公司 Intelligent terminal oriented security transmission method and system
CN106775282A (en) * 2016-11-10 2017-05-31 宇龙计算机通信科技(深圳)有限公司 Operate the method and device of terminal
CN107229489A (en) * 2016-12-02 2017-10-03 天地融科技股份有限公司 A kind of multi-application smart card and its selective method for application and device
CN108073835A (en) * 2018-01-03 2018-05-25 北京知道创宇信息技术有限公司 Password mapping method, system and keyboard
CN108197501A (en) * 2017-12-28 2018-06-22 天地融科技股份有限公司 Information input equipment inputs encryption method, device and the information input equipment of information
CN108334794A (en) * 2017-12-28 2018-07-27 天地融科技股份有限公司 A kind of information input encryption method and system for information input equipment
CN108900532A (en) * 2018-01-05 2018-11-27 艾科立方(香港)公司 For the electronic equipment of Message Processing, method and storage medium

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1690934A (en) * 2004-04-30 2005-11-02 大唐移动通信设备有限公司 Method for dynamically setting functions of keyboard press keys for mobile communication terminal
CN1604004A (en) * 2004-11-04 2005-04-06 白根弟 Method for preventing input information stealing by Trojan or virus
CN101593254A (en) * 2008-05-26 2009-12-02 联想(北京)有限公司 A kind of notebook computer secured inputting method and system
CN102664887A (en) * 2012-04-19 2012-09-12 江汉大学 Input information protecting method, device and system
CN102915113A (en) * 2012-08-24 2013-02-06 深圳创维-Rgb电子有限公司 Method and apparatus for supporting data input
CN104156642A (en) * 2014-07-22 2014-11-19 杭州晟元芯片技术有限公司 Security password input system and method based on security touch screen control chip
CN104463040A (en) * 2014-12-18 2015-03-25 恒宝股份有限公司 Secure input method and system for password
CN106027560A (en) * 2016-07-06 2016-10-12 连山管控(北京)信息技术有限公司 Intelligent terminal oriented security transmission method and system
CN106775282A (en) * 2016-11-10 2017-05-31 宇龙计算机通信科技(深圳)有限公司 Operate the method and device of terminal
CN107229489A (en) * 2016-12-02 2017-10-03 天地融科技股份有限公司 A kind of multi-application smart card and its selective method for application and device
CN108197501A (en) * 2017-12-28 2018-06-22 天地融科技股份有限公司 Information input equipment inputs encryption method, device and the information input equipment of information
CN108334794A (en) * 2017-12-28 2018-07-27 天地融科技股份有限公司 A kind of information input encryption method and system for information input equipment
CN108073835A (en) * 2018-01-03 2018-05-25 北京知道创宇信息技术有限公司 Password mapping method, system and keyboard
CN108900532A (en) * 2018-01-05 2018-11-27 艾科立方(香港)公司 For the electronic equipment of Message Processing, method and storage medium

Similar Documents

Publication Publication Date Title
CN102936980B (en) Method and device for controlling electronic lock
US8130958B2 (en) Transmit power control for wireless security
CN101901318B (en) Trusted hardware equipment and using method thereof
CN103532719B (en) Dynamic password generation method, dynamic password generation system, as well as processing method and processing system of transaction request
CN105847247A (en) Authentication system and working method thereof
CN104303481B (en) Method and apparatus for the certification of long-range portable wireless apparatus
US20130237190A1 (en) Method and apparatus for remote portable wireless device authentication
CN108833101A (en) Data transmission method, internet of things equipment and the authentication platform of internet of things equipment
CN103516525B (en) Dynamic password generation method and system
WO2016112675A1 (en) Financial self-service system processing method
CN102413467B (en) A kind of SRVCC switching handling methods, device and its terminal
CN107005927A (en) Cut-in method, equipment and the system of user equipment (UE)
CN106027457B (en) A kind of ID card information transmission method and system
CN106156677B (en) Identity card card reading method and system
CN105325021B (en) Method and apparatus for remote portable wireless device authentication
CN109618334A (en) Control method and relevant device
WO2016116890A1 (en) Method and system for establishing a secure communication tunnel
CN106027250A (en) Identity card information safety transmission method and system
CN110972136A (en) Internet of things safety communication module, terminal, safety control system and authentication method
CN111245783A (en) Isolated environment data transmission device and method based on digital encryption technology
JP6408627B2 (en) Remote device control system and remote device control method
CN106027249B (en) Identity card card reading method and system
CN112425116B (en) Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment
CN109117678A (en) A kind of information transferring method and system
CN114786177B (en) Edge node access processing method, mobile terminal and edge node

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190101

RJ01 Rejection of invention patent application after publication