CN1604004A - Method for preventing input information stealing by Trojan or virus - Google Patents

Method for preventing input information stealing by Trojan or virus Download PDF

Info

Publication number
CN1604004A
CN1604004A CN 200410052134 CN200410052134A CN1604004A CN 1604004 A CN1604004 A CN 1604004A CN 200410052134 CN200410052134 CN 200410052134 CN 200410052134 A CN200410052134 A CN 200410052134A CN 1604004 A CN1604004 A CN 1604004A
Authority
CN
China
Prior art keywords
input
virus
data set
information
wooden horse
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200410052134
Other languages
Chinese (zh)
Other versions
CN100390698C (en
Inventor
白根弟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNB2004100521344A priority Critical patent/CN100390698C/en
Publication of CN1604004A publication Critical patent/CN1604004A/en
Application granted granted Critical
Publication of CN100390698C publication Critical patent/CN100390698C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

This invention discloses a method to prevent input information stealing by wood horse or virus and is used in local or network environment information input , which comprised the following steps: first to suppose all needed unit of key information as data collection S1 and all information unit of input device M as other data collection S2; second to define the one to one or one to more mapping from S1 to S2 and to define mapping encrypt safety arithmetic as F(S1,S2); third to suppose input key information unit as x#-[1], x#-[2]......x#-[n] is an element of a set S1, wherein, the responding mappings are y#-[1], y#-[2].....y#-[n] inputted from the said device M; fourth to decode y#-[1], y#-[2].....y#-[n] in reliable device environment and restore them into x#-[1], x#-[2]..... x#-[n] to get definite information.

Description

Prevent wooden horse or the viral method of stealing input information
Technical field the present invention relates to the secured inputting method of computing machine in the electric numerical data processing procedure or server key message, particularly relates to a kind of wooden horse and virus and various rogue programs of preventing and steals the method for input information.Be mainly used in the input safety of authentication information on the computer network.
The background technology mankind enter into 21 century, and the internet has been deep into each corner of society, and information security also just becomes important social concern.Current, existing very proven technique method aspect information stores, transmission and use, as if information security issue has obtained solution.But, data message has four kinds of diverse states: input, transmission, storage and use, because the existence of wooden horse, computer virus and various rogue programs, they not only steal the file of storage and transmit with use in data, the more important thing is that they can steal the information of importing.Since the file of storage or transmit to use in data the safety technique guarantee of comparative maturity is all arranged, and the data that are in input state also do not have ripe safety technique guarantee at present.Therefore, numerous lawless persons adopt the method that makes an initiative sally, and emit various rogue programs such as a large amount of wooden horses or virus, import this link from information and steal key message, account number during as authentication and password.
Prior art prevent to input password stolen aspect, existing many people have carried out a large amount of research, but also do not have mature and stable method, mainly are some programs of writing out according to the characteristic of operating system, mainly can be divided into following two classes technically:
1. prevent reading of data from the password input frame: the wooden horse or the virus that are intended to from the password input frame to obtain data such as password are cannot succeed;
2. import the method for depositing in addition again after encrypting: its main thought is that least unit information of every input is deposited other place with regard to encrypting, and random information is provided out, makes wooden horse or virus can only obtain random data or enciphered data.
First kind technology can only be taken precautions against general wooden horse or virus, to can be from any internal memory the wooden horse or the virus of reading of data just powerless because password not only is present in the password input frame, it also will must also can be existed in the internal memory by routine processes; The second class technology goes a step further, and can prevent sense data from internal memory, but concerning the wooden horse or virus of kernel level, also has certain methods can obtain data.For example, it can note the data (as keyboard operation each time) of all least unit of your input, analyzes then and obtains correct data.
Modern safety theory points out, any dependence secret algorithm is underground, to rely on operation highest weight limit or information deposited in technology such as indiscoverable place all be unsafe, and it just may be safe having the technology that relies on password encryption only.This shows, not be well solved in the safety problem aspect the information input at present that information input safety has become one of the weakest link of information security, also is unique important information safety problem that does not solve in theory from cryptography.
The summary of the invention the technical problem to be solved in the present invention is to avoid above-mentioned the deficiencies in the prior art part and proposes a kind of wooden horse or virus of preventing and steal the method for input information.Adopt this method can make rogue programs such as wooden horse or virus can't steal input information safely and effectively.
The present invention solve the technical problem can be by realizing by the following technical solutions:
Propose a kind of wooden horse or virus of preventing and steal the method for input information, be used for the key message input of stand-alone or network environment, may further comprise the steps:
A. all unit informations of the input needs of account number cipher are data set S1 to suppose for example to import by key message, and all unit informations that input equipment M can import are formed another data set S2;
B. define one from S1 to S2 one to one or the mapping of one-to-many, the mapping encrypting security algorithm be F (S1, S2);
C. the key message that will import of hypothesis for example the unit information of account number cipher be x 1, x 2... ..x n∈ S1, and x 1, x 2... ..x nCorrespondence mappings is y in collection S2 1, y 2... ..y n, then from described input equipment M, import y 1, y 2... ..y n
D. reliable facility environment for example in computing machine or the server with y 1, y 2... ..y nDeciphering is reduced into x 1, x 2... ..x n, obtain clear and definite information and authenticate.
Comprise the steps: also between described step B and the step C that display reminding is through the data set S1 of all required unit informations of the key message input of mapping encrypting on display device.
Compare with prior art, the present invention prevents that wooden horse or the viral technique effect of stealing the method for input information are:
1. local any input information all exists with ciphertext, (comprises internal memory) from this locality Anywhere and all can't obtain the plaintext of input information;
2. local all information that will maintain secrecy all are ciphertext at any time, and whenever tackling in this locality is not expressly;
3. the safety of ciphertext only relies on Crypted password wherein, and its algorithm can adopt all kinds of public encryption algorithms with this specific character;
4. be applicable to all information input external units.
Description of drawings
Fig. 1 is that the present invention prevents wooden horse or the viral functional-block diagram of stealing the method for input information;
Fig. 2 is the concrete block flow diagram of implementing of described method;
Fig. 3 is the dummy keyboard synoptic diagram in the described method;
Fig. 4 is the block flow diagram that described method realizes in stand-alone environment;
Fig. 5 is the block flow diagram that described method realizes in network environment.
Embodiment is described in further detail below in conjunction with the most preferred embodiment shown in each accompanying drawing.
A kind of wooden horse or virus of preventing is stolen the method for input information, and the authentication that is used for stand-alone or network environment may further comprise the steps as shown in Figure 1:
A. all unit informations of the input needs of account number cipher are data set S1 to suppose for example to import by key message, and all unit informations that input equipment M can import are formed another data set S2;
B. define one from S1 to S2 one to one or the mapping of one-to-many, the mapping encrypting security algorithm be F (S1, S2);
C. the key message that will import of hypothesis for example the unit information of account number cipher be x 1, x 2... ..x n∈ S 1, and x 1, x 2... ..x nCorrespondence mappings is y in collection S2 1, y 2... ..y n, then from described input equipment M, import y 1, y 2... ..y n
D. reliable facility environment for example in computing machine or the server with y 1, y 2... ..y nDeciphering is reduced into x 1, x 2... ..x n, obtain clear and definite information and authenticate.
Comprise the steps: also between described step B and the step C that display reminding is through the data set S1 of all required unit informations of the key message input of mapping encrypting, so that the corresponding input of user is used for the key message of authentication on display device.
Must possess two conditions in the above-mentioned steps: the one, the facility environment of deciphering reduction is reliable; The 2nd, (S1 S2) has security to security algorithm F.(S1 S2) can adopt existing various security algorithm to this security algorithm F.
Among the present invention, and described security algorithm F (S1, S2) the data set S1 in and data set S2 can be provided by same equipment, for example form by the key assignments on the keyboard; Also can be provided by different equipment, for example collecting S1 is that key assignments all on the keyboard is formed, and the element among the collection S2 is made up of the coordinate of mouse input.
When described data set S1 and data set S2 are provided by same equipment, when for example forming, further comprising the steps of among the described step B by the key assignments on the keyboard:
A. on display, show a dummy keyboard;
B. by security algorithm F (S1, S2) after the processing, show on the described dummy keyboard with actual keyboard on different key assignments, but the key assignments on the dummy keyboard is corresponding one by one with key assignments on the actual keyboard, for example, corresponding to the position of actual keyboard key assignments " A ", that show on the dummy keyboard is key assignments " Y ".
Because dummy keyboard directly shows and may manifest security algorithm F (S1, S2), the demonstration of dummy keyboard adopts decorative pattern background or flicker to show among the described step a, or in different position display, or moves and show, or different size shows.Can further increase the security of input information like this.
When described data set S1 is provided by different equipment with data set S2, for example collecting S1 is that key assignments all on the keyboard is formed, and the element of collection among the S2 is when being imported by mouse, in order to reach key assignments with the mouse input keyboard, must define a kind of concern F (S1, S2) because the key of mouse is very little, data set S2 can not use the mouse key assignments, and the mouse input also has a value: coordinate figure.Collection or its subclass formed with the coordinate figure of mouse are S2, define a F (S1 S2) just can be imported by the mouse substituting for key, thereby further comprising the steps of among the described step B:
1. use on the display more than the mapping of the adjacent coordinates composition that can demonstrate key assignments to same key assignments;
2. the corresponding key assignments that shows its mapping on each group coordinate forms the mapping of an one-to-many.
Because directly the display keyboard key assignments may manifest F (S1, S2), the demonstration of described key assignments adopts decorative pattern background or flicker to show on mouse coordinates.The security of input information is further strengthened.
Now in conjunction with Fig. 2 concrete enforcement of the present invention is elaborated, concrete steps are as follows:
1. behind the system initialization, produce a random number X by the program of setting;
2. establish the collection of data set S1,46 of total identity elements for forming by key assignments in the keyboard (only in a few days often importing the letter of usefulness, the key assignments of numbers and symbols);
3. calculate X square, 3 powers of X, 4 powers of X ... .. to 46 powers of X, are formed the collection S{X that has 46 identity elements, X together with random number X 2, X 3, X 4..., X 46, each element among the collection S is asked mould to 47, each mould value of gained is formed a new collection S2{B 1, B 2, B 3, B 4..., B 46, the element among the collection S2 that draws in this algorithm generally just is 1 to 46 and number inequality entirely, if any identical, then produces a random number again, takes identical algorithm, the element in collection S2 be 1 to 46 and inequality till;
4. give 46 key assignments numberings of keyboard, become a collection S1{C 1, C 2, C 3, C 4..., C 46, this has just had a man-to-man mapping from S1 to S2, be security algorithm F (S1, S2);
5. on display, show a dummy keyboard, show on the dummy keyboard with actual keyboard on different key assignments, concrete grammar is: as C 1Be the numbering of actual keyboard key assignments " A ", and B 1Value be 26, and C 26Be the numbering of actual keyboard key assignments " Y ", then at the position display dummy keyboard key assignments " Y " of the former actual keyboard key assignments " A " of dummy keyboard, each key assignments of dummy keyboard is all pressed this method and is shown, the dummy keyboard that obtains, as shown in Figure 3;
6. if the key message of input is " Y ", available two kinds of methods are imported, and a kind of is with the virtual key assignments (its corresponding actual keyboard is key assignments " A ") that shows " Y " on the click dummy keyboard, perhaps directly knocks key assignments " A " on actual keyboard; Certainly, the password of authentication is generally the combination of a plurality of numerals, letter and symbol, and input is during password, imports one by one by preceding method to get final product;
7. by collection S2 and collection S1, for example " A " deciphering can be reduced into " Y " in the computing machine at reliable facility environment.
Described random number X is to produce at random, thus the numbering of each element correspondence actual keyboard among the described data set S1 with conversion at any time, promptly the corresponding virtual keyboard is with random variation, Fig. 3 only illustrates a kind of situation wherein.As described in above-mentioned step 6, suppose the key message that will input for example password be " Y ", after the inventive method processing, in the actual keyboard input is that key assignments " A " (changes as the random number X that produces, can be any be not other key assignments of key assignments " Y " on actual keyboard), make like this wooden horse or other rogue programs the interception or steal be exactly the vacation information " A ", in like manner, when the password of authentication is generally a plurality of numerals, during the combination of letter and symbol, according to the inventive method input password, what wooden horse or other rogue programs were tackled or stolen all is false information, so just from truly having solved the safety problem of information input aspect.
(S1 S2) has only enumerated a kind of comparatively simple algorithm to above-mentioned security algorithm F, and it can take the security algorithm of differing complexity as required, and the generation (choosing) of these and random number X all belongs to prior art, repeats no more herein.
The present invention prevents that wooden horse or the viral method of stealing input information from can realize, also can realize in network environment in stand-alone environment.
As shown in Figure 4, to prevent that wooden horse or virus from stealing the concrete steps that the method for input information can realize in stand-alone environment as follows in the present invention:
I. the unit information that key message input is needed is formed a collection S1, and establishing collection S1 has n element, i.e. C{C in altogether 1, C 2, C 3... .., C n;
II. program produces a random number A, can get CPU work at present periodicity and current time and carry out computing such as addition subtraction multiplication and division and produce this random number, and obtain Amod (n+1)=x;
III. different Elements C x in different position display collection S1 note the relation of Cx and display position, form table T;
If IV. the element among the collection S1 does not have demonstration fully, then repeat from Step II;
V. if input unit information C1 with the position of click demonstration C1, notes this position y 1
Position sequence Y (y has just been arranged after VI. the information that will import is all imported 1, y 2, y 3...);
VII. with table T position sequence Y is deciphered in this machine and be reduced into key message string (C 1, C 2, C 3...).
Realize under stand-alone environment, must require to have in this machine a reliable environment, promptly for wooden horse or virus environment non-indigenous, only deciphering just can reach the purpose that safety is imported in this environment.
As shown in Figure 5, to prevent that wooden horse or virus from stealing the concrete steps that the method for input information can realize in network environment as follows in the present invention:
1. user side sends request signal to server end, and server end produces a random number A, and produces a big prime number N, and promptly N is much larger than the unit information sum of wanting input information;
2.S1 can get the collection of all unit informations in the authentication database at server end, also can get the collection of the key assignments of keyboard at user side, establish collection S1 total m element, i.e. S1{a 1, a 2, a 3..., a m;
Security algorithm F (S1, S2) adopt following algorithm:
1. B=rounds (N ÷ A),
2. B is carried out 1 power, 2 powers, 3 powers ..., the m power is formed collection C{c with m result of calculation 1, c 2, c 3..., c m,
3. the element among the collection C is carried out mould N, its result forms collection D{d 1, d 2, d 3..., d m,
4. the element of collection among the D carried out from small to large ordering, be preface E (e 1, e 2, e 3..., e m);
4. carry out following processing by the subscript of collection D from 1 to m: establish d the D xIn E e y, a among the display set S1 according to the order of sequence then yPrompting, and note display position;
5., then send display reminding to user side in the mode of chart if step 3,4 is carried out in service end; If step 3,4 is carried out at user side, then send random number A and big prime number N to user side from server end;
6. user side: if input information X, available click shows the place of X, but also the keypad prompting mode from the corresponding input of keyboard; Subscript x among the corresponding collection D of record X position;
7. sequence X (the x after the information encryption has just been arranged after the information that will import is all imported 1, x 2, x 3... x m);
8. user side sends sequence X to server end, and service end is pressed F, and (S1 S2) with sequence X deciphering reduction, and authenticates.
Key of the present invention is to utilize one to one or many-to-one mapping encrypting, make key message that the user imports for example account number cipher all be to exist whenever and wherever possible with the ciphertext form, thereby prevent that effectively rogue program such as wooden horse from stealing.The auxiliary routine of security algorithm wherein, display reminding and reduction deciphering all can adopt prior art.

Claims (8)

1. one kind prevents wooden horse or the viral method of stealing input information, is used for the key message input of stand-alone or network environment, it is characterized in that: may further comprise the steps:
A. suppose that all unit informations that the key message input needs are data set S1, and all unit informations that input equipment M can import are formed another data set S2;
B. define one from S1 to S2 one to one or the mapping of one-to-many, the mapping encrypting security algorithm be F (S1, S2);
C. the unit information of the key message that will import of hypothesis is x 1, x 2... ..x n∈ S1, and x 1, x 2... ..x nCorrespondence mappings is y in collection S2 1, y 2... ..y n, then from described input equipment M, import y 1, y 2... ..y n
D. in reliable facility environment with y 1, y 2... ..y nDeciphering is reduced into x 1, x 2... ..x n, obtain clear and definite information.
2. wooden horse or the virus of preventing as claimed in claim 1 is stolen the method for input information, it is characterized in that: also comprise the steps: display reminding on display device between described step B and the step C, prompting is through the data set S1 of all required unit informations of the key message input of mapping encrypting.
3. wooden horse or the virus of preventing as claimed in claim 1 or 2 is stolen the method for input information, and it is characterized in that: (S1 S2) can adopt existing various security algorithm to the security algorithm F among the described step B.
4. wooden horse or the virus of preventing as claimed in claim 3 is stolen the method for input information, it is characterized in that: and described security algorithm F (S1, S2) the data set S1 in and data set S2 can be provided by same equipment; Also can provide by different equipment.
5. wooden horse or the virus of preventing as claimed in claim 4 is stolen the method for input information, it is characterized in that: when described data set S1 and data set S2 are provided by same equipment, further comprising the steps of among the described step B:
A. on display, show a virtual unit;
B. by security algorithm F (S1, S2) handle after, show on the described virtual unit with physical device on different key assignments, but the key assignments on the virtual unit is corresponding one by one with key assignments on the physical device.
6. wooden horse or the virus of preventing as claimed in claim 5 is stolen the method for input information, it is characterized in that: the demonstration of virtual unit adopts decorative pattern background or flicker to show among the described step a, or in different position display, or mobile the demonstration, or different size shows.
7. wooden horse or the virus of preventing as claimed in claim 4 is stolen the method for input information, it is characterized in that: when described data set S1 is provided by different equipment with data set S2, further comprising the steps of among the described step B:
1. on display, use more than the mapping of the adjacent coordinates composition that can demonstrate key assignments to same key assignments;
2. the corresponding key assignments that shows its mapping on each group coordinate forms a many-to-one mapping.
8. wooden horse or the virus of preventing as claimed in claim 6 is stolen the method for input information, it is characterized in that: the demonstration of described key assignments adopts decorative pattern background or flicker to show.
CNB2004100521344A 2004-11-04 2004-11-04 Method for preventing input information stealing by Trojan or virus Active CN100390698C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100521344A CN100390698C (en) 2004-11-04 2004-11-04 Method for preventing input information stealing by Trojan or virus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100521344A CN100390698C (en) 2004-11-04 2004-11-04 Method for preventing input information stealing by Trojan or virus

Publications (2)

Publication Number Publication Date
CN1604004A true CN1604004A (en) 2005-04-06
CN100390698C CN100390698C (en) 2008-05-28

Family

ID=34666070

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100521344A Active CN100390698C (en) 2004-11-04 2004-11-04 Method for preventing input information stealing by Trojan or virus

Country Status (1)

Country Link
CN (1) CN100390698C (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109117678A (en) * 2018-08-10 2019-01-01 天地融科技股份有限公司 A kind of information transferring method and system
CN109344608A (en) * 2018-08-10 2019-02-15 天地融科技股份有限公司 A kind of information transferring method and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5892903A (en) * 1996-09-12 1999-04-06 Internet Security Systems, Inc. Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system
US6393568B1 (en) * 1997-10-23 2002-05-21 Entrust Technologies Limited Encryption and decryption system and method with content analysis provision
US6429793B1 (en) * 1998-12-03 2002-08-06 International Business Machines Corporation Abstraction of input mapping for keyboards
JP4086660B2 (en) * 2001-01-22 2008-05-14 株式会社進化システム総合研究所 Arithmetic compression encryption device and arithmetic compression encryption / decryption device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109117678A (en) * 2018-08-10 2019-01-01 天地融科技股份有限公司 A kind of information transferring method and system
CN109344608A (en) * 2018-08-10 2019-02-15 天地融科技股份有限公司 A kind of information transferring method and system
CN109344608B (en) * 2018-08-10 2021-09-21 天地融科技股份有限公司 Information transmission method and system

Also Published As

Publication number Publication date
CN100390698C (en) 2008-05-28

Similar Documents

Publication Publication Date Title
Namasudra et al. Securing multimedia by using DNA-based encryption in the cloud computing environment
CN110324143B (en) Data transmission method, electronic device and storage medium
Namasudra et al. Towards DNA based data security in the cloud computing environment
CN1281608A (en) Cryptographic key generation using biometric data
CN1144418C (en) Method and device for authenticating first instance and second instance
CN101075874A (en) Certifying method and system
CN103780393B (en) Virtual-desktop security certification system and method facing multiple security levels
CN101064602A (en) Cipher inputting method and system
CN1991799A (en) Safety memory device and data management method
CN106850229B (en) SM2 digital signature generation method and system based on product secret division
CN1220128C (en) Intelligent secret keyboard with key values being changed randomly
CN112732297B (en) Method and device for updating federal learning model, electronic equipment and storage medium
CN105512523B (en) The digital watermark embedding and extracting method of a kind of anonymization
CN1193538C (en) Electronic cipher formation and checking method
CN103346887A (en) Low-complexity identity authentication method based on intelligent card and under multiserver environment
CN1551559A (en) Method and device for organising public key based on user_defined identification code cryptographic system
CN104951712A (en) Data safety protection method in Xen virtualization environment
CN1991800A (en) Fingerprint identification storage device and fingerprint identification method
CN1806217A (en) Method and apparatus for authenticating a password
CN1894882A (en) Authentication system
CN107104793A (en) A kind of digital signature generation method and system
CN115374150A (en) Character string data query method and device, electronic equipment and storage medium
CN114499859A (en) Password verification method, device, equipment and storage medium
CN106603236A (en) Method and device for generating signature
CN1820449A (en) Method for encoded data transmission via a communication network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Assignee: Shenzhen Pacific Gateway Network Technology Co., Ltd.

Assignor: Bai Gendi

Contract fulfillment period: 2009.3.26 to 2010.3.26 contract change

Contract record no.: 2009440000375

Denomination of invention: Method for preventing input information stealing by Trojan or virus

Granted publication date: 20080528

License type: General permission

Record date: 2009.5.19

LIC Patent licence contract for exploitation submitted for record

Free format text: COMMON LICENSE; TIME LIMIT OF IMPLEMENTING CONTACT: 2009.3.26 TO 2010.3.26; CHANGE OF CONTRACT

Name of requester: SHENZHEN CITY PACIFIC DOOR WEB TECHNOLOGY CO., LTD

Effective date: 20090519