WO2006043759A1 - Procede permettant d'empecher le piratage de clavier, a l'aide d'une souris - Google Patents
Procede permettant d'empecher le piratage de clavier, a l'aide d'une souris Download PDFInfo
- Publication number
- WO2006043759A1 WO2006043759A1 PCT/KR2005/003435 KR2005003435W WO2006043759A1 WO 2006043759 A1 WO2006043759 A1 WO 2006043759A1 KR 2005003435 W KR2005003435 W KR 2005003435W WO 2006043759 A1 WO2006043759 A1 WO 2006043759A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mouse
- input window
- window
- web server
- website
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 20
- 230000006978 adaptation Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Definitions
- the present invention relates to a method for preventing keyboard hacking by using a mouse. More particularly, it is possible to input data, such as a user's information and password, into the website security window by using a mouse to protect against keyboard hacking.
- the Internet is extensively applied to e-mail communication, chatting, games, entertainment, Internet banking, electronic commerce, and financial business by the personal, industrial, and government sectors.
- it is required to login a password and personal data to verify the user's identity, such as a certificate, security number, credit card number, or resident number.
- the personal data is transmitted through an open Internet network, and it is easily hacked by a hacker and used to commit a fraud.
- a method for preventing keyboard hacking is provided by using a mouse.
- An objective of the present invention is to provide a method comprising the steps of: (a) connecting to a desired website on a PC (100) among various websites, which are served by web server (200) through the Internet (150) , (b) accessing a main web page and login window (400) , which are desired by the user, through an output unit (140) of the PC (100) from the web server (200) , (c) judging whether a mouse cursor is positioned on either an ID input window (410) or a password input window
- the method further comprises: judging whether the ID and password received from the previous displaying and receiving steps are the same as the stored information in the storage unit, and accessing the corresponding web page when the ID and password received from the previous steps are the same as the stored information.
- the objective of the present invention is to provide a fixed window type for the security input window served from the website (200) .
- Another objective of the present invention is to provide a randomly movable window type for the security input window served from the website (200) .
- Another objective of the present invention is to provide a popup window type for the security input window served from the website (200) .
- Fig. 1 is a system block diagram for preventing keyboard hacking by using a mouse according to an implementing example of the present invention.
- Fig. 2 is a flow chart for preventing keyboard hacking by- using a mouse according to an implementing example of the present invention.
- Pig. 3 is a login window provided on a typical website according to an implementing example of the present invention.
- Fig. 4 is a fixed type of a security input window served from the website according to an implementing example of the present invention.
- Fig. 5 is a randomly movable type of a security input window served from the website according to an implementing example of the present invention.
- Fig. ⁇ a and 6b are a pop-up type of a security input window served from the website according to an implementing example of the present invention.
- Fig. 7 is a security input window for logging into the website according to an implementing example of the present invention.
- a method for preventing keyboard hacking is comprising the steps of: (a) connecting to a desired website on a PC (100) among various websites, which are served by web server (200) through the Internet (150) , (b) accessing a main web page and login window (400) , which are desired by the user, through an output unit (140) of the PC (100) from the web server (200) , (c) judging whether a mouse cursor is positioned on either an ID input window (410) or a password input window (420) , which are included in the login window (400) on the web page that is selected from the web server (200) by using the mouse (112) , (d) displaying a security input window on the PC (100) through the output unit (140) according to the result of the previous judging step, when the mouse cursor is positioned on either the ID input window (410) or the password input window (420) , (e) receiving a key value from the web server (200) when the security input window is displayed by clicking the mouse on the
- a system for preventing keyboard hacking by using a mouse is composed of a mouse (112) , computer (100) , internet (150) , web server (200) and a keyboard, which is conventionally used to log in to the website by typing the user's password and personal information, such as a name, address, or telephone number.
- the computer (100) is connected to the web server (240) through the Internet (150) .
- the computer (100) comprises an interface (110) for exchanging information with the web server (200) through the Internet (150) , a mouse and a keyboard for entering a password and personal information to the corresponding website, a mouse driver (114) for processing data input from the mouse, an input unit (120) for inputting various information, such as the password and personal information, through the mouse, a storing unit (130) for storing the software and computer operating data, an output unit (140) , such as a display monitor, for displaying the security input window, and a control unit (145) for controlling all units of the computer.
- an interface (110) for exchanging information with the web server (200) through the Internet (150)
- a mouse and a keyboard for entering a password and personal information to the corresponding website
- a mouse driver (114) for processing data input from the mouse
- an input unit (120) for inputting various information, such as the password and personal information, through the mouse
- a storing unit (130) for storing the software and computer operating data
- a desktop or a notebook is a suitable computer (100) , provided that it is equipped with the communicating capability, the Internet browser for displaying the contents of a website, with the Windows 98 or newer, a Pentium CPU, and 64mb memory or more.
- the driver is for driving the mouse.
- the mouse driver can include a printing driver, keyboard driver and disc drive.
- Internet (150) access could be either through a cable connecting system using TCP/IP protocol or through a cable-less system using WAP protocol.
- a mouse which is freely movable in the x-, y-direction on the mouse pad, is a device to arbitrarily locate the mouse cursor on the web page. Therefore, the amount of movement of the mouse cursor is also proportional to the corresponding movement of the mouse on the mouse pad in the X-, y-direction.
- the web server (200) comprises an interface (210) for exchanging information with the computer (100) through the Internet (150) , an input unit (220) for inputting the updated various information corresponding to the website, a storing unit (230) for storing the operating data, personal information such as the user's name, address telephone number, etc., and a control unit (250) for controlling all units of the computer.
- Fig. 2 shows a flow chart for preventing keyboard hacking by using a mouse.
- Fig. 3 shows a login window provided on a typical website.
- Fig. 4 shows a fixed type of a security input window served from the website.
- Fig. 5 shows a randomly movable type of a security input window served from the website.
- Fig. 6a and 6b show a pop-up type of a security input window served from the website.
- Fig. 7 shows a security input window for logging into the website.
- the first step is the user connecting to a desired website on a PC (100) among the various websites, which are served by the web server (200) through the Internet (150) (S310) .
- the membership login window of the website served by the web server (200) is displayed on the PC screen (100) . Then, the user can join the membership by typing the name, personal data, ID and password.
- a login window (400) with a main web page as shown in Fig. 3 is accessed and displayed on the user's PC screen (100) through an output unit (140) (S320) .
- the web server software determines whether a mouse cursor is positioned on either an ID input window (410) or a password input window (420) , which are included in the login window (400) on the web page that is selected from the web server (200) by using the mouse (112) (S330) .
- a mouse cursor is freely and arbitrarily moving on the web page according to the movements of the mouse in the x-, y-direction on the mouse pad. Even if the mouse driver is hacked, the hacker can only gain information about the movements of the mouse cursor in the X-, y-direction on the web page, and cannot learn what information the user is clicking on within the security input window. Therefore, it is impossible to hack the input data, such as a password or personal information.
- a security input window provided from the web server (200) is randomly moved to prevent hacking (S360) .
- An example is shown that the security input window is randomly moved from position (1) to position (2) and from position (2) to position
- the corresponding web page is accessed if the ID and password received from the previous steps (S370) are the same as the stored information (S380) . If the received ID and password from the previous steps (S370) are not valid, return to the judging step (S330) .
- a fixed window type is explained for the security input window served from the website (200) in the step S340.
- the randomly movable window type is also possible for the security input window served from the website (200) in the step S360.
- a popup window type is presented for the security input window served from the website (200) to effectively prevent hacking.
- the security input window displayed on the user's PC screen (100) could be not only numbers, as shown in Figs. 4 to 6, but also letters and numbers, as shown in Fig. 7.
- the personal information, ID and password are effectively input by using the security input window that includes letters and numbers.
- the method for preventing keyboard hacking by using a mouse of the present invention has advantages effectively applying not only to web servers, but also any internet programs, for example, Telnet, File Transfer
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Mathematical Physics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020040083378A KR100495830B1 (ko) | 2004-10-19 | 2004-10-19 | 마우스를 이용한 키보드 해킹 방지방법 |
KR10-2004-0083378 | 2004-10-19 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006043759A1 true WO2006043759A1 (fr) | 2006-04-27 |
Family
ID=36203159
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2005/003435 WO2006043759A1 (fr) | 2004-10-19 | 2005-10-14 | Procede permettant d'empecher le piratage de clavier, a l'aide d'une souris |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR100495830B1 (fr) |
WO (1) | WO2006043759A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2172865A1 (fr) * | 2008-09-29 | 2010-04-07 | Gemplus | Procédé de sécurisation de la saisie d'un secret au travers d'un clavier virtuel |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100867671B1 (ko) * | 2007-03-20 | 2008-11-10 | 씨씨알 주식회사 | 마우스의 문자입력을 이용한 키보드 해킹 방지시스템 |
KR20100030306A (ko) * | 2008-09-10 | 2010-03-18 | 소프트캠프(주) | 입력정보 보안방법 |
KR101600792B1 (ko) * | 2008-12-29 | 2016-03-09 | 엘지전자 주식회사 | 해킹 방지기능을 구비하는 휴대 단말기 및 그 동작방법 |
KR101488162B1 (ko) | 2013-12-24 | 2015-02-03 | 이니텍(주) | 입력 키패드 표시 방법 |
KR101647485B1 (ko) * | 2014-12-24 | 2016-08-10 | 소프트캠프(주) | 네트워크 기반의 키보드 입력데이터 보안시스템과 보안방법 |
KR101952014B1 (ko) * | 2017-05-25 | 2019-02-25 | 순천향대학교 산학협력단 | 마우스 데이터를 보호하기 위한 보안 시스템 및 방법 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20010109864A (ko) * | 2000-06-03 | 2001-12-12 | 신언철 | 가상마우스방법을 이용한 정보입력 방법 |
KR20020048313A (ko) * | 2002-03-07 | 2002-06-22 | 최동성 | 키보드 해킹 방지 방법 |
KR20030021584A (ko) * | 2001-09-06 | 2003-03-15 | 양용철 | 인터넷 로그인의 가상 키보드 장치 및 입력방법. |
KR20040066237A (ko) * | 2003-01-17 | 2004-07-27 | 주식회사 안철수연구소 | 키 입력 도용 방지 방법 |
-
2004
- 2004-10-19 KR KR1020040083378A patent/KR100495830B1/ko not_active Expired - Fee Related
-
2005
- 2005-10-14 WO PCT/KR2005/003435 patent/WO2006043759A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20010109864A (ko) * | 2000-06-03 | 2001-12-12 | 신언철 | 가상마우스방법을 이용한 정보입력 방법 |
KR20030021584A (ko) * | 2001-09-06 | 2003-03-15 | 양용철 | 인터넷 로그인의 가상 키보드 장치 및 입력방법. |
KR20020048313A (ko) * | 2002-03-07 | 2002-06-22 | 최동성 | 키보드 해킹 방지 방법 |
KR20040066237A (ko) * | 2003-01-17 | 2004-07-27 | 주식회사 안철수연구소 | 키 입력 도용 방지 방법 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2172865A1 (fr) * | 2008-09-29 | 2010-04-07 | Gemplus | Procédé de sécurisation de la saisie d'un secret au travers d'un clavier virtuel |
WO2010034535A3 (fr) * | 2008-09-29 | 2010-09-16 | Gemalto Sa | Procédé de sécurisation de la saisie d'un secret au travers d'un clavier virtuel |
Also Published As
Publication number | Publication date |
---|---|
KR100495830B1 (ko) | 2005-06-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8650080B2 (en) | User-browser interaction-based fraud detection system | |
US8966065B2 (en) | Method and apparatus for managing an interactive network session | |
US10044730B1 (en) | Methods, systems, and articles of manufacture for implementing adaptive levels of assurance in a financial management system | |
US20150205957A1 (en) | Method, device, and system of differentiating between a legitimate user and a cyber-attacker | |
US7930411B1 (en) | Network-based verification and fraud-prevention system | |
US7650310B2 (en) | Technique for reducing phishing | |
US9177162B2 (en) | Method and device for secured entry of personal data | |
US20080229411A1 (en) | Chaining information card selectors | |
US8646040B2 (en) | Method and system for securing access to an unsecure network utilizing a transparent identification member | |
US20060136595A1 (en) | Network-based verification and fraud-prevention system | |
US20070240230A1 (en) | User-browser interaction analysis authentication system | |
EP2199940A2 (fr) | Procédés et systèmes pour la détection d'attaques de l'homme dans le navigateur web | |
US20080115198A1 (en) | Multi-factor authentication transfer | |
US20020143637A1 (en) | Shopping cart portability for computing | |
WO2004055632A2 (fr) | Procede, systeme, et programme d'ordinateur de securisation au sein d'un reseau informatique global | |
CN106022172A (zh) | 一种保护密码键盘按键输入操作的密码输入方法及系统 | |
US9208489B2 (en) | System for secure web-prompt processing on point sale devices | |
JP2008071097A (ja) | 認証装置、認証システム、プログラム、及び記録媒体 | |
US20040006709A1 (en) | Apparatus and method for securely inputting and transmitting private data associated with a user to a server | |
EP1542135B1 (fr) | Procede permettant de centraliser l'administration des informations enregistrees des utilisateurs de reseaux | |
WO2006043759A1 (fr) | Procede permettant d'empecher le piratage de clavier, a l'aide d'une souris | |
US20230066295A1 (en) | Configuring an association between objects based on an identification of a style associated with the objects | |
US20240220550A1 (en) | System and method for controlling access to secure data records in a web browsing session | |
US20220051294A1 (en) | Systems and methods for identifying internet users in real-time with high certainty | |
JP2004102525A (ja) | 口座取引システムおよび口座取引通知方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 05804551 Country of ref document: EP Kind code of ref document: A1 |