SECURE INPUT METHOD BASED ON VIRTUAL MACHINE
First Claim
1. A secure input method based on a virtual machine, comprising:
- Step A;
an application invokes a secure input interface of a virtual machine monitor and transfers a logic address and length of input buffer area of the application;
Step B;
the virtual machine monitor accepts the secure input invoking, turns on a secure input switch and converts the logic address of the input buffer area into a physical address;
Step C;
the virtual machine monitor receives keyboard input information, converts it into a key value and saves the converted key value in the input buffer area; and
Step D;
the virtual machine monitor judges that the secure input is completed, returns an input result to the application and turns off the secure input switch.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides a secure input method based on a virtual machine, in which an application invokes directly a secure input interface provided by a virtual machine monitor and transfers the address and length of input buffer area of the application as input parameters when it requires a secure input, and the virtual machine monitor receives keyboard input information, converts it into a key value and saves the converted key value directly into the input buffer area for the application. This prevents another application from using different filtering drivers and keyboard hooks to acquire the user input and thus enhances the security for a user input.
36 Citations
18 Claims
-
1. A secure input method based on a virtual machine, comprising:
-
Step A;
an application invokes a secure input interface of a virtual machine monitor and transfers a logic address and length of input buffer area of the application;Step B;
the virtual machine monitor accepts the secure input invoking, turns on a secure input switch and converts the logic address of the input buffer area into a physical address;Step C;
the virtual machine monitor receives keyboard input information, converts it into a key value and saves the converted key value in the input buffer area; andStep D;
the virtual machine monitor judges that the secure input is completed, returns an input result to the application and turns off the secure input switch. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification