摘要 |
The device, the system and the method of encrypting and authenticating against Trojan horse includes the following steps, the user information including the password, the sum of the transaction, and the number of the account is inputted using the keyboard (102). The user information is encrypted by the key (A), and is sent to the server (4) through the user device (2) and the network (3). The server decrypts the received information with the key (B). Because the key (A) used each time has no relations with other key (A), the information is safe even if it is obtained by the hacker in the process of being transmitted. At the same time, the information is inputted through the keyboard (102) of the device of the encrypting and authenticating (1). The hacker can not obtain the information inputted through the keyboard (102) of the device of the encrypting and authenticating (1) even if the Trojan horse invades into the user's computer. |