That’s the entry screen to my encryption program i developed some time ago. Every time you start it, it displays a new screen with thousands of random numbers. In order to get in you need to enter a code based on what you see on the screen, but you have to know exactly what to look for. This is a good example of a keylogger safe procedure. It doesn’t matter if some spy program registers your keystrokes. The same keystrokes will probably never be used again.
If you could study the source code of the program, maybe you could unveil the secret of the whole procedure. But to make the challenge a bit more interesting, the source code of the program has been encrypted by the program itself.