CA2465270A1 - Secure communication with a keyboard or related device - Google Patents
Secure communication with a keyboard or related device Download PDFInfo
- Publication number
- CA2465270A1 CA2465270A1 CA002465270A CA2465270A CA2465270A1 CA 2465270 A1 CA2465270 A1 CA 2465270A1 CA 002465270 A CA002465270 A CA 002465270A CA 2465270 A CA2465270 A CA 2465270A CA 2465270 A1 CA2465270 A1 CA 2465270A1
- Authority
- CA
- Canada
- Prior art keywords
- keyboard
- initial value
- nonce
- component
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61P—SPECIFIC THERAPEUTIC ACTIVITY OF CHEMICAL COMPOUNDS OR MEDICINAL PREPARATIONS
- A61P31/00—Antiinfectives, i.e. antibiotics, antiseptics, chemotherapeutics
- A61P31/04—Antibacterial agents
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/04—Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
- G08B21/0407—Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons based on behaviour analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72457—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2201/00—Electronic components, circuits, software, systems or apparatus used in telephone systems
- H04M2201/34—Microprocessors
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2201/00—Electronic components, circuits, software, systems or apparatus used in telephone systems
- H04M2201/36—Memories
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/10—Details of telephonic subscriber devices including a GPS signal receiver
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/12—Details of telephonic subscriber devices including a sensor for measuring a physical value, e.g. temperature or motion
Abstract
Secure communication between a keyboard and a component, such as a piece of software running on a computer. A first initial value is known to both the keyboard and the component.
The keyboard and the component exchange nonces. The keyboard and the component each compute a second initial value and a third initial value based on the nonces and the first initial value. Both the keyboard and the component perform the same computation, so that the keyboard and the component each have the same second and third initial values. The keyboard encrypts keystrokes destined for the component using CBC-3DES based on the key and the second initial value, and also creates a message authentication code for each keystroke using based on the key and the third initial value. The component decrypts and verifies the keystrokes using the key and the second and third initial values.
The keyboard and the component exchange nonces. The keyboard and the component each compute a second initial value and a third initial value based on the nonces and the first initial value. Both the keyboard and the component perform the same computation, so that the keyboard and the component each have the same second and third initial values. The keyboard encrypts keystrokes destined for the component using CBC-3DES based on the key and the second initial value, and also creates a message authentication code for each keystroke using based on the key and the third initial value. The component decrypts and verifies the keystrokes using the key and the second and third initial values.
Claims (30)
1. A method of communicating with a keyboard comprising:
receiving, at a component from a keyboard, a plurality of data that have been encrypted with triple-DES and cipher block chaining using a key and a first initial value, said key and said first initial value being known both to the component and to the keyboard;
decrypting the plurality of data based on said first initial value and said key.
receiving, at a component from a keyboard, a plurality of data that have been encrypted with triple-DES and cipher block chaining using a key and a first initial value, said key and said first initial value being known both to the component and to the keyboard;
decrypting the plurality of data based on said first initial value and said key.
2. The method of claim 1, further comprising:
receiving at the component from the keyboard, a plurality of message authentication codes corresponding to the plurality of data, said message authentication codes having been created with triple-DES and cipher block chaining using said key and a second initial value different from said first initial value, said second initial value being known both to the component and to the keyboard;
verifying the plurality of data by using the plurality of message authentication codes.
receiving at the component from the keyboard, a plurality of message authentication codes corresponding to the plurality of data, said message authentication codes having been created with triple-DES and cipher block chaining using said key and a second initial value different from said first initial value, said second initial value being known both to the component and to the keyboard;
verifying the plurality of data by using the plurality of message authentication codes.
3. The method of claim 2, further comprising:
receiving a first nonce from the keyboard;
sending a second nonce to the keyboard; and creating the first initial value and the second initial value by applying triple-DES
and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a third initial value that is known both to the keyboard and to the component.
receiving a first nonce from the keyboard;
sending a second nonce to the keyboard; and creating the first initial value and the second initial value by applying triple-DES
and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a third initial value that is known both to the keyboard and to the component.
4. The method of claim 2, further comprising:
receiving a first nonce from the keyboard;
sending a second nonce to the keyboard;
creating the first initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a third initial value that is known both to the keyboard and to the component; and creating the second initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a fourth initial value that is known both to the keyboard and to the component.
receiving a first nonce from the keyboard;
sending a second nonce to the keyboard;
creating the first initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a third initial value that is known both to the keyboard and to the component; and creating the second initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a fourth initial value that is known both to the keyboard and to the component.
5. The method of claim 1, wherein the plurality of data are received through a channel whose behavioral integrity is not trusted by the component.
6. The method of claim 5, wherein the component comprises a first operating system which executes on a computing device along with a second operating system, the first operating system distrusting, in at least some respect, the behavior of the second operating system, the keyboard communicating with the first operating system through a driver controlled by the second operating system.
7. The method of claim 1, wherein the keyboard comprises a USB keyboard.
8. The method of claim 7, wherein said triple-DES and cipher block chaining encrypt data in blocks having a predetermined size, and wherein the keyboard communicates data in blocks of said predetermined size.
9. The method of claim 1, wherein each of the plurality of data is generated based on an individual keystroke received at the keyboard.
10. The method of claim 1, further comprising:
receiving a first nonce from the keyboard;
sending a second nonce to the keyboard; and creating the first initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a second initial value that is known both to the keyboard and to the component.
receiving a first nonce from the keyboard;
sending a second nonce to the keyboard; and creating the first initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a second initial value that is known both to the keyboard and to the component.
11. A computer-readable medium encoded with computer-executable instructions to perform a method of securely receiving input at a component from a keyboard, the method comprising:
receiving, at the component from the keyboard, a plurality of encrypted keystrokes, the encrypted.keystrokes having been created at the keyboard by encrypting input keystrokes received at the keyboard with triple-DES and cipher block chaining using a key and a first initial value, the key and the first initial value being available both to the keyboard and to the component; and at the component, decrypting the plurality of encrypted keystrokes using the key and the first initial value.
receiving, at the component from the keyboard, a plurality of encrypted keystrokes, the encrypted.keystrokes having been created at the keyboard by encrypting input keystrokes received at the keyboard with triple-DES and cipher block chaining using a key and a first initial value, the key and the first initial value being available both to the keyboard and to the component; and at the component, decrypting the plurality of encrypted keystrokes using the key and the first initial value.
12. The computer-readable medium of claim 11, wherein the component comprises a first operating system which executes on a computing device along with a second operating system, the first operating system distrusting, in at least some respect, the behavior of the second operating system, the keyboard communicating with the first operating system through a driver controlled by the second operating system.
13. The computer-readable medium of claim 11, wherein the method further comprises:
receiving at the component from the keyboard, a plurality of message authentication codes corresponding to the plurality of encrypted keystrokes, said message authentication codes having been created with triple-DES and cipher block chaining using said key and a second initial value different from said first initial value, said second initial value being known both to the component and to the keyboard;
verifying the plurality of encrypted keystrokes by using the plurality of message authentication codes.
receiving at the component from the keyboard, a plurality of message authentication codes corresponding to the plurality of encrypted keystrokes, said message authentication codes having been created with triple-DES and cipher block chaining using said key and a second initial value different from said first initial value, said second initial value being known both to the component and to the keyboard;
verifying the plurality of encrypted keystrokes by using the plurality of message authentication codes.
14. The computer-readable medium of claim 13, wherein the method further comprises:
receiving a first nonce from the keyboard;
sending a second nonce to the keyboard; and creating the first initial value and the second initial value by applying triple-DES
and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a third initial value that is known both to the keyboard and to the component.
receiving a first nonce from the keyboard;
sending a second nonce to the keyboard; and creating the first initial value and the second initial value by applying triple-DES
and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a third initial value that is known both to the keyboard and to the component.
15. The computer-readable medium of claim 13, wherein the method further comprises:
receiving a first nonce from the keyboard;
sending a second nonce to the keyboard;
creating the first initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a third initial value that is known both to the keyboard and to the component; and creating the second initial value applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a fourth initial value that is known both to the keyboard and to the component.
receiving a first nonce from the keyboard;
sending a second nonce to the keyboard;
creating the first initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a third initial value that is known both to the keyboard and to the component; and creating the second initial value applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a fourth initial value that is known both to the keyboard and to the component.
16. The computer-readable medium of claim 11, wherein said triple-DES and cipher block chaining encrypt data in blocks having a predetermined size, and wherein the keyboard communicates data in blocks of said predetermined size.
17. A keyboard comprising:
one or more storage locations that store a first initial value and a key;
an encryption component that encrypts input data received at the keyboard with triple-DES and cipher block chaining using said key and said first initial value, whereby encrypted data is created based on said input data; and a communication interface that communicates said encrypted data to a device external to the keyboard, said encrypted data being destined for a recipient that knows said first initial value and said key.
one or more storage locations that store a first initial value and a key;
an encryption component that encrypts input data received at the keyboard with triple-DES and cipher block chaining using said key and said first initial value, whereby encrypted data is created based on said input data; and a communication interface that communicates said encrypted data to a device external to the keyboard, said encrypted data being destined for a recipient that knows said first initial value and said key.
18. The keyboard of claim 17, wherein the encryption component further creates a plurality of message authentication codes corresponding to the encrypted data or the input data, said message authentication codes having been created with triple-DES and cipher block chaining using said key and a second initial value different from said first initial value.
19. The keyboard of claim 17, wherein the keyboard comprises a USB keyboard.
20. The keyboard of claim 17, wherein the communication interface communicates said encrypted data to a driver that is controlled by a first operating system that executes on said device whereupon said encrypted data is communicated to said recipient, said recipient being a second operating system that executes on said device or a program that executes under said second operating system, said second operating system distrusting, in at least some respect, the behavior of the first operating system.
21. The keyboard of claim 17, wherein said encryption component is adapted to:
receive a first nonce from the recipient through the communication interface;
send a second nonce to the recipient through the communication interface; and create the first initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a second initial value that is known both to the keyboard and to the component.
receive a first nonce from the recipient through the communication interface;
send a second nonce to the recipient through the communication interface; and create the first initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a second initial value that is known both to the keyboard and to the component.
22. The keyboard of claim 17, wherein the input data received at the keyboard comprises a plurality of individual keystrokes, and wherein the encryption component separately encrypts each of the individual keystrokes.
23. A computer-readable medium encoded with computer-executable instructions to perform a method of enabling a keyboard to engage in secure communication with a component external to the keyboard, the method comprising:
receiving a plurality of input keystrokes;
encrypting each of the input keystrokes with triple-DES and cipher block chaining using a key and a first initial value, the key and the first initial value being known to both the keyboard and the component, whereby a plurality of encrypted keystrokes; and transmitting the encrypted keystrokes to the component.
receiving a plurality of input keystrokes;
encrypting each of the input keystrokes with triple-DES and cipher block chaining using a key and a first initial value, the key and the first initial value being known to both the keyboard and the component, whereby a plurality of encrypted keystrokes; and transmitting the encrypted keystrokes to the component.
24. The computer-readable medium of claim 23, wherein said triple-DES and cipher block chaining encrypt data in blocks having a predetermined size, and wherein the keyboard communicates data in blocks of said predetermined size.
25. The computer-readable medium of claim 23, wherein the method further comprises:
creating a plurality of message authentication codes with triple-DES and cipher block chaining using said key and a second initial value different from said first initial value, the plurality of message authentication codes corresponding to the plurality of keystrokes; and transmitting the message authentication codes to the component.
creating a plurality of message authentication codes with triple-DES and cipher block chaining using said key and a second initial value different from said first initial value, the plurality of message authentication codes corresponding to the plurality of keystrokes; and transmitting the message authentication codes to the component.
26. The computer-readable medium of claim 23, wherein the method further comprises:
sending a first nonce to the component;
sending a second nonce to the component; and creating the first initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a second initial value that is known both to the keyboard and to the component.
sending a first nonce to the component;
sending a second nonce to the component; and creating the first initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a second initial value that is known both to the keyboard and to the component.
27. A method of enabling data to be inputted securely to a software component comprising:
distributing a copy of the software component, the software component comprising:
a key;
an first initial value; and computer-executable instructions that enable the software to:
send a first nonce to a keyboard;
receive a second nonce from the keyboard;
create a second initial value based on said first nonce, said second nonce, and said first initial value; and decrypt encrypted data received from the keyboard using the key and the second initial value; and distributing; or enabling the distribution of, the keyboard, the keyboard comprising:
hardware to store or access a copy of the key;
hardware to store or access a copy of the first initial value;
hardware or software that enables the keyboard to:
receive the first nonce from the software component;
send the second nonce to the software component; and create the second initial value based on said first nonce, said second nonce, and said first initial value; and create the encrypted data by encrypting input data received at the keyboard using the key and the second initial value.
distributing a copy of the software component, the software component comprising:
a key;
an first initial value; and computer-executable instructions that enable the software to:
send a first nonce to a keyboard;
receive a second nonce from the keyboard;
create a second initial value based on said first nonce, said second nonce, and said first initial value; and decrypt encrypted data received from the keyboard using the key and the second initial value; and distributing; or enabling the distribution of, the keyboard, the keyboard comprising:
hardware to store or access a copy of the key;
hardware to store or access a copy of the first initial value;
hardware or software that enables the keyboard to:
receive the first nonce from the software component;
send the second nonce to the software component; and create the second initial value based on said first nonce, said second nonce, and said first initial value; and create the encrypted data by encrypting input data received at the keyboard using the key and the second initial value.
28. The method of claim 27, wherein said keyboard further comprises hardware or software that enables the keyboard to:
create a third initial value based on said first nonce, said second nonce, and said first initial value, said third initial value being different from said second initial value;
and create a message authentication code using the key and the third initial value;
the software component further comprises computer-executable instructions to:
create said third initial value based on said first nonce, said second nonce, and said first initial value; and verify the message authenticate code using the key and the third initial value.
create a third initial value based on said first nonce, said second nonce, and said first initial value, said third initial value being different from said second initial value;
and create a message authentication code using the key and the third initial value;
the software component further comprises computer-executable instructions to:
create said third initial value based on said first nonce, said second nonce, and said first initial value; and verify the message authenticate code using the key and the third initial value.
29. The method of claim 27, wherein the encrypted data is created by applying triple-DES with cipher block chaining to the input data using the key and the second initial value.
30. The method of claim 27, wherein the keyboard is adapted to encrypt each keystroke individually.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/428,675 US7243237B2 (en) | 2003-05-02 | 2003-05-02 | Secure communication with a keyboard or related device |
US10/428,675 | 2003-05-02 |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2465270A1 true CA2465270A1 (en) | 2004-11-02 |
CA2465270C CA2465270C (en) | 2011-06-14 |
Family
ID=32990487
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2465270A Expired - Fee Related CA2465270C (en) | 2003-05-02 | 2004-04-27 | Secure communication with a keyboard or related device |
Country Status (18)
Country | Link |
---|---|
US (1) | US7243237B2 (en) |
EP (1) | EP1473615B1 (en) |
JP (1) | JP4459703B2 (en) |
KR (1) | KR100996737B1 (en) |
CN (1) | CN1599311B (en) |
AT (1) | ATE504885T1 (en) |
AU (1) | AU2004201802B2 (en) |
BR (1) | BRPI0401684B1 (en) |
CA (1) | CA2465270C (en) |
DE (1) | DE602004032085D1 (en) |
ES (1) | ES2361074T3 (en) |
HK (1) | HK1069463A1 (en) |
MX (1) | MXPA04004144A (en) |
MY (1) | MY137940A (en) |
PL (1) | PL1473615T3 (en) |
RU (1) | RU2371756C2 (en) |
TW (1) | TWI319536B (en) |
ZA (1) | ZA200403290B (en) |
Families Citing this family (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005140823A (en) | 2003-11-04 | 2005-06-02 | Sony Corp | Information processor, control method, program, and recording medium |
US7581097B2 (en) * | 2003-12-23 | 2009-08-25 | Lenovo Pte Ltd | Apparatus, system, and method for secure communications from a human interface device |
KR100710032B1 (en) * | 2005-02-23 | 2007-04-25 | 제이알소프트 주식회사 | Method and system that can secure keyboard key stroke using secure input filter driver and keyboard secure input BHO of Internet Explorer in windows operating system |
DE102005014194B4 (en) | 2005-03-29 | 2006-12-14 | Axel Ahnert | Reader with integrated cryptography unit |
SG128507A1 (en) * | 2005-06-25 | 2007-01-30 | Krypt Technologies | Encryption system for confidential data transmission |
WO2007006072A1 (en) * | 2005-07-14 | 2007-01-18 | Teewoon Tan | System and method for controllably concealing data from spying applications |
KR100734145B1 (en) * | 2005-10-12 | 2007-07-03 | 주식회사 안철수연구소 | Method of protecting hacking of a key input by using authorization of keyboard data |
WO2007061147A1 (en) * | 2005-11-24 | 2007-05-31 | Softcamp Co., Ltd. | Guarding method for input data by usb keyboard and guarding system |
US7835521B1 (en) * | 2005-12-02 | 2010-11-16 | Google Inc. | Secure keyboard |
CA2571450A1 (en) * | 2005-12-21 | 2007-06-21 | Nervo Security | Encrypted keyboard |
US8566608B2 (en) * | 2006-02-02 | 2013-10-22 | Strikeforce Technologies, Inc. | Methods and apparatus for securing keystrokes from being intercepted between the keyboard and a browser |
US7428306B2 (en) * | 2006-04-18 | 2008-09-23 | International Business Machines Corporation | Encryption apparatus and method for providing an encrypted file system |
KR100861104B1 (en) * | 2006-10-16 | 2008-09-30 | 킹스정보통신(주) | Apparatus and method for preservation of usb keyboard |
KR100846123B1 (en) * | 2006-10-24 | 2008-07-15 | 주식회사 하우리 | Method for keyboard security and storage medium recording keyboard security driver using the method |
KR100838488B1 (en) * | 2007-01-24 | 2008-06-16 | 현대중공업 주식회사 | The method and apparatus for protecting identification data using one-time and altered identification data generation mechanism, need not to install the program for preventing keystroke hacking on user computer |
DE102007004631A1 (en) * | 2007-01-30 | 2008-07-31 | Cherry Gmbh | Method for secure data transmission between input device connected to network computer and network receiver, involves receiving of data of reading or input element of input device to encrypting device of input device |
US8615662B2 (en) * | 2007-01-31 | 2013-12-24 | Microsoft Corporation | Password authentication via a one-time keyboard map |
US20080263672A1 (en) * | 2007-04-18 | 2008-10-23 | Hewlett-Packard Development Company L.P. | Protecting sensitive data intended for a remote application |
KR100909891B1 (en) * | 2007-10-02 | 2009-07-31 | 소프트캠프(주) | Encode processing method of the Keyboard input data for security in kernel |
TWI395112B (en) * | 2007-11-30 | 2013-05-01 | Chi Pei Wang | Keylogger resistant keyboard adapter |
GB2469594B (en) * | 2008-01-22 | 2012-08-29 | Hewlett Packard Development Co | Shared secret used between keyboard and application |
US8214888B2 (en) * | 2008-01-30 | 2012-07-03 | Vasco Data Security, Inc. | Two-factor USB authentication token |
US9596250B2 (en) * | 2009-04-22 | 2017-03-14 | Trusted Knight Corporation | System and method for protecting against point of sale malware using memory scraping |
JP2010039913A (en) * | 2008-08-07 | 2010-02-18 | Sony Corp | Communication device, communication method and program |
DE102008042180B4 (en) * | 2008-09-17 | 2010-09-23 | Zf Friedrichshafen Ag | Method and system for secure transmission of data |
US20110208974A1 (en) * | 2010-02-25 | 2011-08-25 | Alcatel-Lucent Usa Inc. | Countermeasure Against Keystroke Logger Devices |
US8566934B2 (en) | 2011-01-21 | 2013-10-22 | Gigavation, Inc. | Apparatus and method for enhancing security of data on a host computing device and a peripheral device |
WO2012123859A1 (en) * | 2011-03-16 | 2012-09-20 | Garay Peter A | Transaction security method and device |
US8954747B2 (en) * | 2011-07-01 | 2015-02-10 | Intel Corporation | Protecting keystrokes received from a keyboard in a platform containing embedded controllers |
KR102039113B1 (en) | 2011-08-10 | 2019-10-31 | 기타 스리바스타바 | Apparatus and method for enhancing security of data on a host computing device and a peripheral device |
CN104335522A (en) * | 2012-03-21 | 2015-02-04 | 爱迪德加拿大公司 | Method and system for chain transformation |
GB201212878D0 (en) * | 2012-07-20 | 2012-09-05 | Pike Justin | Authentication method and system |
US8868927B1 (en) | 2012-08-14 | 2014-10-21 | Google Inc. | Method and apparatus for secure data input and output |
CN103036681B (en) * | 2012-12-13 | 2015-07-29 | 中国工商银行股份有限公司 | A kind of password safety keyboard device and system |
US20140281549A1 (en) * | 2013-03-15 | 2014-09-18 | Strikeforce Technologies, Inc. | Methods and apparatus for securing user input in a mobile device |
US20150100795A1 (en) * | 2013-10-07 | 2015-04-09 | Microsemi Corporation | Secure Storage Devices, Authentication Devices, and Methods Thereof |
RU2663318C2 (en) * | 2014-03-13 | 2018-08-03 | Акооо (Бэйцзин) Лимитед | Keyboard device containing operating system and computing node |
GB201520760D0 (en) * | 2015-05-27 | 2016-01-06 | Mypinpad Ltd And Licentia Group Ltd | Encoding methods and systems |
US9805200B2 (en) * | 2016-02-01 | 2017-10-31 | Quanta Computer, Inc. | System and method for firmware verification |
US9698777B1 (en) * | 2016-05-23 | 2017-07-04 | Nuvoton Technology Corporation | Secured keyboard readout using capacitance matrix |
CN110060161B (en) * | 2019-03-28 | 2021-05-28 | 众安信息技术服务有限公司 | Client service implementation method and service assembly for block chain transaction repetition prevention |
WO2023069060A1 (en) * | 2021-10-18 | 2023-04-27 | Hewlett-Packard Development Company, L.P. | Input encryption |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4386266A (en) * | 1980-02-11 | 1983-05-31 | International Business Machines Corporation | Method for operating a transaction execution system having improved verification of personal identification |
US5870723A (en) * | 1994-11-28 | 1999-02-09 | Pare, Jr.; David Ferrin | Tokenless biometric transaction authorization method and system |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5748888A (en) * | 1996-05-29 | 1998-05-05 | Compaq Computer Corporation | Method and apparatus for providing secure and private keyboard communications in computer systems |
KR19990076696A (en) * | 1996-10-23 | 1999-10-15 | 요트.게.아. 롤페즈 | Mobile communication service payment system |
JPH1139082A (en) * | 1997-07-15 | 1999-02-12 | Fujitsu Ltd | Keyboard device having security function and method therefor |
US6134661A (en) * | 1998-02-11 | 2000-10-17 | Topp; William C. | Computer network security device and method |
CN1298143A (en) * | 1999-11-30 | 2001-06-06 | 北京汇冠科技有限公司 | Cipher keyboard and its data baking device and security method |
AU785421B2 (en) * | 2000-01-21 | 2007-05-03 | Sony Corporation | Data authentication system |
US20020196935A1 (en) * | 2001-02-25 | 2002-12-26 | Storymail, Inc. | Common security protocol structure and mechanism and system and method for using |
US6981153B1 (en) * | 2000-11-28 | 2005-12-27 | Xilinx, Inc. | Programmable logic device with method of preventing readback |
US7224801B2 (en) * | 2000-12-27 | 2007-05-29 | Logitech Europe S.A. | Wireless secure device |
US7302571B2 (en) * | 2001-04-12 | 2007-11-27 | The Regents Of The University Of Michigan | Method and system to maintain portable computer data secure and authentication token for use therein |
US7110986B1 (en) * | 2001-04-23 | 2006-09-19 | Diebold, Incorporated | Automated banking machine system and method |
WO2002089441A1 (en) * | 2001-05-01 | 2002-11-07 | Meta4Hand Inc. | Wireless network computing |
JP2003087243A (en) * | 2001-06-28 | 2003-03-20 | Hitachi Ltd | Method for verifying data, data verification device and its processing program product |
EP1286242A1 (en) | 2001-08-22 | 2003-02-26 | Sonera SmartTrust, Ltd. | System and method for protected data input of security data |
US20030159053A1 (en) * | 2002-02-19 | 2003-08-21 | Charles Fauble | Secure reconfigurable input device with transaction card reader |
US6912605B1 (en) * | 2002-03-29 | 2005-06-28 | Cypress Semiconductor Corp. | Method and/or apparatus for implementing security in keyboard-computer communication |
JP2003099332A (en) * | 2002-06-27 | 2003-04-04 | Sony Corp | Data processing system, data record reproducing device, recording device, method, and program providing medium |
US7212252B2 (en) * | 2002-11-27 | 2007-05-01 | Sedna Patent Services, Llc | Method and system for enabling detection of signals in the presence of noise |
-
2003
- 2003-05-02 US US10/428,675 patent/US7243237B2/en not_active Expired - Fee Related
-
2004
- 2004-04-27 CA CA2465270A patent/CA2465270C/en not_active Expired - Fee Related
- 2004-04-27 JP JP2004132078A patent/JP4459703B2/en not_active Expired - Fee Related
- 2004-04-28 TW TW093111898A patent/TWI319536B/en not_active IP Right Cessation
- 2004-04-29 DE DE602004032085T patent/DE602004032085D1/en active Active
- 2004-04-29 EP EP04010225A patent/EP1473615B1/en not_active Not-in-force
- 2004-04-29 AU AU2004201802A patent/AU2004201802B2/en not_active Ceased
- 2004-04-29 AT AT04010225T patent/ATE504885T1/en not_active IP Right Cessation
- 2004-04-29 PL PL04010225T patent/PL1473615T3/en unknown
- 2004-04-29 ES ES04010225T patent/ES2361074T3/en active Active
- 2004-04-29 MY MYPI20041593A patent/MY137940A/en unknown
- 2004-04-30 MX MXPA04004144A patent/MXPA04004144A/en active IP Right Grant
- 2004-04-30 ZA ZA200403290A patent/ZA200403290B/en unknown
- 2004-04-30 KR KR1020040030696A patent/KR100996737B1/en active IP Right Grant
- 2004-04-30 RU RU2004113566/09A patent/RU2371756C2/en not_active IP Right Cessation
- 2004-05-03 BR BRPI0401684-0A patent/BRPI0401684B1/en not_active IP Right Cessation
- 2004-05-08 CN CN2004100430805A patent/CN1599311B/en not_active Expired - Fee Related
-
2005
- 2005-04-07 HK HK05102933.1A patent/HK1069463A1/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
PL1473615T3 (en) | 2011-09-30 |
JP4459703B2 (en) | 2010-04-28 |
JP2004355615A (en) | 2004-12-16 |
EP1473615B1 (en) | 2011-04-06 |
TWI319536B (en) | 2010-01-11 |
MY137940A (en) | 2009-04-30 |
ES2361074T3 (en) | 2011-06-13 |
CA2465270C (en) | 2011-06-14 |
BRPI0401684A (en) | 2005-01-18 |
AU2004201802A1 (en) | 2004-11-18 |
MXPA04004144A (en) | 2005-06-08 |
BRPI0401684B1 (en) | 2018-04-17 |
US20040230805A1 (en) | 2004-11-18 |
TW200508946A (en) | 2005-03-01 |
ATE504885T1 (en) | 2011-04-15 |
EP1473615A3 (en) | 2006-11-29 |
CN1599311B (en) | 2011-08-24 |
RU2004113566A (en) | 2005-10-27 |
ZA200403290B (en) | 2005-11-08 |
RU2371756C2 (en) | 2009-10-27 |
AU2004201802B2 (en) | 2010-01-21 |
EP1473615A2 (en) | 2004-11-03 |
KR100996737B1 (en) | 2010-11-25 |
DE602004032085D1 (en) | 2011-05-19 |
US7243237B2 (en) | 2007-07-10 |
HK1069463A1 (en) | 2005-05-20 |
CN1599311A (en) | 2005-03-23 |
KR20040094379A (en) | 2004-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2465270A1 (en) | Secure communication with a keyboard or related device | |
JP2004355615A5 (en) | ||
US8660266B2 (en) | Method of delivering direct proof private keys to devices using an on-line service | |
CN100468438C (en) | Encryption and decryption method for realizing hardware and software binding | |
CN100487715C (en) | Date safety storing system, device and method | |
CN101515319B (en) | Cipher key processing method, cipher key cryptography service system and cipher key consultation method | |
US20170085543A1 (en) | Apparatus and method for exchanging encryption key | |
CN101464932B (en) | Cooperation method and system for hardware security units, and its application apparatus | |
CN1964257A (en) | Method and system for generating ciphertext and message authentication codes utilizing shared hardware | |
CA2400220A1 (en) | Consumable authentication protocol and system | |
CN103036880A (en) | Network information transmission method, transmission equipment and transmission system | |
CN108718233B (en) | Encryption method, computer equipment and storage medium | |
CN101651543A (en) | Creditable calculation platform key migration system and key migration method thereof | |
CN109711841B (en) | Data transaction method and system, platform and storage medium | |
CN115065472B (en) | Security chip encryption and decryption method and device based on multi-key encryption and decryption | |
US9571273B2 (en) | Method and system for the accelerated decryption of cryptographically protected user data units | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN105468940A (en) | Software protection method and apparatus | |
CN110996319A (en) | System and method for performing activation authorization management on software service | |
US7773753B2 (en) | Efficient remotely-keyed symmetric cryptography for digital rights management | |
CN101539978B (en) | Software protection method based on space | |
CN101325486B (en) | Method and apparatus for transferring field permission cryptographic key | |
CN114499825A (en) | Double-control key management method, system, encryption machine and storage medium | |
JP4198509B2 (en) | Mutual authentication method | |
CN105490812A (en) | Data transmission line protection method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20140429 |