CA2465270A1 - Secure communication with a keyboard or related device - Google Patents

Secure communication with a keyboard or related device Download PDF

Info

Publication number
CA2465270A1
CA2465270A1 CA002465270A CA2465270A CA2465270A1 CA 2465270 A1 CA2465270 A1 CA 2465270A1 CA 002465270 A CA002465270 A CA 002465270A CA 2465270 A CA2465270 A CA 2465270A CA 2465270 A1 CA2465270 A1 CA 2465270A1
Authority
CA
Canada
Prior art keywords
keyboard
initial value
nonce
component
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002465270A
Other languages
French (fr)
Other versions
CA2465270C (en
Inventor
Marcus Peinado
Josh Benaloh
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2465270A1 publication Critical patent/CA2465270A1/en
Application granted granted Critical
Publication of CA2465270C publication Critical patent/CA2465270C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61PSPECIFIC THERAPEUTIC ACTIVITY OF CHEMICAL COMPOUNDS OR MEDICINAL PREPARATIONS
    • A61P31/00Antiinfectives, i.e. antibiotics, antiseptics, chemotherapeutics
    • A61P31/04Antibacterial agents
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/04Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
    • G08B21/0407Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons based on behaviour analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2201/00Electronic components, circuits, software, systems or apparatus used in telephone systems
    • H04M2201/34Microprocessors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2201/00Electronic components, circuits, software, systems or apparatus used in telephone systems
    • H04M2201/36Memories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/10Details of telephonic subscriber devices including a GPS signal receiver
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/12Details of telephonic subscriber devices including a sensor for measuring a physical value, e.g. temperature or motion

Abstract

Secure communication between a keyboard and a component, such as a piece of software running on a computer. A first initial value is known to both the keyboard and the component.

The keyboard and the component exchange nonces. The keyboard and the component each compute a second initial value and a third initial value based on the nonces and the first initial value. Both the keyboard and the component perform the same computation, so that the keyboard and the component each have the same second and third initial values. The keyboard encrypts keystrokes destined for the component using CBC-3DES based on the key and the second initial value, and also creates a message authentication code for each keystroke using based on the key and the third initial value. The component decrypts and verifies the keystrokes using the key and the second and third initial values.

Claims (30)

1. A method of communicating with a keyboard comprising:

receiving, at a component from a keyboard, a plurality of data that have been encrypted with triple-DES and cipher block chaining using a key and a first initial value, said key and said first initial value being known both to the component and to the keyboard;
decrypting the plurality of data based on said first initial value and said key.
2. The method of claim 1, further comprising:

receiving at the component from the keyboard, a plurality of message authentication codes corresponding to the plurality of data, said message authentication codes having been created with triple-DES and cipher block chaining using said key and a second initial value different from said first initial value, said second initial value being known both to the component and to the keyboard;

verifying the plurality of data by using the plurality of message authentication codes.
3. The method of claim 2, further comprising:

receiving a first nonce from the keyboard;
sending a second nonce to the keyboard; and creating the first initial value and the second initial value by applying triple-DES
and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a third initial value that is known both to the keyboard and to the component.
4. The method of claim 2, further comprising:
receiving a first nonce from the keyboard;
sending a second nonce to the keyboard;
creating the first initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a third initial value that is known both to the keyboard and to the component; and creating the second initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a fourth initial value that is known both to the keyboard and to the component.
5. The method of claim 1, wherein the plurality of data are received through a channel whose behavioral integrity is not trusted by the component.
6. The method of claim 5, wherein the component comprises a first operating system which executes on a computing device along with a second operating system, the first operating system distrusting, in at least some respect, the behavior of the second operating system, the keyboard communicating with the first operating system through a driver controlled by the second operating system.
7. The method of claim 1, wherein the keyboard comprises a USB keyboard.
8. The method of claim 7, wherein said triple-DES and cipher block chaining encrypt data in blocks having a predetermined size, and wherein the keyboard communicates data in blocks of said predetermined size.
9. The method of claim 1, wherein each of the plurality of data is generated based on an individual keystroke received at the keyboard.
10. The method of claim 1, further comprising:

receiving a first nonce from the keyboard;
sending a second nonce to the keyboard; and creating the first initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a second initial value that is known both to the keyboard and to the component.
11. A computer-readable medium encoded with computer-executable instructions to perform a method of securely receiving input at a component from a keyboard, the method comprising:

receiving, at the component from the keyboard, a plurality of encrypted keystrokes, the encrypted.keystrokes having been created at the keyboard by encrypting input keystrokes received at the keyboard with triple-DES and cipher block chaining using a key and a first initial value, the key and the first initial value being available both to the keyboard and to the component; and at the component, decrypting the plurality of encrypted keystrokes using the key and the first initial value.
12. The computer-readable medium of claim 11, wherein the component comprises a first operating system which executes on a computing device along with a second operating system, the first operating system distrusting, in at least some respect, the behavior of the second operating system, the keyboard communicating with the first operating system through a driver controlled by the second operating system.
13. The computer-readable medium of claim 11, wherein the method further comprises:
receiving at the component from the keyboard, a plurality of message authentication codes corresponding to the plurality of encrypted keystrokes, said message authentication codes having been created with triple-DES and cipher block chaining using said key and a second initial value different from said first initial value, said second initial value being known both to the component and to the keyboard;

verifying the plurality of encrypted keystrokes by using the plurality of message authentication codes.
14. The computer-readable medium of claim 13, wherein the method further comprises:
receiving a first nonce from the keyboard;

sending a second nonce to the keyboard; and creating the first initial value and the second initial value by applying triple-DES
and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a third initial value that is known both to the keyboard and to the component.
15. The computer-readable medium of claim 13, wherein the method further comprises:
receiving a first nonce from the keyboard;

sending a second nonce to the keyboard;

creating the first initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a third initial value that is known both to the keyboard and to the component; and creating the second initial value applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a fourth initial value that is known both to the keyboard and to the component.
16. The computer-readable medium of claim 11, wherein said triple-DES and cipher block chaining encrypt data in blocks having a predetermined size, and wherein the keyboard communicates data in blocks of said predetermined size.
17. A keyboard comprising:

one or more storage locations that store a first initial value and a key;
an encryption component that encrypts input data received at the keyboard with triple-DES and cipher block chaining using said key and said first initial value, whereby encrypted data is created based on said input data; and a communication interface that communicates said encrypted data to a device external to the keyboard, said encrypted data being destined for a recipient that knows said first initial value and said key.
18. The keyboard of claim 17, wherein the encryption component further creates a plurality of message authentication codes corresponding to the encrypted data or the input data, said message authentication codes having been created with triple-DES and cipher block chaining using said key and a second initial value different from said first initial value.
19. The keyboard of claim 17, wherein the keyboard comprises a USB keyboard.
20. The keyboard of claim 17, wherein the communication interface communicates said encrypted data to a driver that is controlled by a first operating system that executes on said device whereupon said encrypted data is communicated to said recipient, said recipient being a second operating system that executes on said device or a program that executes under said second operating system, said second operating system distrusting, in at least some respect, the behavior of the first operating system.
21. The keyboard of claim 17, wherein said encryption component is adapted to:

receive a first nonce from the recipient through the communication interface;

send a second nonce to the recipient through the communication interface; and create the first initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a second initial value that is known both to the keyboard and to the component.
22. The keyboard of claim 17, wherein the input data received at the keyboard comprises a plurality of individual keystrokes, and wherein the encryption component separately encrypts each of the individual keystrokes.
23. A computer-readable medium encoded with computer-executable instructions to perform a method of enabling a keyboard to engage in secure communication with a component external to the keyboard, the method comprising:

receiving a plurality of input keystrokes;

encrypting each of the input keystrokes with triple-DES and cipher block chaining using a key and a first initial value, the key and the first initial value being known to both the keyboard and the component, whereby a plurality of encrypted keystrokes; and transmitting the encrypted keystrokes to the component.
24. The computer-readable medium of claim 23, wherein said triple-DES and cipher block chaining encrypt data in blocks having a predetermined size, and wherein the keyboard communicates data in blocks of said predetermined size.
25. The computer-readable medium of claim 23, wherein the method further comprises:
creating a plurality of message authentication codes with triple-DES and cipher block chaining using said key and a second initial value different from said first initial value, the plurality of message authentication codes corresponding to the plurality of keystrokes; and transmitting the message authentication codes to the component.
26. The computer-readable medium of claim 23, wherein the method further comprises:
sending a first nonce to the component;

sending a second nonce to the component; and creating the first initial value by applying triple-DES and cipher block chaining to a combination of the first nonce and the second nonce, using the key and a second initial value that is known both to the keyboard and to the component.
27. A method of enabling data to be inputted securely to a software component comprising:
distributing a copy of the software component, the software component comprising:
a key;
an first initial value; and computer-executable instructions that enable the software to:

send a first nonce to a keyboard;

receive a second nonce from the keyboard;

create a second initial value based on said first nonce, said second nonce, and said first initial value; and decrypt encrypted data received from the keyboard using the key and the second initial value; and distributing; or enabling the distribution of, the keyboard, the keyboard comprising:

hardware to store or access a copy of the key;
hardware to store or access a copy of the first initial value;

hardware or software that enables the keyboard to:

receive the first nonce from the software component;

send the second nonce to the software component; and create the second initial value based on said first nonce, said second nonce, and said first initial value; and create the encrypted data by encrypting input data received at the keyboard using the key and the second initial value.
28. The method of claim 27, wherein said keyboard further comprises hardware or software that enables the keyboard to:

create a third initial value based on said first nonce, said second nonce, and said first initial value, said third initial value being different from said second initial value;
and create a message authentication code using the key and the third initial value;

the software component further comprises computer-executable instructions to:
create said third initial value based on said first nonce, said second nonce, and said first initial value; and verify the message authenticate code using the key and the third initial value.
29. The method of claim 27, wherein the encrypted data is created by applying triple-DES with cipher block chaining to the input data using the key and the second initial value.
30. The method of claim 27, wherein the keyboard is adapted to encrypt each keystroke individually.
CA2465270A 2003-05-02 2004-04-27 Secure communication with a keyboard or related device Expired - Fee Related CA2465270C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/428,675 US7243237B2 (en) 2003-05-02 2003-05-02 Secure communication with a keyboard or related device
US10/428,675 2003-05-02

Publications (2)

Publication Number Publication Date
CA2465270A1 true CA2465270A1 (en) 2004-11-02
CA2465270C CA2465270C (en) 2011-06-14

Family

ID=32990487

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2465270A Expired - Fee Related CA2465270C (en) 2003-05-02 2004-04-27 Secure communication with a keyboard or related device

Country Status (18)

Country Link
US (1) US7243237B2 (en)
EP (1) EP1473615B1 (en)
JP (1) JP4459703B2 (en)
KR (1) KR100996737B1 (en)
CN (1) CN1599311B (en)
AT (1) ATE504885T1 (en)
AU (1) AU2004201802B2 (en)
BR (1) BRPI0401684B1 (en)
CA (1) CA2465270C (en)
DE (1) DE602004032085D1 (en)
ES (1) ES2361074T3 (en)
HK (1) HK1069463A1 (en)
MX (1) MXPA04004144A (en)
MY (1) MY137940A (en)
PL (1) PL1473615T3 (en)
RU (1) RU2371756C2 (en)
TW (1) TWI319536B (en)
ZA (1) ZA200403290B (en)

Families Citing this family (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005140823A (en) 2003-11-04 2005-06-02 Sony Corp Information processor, control method, program, and recording medium
US7581097B2 (en) * 2003-12-23 2009-08-25 Lenovo Pte Ltd Apparatus, system, and method for secure communications from a human interface device
KR100710032B1 (en) * 2005-02-23 2007-04-25 제이알소프트 주식회사 Method and system that can secure keyboard key stroke using secure input filter driver and keyboard secure input BHO of Internet Explorer in windows operating system
DE102005014194B4 (en) 2005-03-29 2006-12-14 Axel Ahnert Reader with integrated cryptography unit
SG128507A1 (en) * 2005-06-25 2007-01-30 Krypt Technologies Encryption system for confidential data transmission
WO2007006072A1 (en) * 2005-07-14 2007-01-18 Teewoon Tan System and method for controllably concealing data from spying applications
KR100734145B1 (en) * 2005-10-12 2007-07-03 주식회사 안철수연구소 Method of protecting hacking of a key input by using authorization of keyboard data
WO2007061147A1 (en) * 2005-11-24 2007-05-31 Softcamp Co., Ltd. Guarding method for input data by usb keyboard and guarding system
US7835521B1 (en) * 2005-12-02 2010-11-16 Google Inc. Secure keyboard
CA2571450A1 (en) * 2005-12-21 2007-06-21 Nervo Security Encrypted keyboard
US8566608B2 (en) * 2006-02-02 2013-10-22 Strikeforce Technologies, Inc. Methods and apparatus for securing keystrokes from being intercepted between the keyboard and a browser
US7428306B2 (en) * 2006-04-18 2008-09-23 International Business Machines Corporation Encryption apparatus and method for providing an encrypted file system
KR100861104B1 (en) * 2006-10-16 2008-09-30 킹스정보통신(주) Apparatus and method for preservation of usb keyboard
KR100846123B1 (en) * 2006-10-24 2008-07-15 주식회사 하우리 Method for keyboard security and storage medium recording keyboard security driver using the method
KR100838488B1 (en) * 2007-01-24 2008-06-16 현대중공업 주식회사 The method and apparatus for protecting identification data using one-time and altered identification data generation mechanism, need not to install the program for preventing keystroke hacking on user computer
DE102007004631A1 (en) * 2007-01-30 2008-07-31 Cherry Gmbh Method for secure data transmission between input device connected to network computer and network receiver, involves receiving of data of reading or input element of input device to encrypting device of input device
US8615662B2 (en) * 2007-01-31 2013-12-24 Microsoft Corporation Password authentication via a one-time keyboard map
US20080263672A1 (en) * 2007-04-18 2008-10-23 Hewlett-Packard Development Company L.P. Protecting sensitive data intended for a remote application
KR100909891B1 (en) * 2007-10-02 2009-07-31 소프트캠프(주) Encode processing method of the Keyboard input data for security in kernel
TWI395112B (en) * 2007-11-30 2013-05-01 Chi Pei Wang Keylogger resistant keyboard adapter
GB2469594B (en) * 2008-01-22 2012-08-29 Hewlett Packard Development Co Shared secret used between keyboard and application
US8214888B2 (en) * 2008-01-30 2012-07-03 Vasco Data Security, Inc. Two-factor USB authentication token
US9596250B2 (en) * 2009-04-22 2017-03-14 Trusted Knight Corporation System and method for protecting against point of sale malware using memory scraping
JP2010039913A (en) * 2008-08-07 2010-02-18 Sony Corp Communication device, communication method and program
DE102008042180B4 (en) * 2008-09-17 2010-09-23 Zf Friedrichshafen Ag Method and system for secure transmission of data
US20110208974A1 (en) * 2010-02-25 2011-08-25 Alcatel-Lucent Usa Inc. Countermeasure Against Keystroke Logger Devices
US8566934B2 (en) 2011-01-21 2013-10-22 Gigavation, Inc. Apparatus and method for enhancing security of data on a host computing device and a peripheral device
WO2012123859A1 (en) * 2011-03-16 2012-09-20 Garay Peter A Transaction security method and device
US8954747B2 (en) * 2011-07-01 2015-02-10 Intel Corporation Protecting keystrokes received from a keyboard in a platform containing embedded controllers
KR102039113B1 (en) 2011-08-10 2019-10-31 기타 스리바스타바 Apparatus and method for enhancing security of data on a host computing device and a peripheral device
CN104335522A (en) * 2012-03-21 2015-02-04 爱迪德加拿大公司 Method and system for chain transformation
GB201212878D0 (en) * 2012-07-20 2012-09-05 Pike Justin Authentication method and system
US8868927B1 (en) 2012-08-14 2014-10-21 Google Inc. Method and apparatus for secure data input and output
CN103036681B (en) * 2012-12-13 2015-07-29 中国工商银行股份有限公司 A kind of password safety keyboard device and system
US20140281549A1 (en) * 2013-03-15 2014-09-18 Strikeforce Technologies, Inc. Methods and apparatus for securing user input in a mobile device
US20150100795A1 (en) * 2013-10-07 2015-04-09 Microsemi Corporation Secure Storage Devices, Authentication Devices, and Methods Thereof
RU2663318C2 (en) * 2014-03-13 2018-08-03 Акооо (Бэйцзин) Лимитед Keyboard device containing operating system and computing node
GB201520760D0 (en) * 2015-05-27 2016-01-06 Mypinpad Ltd And Licentia Group Ltd Encoding methods and systems
US9805200B2 (en) * 2016-02-01 2017-10-31 Quanta Computer, Inc. System and method for firmware verification
US9698777B1 (en) * 2016-05-23 2017-07-04 Nuvoton Technology Corporation Secured keyboard readout using capacitance matrix
CN110060161B (en) * 2019-03-28 2021-05-28 众安信息技术服务有限公司 Client service implementation method and service assembly for block chain transaction repetition prevention
WO2023069060A1 (en) * 2021-10-18 2023-04-27 Hewlett-Packard Development Company, L.P. Input encryption

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4386266A (en) * 1980-02-11 1983-05-31 International Business Machines Corporation Method for operating a transaction execution system having improved verification of personal identification
US5870723A (en) * 1994-11-28 1999-02-09 Pare, Jr.; David Ferrin Tokenless biometric transaction authorization method and system
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5748888A (en) * 1996-05-29 1998-05-05 Compaq Computer Corporation Method and apparatus for providing secure and private keyboard communications in computer systems
KR19990076696A (en) * 1996-10-23 1999-10-15 요트.게.아. 롤페즈 Mobile communication service payment system
JPH1139082A (en) * 1997-07-15 1999-02-12 Fujitsu Ltd Keyboard device having security function and method therefor
US6134661A (en) * 1998-02-11 2000-10-17 Topp; William C. Computer network security device and method
CN1298143A (en) * 1999-11-30 2001-06-06 北京汇冠科技有限公司 Cipher keyboard and its data baking device and security method
AU785421B2 (en) * 2000-01-21 2007-05-03 Sony Corporation Data authentication system
US20020196935A1 (en) * 2001-02-25 2002-12-26 Storymail, Inc. Common security protocol structure and mechanism and system and method for using
US6981153B1 (en) * 2000-11-28 2005-12-27 Xilinx, Inc. Programmable logic device with method of preventing readback
US7224801B2 (en) * 2000-12-27 2007-05-29 Logitech Europe S.A. Wireless secure device
US7302571B2 (en) * 2001-04-12 2007-11-27 The Regents Of The University Of Michigan Method and system to maintain portable computer data secure and authentication token for use therein
US7110986B1 (en) * 2001-04-23 2006-09-19 Diebold, Incorporated Automated banking machine system and method
WO2002089441A1 (en) * 2001-05-01 2002-11-07 Meta4Hand Inc. Wireless network computing
JP2003087243A (en) * 2001-06-28 2003-03-20 Hitachi Ltd Method for verifying data, data verification device and its processing program product
EP1286242A1 (en) 2001-08-22 2003-02-26 Sonera SmartTrust, Ltd. System and method for protected data input of security data
US20030159053A1 (en) * 2002-02-19 2003-08-21 Charles Fauble Secure reconfigurable input device with transaction card reader
US6912605B1 (en) * 2002-03-29 2005-06-28 Cypress Semiconductor Corp. Method and/or apparatus for implementing security in keyboard-computer communication
JP2003099332A (en) * 2002-06-27 2003-04-04 Sony Corp Data processing system, data record reproducing device, recording device, method, and program providing medium
US7212252B2 (en) * 2002-11-27 2007-05-01 Sedna Patent Services, Llc Method and system for enabling detection of signals in the presence of noise

Also Published As

Publication number Publication date
PL1473615T3 (en) 2011-09-30
JP4459703B2 (en) 2010-04-28
JP2004355615A (en) 2004-12-16
EP1473615B1 (en) 2011-04-06
TWI319536B (en) 2010-01-11
MY137940A (en) 2009-04-30
ES2361074T3 (en) 2011-06-13
CA2465270C (en) 2011-06-14
BRPI0401684A (en) 2005-01-18
AU2004201802A1 (en) 2004-11-18
MXPA04004144A (en) 2005-06-08
BRPI0401684B1 (en) 2018-04-17
US20040230805A1 (en) 2004-11-18
TW200508946A (en) 2005-03-01
ATE504885T1 (en) 2011-04-15
EP1473615A3 (en) 2006-11-29
CN1599311B (en) 2011-08-24
RU2004113566A (en) 2005-10-27
ZA200403290B (en) 2005-11-08
RU2371756C2 (en) 2009-10-27
AU2004201802B2 (en) 2010-01-21
EP1473615A2 (en) 2004-11-03
KR100996737B1 (en) 2010-11-25
DE602004032085D1 (en) 2011-05-19
US7243237B2 (en) 2007-07-10
HK1069463A1 (en) 2005-05-20
CN1599311A (en) 2005-03-23
KR20040094379A (en) 2004-11-09

Similar Documents

Publication Publication Date Title
CA2465270A1 (en) Secure communication with a keyboard or related device
JP2004355615A5 (en)
US8660266B2 (en) Method of delivering direct proof private keys to devices using an on-line service
CN100468438C (en) Encryption and decryption method for realizing hardware and software binding
CN100487715C (en) Date safety storing system, device and method
CN101515319B (en) Cipher key processing method, cipher key cryptography service system and cipher key consultation method
US20170085543A1 (en) Apparatus and method for exchanging encryption key
CN101464932B (en) Cooperation method and system for hardware security units, and its application apparatus
CN1964257A (en) Method and system for generating ciphertext and message authentication codes utilizing shared hardware
CA2400220A1 (en) Consumable authentication protocol and system
CN103036880A (en) Network information transmission method, transmission equipment and transmission system
CN108718233B (en) Encryption method, computer equipment and storage medium
CN101651543A (en) Creditable calculation platform key migration system and key migration method thereof
CN109711841B (en) Data transaction method and system, platform and storage medium
CN115065472B (en) Security chip encryption and decryption method and device based on multi-key encryption and decryption
US9571273B2 (en) Method and system for the accelerated decryption of cryptographically protected user data units
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN105468940A (en) Software protection method and apparatus
CN110996319A (en) System and method for performing activation authorization management on software service
US7773753B2 (en) Efficient remotely-keyed symmetric cryptography for digital rights management
CN101539978B (en) Software protection method based on space
CN101325486B (en) Method and apparatus for transferring field permission cryptographic key
CN114499825A (en) Double-control key management method, system, encryption machine and storage medium
JP4198509B2 (en) Mutual authentication method
CN105490812A (en) Data transmission line protection method and device

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20140429