TW200928849A - A method for keyloggers resistant keyboard - Google Patents

A method for keyloggers resistant keyboard Download PDF

Info

Publication number
TW200928849A
TW200928849A TW96148363A TW96148363A TW200928849A TW 200928849 A TW200928849 A TW 200928849A TW 96148363 A TW96148363 A TW 96148363A TW 96148363 A TW96148363 A TW 96148363A TW 200928849 A TW200928849 A TW 200928849A
Authority
TW
Taiwan
Prior art keywords
keyboard
scan
code
button
key
Prior art date
Application number
TW96148363A
Other languages
Chinese (zh)
Other versions
TWI368863B (en
Inventor
Chi-Pei Wang
Original Assignee
Chi-Pei Wang
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chi-Pei Wang filed Critical Chi-Pei Wang
Priority to TW096148363A priority Critical patent/TWI368863B/en
Publication of TW200928849A publication Critical patent/TW200928849A/en
Application granted granted Critical
Publication of TWI368863B publication Critical patent/TWI368863B/en

Links

Landscapes

  • Input From Keyboards Or The Like (AREA)

Abstract

The invention can be used to solve the problem caused by keyloggers and spy software in a Personal Computer. The keyloggers and spy software can steal the accounts and passwords of the users in the computers and network systems. After get the accounts and passwords, the hacker may break and enter the systems illeagally. The malice keyloggers and spy software can do this by logging the keystrokes sending from keyboard device, thus the users of online finance, the players of online games may lost anything valuable. The invention is a device, system and method to prevent from the keyloggers and spy software. The device, system or method encrypt data of keystrokes by hardware in the keyboard device, so that nobody can understand the screamble logged keystrokes, except the software with decryption alogrithm and key for the encrypted data.

Description

200928849 七、指定代表圖: 本案指定代表圖為:第(二)圖。 本代表圖之元件符號簡單說明: 電腦主機 20 KBC或USB主機控制器 201 鍵盤侧錄軟體 202 防側錄鍵盤 21 鍵盤連接線 22 八、 本案若有化學式時,請揭示最能顯示發明特徵的化學式: 九、 發明說明: 【發明所屬之技術領域】 本發明為一電腦週邊裝置的資料保全方法,即電腦鍵盤防侧錄 的方法。透過這個方法,可確保電腦鍵盤按鍵真正的資料不 會被非法的側錄軟體取得;因為鍵盤的按鍵資料是經過鍵盤 加密。 【先前技術】 凊參閱第一圖,個人電腦(personal Computer, PC)鍵盤11 的按鍵資料係經由中央處理器(Central Processing Unit, CPU)之輸出入指令(i〇 instructi〇ns)與輸出入槔6〇h及 64h ’ 即 KBC 101 (Keyboard Controller 10 ports 60h,64h(h 代表十六進位數字))來達成。由於個人電腦的軟硬體架構的 關係’任意軟體都可以輕易地取得鍵盤按鍵的資料,^且 用者都不會查覺到任何異狀。按鍵側錄或間謀軟體 _物姆非法盗取 200928849 全球最大的中央處理器製造商英特爾(Intel)於幾年前曾推廣 TMKBC (Trusted Mobile Keyboard Controller),TMKBC 主要 定位在高階商用的筆記型電腦,而其架構必須搭配整套特製 的電腦晶片(LaGrande Platform),包括 Trusted CPU, Trusted Chipset, Trusted Memory, Trusted Graphics, Trusted Platform Module(TPM)以及 TMKBC。由於此系統平 Ο200928849 VII. Designated representative map: The representative representative of the case is: (2). The symbol of the symbol of this representative figure is simple: Computer host 20 KBC or USB host controller 201 Keyboard side recording software 202 Anti-side recording keyboard 21 Keyboard connection line 22 8. If there is a chemical formula in this case, please reveal the chemical formula that best shows the characteristics of the invention. Nine, invention description: [Technical field of the invention] The present invention is a data preservation method for a computer peripheral device, that is, a method for preventing a side view of a computer keyboard. In this way, it is ensured that the actual data of the keyboard keys of the computer is not obtained by the illegal side recording software; because the key data of the keyboard is encrypted by the keyboard. [Prior Art] 凊 Referring to the first figure, the key data of the personal computer (PC) keyboard 11 is input and output (i〇instructi〇ns) and output through the central processing unit (CPU). 6〇h and 64h' are KBC 101 (Keyboard Controller 10 ports 60h, 64h (h stands for hexadecimal digits)). Due to the relationship between the hardware and software architecture of the personal computer, any software can easily obtain the data of the keyboard keys, and the user will not detect any abnormalities. Button side recording or intervening software _ illegal illegal stealing 200928849 Intel (Intel), the world's largest central processor manufacturer, promoted TMKBC (Trusted Mobile Keyboard Controller) a few years ago, TMKBC is mainly positioned in high-end commercial notebook computers The architecture must be paired with a complete set of custom-made computer chips (LaGrande Platform), including Trusted CPU, Trusted Chipset, Trusted Memory, Trusted Graphics, Trusted Platform Module (TPM) and TMKBC. Because this system is flat

台涉及層面過多,無法相容於現有之軟硬體系統,並且實作 成本過高,以致於Intel目前已經不再推廣這個新系統平 台。TMKBC的目的即在讓使用者的按鍵不會被盗取,但規格 中並不包括任何加解密的技術或方法,其憑藉的防側錄技術 建立在整個可信任平台(LaGrande Platform)是不允許任音斂 體去讀取或更改鍵盤的資料。 ^軟 由於目前市面上並無加密鍵盤的產品,即使有防毐與 =體’也气聽到線上電腦遊戲的使用者在線上遊。中的| :或:數:皮盗,或因網路銀行的帳號密碼被側錄而有所 失°據統计’侧錄軟體造成的措宝备玍 失 長 =數被ϋ因網路銀行雜難碼被條而 。據f計:侧錄軟體造成_害每年也以倍數的數^ 二’-很:t國家也因此而限伽路金融的衫。例如國内網敗 得S3約定Ϊ帳號?帳,網路腿無約定的帳號轉帳ί 11 一 70。有些國家甚至不許使用網路銀行。 然有各種成熟穩定的加密拔術,但即使電 軟,問題,因為問題的根源諜 諜軟體就料有消’ 纖軟體和間 目别解决&種問題的方法是·軟體的螢幕小鍵盤,使用者 200928849 ;:變螢換幕上 =錄軟體,或者有些使用者覺得不方便而不錄用螢幕小、 "所以說’防側錄加密鍵盤是現今電腦網路系統必備且非^ 體。更有好制者;j;知道要螢幕摘盤防The platform involved too much, could not be compatible with the existing software and hardware systems, and the implementation cost was too high, so Intel has no longer promoted this new system platform. The purpose of TMKBC is to prevent the user's buttons from being stolen, but the specification does not include any encryption or decryption technology or method. The anti-scratch technology is not allowed on the entire trusted platform (LaGrande Platform). Any tone to read or change the keyboard data. ^Soft Because there are no products on the market that have no encryption keyboard, even if there is anti-mite and body, you can hear online users of online computer games online. In the | | or: number: Pirates, or because the online banking account password was recorded and lost. According to statistics, the software used by the side-recording software is too long to be lost. The miscellaneous code is stripped. According to the f-count: the side-recording software caused the _ damage to the number of multiples each year ^ two '- very: t countries are therefore limited to the road of financial. For example, the domestic network lost the S3 agreement account? Account, network leg has no agreed account transfer ί 11 a 70. Some countries do not even allow online banking. However, there are all kinds of mature and stable encryption pull-ups, but even if it is soft, the problem, because the root of the problem, the software of the spyware is expected to have a 'software and between the two methods to solve the problem is a software screen keyboard, User 200928849 ;: Change the screen on the screen = Record software, or some users find it inconvenient to not use the screen, " So that 'anti-side recording encryption keyboard is a must-have for today's computer network system. More well-made; j; know to screen off

/α.Ι A/r J.» «<·*>. V 盤。私,、丨扣 i ,_一 . . °阳、…螢幕小鍵 重要的裝置,雖然並沒有解決鍵盤被側錄的根本問題,但加 密的方法可以讓侧錄軟體側錄到的按鍵資料變成無意義的 碼,除非側錄軟體知道如何解密,否則防侧錄鍵盤理論上θ 可以防制按鍵侧錄軟體和間諜軟體的問題。 疋 【發明内容】 ^第二圖(本案技術系統架構圖)與第一(習知系統架構圖) 中’桌上型電腦的鍵盤通常以PS2或USB的連結器12與22接 上個人電腦,按鍵資料則透過PS2或USB協定規格(ps2、〇rUsB protocols specifications)上傳至個人電腦的鍵盤控制器 (KBC)或USB主機控制器(USB Host Controller),軟體透過輸 出入埠60h/64h與KBC溝通,或透過USB主機控制器,取得按 鍵的資,。筆記型電腦由於鍵盤内建於電腦上,是故鍵盤裝 置控制器(Keyboard Device Controller) 11 與KBC(Keyboard/α.Ι A/r J.» «<·*>. V disk. Private, 丨扣 i, _一. . ° Yang, ... screen small key important device, although it does not solve the fundamental problem of the keyboard being recorded, but the encryption method can make the key information recorded on the side of the software side become Meaningless code, unless the side recording software knows how to decrypt, the anti-sideboard keyboard theoretically θ can prevent the problem of button side recording software and spyware.疋 [Summary] ^The second figure (the technical system architecture diagram of the case) and the first (the conventional system architecture diagram) The keyboard of the desktop computer is usually connected to the personal computer by the connectors 12 and 22 of the PS2 or USB. The button data is uploaded to the keyboard controller (KBC) or USB host controller (USB Host Controller) of the personal computer through the PS2 or USB protocol specification (ps2, 〇rUsB protocols specifications), and the software communicates with the KBC through the input/output port 60h/64h. Or obtain the key of the button through the USB host controller. The notebook computer is built into the keyboard, so the keyboard device controller (Keyboard Device Controller) 11 and KBC (Keyboard)

Controller) 101功能是合而為一的,所以外部就沒有pS2連 接線12 ;不過其架構與原理是一樣的。 在按鍵資料傳送到電腦主機的過程中,按鍵資料是公開透明 的,因為個人電腦的軟硬體規格是公開的,也就是任何人都 可以利用公開的軟硬體規格,自製或其他方式取得按鍵側 錄、間課軟體(keylogger,spy S0ftware),擷取使用者按鍵 的資料。 如第一圖(本案技術系統架構圖),與第一圖(習知系統架構圖) 200928849 唯-不同之處在於習知祕使用—般難n 加密鍵盤2卜其他硬體的連線或軟體的配 都》又有不同。-般鍵盤n按鍵由赃或us f ^ 到文字按鍵Α,Β,0.·Ζ,〇, !,2...9與空白鍵等等的 側錄加盤21所送出的,由KBC或他 $接^ 的是加密過的密碼。 列益αι接收到 本發明的重點即是將文字按鍵資料A B GmU與空 白鍵在鍵盤中就經過加密,再上傳至f腦主機,如第三圖‘^ =圖,所示,本案在鍵盤中新增—按鍵資料加麵組404, 可以把送往主機電腦社字按鍵重新編碼加密,如此一來侧錄 軟體就看不懂那些密碼資料了。 、 τ ! 月中控制按鍵(Ctrl,Alt,Shift,Tab,CaPs 〇c,〜2,Enter…等等)並不重新加密編碼,因為控制按 鍵通常具有個別的功能,通常由作業系統軟體控制,若連控制 按鍵也加密,則整個作業系統的鍵盤控制功能會大亂;除非開 發新的鍵盤控制驅動程式來解決這個控制鍵的問題。開發新 的鍵盤控制驅動程式雖然技術上並非不可行,但現實上以 Microsoft Windows作業系統來說,鍵盤控制驅動程式(i8〇42 porj; driver)是不可以被重新編寫、或取代的; 然提供不同層次的驅動程式可以改寫或新增功能來控制KBC, 但都必須依據i8〇42 port driver而建立,所以i8〇42 port driver是不可以任意更動。不過Linux開放原始碼的作業系 統是可以重新改寫驅動程式的。 即使Linux可以重新改寫KBC的驅動程式來修正上述加密控制 按鍵,問題,但新的問題有可能產生,也就是在該作業系統中 存在著解密的演算法和密鑰,造成這個加密系統更容易被破解 7 200928849 的風險。所以本發明把鍵盤按鍵分成二類:文字按鍵和控 鍵,文字按鍵可以加密,控制按鍵則保留原樣、不加工處理, 讓作業系統的驅動程式可以不必更改。而解密的演复:給 最好放在伺服器電腦上較安全。 ’' 為了進步了解本發明之特徵及技術内容,請參閱【實施方 式】之細部說明與附圖。然而細部說明與附圖僅提供參考與說 明之用,並非用來限制本發明之範圍。 〇 【實施方式】 請參閱第三圖(習知技術鍵盤裝置控制器方塊圖)’鍵盤按鍵 矩陣31由鍵盤矩陣控制模組302掃瞄,若有使用者按下某一 鍵或放開按鍵’就會發出按鍵按下(make key)或放開(b^eak key)的控制訊號與掃瞄位置(scan Address),make key與 break key經由鍵盤按鍵資料產生模組3〇i產生對應掃瞄位置 的按鍵編碼(ScanCode),再傳送到連接電腦主機的介面3〇〇, 亦即PS2或USB鍵盤介面;若是筆記型電腦的KBC則透過 晶片内部的軟體或硬體的方式,直接經由Lpc(L〇w pin c〇unt BUS)上傳至南橋晶片組(South Bridge Chipset)。The Controller 101 function is one, so there is no pS2 connection 12 on the outside; however, the architecture and principle are the same. In the process of transferring key data to the host computer, the key data is public and transparent, because the soft and hard specifications of the personal computer are public, that is, anyone can use the open software and hardware specifications, self-made or other methods to obtain the keys. Side-recording, inter-class software (keylogger, spy S0ftware), capture data from user buttons. As shown in the first figure (the technical system architecture diagram of this case), it differs from the first figure (the conventional system architecture diagram) 200928849. The only difference is that it is difficult to use the encryption keyboard 2 other hardware connection or software. The match is different. - General keyboard n button by 赃 or us f ^ to text button Α, Β, 0.·Ζ, 〇, ! , 2...9 and the blank key, etc. The side record plus the 21 sent by the KBC or the other is the encrypted password. The focus of the invention is that the text button data AB GmU and the blank key are encrypted in the keyboard and then uploaded to the f brain host, as shown in the third figure '^ = diagram, the case is in the keyboard. Added - button data plus face group 404, you can re-encode and encrypt the key words sent to the host computer, so you can't read the password data when you log the software. , τ ! The mid-month control buttons (Ctrl, Alt, Shift, Tab, CaPs 〇c, ~2, Enter..., etc.) do not re-encrypt the code, as the control buttons usually have individual functions, usually controlled by the operating system software. If the control button is also encrypted, the keyboard control function of the entire operating system will be messy; unless a new keyboard control driver is developed to solve the problem of this control button. Developing a new keyboard control driver is not technically feasible, but in reality Microsoft keyboard operating system, the keyboard control driver (i8〇42 porj; driver) can not be rewritten, or replaced; Different levels of drivers can be rewritten or added to control KBC, but they must be built according to the i8〇42 port driver, so the i8〇42 port driver cannot be changed at will. However, the Linux open source operating system can rewrite the driver. Even if Linux can rewrite the KBC driver to fix the above encryption control button, the new problem may arise, that is, there is a decrypted algorithm and key in the operating system, making the encryption system easier to be Crack the risk of 7 200928849. Therefore, the present invention divides the keyboard keys into two categories: a text button and a control button, the text button can be encrypted, and the control button remains as it is, without processing, so that the driver of the operating system does not have to be changed. And the decryption of the play: it is better to put it on the server computer. For a better understanding of the features and technical contents of the present invention, please refer to the detailed description of the [implementation method] and the accompanying drawings. The detailed description and drawings are for the purpose of illustration and description 〇[Embodiment] Please refer to the third figure (the conventional technology keyboard device controller block diagram) 'The keyboard key matrix 31 is scanned by the keyboard matrix control module 302, if a user presses a key or releases the button' The control signal and the scan address of the (make key) or release (b^eak key) are issued, and the make key and the break key generate corresponding scans via the keyboard key data generation module 3〇i. The position of the button code (ScanCode), and then transferred to the interface connected to the host computer 3, that is, PS2 or USB keyboard interface; if the KBC of the notebook computer through the internal software or hardware of the chip, directly through the Lpc ( L〇w pin c〇unt BUS) is uploaded to the South Bridge Chipset.

鍵盤按鍵資料產生模組3〇1的作用在於把每個按鍵的位置對 應出PS2或USB按鍵的編碼(scanc〇de),例如:按鍵A位於 鍵盤矩陣控制器掃瞄到的第85h號位置(Scan Address),而A 在 PS2 規格書(PS2 Set2 Scan Code)上的 make key = ICh ; USB HID則是〇4h。鍵盤按鍵資料產生模組3〇i即在將85h轉 換成ICh或04h ’然後送往連接電腦主機的介面3〇〇,即ps2 或USB鍵盤介面模組。 請參閱第四圖(本案使用技術鍵盤裝置控制器方塊圖),在鍵盤 200928849 料產生模組401旁邊加了—健織料加密模組侧, ,文子按鍵可以經過加雜’找料接冑駄機的介 〇。文字按鍵包括英文字母(A〜z),阿拉伯數字⑦〜9)盥办 ,(Space)共37個要加密,其他控制鍵 (Ctrl, Alt’ Shift,Tab, Caps Lock, F1 〜F12, Enter..·)則不項 加=。因為對側錄軟體有意義的按鍵是那些英文字母、阿拉伯 數字與與空自鍵(Space) 且控輪鍵對作業系統個有不同 的功用’本發明並不須要更改作業系統原本KBC的驅動程 (i8042 port driver),是故不對控制鍵加密。 ^實作時’於第四圖中,除了新增按鍵資料加密模組4〇4之 ,,鍵盤命令控制模組403中,為了要讓本發明之系統更有彈 f,並讓軟體使用更方便,可以在鍵盤命令控制模組403中設 a十一組防側錄加密鍵盤的命令。這一組新的命令的功能,例如 開啟與關雄·防侧錄鍵盤、設定或選擇加密的演算法以及演算法 的參數;讓軟體可以直接控制防侧錄鍵盤。當然這些命令的設 計必須要能確保整個防侧錄鍵盤的系統是不會被破解的才 行;新命令實施例如下: 設定鍵盤裝置控制器的RSA加密演算法的公開金餘 F〇 FA 06 FA W1 FA W2 FA W3 FA W4 FA … 讀取RSA加密過的文字按鍵解碼對應表 F0 FA 07 FA R1 R2 R3 R4 …The function of the keyboard key data generating module 3〇1 is to map the position of each button to the code of the PS2 or USB button (scanc〇de), for example, the button A is located at the 85h position scanned by the keyboard matrix controller ( Scan Address), and A makes key = ICh on the PS2 Set2 Scan Code; USB HID is 〇4h. The keyboard key data generation module 3〇i is converted to ICh or 04h ’ and then sent to the interface 3连接 connected to the host computer, ie ps2 or USB keyboard interface module. Please refer to the fourth figure (in this case, use the technical keyboard device controller block diagram), and add the woven material encryption module side next to the keyboard 200928849 material generation module 401, and the text button can be used to add the impurity to find the material. Introduction of the machine. Text keys include English letters (A ~ z), Arabic numerals 7 ~ 9), (Space) a total of 37 to be encrypted, other control keys (Ctrl, Alt' Shift, Tab, Caps Lock, F1 ~ F12, Enter. ..) Then add no =. Because the buttons that are meaningful to the side recording software are those English letters, Arabic numerals and empty keys (Space) and the control wheel keys have different functions for the operating system. The present invention does not need to change the operating system's original KBC driver (i8042). Port driver), so the control key is not encrypted. ^In the fourth figure, in addition to the new key data encryption module 4〇4, in the keyboard command control module 403, in order to make the system of the present invention more elastic, and let the software use more Conveniently, an eleven sets of anti-side recording encryption keyboard commands can be set in the keyboard command control module 403. The functions of this new set of commands, such as enabling and closing the keyboard, setting or selecting the encryption algorithm and algorithm parameters; allowing the software to directly control the anti-sliding keyboard. Of course, these commands must be designed to ensure that the entire anti-sideboard system is not cracked; the new command implementation is as follows: Set the RSA encryption algorithm for the keyboard device controller. W1 FA W2 FA W3 FA W4 FA ... Read RSA encrypted text button decoding correspondence table F0 FA 07 FA R1 R2 R3 R4 ...

啟動防侧錄鍵盤加密功能 F0 FA 08 FA ^本PS2鍵盤命令FOh (Access Scan Code Set)為讀取或設 =PS2鍵盤掃瞄碼的命令;命令格式為f〇 fa 〇〇 FA 02 (都 是十六進位數值),其中FA為鍵盤裝置控制器(Keyb〇ard 9 200928849 要的應碼(aCk_ledge) ’GG代表軟體 =,PS2鍵盤掃猫碼代號,〇2代表目前掃瞒碼為秘;若 巧中00取代為非00之值例如〇1或02,則代表設定ps2鍵 盤掃瞄碼為Setl Scan Code或Set2 Scan Code ;目前常見掃 =碼有Setl,Set2,與Set3。現在新增PS2鍵盤掃瞒碼㈣: =FA 06 FA W1 FA W2 FA W3 FA W4 FA …。其中 06 代表新 掃猫碼為Set6為新設定的編號’目的為設定RSA加密賓算法 之公開麵給鍵盤裝置控制n,並不是真的有Set6掃猫碼,, FA為鍵盤裝置控制器的回應碼(ackn〇wled软),而 Wl,W2’ W3, W4…代表寫入鍵盤裝置控制器的RSA公開金矯。 在設定RSA公開金鑰之後,就可以用新命令F〇 FA 〇7 FA R1敗 R3 R4…讀取文字按鍵解碼對應表,其中〇7為代表讀取文字 按鍵解碼對應表命令碼,而Rl,R2, R3, R4…代表文字按鍵解碼 對應表。文字按鍵解碼對應表在每次設定RSA加密演算法的公 開金鑰時都會改變。只有擁有RSA私鑰才能解開文字按鍵解碼 對應表。理論上,若使用一次性RSA加密法,也就是每次要求 防侧錄鍵盤功能時都更改RSA的公私金输,要破解一次性加密 法是非常困難的。若將RSA的私鍮放在較安全的伺服器電腦 上,那安全性就更高了,因為常見的按鍵侧錄軟體是發生在一 般使用者的個人電腦上,伺服器電腦因為人為操作較&,較不 會不小心被按鍵侧錄軟體入侵。 新命令F0 FA 08 FA啟動防侧錄鍵盤加密功能,即設定Set8 為防側錄鍵盤的啟動命令’防側錄鍵盤接收到這個命令後,若 使用者按了 A鍵,在主機電腦KBCPS2連接璋上就會收到aa, β鍵則會收到bb…’而不是Set2的ICh與32h(A與B的makL code)。只要將aa與bb查尋解碼後的文字按鍵解碼對應表, 可得原來鍵盤送出來的是ICh與32h。 200928849 ^ 37鍵)交換編碼’即單字母加密法⑽職恤^^ Cipher) ’㈣主要在讓域電腦不必安裝__ 運作,因為其他非文字科控彻按鍵都沒有ϊ Ϊ解到的加文字是重新編碼的文字。而重新編瑪 的解碼表疋以RSA的公開金鑰保護。Start anti-sideboard keyboard encryption function F0 FA 08 FA ^This PS2 keyboard command FOh (Access Scan Code Set) is the command to read or set =PS2 keyboard scan code; the command format is f〇fa 〇〇FA 02 (both The hexadecimal value), where FA is the keyboard device controller (Keyb〇ard 9 200928849 should be the code (aCk_ledge) 'GG stands for software=, PS2 keyboard scans the cat code code, 〇2 stands for the current broom code is secret; If 00 is replaced by a value other than 00, such as 〇1 or 02, it means setting the ps2 keyboard scan code to Setl Scan Code or Set2 Scan Code; currently common scan code has Setl, Set2, and Set3. Now add PS2 keyboard Broom code (4): =FA 06 FA W1 FA W2 FA W3 FA W4 FA .... where 06 means the new scan cat code is Set6 for the newly set number '. The purpose is to set the public face of the RSA encryption algorithm to the keyboard device control n, It is not true that Set6 scans the cat code, FA is the response code of the keyboard device controller (ackn〇wled soft), and Wl, W2' W3, W4... represents the RSA open gold correction written to the keyboard device controller. After setting the RSA public key, you can use the new command F〇FA 〇7 FA R1 to defeat R3. R4...Reads the text button decoding correspondence table, where 〇7 is the command code for decoding the corresponding text button decoding, and Rl, R2, R3, R4... represents the text button decoding correspondence table. The text button decoding correspondence table is set each time. The public key of the RSA encryption algorithm will change. Only the RSA private key can be used to unlock the text key decoding correspondence table. In theory, if the one-time RSA encryption method is used, it is changed every time the anti-sideboard function is required. RSA's public and private gold, it is very difficult to break the one-time encryption method. If you put RSA's private information on a more secure server computer, the security is even higher, because the common key-side recording software is happening. On a general user's personal computer, the server computer is inadvertently invaded by the button side recording software because of the human operation. The new command F0 FA 08 FA starts the anti-side recording keyboard encryption function, that is, set Set8 to prevent The start command of the side-recording keyboard 'After the side-recording keyboard receives this command, if the user presses the A key, it will receive aa on the host computer KBCPS2 connection, and the β key will receive bb. 'Instead of Seth's ICh and 32h (A and B's makL code). As long as the aa and bb search for the decoded text button to decode the correspondence table, the original keyboard can be sent out is ICh and 32h. 200928849 ^ 37 key) exchange Encoding 'single-letter cryptography (10), ^^ Cipher) '(4) Mainly in the domain computer does not have to install __ operation, because other non-textual control buttons are not ϊ The added text is re-encoded text. The re-encoded decoding table is protected by RSA's public key.

完成防側錄功能之後,以F0 FA 〇2 FA,設回pS2 鍵盤 掃瞄碼,即關閉防側錄鍵盤,回到一般鍵盤的狀態。 以上實施例主要以桌上型電腦之外接鍵盤為例,若回到第一圖 中,KBC 101或202是在電腦主機内,是控制ps2外接鍵盤的 控制器,並且位按鍵資料的中途,所以亦可將文字加密的功能 放在KBC内’如第五圖。KBC50内之鍵盤控制器主機介面5〇〇 (KBC Host Interface)以三個暫存器來讓電腦軟體讀取或寫入 命令或資料;分別為資料暫存器的讀取與寫入(read/wHte KBC Data Register, 10 port 60h),以及命令暫存器(kbc Command Register ’ write 10 port 64h) ’ 還有狀態暫存器(KBC Status Register ’ read 10 port 64h)。KBC 50 再透過 LPC(Low Pin Count BUS)連上南橋晶片組(South Bridge Chipset)。 當KBC 50透過連接鍵盤的介面502,接收外接PS2鍵盤的按 鍵資料後,會把按鍵資料透過鍵盤按鍵資料產生模組501 ,由 Set2 Scan Code對應成Setl Scan Code,再傳給鍵盤控制器 主機介面500内的輸出資料暫存器(Output Buffer),並且把 狀態暫存器上的輸出旗標設定為1(KBC Status Register BitO, OBF,Output Buffer Full Flag);等待軟體透過讀取資料暫 存器(Read KBC data 10 port 60h)來取得按鍵資料。如果在 11 200928849 ======前,先經過按鍵資料加密 置控制器上(Kpv^ if如同刖&所述把加密功能放在鍵盤裝 詈抻制哭沾DeV1Ce C〇ntr〇1 ler)。唯KBC與鍵盤裝 二加=在。ί橋晶片組(&uth Bridge ^可_,絲,==:力 0 只是側錄鍵 的資料,則螢幕側錄軟體可能侧錄出使正確 而造成這個系統還有-==== ΪΓ 最好的作法是在使用者操作鍵 資料不會有被解碼的可 月& ‘鑰的軟體,以確保按鍵 Ο 為了使用者的使用便利性,有幾種方式可 -個是在鍵盤上加一個小型的顯示器的問題, 接把使用者輸人敝轉該面板,直 本增加較多,使用上也較不那麼直接。不^系統硬體成 在主機板60的鍵盤控制器602上接式ί第六圖, 通往南橋晶片組601之外,另有—新的 吊的加密按鍵資料 _,直接輸出未加密按鍵身^的盤資料直接輪出 貝枓至顯像控制器600 (Vga 12 200928849 ^roller 或 GPU,Graphic Pr〇cessing _)。 體通常透侧雜個螢幕的記賴資 果,是故這個鍵盤資料直接輸出的連線6〇3必二== 錄的記憶齡置,崎雜絲的功效。被側 以上所述之實補只鱗細朗本發明,並_來 之範圍,本發明含蓋之範圍應以申請專利範圍所述 \ 於本發明之精神之實施例皆應為本發明含蓋之範圍。 σ 【圖式簡單說明】 第一圖為習知技術系統架構圖。 第二圖為本案技術系統架構圖。 第二圖為習知技術鍵盤裝置控制器方塊圖。 第四圖為本案使用技術鍵盤裝置控制器方塊圖。 第五圖為本案使用鍵盤控制器方塊圖。 第六圖為本案使用鍵盤資料直接輸出方塊圖。 【主要元件符號說明】 第一圖:After completing the anti-slide function, set the pS2 keyboard scan code to F0 FA 〇2 FA, that is, turn off the anti-side recording keyboard and return to the normal keyboard state. The above embodiment mainly takes the keyboard of the desktop computer as an example. If the computer is returned to the first figure, the KBC 101 or 202 is in the host computer, and is the controller for controlling the external keyboard of the ps2, and the middle of the key information, so You can also put the text encryption function in the KBC' as shown in the fifth picture. The KBC Host Interface in KBC50 uses three registers to allow the computer software to read or write commands or data; read and write data buffers respectively (read/ wHte KBC Data Register, 10 port 60h), and the command register (kbc Command Register ' write 10 port 64h) ' also has a status register (KBC Status Register ' read 10 port 64h). The KBC 50 is connected to the South Bridge Chipset via LPC (Low Pin Count BUS). When the KBC 50 receives the key data of the external PS2 keyboard through the interface 502 of the keyboard, the key data is transmitted through the keyboard key data generation module 501, and the Set2 Scan Code is corresponding to the Setl Scan Code, and then transmitted to the keyboard controller host interface. The output data buffer (Output Buffer) in 500, and the output flag on the status register is set to 1 (KBC Status Register BitO, OBF, Output Buffer Full Flag); waiting for the software to read through the data register (Read KBC data 10 port 60h) to get the button data. If before 11 200928849 ======, first pass the key data encryption on the controller (Kpv^ if as 刖& put the encryption function on the keyboard decoration system crying DeV1Ce C〇ntr〇1 ler ). Only KBC and keyboard installed two plus = in. ί bridge chipset (&uth Bridge ^ can _, silk, ==: force 0 is only the data of the side recording key, the screen side recording software may be recorded on the side to make it correct and cause this system to have -==== ΪΓ The best way to do this is to use the software that does not have to be decoded by the user to operate the key data to ensure the button Ο. For the convenience of the user, there are several ways - one is added on the keyboard. The problem of a small display is that the user loses the switch to the panel, and the direct increase is more, and the use is less direct. The system hardware is connected to the keyboard controller 602 of the motherboard 60. ί sixth picture, in addition to the south bridge chipset 601, another - new hanging encryption key data _, directly output the unencrypted button body ^ disk data directly from the Bellow to the display controller 600 (Vga 12 200928849 ^roller or GPU, Graphic Pr〇cessing _). The body usually passes through the miscellaneous screen of the screen, so the connection of the keyboard data directly output 6〇3 must be two == recorded memory age, Saki The effect of the miscellaneous silk. The scope of the present invention is intended to cover the scope of the invention. The embodiment of the present invention should cover the scope of the invention. σ [Simple description of the drawing] The first figure is a conventional technical system. The second figure is a block diagram of the technical system of the prior art. The second figure is a block diagram of the controller of the prior art keyboard device. The fourth figure is a block diagram of the controller of the technical keyboard device used in the present case. The sixth figure shows the block diagram directly using the keyboard data for this case. [Main component symbol description] The first picture:

電腦主機 1〇 KBC或USB主機控制器 1〇1 鍵盤侧錄軟體 102 鍵盤 11 鍵盤連接線 12 第二圖: 電腦主機 20 KBC或USB主機控制器 201 鍵盤侧錄軟體 202 13 200928849 防侧錄鍵盤 21 鍵盤連接線 22 第三圖: 鍵盤裝置控制器 30 連接電腦主機的介面 300 鍵盤按鍵資料產生模組 301 鍵盤矩陣控制模組 302 鍵盤命令控制模組 303 鍵盤矩陣 31Computer host 1〇KBC or USB host controller1〇1 Keyboard side recording software 102 Keyboard 11 Keyboard cable 12 Second figure: Computer host 20 KBC or USB host controller 201 Keyboard side recording software 202 13 200928849 Anti-side recording keyboard 21 Keyboard cable 22 Third diagram: Keyboard device controller 30 Interface to the host computer 300 Keyboard button data generation module 301 Keyboard matrix control module 302 Keyboard command control module 303 Keyboard matrix 31

第四圖: 鍵盤裝置控制器 40 連接電腦主機的介面 400 鍵盤按鍵資料產生模組 401 鍵盤矩陣控制模組 402 鍵盤命令控制模組 403 按鍵資料加密模組 404 鍵盤矩陣 41Figure 4: Keyboard Device Controller 40 Interface to the host computer 400 Keyboard button data generation module 401 Keyboard matrix control module 402 Keyboard command control module 403 Button data encryption module 404 Keyboard matrix 41

第五圖: KBC(鍵盤控制器) 50 鍵盤控制器主機介面 500 鍵盤按鍵資料產生模組 501 連接鍵盤的介面 502 鍵盤控制器命令控制模組 503 按鍵資料加密模組 504 第六圖. 14 200928849 電腦主機板 60 VGA(顯像控制器) 600 南橋晶片組 601 KBC(鍵盤控制器) 602 鍵盤資料直接輸出連線 603 申請專利範圍: 1. 一個防止電腦鍵盤按鍵資料被側錄的方法,此方法包含: e 一個鍵盤矩陣; 一個鍵盤矩陣控制模組; 一個鍵盤按鍵資料產生模組; 一個資料加密模組; 一個連接電腦主機的介面; 其。中,當使用者在鍵盤按下某一按鍵時,鍵盤矩陣即產生一個 讯號父又點,經由鍵盤矩陣控制模組掃瞄出該交又的位置(掃瞄 位置,Scan Address),再送往鍵盤按鍵資料產生模組,產生對 應該按鍵的鍵盤掃瞄碼(Scan c〇de),若該按鍵為文字鍵 A/,C”j’ 〇, 1,2.··9與空白鍵,則將該文字掃瞄碼經(Scan c〇de) 資料加密模組重新編碼,再送往連接電腦主機的介面;因此電 腦主機軟體接收到的文字掃瞄碼(Scan c〇de)是經過加密的文 字掃猫碼(Scan Code),以此達到防制鍵盤侧錄程式的功效;並 且電腦主機軟體接收到的ctrl,Alt,Shift,Tab,Caps Lock’ FI〜F12, Enter…等等控制鍵掃瞄碼(Scan c〇de)並沒有經 過重新編碼加密,所以相容於作業系統現有之鍵盤驅動程式。 2.如申請專利範圍第1項所述之鍵盤矩陣控制模組,以交又掃 猫方式’決疋出按鍵掃猫位置(Scan Address),亦即按鍵的位Figure 5: KBC (Keyboard Controller) 50 Keyboard Controller Host Interface 500 Keyboard Key Data Generation Module 501 Keyboard Interface 502 Keyboard Controller Command Control Module 503 Key Data Encryption Module 504 Figure 6. 14 200928849 Computer Motherboard 60 VGA (development controller) 600 Southbridge chipset 601 KBC (keyboard controller) 602 Keyboard data direct output connection 603 Patent application scope: 1. A method to prevent computer keyboard key data from being recorded, this method includes : e A keyboard matrix; a keyboard matrix control module; a keyboard key data generation module; a data encryption module; an interface connected to the host computer; When the user presses a button on the keyboard, the keyboard matrix generates a signal parent and points, and scans the position of the intersection (Scan Address) through the keyboard matrix control module, and then sends Go to the keyboard button data generation module to generate a keyboard scan code (Scan c〇de) corresponding to the button. If the button is the text button A/, C"j' 〇, 1,2.··9 and the blank button, The text scan code is re-encoded by the (Scan c〇de) data encryption module, and then sent to the interface connected to the host computer; therefore, the text scan code (Scan c〇de) received by the host computer software is encrypted. The Scan Code is used to control the function of the keyboard side recording program; and the computer host software receives the ctrl, Alt, Shift, Tab, Caps Lock' FI~F12, Enter... and so on. The scan code (Scan c〇de) is not re-encoded and encrypted, so it is compatible with the existing keyboard driver of the operating system. 2. The keyboard matrix control module described in the first application of the patent scope is used for sweeping and sweeping. Cat mode 'decision button scan position (Scan Address), also The position of the button

Claims (1)

200928849 電腦主機板 60 VGA(顯像控制器) 600 南橋晶片組 601 KBC(鍵盤控制器) 602 鍵盤資料直接輸出連線 603 申請專利範圍: 1. 一個防止電腦鍵盤按鍵資料被側錄的方法,此方法包含: e 一個鍵盤矩陣; 一個鍵盤矩陣控制模組; 一個鍵盤按鍵資料產生模組; 一個資料加密模組; 一個連接電腦主機的介面; 其。中,當使用者在鍵盤按下某一按鍵時,鍵盤矩陣即產生一個 讯號父又點,經由鍵盤矩陣控制模組掃瞄出該交又的位置(掃瞄 位置,Scan Address),再送往鍵盤按鍵資料產生模組,產生對 應該按鍵的鍵盤掃瞄碼(Scan c〇de),若該按鍵為文字鍵 A/,C”j’ 〇, 1,2.··9與空白鍵,則將該文字掃瞄碼經(Scan c〇de) 資料加密模組重新編碼,再送往連接電腦主機的介面;因此電 腦主機軟體接收到的文字掃瞄碼(Scan c〇de)是經過加密的文 字掃猫碼(Scan Code),以此達到防制鍵盤侧錄程式的功效;並 且電腦主機軟體接收到的ctrl,Alt,Shift,Tab,Caps Lock’ FI〜F12, Enter…等等控制鍵掃瞄碼(Scan c〇de)並沒有經 過重新編碼加密,所以相容於作業系統現有之鍵盤驅動程式。 2.如申請專利範圍第1項所述之鍵盤矩陣控制模組,以交又掃 猫方式’決疋出按鍵掃猫位置(Scan Address),亦即按鍵的位 200928849 3.如申請專繼圍第1項職之鍵触鍵資料產蝴組輸出之 編碼為符合PS2或USB標準鍵盤規格所述之鍵盤按鍵編碼(ps2 Setl、Set2以及USB HID Scan Code),是故在其中有一個對應 表’決定每個掃瞄位置所對應的掃瞄碼(Scan c〇de)。 " 4’如申π專利範圍第1項所述之按鍵資料力π密模組用來把m2 或USB標準鍵盤規格所述之Α,Β,c...z,〇, 2···9與空白鍵的掃 瞄碼(ScanCode)重新編碼加密,重新編碼之文字掃瞄碼還是落 在文字掃瞄碼的範圍;其他CtrlAltShiftTab,Caps ❹ Lock,FHF12, Enter…等等控制鍵並不重新編碼加密。, 5. 如申請專利範圍第丨項所述之心艮&"2,〇,12_9,包括小 寫字母a,b,c…z,以及與〇〜9同一按鍵之符號)j,@...(以 及’九宮格之數字鍵與+-V符號。 6. 如申請專利範圍第!項所述之連接電腦主機的介面為ps2或 USB或LPC(Low Pin Count BUS),連接到鍵盤控制器(騰)或南 橋晶片組(South Bridge Chipset)。 ❹ 7. —個防止電腦鍵盤按鍵資料被側錄的方法,此方法包含: 一個連接鍵盤的介面; 一個鍵盤按鍵資料產生模組; 一個資料加密模組; 一個連接電腦主機的介面; 其中,連接鍵盤的介面接收鍵盤送出按鍵掃瞄碼(Scan c〇de), 16 200928849 經由鍵盤按鍵資料產生模組,產生對應該鍵盤掃瞄碼(Scan Code)的新鍵盤掃猫碼(scan Code),若該鍵盤掃瞄碼(Scan c〇de) 為文字鍵A,B,C."Z,0,1,2…9與空白鍵,則將該文字掃瞄碼經 (Scan Code)資料加密模組重新編碼,重新編碼之文字掃瞄碼 (Scan Code)還是落在文字掃瞒碼的範圍,再送往連接電腦主機 的介面;因此電腦主機軟體接收到的文字掃瞄碼(Scan c〇de) 是經過加密的文字掃瞄碼(Scan Code),以此達到防制鍵盤側錄 程式的功效;並且電腦主機軟體接收到的 Ctrl, Alt, Shift, Tab, Caps Lock, F1 〜F12, Enter…等等控制鍵 ❹ 掃瞄碼(Scan Code)並沒有經過重新編碼加密,所以相容^作業 系統現有之鍵盤驅動程式。 、、 8. 如申請專利範圍第7項所述之連接鍵盤的介面為pS2鍵盤介 面。 9. 如申請專利範圍第7項所述之鍵盤按鍵資料產生模組所輸出 之編碼為符合PS2標準鍵盤規格所述之鍵盤按鍵編 Setl、Set2 Scan Code) ’是故其中有一個對應表,決定每個掃 瞄碼(PS2 Set2 Scan Code)該對應到的新掃瞄碼(PS2 Setl Scan ❹ Code)。 10. 如申請專利範圍第7項所述之文字鍵a,Β,〇··Ζ, 0,1, 2…9, 包括小寫字母a,b,c.“z,以及與〇〜9同一按鍵之符 號),!,@. ·.(以及’九宮格之數字鍵與+-*/符號。 11. 如申請專利範圍第7項所述之連接電腦主機的介面為 LPC(Low Pin Count BUS),連接到鍵盤控制器(KBC)或南橋晶 片組(South Bridge Chipset)。 17 200928849 12·—個直接輪出按鍵 含: 資料至螢幕的魏防贿方法,此方法包 -個防侧錄加密鍵盤控制器; 一個顯像控制器; ° ’ 個連接鍵盤控制器和顯像控制器的連線; 其中鍵盤控制ϋ輸出未加密 制器和顯像控制器的連緩 鍵二枓,透過連接鍵盤控 ?示在勞幕上,讓使:====== 是防則錄的亂碼。 』具土筏鍵的文子,而不 符人PS2f準鍵盤祕所f所述防側錄加密鍵盤控制器,將 。^鍵盤規格所述之_按鍵編碼由_碼(脱如2 Scan Code)=對應到的新掃瞄碼(ps2 Setl ^如)·並且 將文字按鍵資料重新編碼加密;其他ctrl,姐,Shift,賊 Lock’ FI〜F12, Enter…等等控制鍵並不重新編碼加密。 14.如申請專利範圍第12項所述之顯像控制器,為VGA控制器 或 GPU(Graphic Processing Unit)。 15. 如申請專利範圍第12項所述之文字按鍵資料為 Α,Β,Ο··Ζ,0,1,2···9 與空白鍵的掃瞄碼(Scan c〇de)。 16. 如申請專利範圍第12項所述之18,〇..乙0,1,2〜9,包括 小寫子母a, b, c·.·ζ,以及與〇〜9同一按鍵之符 號),!,@...(以及’九宮格之數字鍵與+_*/符號。 200928849 七、指定代表圖: 本案指定代表圖為:第(二)圖。 本代表圖之元件符號簡單說明: 電腦主機 20 KBC或USB主機控制器 201 鍵盤侧錄軟體 202 防側錄鍵盤 21 鍵盤連接線 22 八、 本案若有化學式時,請揭示最能顯示發明特徵的化學式: 九、 發明說明: 【發明所屬之技術領域】 本發明為一電腦週邊裝置的資料保全方法,即電腦鍵盤防侧錄 的方法。透過這個方法,可確保電腦鍵盤按鍵真正的資料不 會被非法的側錄軟體取得;因為鍵盤的按鍵資料是經過鍵盤 加密。 【先前技術】 凊參閱第一圖,個人電腦(personal Computer, PC)鍵盤11 的按鍵資料係經由中央處理器(Central Processing Unit, CPU)之輸出入指令(i〇 instructi〇ns)與輸出入槔6〇h及 64h ’ 即 KBC 101 (Keyboard Controller 10 ports 60h,64h(h 代表十六進位數字))來達成。由於個人電腦的軟硬體架構的 關係’任意軟體都可以輕易地取得鍵盤按鍵的資料,^且 用者都不會查覺到任何異狀。按鍵側錄或間謀軟體 _物姆非法盗取200928849 Computer motherboard 60 VGA (development controller) 600 South bridge chipset 601 KBC (keyboard controller) 602 Keyboard data direct output connection 603 Patent application scope: 1. A method to prevent the computer keyboard key data from being recorded. The method comprises: e a keyboard matrix; a keyboard matrix control module; a keyboard key data generation module; a data encryption module; an interface connected to the host computer; When the user presses a button on the keyboard, the keyboard matrix generates a signal parent and points, and scans the position of the intersection (Scan Address) through the keyboard matrix control module, and then sends Go to the keyboard button data generation module to generate a keyboard scan code (Scan c〇de) corresponding to the button. If the button is the text button A/, C"j' 〇, 1,2.··9 and the blank button, The text scan code is re-encoded by the (Scan c〇de) data encryption module, and then sent to the interface connected to the host computer; therefore, the text scan code (Scan c〇de) received by the host computer software is encrypted. The Scan Code is used to control the function of the keyboard side recording program; and the computer host software receives the ctrl, Alt, Shift, Tab, Caps Lock' FI~F12, Enter... and so on. The scan code (Scan c〇de) is not re-encoded and encrypted, so it is compatible with the existing keyboard driver of the operating system. 2. The keyboard matrix control module described in the first application of the patent scope is used for sweeping and sweeping. The cat mode 'cuts the button to scan the Scan Address, That is, the bit of the button 200928849 3. If you apply for the keystroke key of the first job, the code of the output of the butterfly group is the keyboard key code (PS2 Setl, Set2 and USB HID Scan) as described in PS2 or USB standard keyboard specifications. Code), so there is a corresponding table 'determines the scan code corresponding to each scan position (Scan c〇de). " 4', as described in the scope of the π patent range, the key data force π The secret module is used to re-encode and re-encode the scan code (ScanCode) of the m2 or USB standard keyboard specifications, c, c...z, 〇, 2···9 and the blank key. The scan code still falls within the scope of the text scan code; other CtrlAltShiftTab, Caps ❹ Lock, FHF12, Enter... and so on do not re-encode the encryption. 5. As described in the scope of the patent application, the heart &;"2,〇,12_9, including lowercase letters a, b, c...z, and the same key symbol as 〇~9) j, @... (and the numeric keys of the nine squares and the +-V symbol. 6 The interface for connecting to the host computer as described in the application for the scope of the patent is ps2 or USB or LPC (Low Pin Count BUS). Connect to the keyboard controller (Teng) or South Bridge Chipset. ❹ 7. A method to prevent the computer keyboard key data from being recorded. This method includes: a keyboard connection interface; a keyboard key data generation Module; a data encryption module; an interface connected to the host computer; wherein, the interface connected to the keyboard receives the keyboard to send the button scan code (Scan c〇de), 16 200928849 through the keyboard button data generation module, generate the corresponding keyboard Scan Code's new keyboard scan code, if the keyboard scan code (Scan c〇de) is the text key A, B, C. " Z, 0, 1, 2...9 With the blank key, the text scan code is re-encoded by the Scan Code data encryption module, and the re-encoded scan code is still in the range of the text broom code, and then sent to the connected computer host. The interface scan code (Scan c〇de) received by the host computer software is an encrypted text scan code (Scan Code), thereby achieving the effect of preventing the keyboard side recording program; and the host computer software receiving To Ctrl, Alt, Shift, Tab, Caps Lock, F1 ~ F12, Enter... and so on. ❹ Scan Code is not re-encoded, so it is compatible with the existing keyboard driver. 8. The interface for connecting the keyboard as described in item 7 of the patent application is the pS2 keyboard interface. 9. If the keyboard key data generation module described in item 7 of the patent application scope outputs the code as the keyboard key set according to the PS2 standard keyboard specification, Setl, Set2 Scan Code) 'is therefore one of the correspondence tables, the decision Each scan code (PS2 Set1 Scan Code) corresponds to the new scan code (PS2 Setl Scan ❹ Code). 10. For the text key a, Β, 〇··Ζ, 0,1, 2...9, including the lowercase letters a, b, c. “z, and the same button as 〇~9, as described in item 7 of the patent application scope. The symbol), !, @. ·. (and the '9-square grid number key and +-*/ symbol. 11. The interface for connecting to the host computer as described in claim 7 is LPC (Low Pin Count BUS), Connect to the keyboard controller (KBC) or South Bridge Chipset. 17 200928849 12·—A direct turn-out button with: Data to the screen's Wei anti-bribery method, this method package - an anti-side recording encryption keyboard control ; a development controller; ° 'connected keyboard controller and development controller connection; where the keyboard control ϋ output unencrypted controller and the development controller's linkage key two, through the connection keyboard control? Show on the screen, let: ====== is the garbled code of the anti-recording. 』The text of the soil card, not the PS2f quasi-keyboard secrets f anti-side recording encryption keyboard controller, will ^ Keyboard specification described _ button coded by _ code (off 2 Scan Code) = corresponding new scan code (ps2 Setl ^ ) and re-encode the text key data; other ctrl, sister, Shift, thief Lock' FI~F12, Enter... and so on do not re-encode the encryption. 14. As shown in the scope of claim 12 Like the controller, it is a VGA controller or a GPU (Graphic Processing Unit). 15. The text button information as described in item 12 of the patent application is Α, Β, Ο··Ζ, 0,1,2···9 Scan code with blank key (Scan c〇de) 16. As described in item 12 of the patent application, 〇.. B 0,1,2~9, including lowercase mother a, b, c· .·ζ, and the symbol of the same button with 〇~9),!,@...(and the number key of the nine squares and the +_*/ symbol. 200928849 VII. Designation of the representative figure: The representative figure of the case is: 2) Figure. The symbol of the symbol of this representative is simple: Computer host 20 KBC or USB host controller 201 Keyboard side recording software 202 Anti-side recording keyboard 21 Keyboard connection line 22 8. If there is a chemical formula in this case, please reveal the best display Chemical formula of the invention features: IX. Description of the invention: [Technical field to which the invention pertains] The invention relates to a data security method for a computer peripheral device, that is, a method for preventing a side view of a computer keyboard. Through this method, it is ensured that the real data of the computer keyboard keys is not obtained by the illegal side recording software; Keyboard encryption. [Prior Art] 凊 Referring to the first figure, the key data of the personal computer (PC) keyboard 11 is input and output (i〇instructi〇ns) and output through the central processing unit (CPU). 6〇h and 64h' are KBC 101 (Keyboard Controller 10 ports 60h, 64h (h stands for hexadecimal digits)). Due to the relationship between the hardware and software architecture of the personal computer, any software can easily obtain the data of the keyboard keys, and the user will not detect any abnormalities. Button side recording or intervening software _ illegal illegal stealing
TW096148363A 2007-12-18 2007-12-18 A method for keyloggers resistant keyboard TWI368863B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW096148363A TWI368863B (en) 2007-12-18 2007-12-18 A method for keyloggers resistant keyboard

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW096148363A TWI368863B (en) 2007-12-18 2007-12-18 A method for keyloggers resistant keyboard

Publications (2)

Publication Number Publication Date
TW200928849A true TW200928849A (en) 2009-07-01
TWI368863B TWI368863B (en) 2012-07-21

Family

ID=44864256

Family Applications (1)

Application Number Title Priority Date Filing Date
TW096148363A TWI368863B (en) 2007-12-18 2007-12-18 A method for keyloggers resistant keyboard

Country Status (1)

Country Link
TW (1) TWI368863B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200104538A1 (en) * 2018-09-27 2020-04-02 Citrix Systems, Inc. Encryption of keyboard data to avoid being read by endpoint-hosted keylogger applications

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI480760B (en) * 2013-02-06 2015-04-11 Chi Pei Wang Prevent the input data is recorded in the computer network system side

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200104538A1 (en) * 2018-09-27 2020-04-02 Citrix Systems, Inc. Encryption of keyboard data to avoid being read by endpoint-hosted keylogger applications
US11429753B2 (en) * 2018-09-27 2022-08-30 Citrix Systems, Inc. Encryption of keyboard data to avoid being read by endpoint-hosted keylogger applications

Also Published As

Publication number Publication date
TWI368863B (en) 2012-07-21

Similar Documents

Publication Publication Date Title
US7900252B2 (en) Method and apparatus for managing shared passwords on a multi-user computer
KR101878149B1 (en) Device, system, and method of secure entry and handling of passwords
JP4709992B2 (en) Authentication password storage method, generation method, user authentication method, and computer
EP3183681B1 (en) Accessing a secured software application
US8176324B1 (en) Method and system for a secure virtual keyboard
Kuhn Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP
US10616215B1 (en) Virtual smart card to perform security-critical operations
CN106687985B (en) Method for the safe input mechanism based on privileged mode
US7861015B2 (en) USB apparatus and control method therein
US8156331B2 (en) Information transfer
US8874931B2 (en) System and method for securing a user interface
US20090252323A1 (en) Methods, techniques and system for maintaining security on computer systems
CN101551784A (en) Method and device for encrypting data in ATA memory device with USB interface
JP2003510713A (en) Trusted computing platform that limits data usage
JPH1069514A (en) Financial transaction processing system
TW201539247A (en) Password input and verification method and system thereof
MXPA03004371A (en) Systems and methods for securing video card output.
KR20080101333A (en) Secutiry method using virtual keyboard
WO2017133204A1 (en) Bank card password protection method and system
JP6751856B2 (en) Information processing equipment and information processing system
JP4767619B2 (en) External storage device and SBC control method
TW200928849A (en) A method for keyloggers resistant keyboard
CN101751522B (en) Method, device and system for preventing keys of keyboard from being logged
JP2008160325A (en) User authentication method using removable device, and computer
KR20100048323A (en) Apparatus for and method of securing keyboard to evade stealth sniffing