Disclosure of Invention
A first objective of the present invention is to provide a wireless input device with an encryption key formed by a first partial key at a message receiving end and a second partial key at a message output end.
A second objective of the present invention is to provide an information transmission method applied to the wireless input device.
In a preferred embodiment, the present invention provides a wireless input device, comprising:
an information receiving end for generating a first partial key; and
an information output end, for receiving the first partial key and generating a second partial key, and the information output end at least utilizes the first partial key, the second partial key and an encryption algorithm to convert an original message into an encrypted message;
the information output end is further used for transmitting the encrypted information and the second partial key to the wireless receiver, and the wireless receiver restores the encrypted information to the original information by using at least the first partial key, the second partial key and the encryption algorithm.
In a preferred embodiment, the present invention also provides an information transmission method applied to a wireless input device, wherein the wireless input device includes an information receiving end and an information output end, and the information transmission method includes:
(a) generating a first partial key at the message receiving end;
(b) transmitting the first partial key to the message output end;
(c) generating a second partial key at the message output end;
(d) converting an original message into an encrypted message by using at least the first partial key, the second partial key and an encryption algorithm;
(e) transmitting the encrypted message and the second partial key to the message receiving end; and
(f) the encrypted message is restored to the original message by at least using the first partial key, the second partial key and the encryption algorithm.
Detailed Description
Embodiments of the invention will be further explained by the following in conjunction with the associated drawings. Wherever possible, the same reference numbers will be used throughout the drawings and the description to refer to the same or like parts. In the drawings, the shape and thickness may be exaggerated for simplicity and convenience. It is to be understood that elements not specifically shown in the drawings or described in the specification are of a type well known to those of ordinary skill in the art. Many variations and modifications may be made by one of ordinary skill in the art in light of the teachings of the present invention.
Please refer to fig. 2, which is a schematic diagram illustrating a preferred concept of the wireless input device signal connected to a computer host according to the present invention. In the preferred embodiment, the wireless input device is exemplified by a wireless mouse device 3, which includes a mouse body 31 and a wireless receiver 32, wherein the mouse body 31 can be held by a palm of a user for operation, for example, the user can move the mouse body 31, scroll a wheel 311 of the mouse body 31 or click a button 312 of the mouse body 31, and the wireless receiver 32 can be plugged into a connection terminal 41 of the computer host 4, wherein when the user operates the mouse body 31, the mouse body 31 can wirelessly communicate with the wireless receiver 32 plugged into the computer host 4, so that the computer host 4 executes corresponding operations, for example, moving a cursor 42, scrolling a window scroll 431, or enlarging/reducing/closing a window 43.
In the preferred embodiment, the host computer 4 can be, for example but not limited to, a desktop computer, a notebook computer, a tablet computer … … or other software-executable or programmable logic operation device, and the connection terminal 41 of the host computer 4 is a Universal Serial Bus (USB) terminal, and the wireless receiver 32 is a USB Dongle (USB Dongle) capable of being plugged into the USB terminal and communicates with the mouse body 31 by using a 2.4G radio frequency technology. However, the above embodiments are only examples, and the form of the host computer 4 and the connection terminal 41 thereof, the form of the wireless receiver 32 and the communication protocol between the mouse body 31 and the wireless receiver are not limited to the above embodiments.
When the user uses the wireless mouse device 3 for the first time, the mouse body 31 and the wireless receiver 32 need to complete pairing before wireless communication related to the control computer host 4 is performed, and during the communication pairing process between the mouse body 31 and the wireless receiver 32, related System information, such as Product Identification (PID), Product name (Product String), Serial Number (Serial Number), custom protocol or System Address (System Address) … …, is exchanged between the mouse body 31 and the wireless receiver 32, and the specific implementation manner related to the communication pairing between the mouse body 31 and the wireless receiver 32 is known by those skilled in the art and will not be described herein again.
Please refer to fig. 3A to 3C, which are schematic diagrams illustrating operation processes of the wireless input device and the host computer shown in fig. 2 according to a preferred embodiment. Here, the mouse body 31 and the wireless receiver 32 will be described as an information output terminal and an information receiving terminal, respectively. First, the wireless receiver 32 generates the first partial key 51 and transmits it to the mouse body 31, and during the transmission, the wireless receiver 32 can also simultaneously transmit a Cyclic Redundancy Check (CRC) 61 for ensuring that the first partial key 51 can be correctly transmitted, as shown in fig. 3A.
The first partial key 51 and the crc 61 may be transmitted to the mouse body 31 in a plain text or in a cipher mode to the mouse body 31, and the wireless receiver 32 may perform a non-linear operation on the first partial key 51 and the crc 61 to complete an encoding (encode) and then transmit the encoded encoding to the mouse body 31. In contrast, if the first partial key 51 and the crc 61 received by the mouse body 31 are transmitted in a cipher manner, the mouse body 31 first performs an inverse nonlinear operation on the first partial key 51 and the crc 61 for decoding (decode), as shown in fig. 3B.
Furthermore, the mouse body 31 generates the second partial key 52, and when the user holds the mouse body 31 with the palm to perform the operation, the mouse body 31 generates the original information 71 for controlling the computer host 4 and other purposes; the mouse body 31 converts the original information 71 into the encrypted information 72 by using at least the received first partial key 51, the generated second partial key 52, and an encryption algorithm, as shown in fig. 3B.
Further, in the preferred embodiment, the Encryption algorithm is Advanced Encryption Standard (AES), and the first partial key 51 and the second partial key 52 form the Encryption key 53 for encrypting the original information through the Encryption algorithm. Preferably, but not limited thereto, the original message 71 further includes a cyclic redundancy check code 711 for ensuring that the original message 71 can be correctly transmitted, and the mouse body 31 can further utilize a non-linear function to perform a non-linear operation on the encryption key 53 and the original message 71 to increase the difficulty of breaking the encrypted message.
Then, the mouse body 31 transmits the encrypted information 72 and the second partial key 52 to the wireless receiver 32, and the wireless receiver 32 utilizes at least the generated first partial key 51, the received second partial key 52 and the same encryption algorithm (such as advanced encryption standard) to restore the encrypted information 72 to the original information 71, as shown in fig. 3C. Further, in the preferred embodiment, after the wireless receiver 32 receives the second partial key 52, the wireless receiver 32 first obtains the encryption key 53 formed by the first partial key 51 and the second partial key 52 through an encryption algorithm (e.g., advanced encryption standard), and then decrypts the encrypted message 72 by using the encryption key 53. If the encryption key 53 and the original message 71 are non-linearly operated during the encryption process of the mouse body 31, the following wireless receiver 32 needs to perform a reverse non-linear operation during the decryption process of the encrypted message 72.
In addition, during the process of transmitting the second partial key 52 to the wireless receiver 32 by the mouse body 31, the wireless receiver 32 can also simultaneously transmit the cyclic redundancy check code 62 for ensuring that the second partial key 52 can be correctly transmitted. The second partial key 52 and the crc 62 can be transmitted to the wireless receiver 32 in a plain text, or can be transmitted to the wireless receiver 32 in an encrypted manner, for example, the mouse body 31 performs a nonlinear operation on the second partial key 52 and the crc 62 to complete the encoding, and then transmits the encoded result to the wireless receiver 32. In contrast, if the second partial key 52 and the crc 62 received by the subsequent wireless receiver 32 are cryptographically transmitted, the wireless receiver 32 first performs an inverse nonlinear operation on the second partial key 52 and the crc 62 for decoding.
Finally, the host computer 4 can obtain the original information 71 via the wireless receiver 32 to perform the corresponding operation. In summary, fig. 4 illustrates a preferred block flow diagram of the information transmission method of the present invention. The information transmission method comprises the following steps:
step P1, generating a first partial key at the message receiver;
step P2, transmitting the first partial key to the message output terminal;
step P3, generating a second partial key at the message output terminal;
step P4, converting an original message into an encrypted message by using at least the first partial key, the second partial key and an encryption algorithm;
step P5, transmitting the encrypted message and the second partial key to the message receiver; and
in step P6, the encrypted message is restored to the original message by using at least the first partial key, the second partial key and the encryption algorithm.
Preferably, but not limited thereto, in the step P1, the first partial key may be generated periodically or aperiodically, that is, the first partial key is updated periodically or aperiodically, and the information receiving end actively transmits the updated first partial key to the information output end. In addition, in the steps P1 and P3, the first partial key and the second partial key may be generated randomly or regularly, wherein if the encryption key formed by the encryption algorithm in the step P4 does not conform to the required length in practical applications, a fixed value, such as the System Address (System Address) or other fixed value, may be additionally refilled.
As can be seen from the above description, when the user holds the mouse body 31 with the palm to operate, since the mouse body 31 encrypts the information to be transmitted to the wireless receiver 32, the monitoring and the decryption by the malicious people during the communication between the mouse body 31 and the wireless receiver 32 can be avoided, so that the mouse body 31 and the wireless receiver 32 have sufficient information security protection.
In addition, another important advantage of the present disclosure is that the information receiving end and the information output end can generate the first partial key and the second partial key respectively, and the encryption key for encrypting or decrypting the information is formed by the first partial key and the second partial key, and the complete encryption key is not transmitted between the mouse body 31 and the wireless receiver 32, thereby reducing the length of the transmission packet and simplifying the complexity of encrypting the transmission information, so that the present disclosure can be more applied to the radio competition device requiring both the Report Rate (Report Rate) and the information security.
It should be understood that the above description is only exemplary, and those skilled in the art can make any equivalent design changes according to the actual application requirements. For example, although the mouse body and the wireless receiver are respectively used as the information output terminal and the information receiving terminal in the above embodiments, it may be alternatively designed that the mouse body and the wireless receiver are respectively used as the information receiving terminal and the information output terminal, that is, when the wireless receiver intends to transmit information to the mouse body, the method shown in fig. 4 may also be used to transmit information. For example, although the wireless input device in the above embodiments is described as a wireless mouse device, the wireless input device may be modified to a wireless keyboard device, and the device body thereof may be a keyboard body that can wirelessly communicate with the wireless receiver by using the method shown in fig. 4.
The above description is only a preferred embodiment of the present invention and is not intended to limit the claims of the present invention, so that other equivalent changes or modifications without departing from the concept disclosed in the present invention should be included in the claims of the present disclosure.