CN113836601A - Special USB keyboard and control method, system and equipment thereof - Google Patents
Special USB keyboard and control method, system and equipment thereof Download PDFInfo
- Publication number
- CN113836601A CN113836601A CN202110987078.7A CN202110987078A CN113836601A CN 113836601 A CN113836601 A CN 113836601A CN 202110987078 A CN202110987078 A CN 202110987078A CN 113836601 A CN113836601 A CN 113836601A
- Authority
- CN
- China
- Prior art keywords
- usb keyboard
- keyboard
- key value
- usb
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000012795 verification Methods 0.000 claims abstract description 15
- 238000012544 monitoring process Methods 0.000 claims abstract description 14
- 238000004891 communication Methods 0.000 claims description 14
- 238000004590 computer program Methods 0.000 claims description 9
- 238000001914 filtration Methods 0.000 claims description 8
- 230000009471 action Effects 0.000 claims description 7
- 230000000694 effects Effects 0.000 abstract description 2
- 230000006870 function Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 5
- 238000006243 chemical reaction Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 1
- 238000012938 design process Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/02—Input arrangements using manually operated switches, e.g. using keyboards or dials
- G06F3/0202—Constructional details or processes of manufacture of the input device
- G06F3/0219—Special purpose keyboards
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Mathematical Physics (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
The application discloses a control method and a system of a special USB keyboard, which are applied to the control of a host computer to the special USB keyboard, and the method comprises the following steps: a keyboard loading step: connecting the USB keyboard with a host, sending an encryption instruction for equipment verification to the USB keyboard by the host, decrypting and identifying the encryption instruction for equipment verification by the USB keyboard, returning an identification code, and judging the USB keyboard to be a legal keyboard by the host according to the received identification code; a monitoring input step: the host starts a monitoring thread, monitors the input of the USB keyboard and sends a key value acquisition request to the USB keyboard; a key input step: the host computer obtains the key value of the USB keyboard through the SDK program, converts the key value into the required key value based on the SDK program, and executes and completes the corresponding operation based on the required key value. The method has better protection effect on input data.
Description
Technical Field
The present application relates to the field of keyboards, and in particular, to a USB keyboard, a method and a system for controlling the USB keyboard, and a host device.
Background
The traditional USB keyboard is a common input device of a Windows operating system, but at present, in industries such as POS machines or game machines and the like, the popularization of self-service equipment brings user individuation requirements, but simultaneously, problems are introduced, such as input safety; meanwhile, the number of keys of the common USB keyboard is large, and the common USB keyboard is inconvenient to apply on site.
At present, aiming at the following bottlenecks in the related art, no effective solution is proposed:
1. the illegal access of the illegal equipment causes the safety problem of input;
2. the number of keys of a common USB keyboard is large, and the common USB keyboard is inconvenient to apply to specific equipment.
The keyboard used in the self-service equipment is generally customized and developed according to actual requirements, the number of key values is small, and specific function definitions and software requirements are provided. The special USB self-service keyboard provided by the invention is a customized keyboard, comprises a plurality of functional keys, and is used for encrypting the value input by the keyboard in order to prevent illegal operation of connecting other keyboards externally by a user. Meanwhile, the special keyboard input device can be identified, and the number input by the keyboard is converted into the character of the designated number.
Disclosure of Invention
The embodiment of the application provides a special USB self-service keyboard which is a customized keyboard and comprises a plurality of functional keys, and the value input by the keyboard is encrypted in order to prevent illegal operation of a user externally connected with other keyboards. Meanwhile, the special keyboard input device can be identified, and the number input by the keyboard is converted into the character of the designated number.
In a first aspect, an embodiment of the present application provides a method for controlling a dedicated USB keyboard, which is applied to a host to control the USB keyboard, and includes the steps of:
a keyboard loading step: connecting the USB keyboard with a host, sending an encryption instruction for equipment verification to the USB keyboard by the host, decrypting and identifying the encryption instruction for equipment verification by the USB keyboard, returning an identification code, and judging the USB keyboard to be a legal keyboard by the host according to the received identification code;
a monitoring input step: the host starts a monitoring thread, monitors the input of the USB keyboard and sends a key value acquisition request to the USB keyboard;
a key input step: the host computer obtains the key value of the USB keyboard through the SDK program, converts the key value into the required key value based on the SDK program, and executes and completes the corresponding operation based on the required key value.
In some embodiments, the method for controlling the dedicated USB keyboard further includes:
and (3) filtering: after the host computer converts the key value into the required key value, the key value is filtered and discarded.
In some embodiments, the identification code of the USB keyboard includes a unique PID and VID.
In some embodiments, the SDK program of the host identifies the key values of the USB keyboard, and completes setting on/off of the key lamps of the USB keyboard and obtaining key actions of the keyboard.
In a second aspect, an embodiment of the present application provides a control system for a dedicated USB keyboard, which uses the control method for a dedicated USB keyboard as described above, and is applied to a host to control a USB keyboard, and includes:
a keyboard loading module: connecting the USB keyboard with a host, sending an encryption instruction for equipment verification to the USB keyboard by the host, decrypting and identifying the encryption instruction for equipment verification by the USB keyboard, returning an identification code, and judging the USB keyboard to be a legal keyboard by the host according to the received identification code;
a monitoring input module: the host starts a monitoring thread, monitors the input of the USB keyboard and sends a key value acquisition request to the USB keyboard;
a key input module: the host computer obtains the key value of the USB keyboard through the SDK program, converts the key value into the required key value based on the SDK program, and executes and completes the corresponding operation based on the required key value.
In some embodiments, the control system of the dedicated USB keyboard further includes:
a filtering module: after the host computer converts the key value into the required key value, the key value is filtered and discarded.
In some embodiments, the identification code of the USB keyboard includes a unique PID and VID.
In some embodiments, the SDK program of the host identifies the key values of the USB keyboard, and completes setting on/off of the key lamps of the USB keyboard and obtaining key actions of the keyboard.
In a third aspect, an embodiment of the present application provides a dedicated USB keyboard, where the dedicated USB keyboard is in a USB communication mode, and includes at least one key disposed on a front surface and a side surface of the keyboard.
In a fourth aspect, an embodiment of the present application provides a host device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and further includes the dedicated USB keyboard as described above, and the processor implements the dedicated USB keyboard control method as described above when executing the computer program.
Compared with the related prior art, the method has the following outstanding advantages:
1. the invention can monitor the key input of the input equipment after identifying the input equipment, and can provide the conversion key value corresponding to the actual key value of the input key according to the requirement of a user program once finding the key input.
2. The invention can ensure that the user software is operated by other keyboard input devices, and has better protection function on input data.
3. The invention is different from the common USB keyboard input and the input of a programmable keyboard, and provides a key input acquisition mode in an SDK mode under a Windows system, so as to ensure that the user program uses the key input of the self-service equipment.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a flow chart of a method for controlling a USB keyboard dedicated to the present invention;
FIG. 2 is a schematic flow chart of an embodiment of the method of the present invention;
FIG. 3 is a diagram of a USB keyboard control system according to the present invention;
fig. 4 is a schematic diagram of a hardware structure of a host device according to an embodiment of the present application.
In the above figures:
10 keyboard loading module 20 monitoring input module
30 key input module
81. A processor; 82. a memory; 83. a communication interface; 80. a bus.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application.
It is obvious that the drawings in the following description are only examples or embodiments of the present application, and that it is also possible for a person skilled in the art to apply the present application to other similar contexts on the basis of these drawings without inventive effort. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as referred to herein means two or more. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
The method, the device, the equipment or the computer readable storage medium related by the application aims to provide a self-service customized keyboard which comprises a plurality of functional keys, wherein each key is provided with an indicator light, and when a certain key is pressed, a fixed key value is output and the key light is lightened. In order to prevent the user from connecting other keyboard operation software externally, simple encryption is required to be carried out on the value input by the keyboard. Therefore, a set of programs is designed, which can identify the keyboard input device and convert the number input by the keyboard into the character of the designated number.
Fig. 1 is a control method of a dedicated USB keyboard according to the present invention, and as shown in fig. 1, the present embodiment provides a control method of a dedicated USB keyboard, which is applied to a host computer to control a USB keyboard, and includes the following steps:
keyboard loading step S10: connecting the USB keyboard with a host, sending an encryption instruction for equipment verification to the USB keyboard by the host, decrypting and identifying the encryption instruction for equipment verification by the USB keyboard, returning an identification code, and judging the USB keyboard to be a legal keyboard by the host according to the received identification code;
monitor input step S20: the host starts a monitoring thread, monitors the input of the USB keyboard and sends a key value acquisition request to the USB keyboard;
key input step S30: the host computer obtains the key value of the USB keyboard through the SDK program, converts the key value into the required key value based on the SDK program, and executes and completes the corresponding operation based on the required key value.
In some embodiments, the method for controlling the dedicated USB keyboard further includes:
filtering step S40: after the host computer converts the key value into the required key value, the key value is filtered and discarded.
In some embodiments, the identification code of the USB keyboard includes a unique PID and VID.
In some embodiments, the SDK program of the host identifies the key values of the USB keyboard, and completes setting on/off of the key lamps of the USB keyboard and obtaining key actions of the keyboard.
The following detailed description of specific embodiments of the invention is provided in conjunction with the accompanying drawings:
the key point of the method is that the keyboard equipment can be actively identified by opening the keyboard equipment, and only a specific keyboard on the self-service equipment can be used for next-step operation; and the identified equipment key input is realized by setting the on and off of the key lamp and acquiring the key action of the keyboard by a matched developed Windows program, and the identifier of the corresponding key is converted into a numerical value required by software. Obtaining the key value of the key needs to be captured by using a lower-layer technology of Windows, and the key value is terminated after conversion and is further input into an operating system.
The scheme of the invention is realized by using the program development of a Windows system, and the program opens the called interface function to the client in the form of SDK. And calling an interface function by a client program to acquire the key light and the keyboard value of the keyboard. The interface function includes: opening a keyboard, closing the keyboard, setting a key indicator lamp and acquiring key values of keys; wherein the conversion function of the key values is used when the key values are obtained. The design process is as follows: 1) the program first needs to open the keyboard device to ensure that the keyboard device is connected normally. 2) The program starts a thread through the opened keyboard equipment, monitors the input of the keyboard in the Windows system, converts the corresponding characters if the input preset characters are found at the moment, and then discards the input characters.
Fig. 2 is a schematic flow chart of an embodiment of the method of the present invention, and the processing flow is as shown in fig. 2.
Meanwhile, the invention also provides a control system of the special USB keyboard, which is applied to the control of the host computer to the USB keyboard by adopting the control method of the special USB keyboard and comprises the following steps:
the keyboard loading module 10: connecting the USB keyboard with a host, sending an encryption instruction for equipment verification to the USB keyboard by the host, decrypting and identifying the encryption instruction for equipment verification by the USB keyboard, returning an identification code, and judging the USB keyboard to be a legal keyboard by the host according to the received identification code;
the monitoring input module 20: the host starts a monitoring thread, monitors the input of the USB keyboard and sends a key value acquisition request to the USB keyboard;
the key input module 30: the host computer obtains the key value of the USB keyboard through the SDK program, converts the key value into the required key value based on the SDK program, and executes and completes the corresponding operation based on the required key value.
In some embodiments, the control system of the dedicated USB keyboard further includes:
the filtering module 40: after the host computer converts the key value into the required key value, the key value is filtered and discarded.
In some embodiments, the identification code of the USB keyboard includes a unique PID and VID.
In some embodiments, the SDK program of the host identifies the key values of the USB keyboard, and completes setting on/off of the key lamps of the USB keyboard and obtaining key actions of the keyboard.
In a third aspect, an embodiment of the present application provides a dedicated USB keyboard, where the dedicated USB keyboard is in a USB communication mode, and includes at least one key disposed on a front surface and a side surface of the keyboard.
The keyboard adopts USB communication and has unique PID and VID, and the Windows system can automatically identify and load the device. An encrypted communication instruction for equipment verification is designed in the keyboard firmware, and after the instruction is sent to the keyboard, the keyboard can return an identification code of the equipment, wherein the identification code is used for judging whether the equipment is legal or not. The output value of the keyboard device can only be read after the system is identified as a legal device. The system reads a key value through a USB keyboard protocol, an SDK program operated by the system can be intercepted in advance, the key value is filtered after the value input by legal keyboard equipment is judged, and the key value is converted into a key value required by software and input into the software. And the software executes corresponding operation according to the acquired key value.
Obtaining the key value, obtaining the Windows key message by using Windows API functions SetWindowsHookEx, UnhookWindowsHookEx and GetMessage, and judging and analyzing the obtained key value.
In a fourth aspect, an embodiment of the present application provides a host device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and further includes the dedicated USB keyboard as described above, and the processor implements the dedicated USB keyboard control method as described above when executing the computer program. .
In addition, the dedicated USB keyboard control method described in the embodiment of the present application with reference to fig. 1 may be implemented by a host device. Fig. 4 is a schematic diagram of a hardware structure of a host device according to an embodiment of the present application.
The host device may include a USB keyboard 84, a processor 81, and a memory 82 storing computer program instructions.
Specifically, the processor 81 may include a Central Processing Unit (CPU), or A Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
The memory 82 may be internal or external to the data processing apparatus, where appropriate. In a particular embodiment, the memory 82 is a Non-Volatile (Non-Volatile) memory. In particular embodiments, Memory 82 includes Read-Only Memory (ROM) and Random Access Memory (RAM). The ROM may be mask-programmed ROM, Programmable ROM (PROM), Erasable PROM (EPROM), Electrically Erasable PROM (EEPROM), Electrically rewritable ROM (EAROM), or FLASH Memory (FLASH), or a combination of two or more of these, where appropriate. The RAM may be a Static Random-Access Memory (SRAM) or a Dynamic Random-Access Memory (DRAM), where the DRAM may be a Fast Page Mode Dynamic Random-Access Memory (FPMDRAM), an Extended data output Dynamic Random-Access Memory (EDODRAM), a Synchronous Dynamic Random-Access Memory (SDRAM), and the like.
The memory 82 may be used to store or cache various data files for processing and/or communication use, as well as possible computer program instructions executed by the processor 81.
The processor 81 reads and executes the computer program instructions stored in the memory 82 to implement any one of the entity recommendation methods in the above embodiments.
In some of these embodiments, the computer device may also include a communication interface 83 and a bus 80. As shown in fig. 4, the processor 81, the memory 82, the communication interface 83, and the USB keyboard 84 are connected via the bus 80 to complete communication therebetween.
The communication interface 83 is used for implementing communication between modules, devices, units and/or equipment in the embodiment of the present application. The communication port 83 may also be implemented with other components such as: the data communication is carried out among external equipment, image/data acquisition equipment, a database, external storage, an image/data processing workstation and the like.
Compared with the prior art, the method and the device have the advantages that after the input device is identified, the key input of the device can be monitored, and once the key input is found, the conversion key value corresponding to the input actual key value can be provided according to the requirement of a user program. Therefore, the user software can be operated by other keyboard input devices, and the protection effect of the input data is better. The technical scheme is different from the common USB keyboard input and the input of a programmable keyboard, and adopts a mode of providing key input acquisition in an SDK form under a Windows system to ensure that the user program uses the key input of the self-service equipment.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (10)
1. A control method of a special USB keyboard is applied to the control of a host computer on the USB keyboard, and is characterized by comprising the following steps:
a keyboard loading step: connecting the USB keyboard with the host computer, sending an equipment verification encryption instruction to the USB keyboard by the host computer, decrypting and identifying the equipment verification encryption instruction by the USB keyboard, returning an identification code, and judging that the USB keyboard is a legal keyboard by the host computer according to the received identification code;
a monitoring input step: the host starts a monitoring thread, monitors the input of the USB keyboard and sends a key value acquisition request to the USB keyboard;
a key input step: the host computer obtains a key value of the USB keyboard through an SDK program, converts the key value into a required key value based on the SDK program, and executes corresponding operation based on the required key value.
2. The method for controlling a dedicated USB keyboard according to claim 1, further comprising:
and (3) filtering: and after the host converts the key value into the required key value, filtering and discarding the key value.
3. The method of claim 1, wherein the identification code of the USB keyboard comprises a unique PID and VID.
4. The method for controlling a dedicated USB keyboard according to claim 1, wherein the SDK program of the host recognizes the key values of the USB keyboard, and performs setting on/off of the key lamps of the USB keyboard and obtaining the key actions of the keyboard.
5. A control system of a special USB keyboard, which is applied to the control of a host computer on a USB keyboard by using the control method of the special USB keyboard according to any one of claims 1 to 4, and comprises:
a keyboard loading module: connecting the USB keyboard with the host computer, sending an equipment verification encryption instruction to the USB keyboard by the host computer, decrypting and identifying the equipment verification encryption instruction by the USB keyboard, returning an identification code, and judging that the USB keyboard is a legal keyboard by the host computer according to the received identification code;
a monitoring input module: the host starts a monitoring thread, monitors the input of the USB keyboard and sends a key value acquisition request to the USB keyboard;
a key input module: the host computer obtains a key value of the USB keyboard through an SDK program, converts the key value into a required key value based on the SDK program, and executes corresponding operation based on the required key value.
6. The control system of the dedicated USB keyboard according to claim 1, further comprising:
a filtering module: and after the host converts the key value into the required key value, filtering and discarding the key value.
7. The USB keyboard control system of claim 1, wherein the identification code of the USB keyboard comprises a unique PID and VID.
8. The system for controlling a dedicated USB keyboard according to claim 1, wherein the SDK program of the host recognizes the key values of the USB keyboard, performs setting on/off of the key lamps of the USB keyboard, and obtains the key actions of the keyboard.
9. A special USB keyboard for implementing the control method of the special USB keyboard as claimed in any one of claims 1 to 4, wherein the special USB keyboard adopts a USB communication mode, and the special USB keyboard comprises at least one key arranged on the front and side surfaces of the keyboard.
10. A host device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized by further comprising the dedicated USB keyboard of claim 9, the processor implementing the dedicated USB keyboard control method of any one of claims 1 to 4 when executing the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110987078.7A CN113836601A (en) | 2021-08-26 | 2021-08-26 | Special USB keyboard and control method, system and equipment thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110987078.7A CN113836601A (en) | 2021-08-26 | 2021-08-26 | Special USB keyboard and control method, system and equipment thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113836601A true CN113836601A (en) | 2021-12-24 |
Family
ID=78961307
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110987078.7A Pending CN113836601A (en) | 2021-08-26 | 2021-08-26 | Special USB keyboard and control method, system and equipment thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113836601A (en) |
Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1332926A (en) * | 1998-12-28 | 2002-01-23 | 汤姆森特许公司 | System and method for customizing program guide information to includes reminder item or local identifier |
CN1690926A (en) * | 2004-04-30 | 2005-11-02 | 深圳市朗科科技有限公司 | Mobile storage method, system and equipment with wireless communication control function |
CN101042618A (en) * | 2007-04-30 | 2007-09-26 | 李明 | Touching external connection keyboard |
CN101158885A (en) * | 2007-10-22 | 2008-04-09 | 李玫 | User-defined keyboard and implementing method thereof |
CN101340294A (en) * | 2008-08-07 | 2009-01-07 | 深圳市紫金支点技术股份有限公司 | Cipher keyboard apparatus and implementing method thereof |
CN101770386A (en) * | 2010-03-08 | 2010-07-07 | 北京飞天诚信科技有限公司 | Safe startup method for Linux embedded system |
CN102685216A (en) * | 2012-04-25 | 2012-09-19 | 深圳市江波龙电子有限公司 | Attribute display method and attribute display system of universal serial bus (USB) equipment, USB equipment and server |
CN102902903A (en) * | 2012-10-10 | 2013-01-30 | 山东中孚信息产业股份有限公司 | Electronic commerce intelligent password key with button and implementation method for electronic commerce intelligent password key |
CN203055028U (en) * | 2013-02-05 | 2013-07-10 | 艾体威尔电子技术(北京)有限公司 | Password input device and POS terminal |
CN104156642A (en) * | 2014-07-22 | 2014-11-19 | 杭州晟元芯片技术有限公司 | Security password input system and method based on security touch screen control chip |
CN105389506A (en) * | 2015-10-20 | 2016-03-09 | 飞天诚信科技股份有限公司 | Method and device for improving input safety |
CN206039532U (en) * | 2016-07-19 | 2017-03-22 | 国网新疆电力公司电力科学研究院 | Computer USB peripheral hardware safety discernment filter |
CN107783793A (en) * | 2016-08-24 | 2018-03-09 | 旺玖科技股份有限公司 | The method and USB device of automatic identification host operating system |
CN107871092A (en) * | 2016-09-27 | 2018-04-03 | 北京计算机技术及应用研究所 | Anti- keyboard recording method based on Windows |
CN107888379A (en) * | 2017-10-25 | 2018-04-06 | 百富计算机技术(深圳)有限公司 | A kind of method of secure connection, POS terminal and code keypad |
CN111859373A (en) * | 2020-07-15 | 2020-10-30 | 杭州安恒信息技术股份有限公司 | Defense method and device for HID attack and computer equipment |
CN112486496A (en) * | 2020-11-25 | 2021-03-12 | 上海连尚网络科技有限公司 | Method and equipment for generating and operating so file |
CN112966276A (en) * | 2021-04-02 | 2021-06-15 | 杭州华澜微电子股份有限公司 | Method, device and medium for safely starting computer |
CN113127941A (en) * | 2019-12-31 | 2021-07-16 | 北京奇虎科技有限公司 | Equipment safety protection method and device |
-
2021
- 2021-08-26 CN CN202110987078.7A patent/CN113836601A/en active Pending
Patent Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1332926A (en) * | 1998-12-28 | 2002-01-23 | 汤姆森特许公司 | System and method for customizing program guide information to includes reminder item or local identifier |
CN1690926A (en) * | 2004-04-30 | 2005-11-02 | 深圳市朗科科技有限公司 | Mobile storage method, system and equipment with wireless communication control function |
CN101042618A (en) * | 2007-04-30 | 2007-09-26 | 李明 | Touching external connection keyboard |
CN101158885A (en) * | 2007-10-22 | 2008-04-09 | 李玫 | User-defined keyboard and implementing method thereof |
CN101340294A (en) * | 2008-08-07 | 2009-01-07 | 深圳市紫金支点技术股份有限公司 | Cipher keyboard apparatus and implementing method thereof |
CN101770386A (en) * | 2010-03-08 | 2010-07-07 | 北京飞天诚信科技有限公司 | Safe startup method for Linux embedded system |
CN102685216A (en) * | 2012-04-25 | 2012-09-19 | 深圳市江波龙电子有限公司 | Attribute display method and attribute display system of universal serial bus (USB) equipment, USB equipment and server |
CN102902903A (en) * | 2012-10-10 | 2013-01-30 | 山东中孚信息产业股份有限公司 | Electronic commerce intelligent password key with button and implementation method for electronic commerce intelligent password key |
CN203055028U (en) * | 2013-02-05 | 2013-07-10 | 艾体威尔电子技术(北京)有限公司 | Password input device and POS terminal |
CN104156642A (en) * | 2014-07-22 | 2014-11-19 | 杭州晟元芯片技术有限公司 | Security password input system and method based on security touch screen control chip |
CN105389506A (en) * | 2015-10-20 | 2016-03-09 | 飞天诚信科技股份有限公司 | Method and device for improving input safety |
CN206039532U (en) * | 2016-07-19 | 2017-03-22 | 国网新疆电力公司电力科学研究院 | Computer USB peripheral hardware safety discernment filter |
CN107783793A (en) * | 2016-08-24 | 2018-03-09 | 旺玖科技股份有限公司 | The method and USB device of automatic identification host operating system |
CN107871092A (en) * | 2016-09-27 | 2018-04-03 | 北京计算机技术及应用研究所 | Anti- keyboard recording method based on Windows |
CN107888379A (en) * | 2017-10-25 | 2018-04-06 | 百富计算机技术(深圳)有限公司 | A kind of method of secure connection, POS terminal and code keypad |
CN113127941A (en) * | 2019-12-31 | 2021-07-16 | 北京奇虎科技有限公司 | Equipment safety protection method and device |
CN111859373A (en) * | 2020-07-15 | 2020-10-30 | 杭州安恒信息技术股份有限公司 | Defense method and device for HID attack and computer equipment |
CN112486496A (en) * | 2020-11-25 | 2021-03-12 | 上海连尚网络科技有限公司 | Method and equipment for generating and operating so file |
CN112966276A (en) * | 2021-04-02 | 2021-06-15 | 杭州华澜微电子股份有限公司 | Method, device and medium for safely starting computer |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2017765B1 (en) | System and method for out-of-band assisted biometric secure boot | |
US6678833B1 (en) | Protection of boot block data and accurate reporting of boot block contents | |
CN107563201B (en) | Associated sample searching method and device based on machine learning and server | |
US20160196428A1 (en) | System and Method for Detecting Stack Pivot Programming Exploit | |
US10447924B2 (en) | Camera usage notification | |
WO2013041016A1 (en) | Method and device for processing computer viruses | |
CN112165455A (en) | Data access control method and device, computer equipment and storage medium | |
US10554383B2 (en) | Analysis system, analysis method, and storage medium | |
US20150249665A1 (en) | Method and system for extracting characteristic information | |
US10372947B2 (en) | Parsing, processing, and/or securing stream buffers | |
WO2020108357A1 (en) | Program classification model training method, program classification method, and device | |
CN109800576B (en) | Monitoring method and device for unknown program exception request and electronic device | |
US20180341769A1 (en) | Threat detection method and threat detection device | |
CN111967023A (en) | Data encryption and decryption method, device, system and readable storage medium | |
US20160134652A1 (en) | Method for recognizing disguised malicious document | |
CN112417014A (en) | Dynamic modification execution plan method, system, and computer-readable storage medium | |
CN110135154B (en) | Injection attack detection system and method for application program | |
CN109446847B (en) | Configuration method of dual-system peripheral resources, terminal equipment and storage medium | |
CN113836601A (en) | Special USB keyboard and control method, system and equipment thereof | |
WO2019127043A1 (en) | Terminal device control method and terminal device | |
CN108319853B (en) | Virus characteristic code processing method and device | |
US9787699B2 (en) | Malware detection | |
KR101899774B1 (en) | Data processing method against Randsomeware, computer program therefor and a computer-readable recording meduim on which the program is recorded | |
CN111651763A (en) | Process monitoring method and device, electronic equipment and storage medium | |
EP3819799A1 (en) | Method of threat detection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |