CN113836601A - Special USB keyboard and control method, system and equipment thereof - Google Patents

Special USB keyboard and control method, system and equipment thereof Download PDF

Info

Publication number
CN113836601A
CN113836601A CN202110987078.7A CN202110987078A CN113836601A CN 113836601 A CN113836601 A CN 113836601A CN 202110987078 A CN202110987078 A CN 202110987078A CN 113836601 A CN113836601 A CN 113836601A
Authority
CN
China
Prior art keywords
usb keyboard
keyboard
key value
usb
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110987078.7A
Other languages
Chinese (zh)
Inventor
柳美勋
韩方全
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Wintec System Co ltd
Original Assignee
Qingdao Wintec System Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Wintec System Co ltd filed Critical Qingdao Wintec System Co ltd
Priority to CN202110987078.7A priority Critical patent/CN113836601A/en
Publication of CN113836601A publication Critical patent/CN113836601A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/0202Constructional details or processes of manufacture of the input device
    • G06F3/0219Special purpose keyboards

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Mathematical Physics (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

The application discloses a control method and a system of a special USB keyboard, which are applied to the control of a host computer to the special USB keyboard, and the method comprises the following steps: a keyboard loading step: connecting the USB keyboard with a host, sending an encryption instruction for equipment verification to the USB keyboard by the host, decrypting and identifying the encryption instruction for equipment verification by the USB keyboard, returning an identification code, and judging the USB keyboard to be a legal keyboard by the host according to the received identification code; a monitoring input step: the host starts a monitoring thread, monitors the input of the USB keyboard and sends a key value acquisition request to the USB keyboard; a key input step: the host computer obtains the key value of the USB keyboard through the SDK program, converts the key value into the required key value based on the SDK program, and executes and completes the corresponding operation based on the required key value. The method has better protection effect on input data.

Description

Special USB keyboard and control method, system and equipment thereof
Technical Field
The present application relates to the field of keyboards, and in particular, to a USB keyboard, a method and a system for controlling the USB keyboard, and a host device.
Background
The traditional USB keyboard is a common input device of a Windows operating system, but at present, in industries such as POS machines or game machines and the like, the popularization of self-service equipment brings user individuation requirements, but simultaneously, problems are introduced, such as input safety; meanwhile, the number of keys of the common USB keyboard is large, and the common USB keyboard is inconvenient to apply on site.
At present, aiming at the following bottlenecks in the related art, no effective solution is proposed:
1. the illegal access of the illegal equipment causes the safety problem of input;
2. the number of keys of a common USB keyboard is large, and the common USB keyboard is inconvenient to apply to specific equipment.
The keyboard used in the self-service equipment is generally customized and developed according to actual requirements, the number of key values is small, and specific function definitions and software requirements are provided. The special USB self-service keyboard provided by the invention is a customized keyboard, comprises a plurality of functional keys, and is used for encrypting the value input by the keyboard in order to prevent illegal operation of connecting other keyboards externally by a user. Meanwhile, the special keyboard input device can be identified, and the number input by the keyboard is converted into the character of the designated number.
Disclosure of Invention
The embodiment of the application provides a special USB self-service keyboard which is a customized keyboard and comprises a plurality of functional keys, and the value input by the keyboard is encrypted in order to prevent illegal operation of a user externally connected with other keyboards. Meanwhile, the special keyboard input device can be identified, and the number input by the keyboard is converted into the character of the designated number.
In a first aspect, an embodiment of the present application provides a method for controlling a dedicated USB keyboard, which is applied to a host to control the USB keyboard, and includes the steps of:
a keyboard loading step: connecting the USB keyboard with a host, sending an encryption instruction for equipment verification to the USB keyboard by the host, decrypting and identifying the encryption instruction for equipment verification by the USB keyboard, returning an identification code, and judging the USB keyboard to be a legal keyboard by the host according to the received identification code;
a monitoring input step: the host starts a monitoring thread, monitors the input of the USB keyboard and sends a key value acquisition request to the USB keyboard;
a key input step: the host computer obtains the key value of the USB keyboard through the SDK program, converts the key value into the required key value based on the SDK program, and executes and completes the corresponding operation based on the required key value.
In some embodiments, the method for controlling the dedicated USB keyboard further includes:
and (3) filtering: after the host computer converts the key value into the required key value, the key value is filtered and discarded.
In some embodiments, the identification code of the USB keyboard includes a unique PID and VID.
In some embodiments, the SDK program of the host identifies the key values of the USB keyboard, and completes setting on/off of the key lamps of the USB keyboard and obtaining key actions of the keyboard.
In a second aspect, an embodiment of the present application provides a control system for a dedicated USB keyboard, which uses the control method for a dedicated USB keyboard as described above, and is applied to a host to control a USB keyboard, and includes:
a keyboard loading module: connecting the USB keyboard with a host, sending an encryption instruction for equipment verification to the USB keyboard by the host, decrypting and identifying the encryption instruction for equipment verification by the USB keyboard, returning an identification code, and judging the USB keyboard to be a legal keyboard by the host according to the received identification code;
a monitoring input module: the host starts a monitoring thread, monitors the input of the USB keyboard and sends a key value acquisition request to the USB keyboard;
a key input module: the host computer obtains the key value of the USB keyboard through the SDK program, converts the key value into the required key value based on the SDK program, and executes and completes the corresponding operation based on the required key value.
In some embodiments, the control system of the dedicated USB keyboard further includes:
a filtering module: after the host computer converts the key value into the required key value, the key value is filtered and discarded.
In some embodiments, the identification code of the USB keyboard includes a unique PID and VID.
In some embodiments, the SDK program of the host identifies the key values of the USB keyboard, and completes setting on/off of the key lamps of the USB keyboard and obtaining key actions of the keyboard.
In a third aspect, an embodiment of the present application provides a dedicated USB keyboard, where the dedicated USB keyboard is in a USB communication mode, and includes at least one key disposed on a front surface and a side surface of the keyboard.
In a fourth aspect, an embodiment of the present application provides a host device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and further includes the dedicated USB keyboard as described above, and the processor implements the dedicated USB keyboard control method as described above when executing the computer program.
Compared with the related prior art, the method has the following outstanding advantages:
1. the invention can monitor the key input of the input equipment after identifying the input equipment, and can provide the conversion key value corresponding to the actual key value of the input key according to the requirement of a user program once finding the key input.
2. The invention can ensure that the user software is operated by other keyboard input devices, and has better protection function on input data.
3. The invention is different from the common USB keyboard input and the input of a programmable keyboard, and provides a key input acquisition mode in an SDK mode under a Windows system, so as to ensure that the user program uses the key input of the self-service equipment.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a flow chart of a method for controlling a USB keyboard dedicated to the present invention;
FIG. 2 is a schematic flow chart of an embodiment of the method of the present invention;
FIG. 3 is a diagram of a USB keyboard control system according to the present invention;
fig. 4 is a schematic diagram of a hardware structure of a host device according to an embodiment of the present application.
In the above figures:
10 keyboard loading module 20 monitoring input module
30 key input module
81. A processor; 82. a memory; 83. a communication interface; 80. a bus.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application.
It is obvious that the drawings in the following description are only examples or embodiments of the present application, and that it is also possible for a person skilled in the art to apply the present application to other similar contexts on the basis of these drawings without inventive effort. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as referred to herein means two or more. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
The method, the device, the equipment or the computer readable storage medium related by the application aims to provide a self-service customized keyboard which comprises a plurality of functional keys, wherein each key is provided with an indicator light, and when a certain key is pressed, a fixed key value is output and the key light is lightened. In order to prevent the user from connecting other keyboard operation software externally, simple encryption is required to be carried out on the value input by the keyboard. Therefore, a set of programs is designed, which can identify the keyboard input device and convert the number input by the keyboard into the character of the designated number.
Fig. 1 is a control method of a dedicated USB keyboard according to the present invention, and as shown in fig. 1, the present embodiment provides a control method of a dedicated USB keyboard, which is applied to a host computer to control a USB keyboard, and includes the following steps:
keyboard loading step S10: connecting the USB keyboard with a host, sending an encryption instruction for equipment verification to the USB keyboard by the host, decrypting and identifying the encryption instruction for equipment verification by the USB keyboard, returning an identification code, and judging the USB keyboard to be a legal keyboard by the host according to the received identification code;
monitor input step S20: the host starts a monitoring thread, monitors the input of the USB keyboard and sends a key value acquisition request to the USB keyboard;
key input step S30: the host computer obtains the key value of the USB keyboard through the SDK program, converts the key value into the required key value based on the SDK program, and executes and completes the corresponding operation based on the required key value.
In some embodiments, the method for controlling the dedicated USB keyboard further includes:
filtering step S40: after the host computer converts the key value into the required key value, the key value is filtered and discarded.
In some embodiments, the identification code of the USB keyboard includes a unique PID and VID.
In some embodiments, the SDK program of the host identifies the key values of the USB keyboard, and completes setting on/off of the key lamps of the USB keyboard and obtaining key actions of the keyboard.
The following detailed description of specific embodiments of the invention is provided in conjunction with the accompanying drawings:
the key point of the method is that the keyboard equipment can be actively identified by opening the keyboard equipment, and only a specific keyboard on the self-service equipment can be used for next-step operation; and the identified equipment key input is realized by setting the on and off of the key lamp and acquiring the key action of the keyboard by a matched developed Windows program, and the identifier of the corresponding key is converted into a numerical value required by software. Obtaining the key value of the key needs to be captured by using a lower-layer technology of Windows, and the key value is terminated after conversion and is further input into an operating system.
The scheme of the invention is realized by using the program development of a Windows system, and the program opens the called interface function to the client in the form of SDK. And calling an interface function by a client program to acquire the key light and the keyboard value of the keyboard. The interface function includes: opening a keyboard, closing the keyboard, setting a key indicator lamp and acquiring key values of keys; wherein the conversion function of the key values is used when the key values are obtained. The design process is as follows: 1) the program first needs to open the keyboard device to ensure that the keyboard device is connected normally. 2) The program starts a thread through the opened keyboard equipment, monitors the input of the keyboard in the Windows system, converts the corresponding characters if the input preset characters are found at the moment, and then discards the input characters.
Fig. 2 is a schematic flow chart of an embodiment of the method of the present invention, and the processing flow is as shown in fig. 2.
Meanwhile, the invention also provides a control system of the special USB keyboard, which is applied to the control of the host computer to the USB keyboard by adopting the control method of the special USB keyboard and comprises the following steps:
the keyboard loading module 10: connecting the USB keyboard with a host, sending an encryption instruction for equipment verification to the USB keyboard by the host, decrypting and identifying the encryption instruction for equipment verification by the USB keyboard, returning an identification code, and judging the USB keyboard to be a legal keyboard by the host according to the received identification code;
the monitoring input module 20: the host starts a monitoring thread, monitors the input of the USB keyboard and sends a key value acquisition request to the USB keyboard;
the key input module 30: the host computer obtains the key value of the USB keyboard through the SDK program, converts the key value into the required key value based on the SDK program, and executes and completes the corresponding operation based on the required key value.
In some embodiments, the control system of the dedicated USB keyboard further includes:
the filtering module 40: after the host computer converts the key value into the required key value, the key value is filtered and discarded.
In some embodiments, the identification code of the USB keyboard includes a unique PID and VID.
In some embodiments, the SDK program of the host identifies the key values of the USB keyboard, and completes setting on/off of the key lamps of the USB keyboard and obtaining key actions of the keyboard.
In a third aspect, an embodiment of the present application provides a dedicated USB keyboard, where the dedicated USB keyboard is in a USB communication mode, and includes at least one key disposed on a front surface and a side surface of the keyboard.
The keyboard adopts USB communication and has unique PID and VID, and the Windows system can automatically identify and load the device. An encrypted communication instruction for equipment verification is designed in the keyboard firmware, and after the instruction is sent to the keyboard, the keyboard can return an identification code of the equipment, wherein the identification code is used for judging whether the equipment is legal or not. The output value of the keyboard device can only be read after the system is identified as a legal device. The system reads a key value through a USB keyboard protocol, an SDK program operated by the system can be intercepted in advance, the key value is filtered after the value input by legal keyboard equipment is judged, and the key value is converted into a key value required by software and input into the software. And the software executes corresponding operation according to the acquired key value.
Obtaining the key value, obtaining the Windows key message by using Windows API functions SetWindowsHookEx, UnhookWindowsHookEx and GetMessage, and judging and analyzing the obtained key value.
In a fourth aspect, an embodiment of the present application provides a host device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and further includes the dedicated USB keyboard as described above, and the processor implements the dedicated USB keyboard control method as described above when executing the computer program. .
In addition, the dedicated USB keyboard control method described in the embodiment of the present application with reference to fig. 1 may be implemented by a host device. Fig. 4 is a schematic diagram of a hardware structure of a host device according to an embodiment of the present application.
The host device may include a USB keyboard 84, a processor 81, and a memory 82 storing computer program instructions.
Specifically, the processor 81 may include a Central Processing Unit (CPU), or A Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 82 may include, among other things, mass storage for data or instructions. By way of example, and not limitation, memory 82 may include a Hard Disk Drive (Hard Disk Drive, abbreviated to HDD), a floppy Disk Drive, a Solid State Drive (SSD), flash memory, an optical Disk, a magneto-optical Disk, tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 82 may include removable or non-removable (or fixed) media, where appropriate.
The memory 82 may be internal or external to the data processing apparatus, where appropriate. In a particular embodiment, the memory 82 is a Non-Volatile (Non-Volatile) memory. In particular embodiments, Memory 82 includes Read-Only Memory (ROM) and Random Access Memory (RAM). The ROM may be mask-programmed ROM, Programmable ROM (PROM), Erasable PROM (EPROM), Electrically Erasable PROM (EEPROM), Electrically rewritable ROM (EAROM), or FLASH Memory (FLASH), or a combination of two or more of these, where appropriate. The RAM may be a Static Random-Access Memory (SRAM) or a Dynamic Random-Access Memory (DRAM), where the DRAM may be a Fast Page Mode Dynamic Random-Access Memory (FPMDRAM), an Extended data output Dynamic Random-Access Memory (EDODRAM), a Synchronous Dynamic Random-Access Memory (SDRAM), and the like.
The memory 82 may be used to store or cache various data files for processing and/or communication use, as well as possible computer program instructions executed by the processor 81.
The processor 81 reads and executes the computer program instructions stored in the memory 82 to implement any one of the entity recommendation methods in the above embodiments.
In some of these embodiments, the computer device may also include a communication interface 83 and a bus 80. As shown in fig. 4, the processor 81, the memory 82, the communication interface 83, and the USB keyboard 84 are connected via the bus 80 to complete communication therebetween.
The communication interface 83 is used for implementing communication between modules, devices, units and/or equipment in the embodiment of the present application. The communication port 83 may also be implemented with other components such as: the data communication is carried out among external equipment, image/data acquisition equipment, a database, external storage, an image/data processing workstation and the like.
Bus 80 includes hardware, software, or both to couple the components of the computer device to each other. Bus 80 includes, but is not limited to, at least one of the following: data Bus (Data Bus), Address Bus (Address Bus), Control Bus (Control Bus), Expansion Bus (Expansion Bus), and Local Bus (Local Bus). By way of example, and not limitation, Bus 80 may include an Accelerated Graphics Port (AGP) or other Graphics Bus, an Enhanced Industry Standard Architecture (EISA) Bus, a Front-Side Bus (FSB), a Hyper Transport (HT) Interconnect, an ISA (ISA) Bus, an InfiniBand (InfiniBand) Interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a microchannel Architecture (MCA) Bus, a PCI (Peripheral Component Interconnect) Bus, a PCI-Express (PCI-X) Bus, a Serial Advanced Technology Attachment (SATA) Bus, a Video Electronics Bus (audio Electronics Association), abbreviated VLB) bus or other suitable bus or a combination of two or more of these. Bus 80 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the application, any suitable buses or interconnects are contemplated by the application.
Compared with the prior art, the method and the device have the advantages that after the input device is identified, the key input of the device can be monitored, and once the key input is found, the conversion key value corresponding to the input actual key value can be provided according to the requirement of a user program. Therefore, the user software can be operated by other keyboard input devices, and the protection effect of the input data is better. The technical scheme is different from the common USB keyboard input and the input of a programmable keyboard, and adopts a mode of providing key input acquisition in an SDK form under a Windows system to ensure that the user program uses the key input of the self-service equipment.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A control method of a special USB keyboard is applied to the control of a host computer on the USB keyboard, and is characterized by comprising the following steps:
a keyboard loading step: connecting the USB keyboard with the host computer, sending an equipment verification encryption instruction to the USB keyboard by the host computer, decrypting and identifying the equipment verification encryption instruction by the USB keyboard, returning an identification code, and judging that the USB keyboard is a legal keyboard by the host computer according to the received identification code;
a monitoring input step: the host starts a monitoring thread, monitors the input of the USB keyboard and sends a key value acquisition request to the USB keyboard;
a key input step: the host computer obtains a key value of the USB keyboard through an SDK program, converts the key value into a required key value based on the SDK program, and executes corresponding operation based on the required key value.
2. The method for controlling a dedicated USB keyboard according to claim 1, further comprising:
and (3) filtering: and after the host converts the key value into the required key value, filtering and discarding the key value.
3. The method of claim 1, wherein the identification code of the USB keyboard comprises a unique PID and VID.
4. The method for controlling a dedicated USB keyboard according to claim 1, wherein the SDK program of the host recognizes the key values of the USB keyboard, and performs setting on/off of the key lamps of the USB keyboard and obtaining the key actions of the keyboard.
5. A control system of a special USB keyboard, which is applied to the control of a host computer on a USB keyboard by using the control method of the special USB keyboard according to any one of claims 1 to 4, and comprises:
a keyboard loading module: connecting the USB keyboard with the host computer, sending an equipment verification encryption instruction to the USB keyboard by the host computer, decrypting and identifying the equipment verification encryption instruction by the USB keyboard, returning an identification code, and judging that the USB keyboard is a legal keyboard by the host computer according to the received identification code;
a monitoring input module: the host starts a monitoring thread, monitors the input of the USB keyboard and sends a key value acquisition request to the USB keyboard;
a key input module: the host computer obtains a key value of the USB keyboard through an SDK program, converts the key value into a required key value based on the SDK program, and executes corresponding operation based on the required key value.
6. The control system of the dedicated USB keyboard according to claim 1, further comprising:
a filtering module: and after the host converts the key value into the required key value, filtering and discarding the key value.
7. The USB keyboard control system of claim 1, wherein the identification code of the USB keyboard comprises a unique PID and VID.
8. The system for controlling a dedicated USB keyboard according to claim 1, wherein the SDK program of the host recognizes the key values of the USB keyboard, performs setting on/off of the key lamps of the USB keyboard, and obtains the key actions of the keyboard.
9. A special USB keyboard for implementing the control method of the special USB keyboard as claimed in any one of claims 1 to 4, wherein the special USB keyboard adopts a USB communication mode, and the special USB keyboard comprises at least one key arranged on the front and side surfaces of the keyboard.
10. A host device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized by further comprising the dedicated USB keyboard of claim 9, the processor implementing the dedicated USB keyboard control method of any one of claims 1 to 4 when executing the computer program.
CN202110987078.7A 2021-08-26 2021-08-26 Special USB keyboard and control method, system and equipment thereof Pending CN113836601A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110987078.7A CN113836601A (en) 2021-08-26 2021-08-26 Special USB keyboard and control method, system and equipment thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110987078.7A CN113836601A (en) 2021-08-26 2021-08-26 Special USB keyboard and control method, system and equipment thereof

Publications (1)

Publication Number Publication Date
CN113836601A true CN113836601A (en) 2021-12-24

Family

ID=78961307

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110987078.7A Pending CN113836601A (en) 2021-08-26 2021-08-26 Special USB keyboard and control method, system and equipment thereof

Country Status (1)

Country Link
CN (1) CN113836601A (en)

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1332926A (en) * 1998-12-28 2002-01-23 汤姆森特许公司 System and method for customizing program guide information to includes reminder item or local identifier
CN1690926A (en) * 2004-04-30 2005-11-02 深圳市朗科科技有限公司 Mobile storage method, system and equipment with wireless communication control function
CN101042618A (en) * 2007-04-30 2007-09-26 李明 Touching external connection keyboard
CN101158885A (en) * 2007-10-22 2008-04-09 李玫 User-defined keyboard and implementing method thereof
CN101340294A (en) * 2008-08-07 2009-01-07 深圳市紫金支点技术股份有限公司 Cipher keyboard apparatus and implementing method thereof
CN101770386A (en) * 2010-03-08 2010-07-07 北京飞天诚信科技有限公司 Safe startup method for Linux embedded system
CN102685216A (en) * 2012-04-25 2012-09-19 深圳市江波龙电子有限公司 Attribute display method and attribute display system of universal serial bus (USB) equipment, USB equipment and server
CN102902903A (en) * 2012-10-10 2013-01-30 山东中孚信息产业股份有限公司 Electronic commerce intelligent password key with button and implementation method for electronic commerce intelligent password key
CN203055028U (en) * 2013-02-05 2013-07-10 艾体威尔电子技术(北京)有限公司 Password input device and POS terminal
CN104156642A (en) * 2014-07-22 2014-11-19 杭州晟元芯片技术有限公司 Security password input system and method based on security touch screen control chip
CN105389506A (en) * 2015-10-20 2016-03-09 飞天诚信科技股份有限公司 Method and device for improving input safety
CN206039532U (en) * 2016-07-19 2017-03-22 国网新疆电力公司电力科学研究院 Computer USB peripheral hardware safety discernment filter
CN107783793A (en) * 2016-08-24 2018-03-09 旺玖科技股份有限公司 The method and USB device of automatic identification host operating system
CN107871092A (en) * 2016-09-27 2018-04-03 北京计算机技术及应用研究所 Anti- keyboard recording method based on Windows
CN107888379A (en) * 2017-10-25 2018-04-06 百富计算机技术(深圳)有限公司 A kind of method of secure connection, POS terminal and code keypad
CN111859373A (en) * 2020-07-15 2020-10-30 杭州安恒信息技术股份有限公司 Defense method and device for HID attack and computer equipment
CN112486496A (en) * 2020-11-25 2021-03-12 上海连尚网络科技有限公司 Method and equipment for generating and operating so file
CN112966276A (en) * 2021-04-02 2021-06-15 杭州华澜微电子股份有限公司 Method, device and medium for safely starting computer
CN113127941A (en) * 2019-12-31 2021-07-16 北京奇虎科技有限公司 Equipment safety protection method and device

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1332926A (en) * 1998-12-28 2002-01-23 汤姆森特许公司 System and method for customizing program guide information to includes reminder item or local identifier
CN1690926A (en) * 2004-04-30 2005-11-02 深圳市朗科科技有限公司 Mobile storage method, system and equipment with wireless communication control function
CN101042618A (en) * 2007-04-30 2007-09-26 李明 Touching external connection keyboard
CN101158885A (en) * 2007-10-22 2008-04-09 李玫 User-defined keyboard and implementing method thereof
CN101340294A (en) * 2008-08-07 2009-01-07 深圳市紫金支点技术股份有限公司 Cipher keyboard apparatus and implementing method thereof
CN101770386A (en) * 2010-03-08 2010-07-07 北京飞天诚信科技有限公司 Safe startup method for Linux embedded system
CN102685216A (en) * 2012-04-25 2012-09-19 深圳市江波龙电子有限公司 Attribute display method and attribute display system of universal serial bus (USB) equipment, USB equipment and server
CN102902903A (en) * 2012-10-10 2013-01-30 山东中孚信息产业股份有限公司 Electronic commerce intelligent password key with button and implementation method for electronic commerce intelligent password key
CN203055028U (en) * 2013-02-05 2013-07-10 艾体威尔电子技术(北京)有限公司 Password input device and POS terminal
CN104156642A (en) * 2014-07-22 2014-11-19 杭州晟元芯片技术有限公司 Security password input system and method based on security touch screen control chip
CN105389506A (en) * 2015-10-20 2016-03-09 飞天诚信科技股份有限公司 Method and device for improving input safety
CN206039532U (en) * 2016-07-19 2017-03-22 国网新疆电力公司电力科学研究院 Computer USB peripheral hardware safety discernment filter
CN107783793A (en) * 2016-08-24 2018-03-09 旺玖科技股份有限公司 The method and USB device of automatic identification host operating system
CN107871092A (en) * 2016-09-27 2018-04-03 北京计算机技术及应用研究所 Anti- keyboard recording method based on Windows
CN107888379A (en) * 2017-10-25 2018-04-06 百富计算机技术(深圳)有限公司 A kind of method of secure connection, POS terminal and code keypad
CN113127941A (en) * 2019-12-31 2021-07-16 北京奇虎科技有限公司 Equipment safety protection method and device
CN111859373A (en) * 2020-07-15 2020-10-30 杭州安恒信息技术股份有限公司 Defense method and device for HID attack and computer equipment
CN112486496A (en) * 2020-11-25 2021-03-12 上海连尚网络科技有限公司 Method and equipment for generating and operating so file
CN112966276A (en) * 2021-04-02 2021-06-15 杭州华澜微电子股份有限公司 Method, device and medium for safely starting computer

Similar Documents

Publication Publication Date Title
EP2017765B1 (en) System and method for out-of-band assisted biometric secure boot
US6678833B1 (en) Protection of boot block data and accurate reporting of boot block contents
CN107563201B (en) Associated sample searching method and device based on machine learning and server
US20160196428A1 (en) System and Method for Detecting Stack Pivot Programming Exploit
US10447924B2 (en) Camera usage notification
WO2013041016A1 (en) Method and device for processing computer viruses
CN112165455A (en) Data access control method and device, computer equipment and storage medium
US10554383B2 (en) Analysis system, analysis method, and storage medium
US20150249665A1 (en) Method and system for extracting characteristic information
US10372947B2 (en) Parsing, processing, and/or securing stream buffers
WO2020108357A1 (en) Program classification model training method, program classification method, and device
CN109800576B (en) Monitoring method and device for unknown program exception request and electronic device
US20180341769A1 (en) Threat detection method and threat detection device
CN111967023A (en) Data encryption and decryption method, device, system and readable storage medium
US20160134652A1 (en) Method for recognizing disguised malicious document
CN112417014A (en) Dynamic modification execution plan method, system, and computer-readable storage medium
CN110135154B (en) Injection attack detection system and method for application program
CN109446847B (en) Configuration method of dual-system peripheral resources, terminal equipment and storage medium
CN113836601A (en) Special USB keyboard and control method, system and equipment thereof
WO2019127043A1 (en) Terminal device control method and terminal device
CN108319853B (en) Virus characteristic code processing method and device
US9787699B2 (en) Malware detection
KR101899774B1 (en) Data processing method against Randsomeware, computer program therefor and a computer-readable recording meduim on which the program is recorded
CN111651763A (en) Process monitoring method and device, electronic equipment and storage medium
EP3819799A1 (en) Method of threat detection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination