[go: up one dir, main page]

WO2006033531A1 - Random keycode security - Google Patents

Random keycode security Download PDF

Info

Publication number
WO2006033531A1
WO2006033531A1 PCT/KR2005/003010 KR2005003010W WO2006033531A1 WO 2006033531 A1 WO2006033531 A1 WO 2006033531A1 KR 2005003010 W KR2005003010 W KR 2005003010W WO 2006033531 A1 WO2006033531 A1 WO 2006033531A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
keylogger
software
hardware
random
Prior art date
Application number
PCT/KR2005/003010
Other languages
French (fr)
Inventor
Young Shin Kim
Original Assignee
Young Shin Kim
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Young Shin Kim filed Critical Young Shin Kim
Publication of WO2006033531A1 publication Critical patent/WO2006033531A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Definitions

  • This invention is the invention devised to provide the ultimate security for the keyboard input data.
  • the hardware Keylogger security device is intended to maintain the physical keyboard security by encoding
  • the production costs of built-in hardware encoding module may be raised by several times and it seems difficult to be generally used due to the limitations in the encoding phase, the information exposure at the final decoding phase, or causing various types of problems in the hardware stability and the problems of OS performance degradation.
  • This invention can maintain the security for the software Keylogger as well as the hardware Keylogger and can be applicable to all the windows applications not limited to the web browsers. Also, this invention is intended to provide the online/offline security and more high-level security function while not depending on the encoding/ decoding methodologies, while being faithful to the existing computing environments with sufficient competitive advantages in the market.
  • this invention is intended to allow operating all the hardware and software of the basic computing system beyond various limitations and speed by in ⁇ tegrating them, to face with various OS and computing environments, and to realize the Keylogger security for all types of Keyloggers without affecting the performance with the simplest and highest functionalities Technical Solution
  • Drawing No. 1 is a sequential diagram of explaining the Keylogger security process in the entire system according to an example and Drawing No. 2 is the drawing of explaining the above Keylogger security program by each module.
  • the above Keylogger Security Program includes the Random Key Transfer Module (11), Real Keycode Extraction Module (12), Real Keycode Tranfer Module (13), and Virtual Keyboard Module (14).
  • the Random Key Transfer Module (11) generates a numerous number of random keys by a direct hardware access and transmits to the Keyboard (100), Physical Interface Device (200), or Input Port (300).
  • the Real Keycode Extraction Module (12) precisely extracts the real key from the numerous random keys by the random key array information of the Random Key Transfer Module (11) and removes the random keys.
  • FIG. 3 shows the real example of the system- wide Keylogger security program according to this invention.
  • this invention since this invention has the advantage of providing security to all the hardware Keyloggers only by updating the firmware without a hardware modification when applying it to a Keyboard (100), it can secure high competitive advantages over the performance, applicability and economy.
  • This invention can realize the ultimate security goals of keyboard input by overcoming the practical, applicable and economical limitations of existing software and hardware Keylogger security solutions while enabling to use all the applications on the OS by applying a software random key security module that provides security to all the hardware and software Key loggers.
  • this invention maintains the security to all the hardware and software
  • Keyloggers it can be applied to all the windows applications at the same time, and security can be made on the online as well as offline environment.
  • This invention can be reliably operated beyond various encoding/decoding limitations and the speed limitation while not depending on the encoding method since all the hardware and software of the basic computer OS are systematically integrated. Also in the perspectives of production costs, it can greatly improve the security performance, system performance and economy tens and hundreds times more than those of existing Keylogger security tools in the overall performance since it allows providing a high level of security functions without causing any additional cost.
  • this invention in the current society of rapid information exchange, can not only contribute to the stable operation of economy and information in the perspectives of enterprise and public institution information security as well as important personal information, but also can make a rapid progress in the security solution market domestic and overseas more than any other security solutions.
  • Drawing No. 1 of this invention is the sequence diagram that explains the
  • Drawing No. 3 of this invention shows a user window secured by this security program.
  • Drawing No. 1 is a sequential diagram of explaining the Keylogger security process in the entire system according to an example and Drawing No. 2 is the drawing of explaining the above Keylogger security program by each module.
  • the above Keylogger Security Program includes the Random Key Transfer Module (11), Real Keycode Extraction Module (12), Real Keycode Tranfer Module (13), and Virtual Keyboard Module (14).
  • the Random Key Transfer Module (11) generates a numerous number of random keys by a direct hardware access and transmits to the Keyboard (100), Physical Interface Device (200), or Input Port (300).
  • the Real Keycode Extraction Module (12) precisely extracts the real key from the numerous random keys by the random key array information of the Random Key Transfer Module (11) and removes the random keys.
  • the Real Keycode Tranfer Module (13) directly enters (S4) the secured input to the Application Program (500). [64] Also, if a certain user desires, user can directly enter to the application (300) through the Real Key code Tranfer Module (13) with the Virtual Keyboard Module (14).
  • Drawing No. 3 shows the real example of the system- wide Keylogger security program according to this invention.
  • this invention since this invention has the advantage of providing security to all the hardware Keyloggers only by updating the firmware without a hardware modification when applying it to a Keyboard (100), it can secure high competitive advantages over the performance, applicability and economy.
  • This invention can realize the ultimate security goals of keyboard input by overcoming the practical, applicable and economical limitations of existing software and hardware Keylogger security solutions while enabling to use all the applications on the OS by applying a software random key security module that provides security to all the hardware and software Keyloggers.
  • this invention maintains the security to all the hardware and software
  • Keyloggers it can be applied to all the windows applications at the same time, and security can be made on the online as well as offline environment.
  • This invention can be reliably operated beyond various encoding/decoding limitations and the speed limitation while not depending on the encoding method since all the hardware and software of the basic computer OS are systematically integrated. Also in the perspectives of production costs, it can greatly improve the security performance, system performance and economy tens and hundreds times more than those of existing Keylogger security tools in the overall performance since it allows providing a high level of security functions without causing any additional cost.
  • this invention in the current society of rapid information exchange, can not only contribute to the stable operation of economy and information in the perspectives of enterprise and public institution information security as well as important personal information, but also can make a rapid progress in the security solution market domestic and overseas more than any other security solutions.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Input From Keyboards Or The Like (AREA)
  • User Interface Of Digital Computer (AREA)
  • Storage Device Security (AREA)

Abstract

As an invention devised for the keyboard input data security, it provides a security for all the software Keylogger as well as the hardware Keylogger by executing a software-type of random key security. It allows using all the operating applications as well as the web-browser on the security environment, has improved the limitations in the validity, applicability and economy of existing software Keylogger security solutions and hardware Keylogger security solutions. It has overcome the limitations of existing hardware Keylogger security solutions in their encoding security system, system stability, speed decline, and increased production cost. This invention is devised to guarantee a high-level of security for the keyboard input data by a random key security that exceeds the encoding/decoding functions without using the encoding/decoding process.

Description

Description RANDOM KEYCODE SECURITY
Technical Field
[1] As an invention devised for the keyboard input data security, it provides a security for all the software Keylogger as well as the hardware Keylogger by executing a software-type of random key security, with much circumstance, This invention is devised to guarantee a high-level of security for the keyboard input data by a random key security that exceeds the encoding/decoding functions without using the encoding/ decoding process. Background Art
[2] This invention is the invention devised to provide the ultimate security for the keyboard input data.
[3] In the perspectives of hacking important data, the evilness of Keylogger may be considered much more dangerous than the viruses, worms and spyware and if it is the personal information directly related to the economic activities, it can threat a national economy beyond the personal economy. Also, companies and governmental in¬ stitutions may be prone to the outflows and misuses of important information and the military institutions may have the fatal danger of exposing confidential information. To avoid such problems, various vaccine, firewall and security programs have been applied, but the effect has been made only on a partial portion of the Keylogger. Since Keylogger has various special functions in its legal and illegal applicability, the mod¬ ification and production are relatively easy and has a large abuse possibility due to its wide-spread presence. Due to these problems, a more professional and powerful security has been demanded and various Keylogger security solutions have been developed.
[4] According to the conventional technology, there are two types of keyboard security solutions, one for the software Keylogger and the other for the hardware Keylogger.
[5] As computers and programming techniques are rapidly developing, Keylogger has been further evolved and the software Keylogger security program had a certain level of limitations to various Keyloggers. More over, the hardware Keylogger devices are even traded at the present time. Nevertheless, in order to maintain the security for the software Keylogger, the software Keylogger security programs have adopted various conventional security methods of encoding, scanning and virtual keyboard to the methods of hooking, filter driver and keyboard driver preemption, and up to the recent methods of input port access, input port encoding, detection and elusion. However, the real test results tell that even the software security has not been realized adequately and they seemed to have various restrictions that they are limited to some defined websites and applications or they have put limitations to the input of Korean character and the hardware environment, together with the limitations of execution speed and system load. Even under these restricted conditions, some security weaknesses have been found.
[6] Although the hardware Keylogger security device is intended to maintain the physical keyboard security by encoding, the production costs of built-in hardware encoding module may be raised by several times and it seems difficult to be generally used due to the limitations in the encoding phase, the information exposure at the final decoding phase, or causing various types of problems in the hardware stability and the problems of OS performance degradation.
[7] Therefore, the solution that exceeds the performance of current Keylogger security programs and devices is highly demanded, while providing the security of all the software and hardware Key loggers in all the security environments, providing the security over all the window applications not limited to the web browsers and messengers, and not affecting the existing computing performance in the system loads of speed, resources, memory and execution file capacity, without raising any further costs. Disclosure of Invention
Technical Problem
[8] This invention can maintain the security for the software Keylogger as well as the hardware Keylogger and can be applicable to all the windows applications not limited to the web browsers. Also, this invention is intended to provide the online/offline security and more high-level security function while not depending on the encoding/ decoding methodologies, while being faithful to the existing computing environments with sufficient competitive advantages in the market.
[9] In order to achieve the above goals, the first viewpoint of this Keylogger security method has the following phases such as;
[10] a) The phase that transmits to the keyboard or interface devices for the hardware and software Keylogger security with numerous random key repetitions and to the input port for the software Keylogger security;
[11] b) The phase that user enters the real keys on the keyboard whenever the user desires;
[12] c) The phase of extracting correctly the real key from a numerous number of random keys jus before reaching to an application, when an real key is entered;
[13] d) The phase of directly entering only the real keys to the application;
[14] e) The phase of entering a secured direct input to the application when entering the real key input through a virtual keyboard.
[15] Therefore, this invention is intended to allow operating all the hardware and software of the basic computing system beyond various limitations and speed by in¬ tegrating them, to face with various OS and computing environments, and to realize the Keylogger security for all types of Keyloggers without affecting the performance with the simplest and highest functionalities Technical Solution
[16] The characteristics of system- wide Keylogger security by the random key code security software for the realization of above goals are made by the technology of using random keycode. This random key security technology is a new technology of improving the performance more than tens or hundreds times in the perspectives of the execution speed, applicability and security while eliminating the decoding key itself.
[17] For the computer keyboard that includes the system- wide Keylogger security functions from the random keycode security software prepared by this invention, the real examples can be applied to all the application programs for the security functions of all the software and hardware Keyloggers.
[18] Drawing No. 1 is a sequential diagram of explaining the Keylogger security process in the entire system according to an example and Drawing No. 2 is the drawing of explaining the above Keylogger security program by each module.
[19] Referring to the Drawing No. 1, the above Keylogger Security Program (10) includes the Random Key Transfer Module (11), Real Keycode Extraction Module (12), Real Keycode Tranfer Module (13), and Virtual Keyboard Module (14).
[20] Referring to the Drawing No. 1 and 2, the Random Key Transfer Module (11) generates a numerous number of random keys by a direct hardware access and transmits to the Keyboard (100), Physical Interface Device (200), or Input Port (300).
[21] When user enters (S2) the real key desired by the user on the Keyboard (100), the real key is located in a random position from the numerous random keys and passes all the Hardware Software Process (400) of the computer system.
[22] The Real Keycode Extraction Module (12) precisely extracts the real key from the numerous random keys by the random key array information of the Random Key Transfer Module (11) and removes the random keys.
[23] Even though a Keylogger exists in a process point of the computer hardware or software, it may make any sense whether or not it records a numerous number of meaningless random keys since the real key and random key take the same form.
[24] Finally, the Real Keycode Tranfer Module (13) directly enters (S4) the secured input to the Application Program (500).
[25] Also, if a certain user desires, user can directly enter to the Application Program (500) through the Real Keycode Tranfer Module (13) with Virtual Keyboard Module (14).
[26] Additionally, when transmitting the random keys to the Input Port (300) which is the initial keycode input phase of the computer mainboard from the Random Key Transfer Module (11), it can realize the system- wide Key logger security that has not been accomplished by any existing software Keylogger security module and when applying to the Keyboard (100) or Physical Interface Device (200), it can accomplish the system-wide Keylogger security that is more economical, fast and reliable than any other hardware Keylogger security devices.
[27] Also, it allows to accomplish a complete security only by modifying the firmware routines of existing Keyboard (100) or Physical Interface Device (200) without adding a new chip or device for the hardware Keylogger security and all these processes are optimized to be maintained with the kernel level of memory occupation level and almost 0% of CPU load, resource occupation and speed reduction and support all the keycodes such as English, Korean, digits, special keys, and function keys.
[28] Drawing No. 3 shows the real example of the system- wide Keylogger security program according to this invention.
[29] Referring to Drawing No. 3, no data is recorded in a specific Keylogger-B (B) although the User Input Information (A) is really entered and another Keylogger-C (C) has recorded a numerous number of meaningless data by the randomized security process. In other words, the Keylogger has completely lost its function by this security program and it has recorded a numerous number of meaningless data even though it has logged.
[30] Since these data are completely randomized, no decoding key is necessary and they simply are meaningless data that even this security program can t recognize. In other words, only the real key extraction module can tell that when having the input in a real-time and no program or OS can restore the original data after or before the input.
[31] Also, since this invention has the advantage of providing security to all the hardware Keyloggers only by updating the firmware without a hardware modification when applying it to a Keyboard (100), it can secure high competitive advantages over the performance, applicability and economy.
[32] Also, the security to all the hardware Keylogger can be made simply by adding a
Physical Interface Device (200) of holding a firm without modifying the existing keyboard firmware. Additionally, if it is applied only to the Input Port (300) of the body without modifying a firmware or adding an interface device, the security to a software Keylogger may be provided and further, it has the advantage of providing security to all the hardware Keyloggers when using a virtual keyboard. Advantageous Effects
[33] This invention can realize the ultimate security goals of keyboard input by overcoming the practical, applicable and economical limitations of existing software and hardware Keylogger security solutions while enabling to use all the applications on the OS by applying a software random key security module that provides security to all the hardware and software Key loggers.
[34] Also, this invention maintains the security to all the hardware and software
Keyloggers, it can be applied to all the windows applications at the same time, and security can be made on the online as well as offline environment.
[35] This invention can be reliably operated beyond various encoding/decoding limitations and the speed limitation while not depending on the encoding method since all the hardware and software of the basic computer OS are systematically integrated. Also in the perspectives of production costs, it can greatly improve the security performance, system performance and economy tens and hundreds times more than those of existing Keylogger security tools in the overall performance since it allows providing a high level of security functions without causing any additional cost.
[36] Also, this invention in the current society of rapid information exchange, can not only contribute to the stable operation of economy and information in the perspectives of enterprise and public institution information security as well as important personal information, but also can make a rapid progress in the security solution market domestic and overseas more than any other security solutions.
[37] The example in this invention is simply one real example and the changes and modifications can be made within the scope that doesn t go beyond the main idea and they may not limited to the examples provided. Brief Description of the Drawings
[38] Drawing No. 1 of this invention is the sequence diagram that explains the
Keylogger security process in the entire system.
[39] Drawing No. 2 of this invention explains this security program by each module.
[40] Drawing No. 3 of this invention shows a user window secured by this security program.
[41] * Symbols Used in the Drawings *
[42] 10: Keylogger Security Program
[43] 11 : Random Key Transfer Module
[44] 12: Real Keycode Extraction Module
[45] 13: Real Keycode Tranfer Module
[46] 14: Virtual Keyboard Module
[47] 100: Keyboard [48] 200: Physical Interface Device
[49] 300: Input Port
[50] 400: Hardware Software Process
[51] 500: Application Program
[52] A: User Input Information
[53] B: Keylogger-B
[54] C: Keylogger-C
Best Mode for Carrying Out the Invention
[55] The characteristics of system- wide Keylogger security by the random keycode security software for the realization of above goals are made by the technology of using random keycode. This random key security technology is a new technology of improving the performance more than tens or hundreds times in the perspectives of the execution speed, applicability and security while eliminating the decoding key itself.
[56] For the computer keyboard that includes the system-wide Keylogger security functions from the random keycode security software prepared by this invention, the real examples can be applied to all the application programs for the security functions of all the software and hardware Key loggers.
[57] Drawing No. 1 is a sequential diagram of explaining the Keylogger security process in the entire system according to an example and Drawing No. 2 is the drawing of explaining the above Keylogger security program by each module.
[58] Referring to the Drawing No. 1, the above Keylogger Security Program (10) includes the Random Key Transfer Module (11), Real Keycode Extraction Module (12), Real Keycode Tranfer Module (13), and Virtual Keyboard Module (14).
[59] Referring to the Drawing No. 1 and 2, the Random Key Transfer Module (11) generates a numerous number of random keys by a direct hardware access and transmits to the Keyboard (100), Physical Interface Device (200), or Input Port (300).
[60] When user enters (S2) the real key desired by the user on the Keyboard (100), the real key is located in a random position from the numerous random keys and passes all the Hardware Software Process (400) of the computer system.
[61] The Real Keycode Extraction Module (12) precisely extracts the real key from the numerous random keys by the random key array information of the Random Key Transfer Module (11) and removes the random keys.
[62] Even though a Keylogger exists in a process point of the computer hardware or software, it may make any sense whether or not it records a numerous number of meaningless random keys since the real key and random key take the same form.
[63] Finally, the Real Keycode Tranfer Module (13) directly enters (S4) the secured input to the Application Program (500). [64] Also, if a certain user desires, user can directly enter to the application (300) through the Real Key code Tranfer Module (13) with the Virtual Keyboard Module (14).
[65] Additionally, when transmitting the random keys to the Input Port (300) which is the initial keycode input phase of the computer mainboard from the Random Key Transfer Module (11), it can realize the system- wide Key logger security that has not been accomplished by any existing software Keylogger security module and when applying to the Keyboard (100) or Physical Interface Device (200), it can accomplish the system-wide Keylogger security that is more economical, fast and reliable than any other hardware Keylogger security devices.
[66] Also, it allows to accomplish a complete security only by modifying the firmware routines of existing Keyboard (100) or Physical Interface Device (200) without adding a new chip or device for the hardware Keylogger security and all these processes are optimized to be maintained with the kernel level of memory occupation level and almost 0% of CPU load, resource occupation and speed reduction and support all the keycodes such as English, Korean, digits, special keys, and function keys. Mode for the Invention
[67] The characteristics of system-wide Keylogger security by the random keycode security software for the realization of above goals are made by the technology of using random keycode. This random key security technology is a new technology of improving the performance more than tens or hundreds times in the perspectives of the execution speed, applicability and security while eliminating the decoding key itself.
[68] Drawing No. 3 shows the real example of the system- wide Keylogger security program according to this invention.
[69] Referring to Drawing No. 3, no data is recorded in a specific Keylogger-B (B) although the User Input Information (A) is really entered and another Keylogger-C (C) has recorded a numerous number of meaningless data by the randomized security process. In other words, the Keylogger has completely lost its function by this security program and it has recorded a numerous number of meaningless data even though it has logged.
[70] Since these data are completely randomized, no decoding key is necessary and they simply are meaningless data that even this security program can t recognize. In other words, only the real key extraction module can tell that when having the input in a real-time and no program or OS can restore the original data after or before the input.
[71] Also, since this invention has the advantage of providing security to all the hardware Keyloggers only by updating the firmware without a hardware modification when applying it to a Keyboard (100), it can secure high competitive advantages over the performance, applicability and economy.
[72] Also, the security to all the hardware Keylogger can be made simply by adding a
Physical Interface Device (200) of holding a firm without modifying the existing keyboard firmware. Additionally, if it is applied only to the Input Port (300) of the body without modifying a firmware or adding an interface device, the security to a software Keylogger may be provided and further, it has the advantage of providing security to all the hardware Keyloggers when using a virtual keyboard. Industrial Applicability
[73] This invention can realize the ultimate security goals of keyboard input by overcoming the practical, applicable and economical limitations of existing software and hardware Keylogger security solutions while enabling to use all the applications on the OS by applying a software random key security module that provides security to all the hardware and software Keyloggers.
[74] Also, this invention maintains the security to all the hardware and software
Keyloggers, it can be applied to all the windows applications at the same time, and security can be made on the online as well as offline environment.
[75] This invention can be reliably operated beyond various encoding/decoding limitations and the speed limitation while not depending on the encoding method since all the hardware and software of the basic computer OS are systematically integrated. Also in the perspectives of production costs, it can greatly improve the security performance, system performance and economy tens and hundreds times more than those of existing Keylogger security tools in the overall performance since it allows providing a high level of security functions without causing any additional cost.
[76] Also, this invention in the current society of rapid information exchange, can not only contribute to the stable operation of economy and information in the perspectives of enterprise and public institution information security as well as important personal information, but also can make a rapid progress in the security solution market domestic and overseas more than any other security solutions.

Claims

Claims
[1] a) The phase of transmitting to the keyboard or interface device for the hardware and software Keylogger security by a numerous random key repetitions and the input port for the software Keylogger security; b) The phase that user enters the real key on the keyboard whenever user desires; c) When an real key is entered, the phase of extracting the real key from a numerous number of random keys just before the random keys and real key being reached to the application program d) The phase of directly entering the secured real key to the application program; e) When the real key is entered through a virtual keyboard, it is the phase of making a secured input directly to the application program and the Keylogger security method characterized by this phase;
PCT/KR2005/003010 2004-09-20 2005-09-13 Random keycode security WO2006033531A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020040074924A KR20040086235A (en) 2004-09-20 2004-09-20 Security method for keylog in the whole field of system by random keycode security software
KR10-2004-0074924 2004-09-20

Publications (1)

Publication Number Publication Date
WO2006033531A1 true WO2006033531A1 (en) 2006-03-30

Family

ID=36090258

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2005/003010 WO2006033531A1 (en) 2004-09-20 2005-09-13 Random keycode security

Country Status (2)

Country Link
KR (1) KR20040086235A (en)
WO (1) WO2006033531A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009023422A1 (en) * 2007-08-09 2009-02-19 Mcm Portfolio Llc System and method for generating and displaying a keyboard comprising a random layout of keys
US7921454B2 (en) 2007-10-22 2011-04-05 International Business Machines Corporation System and method for user password protection
TWI395112B (en) * 2007-11-30 2013-05-01 Chi Pei Wang Adapter to prevent keyboard keys from being recorded
EP2353092A4 (en) * 2008-10-10 2013-11-06 Safend Ltd System and method for incapacitating a hardware keylogger
US8712050B2 (en) 2007-09-11 2014-04-29 International Business Machines Corporation Method for implementing dynamic pseudorandom keyboard remapping
US8712049B2 (en) 2007-09-11 2014-04-29 International Business Machines Corporation System for implementing dynamic pseudorandom keyboard remapping
US8925073B2 (en) 2007-05-18 2014-12-30 International Business Machines Corporation Method and system for preventing password theft through unauthorized keylogging
TWI480760B (en) * 2013-02-06 2015-04-11 Chi Pei Wang Prevent the input data is recorded in the computer network system side
CN112261005A (en) * 2020-09-27 2021-01-22 中孚安全技术有限公司 Method and system for hiding Web secure login password

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100745489B1 (en) * 2005-07-19 2007-08-02 소프트포럼 주식회사 Key input hacking prevention method
US20070245343A1 (en) * 2005-12-30 2007-10-18 Marvin Shannon System and Method of Blocking Keyloggers
KR100746944B1 (en) * 2006-04-14 2007-08-07 고려대학교 산학협력단 Method of preventing information leakage and recording medium storing program for preventing information leakage

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010000260A (en) * 2000-08-25 2001-01-05 박준상 System and Method of authentication
KR20010109864A (en) * 2000-06-03 2001-12-12 신언철 Method For Input Of Information Using Virtual-Mouse-Method
KR20020048313A (en) * 2002-03-07 2002-06-22 최동성 Method for preventing key board hacking

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010109864A (en) * 2000-06-03 2001-12-12 신언철 Method For Input Of Information Using Virtual-Mouse-Method
KR20010000260A (en) * 2000-08-25 2001-01-05 박준상 System and Method of authentication
KR20020048313A (en) * 2002-03-07 2002-06-22 최동성 Method for preventing key board hacking

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
GARBER L.: "New Products Fill Gap in Encryption Protection", COMPUTER, vol. 38, no. 10, October 2005 (2005-10-01), pages 22 - 24 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8925073B2 (en) 2007-05-18 2014-12-30 International Business Machines Corporation Method and system for preventing password theft through unauthorized keylogging
WO2009023422A1 (en) * 2007-08-09 2009-02-19 Mcm Portfolio Llc System and method for generating and displaying a keyboard comprising a random layout of keys
US8712050B2 (en) 2007-09-11 2014-04-29 International Business Machines Corporation Method for implementing dynamic pseudorandom keyboard remapping
US8712049B2 (en) 2007-09-11 2014-04-29 International Business Machines Corporation System for implementing dynamic pseudorandom keyboard remapping
US7921454B2 (en) 2007-10-22 2011-04-05 International Business Machines Corporation System and method for user password protection
US8353017B2 (en) 2007-10-22 2013-01-08 International Business Machines Corporation User password protection
TWI395112B (en) * 2007-11-30 2013-05-01 Chi Pei Wang Adapter to prevent keyboard keys from being recorded
EP2353092A4 (en) * 2008-10-10 2013-11-06 Safend Ltd System and method for incapacitating a hardware keylogger
US9032536B2 (en) 2008-10-10 2015-05-12 Safend Ltd. System and method for incapacitating a hardware keylogger
TWI480760B (en) * 2013-02-06 2015-04-11 Chi Pei Wang Prevent the input data is recorded in the computer network system side
CN112261005A (en) * 2020-09-27 2021-01-22 中孚安全技术有限公司 Method and system for hiding Web secure login password

Also Published As

Publication number Publication date
KR20040086235A (en) 2004-10-08

Similar Documents

Publication Publication Date Title
Dai et al. SBLWT: A secure blockchain lightweight wallet based on trustzone
Volety et al. Cracking Bitcoin wallets: I want what you have in the wallets
Cooijmans et al. Analysis of secure key storage solutions on android
ES2728292T3 (en) Server and method to provide secure access to network-based services
CN101340281B (en) Method and system for safe login input on network
RU2619895C1 (en) Data encryption system and methods
Sparks A security assessment of trusted platform modules
US10275593B2 (en) Secure computing device using different central processing resources
CN106682497A (en) System and method of secure execution of code in hypervisor mode
JP2010517424A (en) Encryption key container on USB token
WO2006033531A1 (en) Random keycode security
Xia et al. TinMan: Eliminating confidential mobile data exposure with security oriented offloading
Benadjila et al. Wookey: Designing a trusted and efficient USB device
McGraw Managing software security risks
Mayrhofer An architecture for secure mobile devices
Creutzburg The strange world of keyloggers-an overview, Part I
Koivu et al. Software security considerations for IoT
CN111079102A (en) Linux remote secure login method, system, storage medium and equipment
EP2354994A1 (en) Secure signature creation application using a TPM comprising a middleware stack
CN106687978B (en) Computing device and method for suppression of stack disruption utilization
Adiletta et al. Leapfrog: The rowhammer instruction skip attack
Moses et al. Touch interface and keylogging malware
CN101383833A (en) Apparatus and method for enhancing PIN code input security of intelligent cipher key apparatus
US9361456B2 (en) Secure computing device using a library of programs
US20230419325A1 (en) Method for processing an operation involving secret data, terminal, system and corresponding computer program

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS (EPO FORM 1205A) OF 13-08-2007

122 Ep: pct application non-entry in european phase

Ref document number: 05808601

Country of ref document: EP

Kind code of ref document: A1