Description RANDOM KEYCODE SECURITY
Technical Field
[1] As an invention devised for the keyboard input data security, it provides a security for all the software Keylogger as well as the hardware Keylogger by executing a software-type of random key security, with much circumstance, This invention is devised to guarantee a high-level of security for the keyboard input data by a random key security that exceeds the encoding/decoding functions without using the encoding/ decoding process. Background Art
[2] This invention is the invention devised to provide the ultimate security for the keyboard input data.
[3] In the perspectives of hacking important data, the evilness of Keylogger may be considered much more dangerous than the viruses, worms and spyware and if it is the personal information directly related to the economic activities, it can threat a national economy beyond the personal economy. Also, companies and governmental in¬ stitutions may be prone to the outflows and misuses of important information and the military institutions may have the fatal danger of exposing confidential information. To avoid such problems, various vaccine, firewall and security programs have been applied, but the effect has been made only on a partial portion of the Keylogger. Since Keylogger has various special functions in its legal and illegal applicability, the mod¬ ification and production are relatively easy and has a large abuse possibility due to its wide-spread presence. Due to these problems, a more professional and powerful security has been demanded and various Keylogger security solutions have been developed.
[4] According to the conventional technology, there are two types of keyboard security solutions, one for the software Keylogger and the other for the hardware Keylogger.
[5] As computers and programming techniques are rapidly developing, Keylogger has been further evolved and the software Keylogger security program had a certain level of limitations to various Keyloggers. More over, the hardware Keylogger devices are even traded at the present time. Nevertheless, in order to maintain the security for the software Keylogger, the software Keylogger security programs have adopted various conventional security methods of encoding, scanning and virtual keyboard to the methods of hooking, filter driver and keyboard driver preemption, and up to the recent methods of input port access, input port encoding, detection and elusion. However, the real test results tell that even the software security has not been realized adequately and
they seemed to have various restrictions that they are limited to some defined websites and applications or they have put limitations to the input of Korean character and the hardware environment, together with the limitations of execution speed and system load. Even under these restricted conditions, some security weaknesses have been found.
[6] Although the hardware Keylogger security device is intended to maintain the physical keyboard security by encoding, the production costs of built-in hardware encoding module may be raised by several times and it seems difficult to be generally used due to the limitations in the encoding phase, the information exposure at the final decoding phase, or causing various types of problems in the hardware stability and the problems of OS performance degradation.
[7] Therefore, the solution that exceeds the performance of current Keylogger security programs and devices is highly demanded, while providing the security of all the software and hardware Key loggers in all the security environments, providing the security over all the window applications not limited to the web browsers and messengers, and not affecting the existing computing performance in the system loads of speed, resources, memory and execution file capacity, without raising any further costs. Disclosure of Invention
Technical Problem
[8] This invention can maintain the security for the software Keylogger as well as the hardware Keylogger and can be applicable to all the windows applications not limited to the web browsers. Also, this invention is intended to provide the online/offline security and more high-level security function while not depending on the encoding/ decoding methodologies, while being faithful to the existing computing environments with sufficient competitive advantages in the market.
[9] In order to achieve the above goals, the first viewpoint of this Keylogger security method has the following phases such as;
[10] a) The phase that transmits to the keyboard or interface devices for the hardware and software Keylogger security with numerous random key repetitions and to the input port for the software Keylogger security;
[11] b) The phase that user enters the real keys on the keyboard whenever the user desires;
[12] c) The phase of extracting correctly the real key from a numerous number of random keys jus before reaching to an application, when an real key is entered;
[13] d) The phase of directly entering only the real keys to the application;
[14] e) The phase of entering a secured direct input to the application when entering the
real key input through a virtual keyboard.
[15] Therefore, this invention is intended to allow operating all the hardware and software of the basic computing system beyond various limitations and speed by in¬ tegrating them, to face with various OS and computing environments, and to realize the Keylogger security for all types of Keyloggers without affecting the performance with the simplest and highest functionalities Technical Solution
[16] The characteristics of system- wide Keylogger security by the random key code security software for the realization of above goals are made by the technology of using random keycode. This random key security technology is a new technology of improving the performance more than tens or hundreds times in the perspectives of the execution speed, applicability and security while eliminating the decoding key itself.
[17] For the computer keyboard that includes the system- wide Keylogger security functions from the random keycode security software prepared by this invention, the real examples can be applied to all the application programs for the security functions of all the software and hardware Keyloggers.
[18] Drawing No. 1 is a sequential diagram of explaining the Keylogger security process in the entire system according to an example and Drawing No. 2 is the drawing of explaining the above Keylogger security program by each module.
[19] Referring to the Drawing No. 1, the above Keylogger Security Program (10) includes the Random Key Transfer Module (11), Real Keycode Extraction Module (12), Real Keycode Tranfer Module (13), and Virtual Keyboard Module (14).
[20] Referring to the Drawing No. 1 and 2, the Random Key Transfer Module (11) generates a numerous number of random keys by a direct hardware access and transmits to the Keyboard (100), Physical Interface Device (200), or Input Port (300).
[21] When user enters (S2) the real key desired by the user on the Keyboard (100), the real key is located in a random position from the numerous random keys and passes all the Hardware Software Process (400) of the computer system.
[22] The Real Keycode Extraction Module (12) precisely extracts the real key from the numerous random keys by the random key array information of the Random Key Transfer Module (11) and removes the random keys.
[23] Even though a Keylogger exists in a process point of the computer hardware or software, it may make any sense whether or not it records a numerous number of meaningless random keys since the real key and random key take the same form.
[24] Finally, the Real Keycode Tranfer Module (13) directly enters (S4) the secured input to the Application Program (500).
[25] Also, if a certain user desires, user can directly enter to the Application Program
(500) through the Real Keycode Tranfer Module (13) with Virtual Keyboard Module (14).
[26] Additionally, when transmitting the random keys to the Input Port (300) which is the initial keycode input phase of the computer mainboard from the Random Key Transfer Module (11), it can realize the system- wide Key logger security that has not been accomplished by any existing software Keylogger security module and when applying to the Keyboard (100) or Physical Interface Device (200), it can accomplish the system-wide Keylogger security that is more economical, fast and reliable than any other hardware Keylogger security devices.
[27] Also, it allows to accomplish a complete security only by modifying the firmware routines of existing Keyboard (100) or Physical Interface Device (200) without adding a new chip or device for the hardware Keylogger security and all these processes are optimized to be maintained with the kernel level of memory occupation level and almost 0% of CPU load, resource occupation and speed reduction and support all the keycodes such as English, Korean, digits, special keys, and function keys.
[28] Drawing No. 3 shows the real example of the system- wide Keylogger security program according to this invention.
[29] Referring to Drawing No. 3, no data is recorded in a specific Keylogger-B (B) although the User Input Information (A) is really entered and another Keylogger-C (C) has recorded a numerous number of meaningless data by the randomized security process. In other words, the Keylogger has completely lost its function by this security program and it has recorded a numerous number of meaningless data even though it has logged.
[30] Since these data are completely randomized, no decoding key is necessary and they simply are meaningless data that even this security program can t recognize. In other words, only the real key extraction module can tell that when having the input in a real-time and no program or OS can restore the original data after or before the input.
[31] Also, since this invention has the advantage of providing security to all the hardware Keyloggers only by updating the firmware without a hardware modification when applying it to a Keyboard (100), it can secure high competitive advantages over the performance, applicability and economy.
[32] Also, the security to all the hardware Keylogger can be made simply by adding a
Physical Interface Device (200) of holding a firm without modifying the existing keyboard firmware. Additionally, if it is applied only to the Input Port (300) of the body without modifying a firmware or adding an interface device, the security to a software Keylogger may be provided and further, it has the advantage of providing security to all the hardware Keyloggers when using a virtual keyboard.
Advantageous Effects
[33] This invention can realize the ultimate security goals of keyboard input by overcoming the practical, applicable and economical limitations of existing software and hardware Keylogger security solutions while enabling to use all the applications on the OS by applying a software random key security module that provides security to all the hardware and software Key loggers.
[34] Also, this invention maintains the security to all the hardware and software
Keyloggers, it can be applied to all the windows applications at the same time, and security can be made on the online as well as offline environment.
[35] This invention can be reliably operated beyond various encoding/decoding limitations and the speed limitation while not depending on the encoding method since all the hardware and software of the basic computer OS are systematically integrated. Also in the perspectives of production costs, it can greatly improve the security performance, system performance and economy tens and hundreds times more than those of existing Keylogger security tools in the overall performance since it allows providing a high level of security functions without causing any additional cost.
[36] Also, this invention in the current society of rapid information exchange, can not only contribute to the stable operation of economy and information in the perspectives of enterprise and public institution information security as well as important personal information, but also can make a rapid progress in the security solution market domestic and overseas more than any other security solutions.
[37] The example in this invention is simply one real example and the changes and modifications can be made within the scope that doesn t go beyond the main idea and they may not limited to the examples provided. Brief Description of the Drawings
[38] Drawing No. 1 of this invention is the sequence diagram that explains the
Keylogger security process in the entire system.
[39] Drawing No. 2 of this invention explains this security program by each module.
[40] Drawing No. 3 of this invention shows a user window secured by this security program.
[41] * Symbols Used in the Drawings *
[42] 10: Keylogger Security Program
[43] 11 : Random Key Transfer Module
[44] 12: Real Keycode Extraction Module
[45] 13: Real Keycode Tranfer Module
[46] 14: Virtual Keyboard Module
[47] 100: Keyboard
[48] 200: Physical Interface Device
[49] 300: Input Port
[50] 400: Hardware Software Process
[51] 500: Application Program
[52] A: User Input Information
[53] B: Keylogger-B
[54] C: Keylogger-C
Best Mode for Carrying Out the Invention
[55] The characteristics of system- wide Keylogger security by the random keycode security software for the realization of above goals are made by the technology of using random keycode. This random key security technology is a new technology of improving the performance more than tens or hundreds times in the perspectives of the execution speed, applicability and security while eliminating the decoding key itself.
[56] For the computer keyboard that includes the system-wide Keylogger security functions from the random keycode security software prepared by this invention, the real examples can be applied to all the application programs for the security functions of all the software and hardware Key loggers.
[57] Drawing No. 1 is a sequential diagram of explaining the Keylogger security process in the entire system according to an example and Drawing No. 2 is the drawing of explaining the above Keylogger security program by each module.
[58] Referring to the Drawing No. 1, the above Keylogger Security Program (10) includes the Random Key Transfer Module (11), Real Keycode Extraction Module (12), Real Keycode Tranfer Module (13), and Virtual Keyboard Module (14).
[59] Referring to the Drawing No. 1 and 2, the Random Key Transfer Module (11) generates a numerous number of random keys by a direct hardware access and transmits to the Keyboard (100), Physical Interface Device (200), or Input Port (300).
[60] When user enters (S2) the real key desired by the user on the Keyboard (100), the real key is located in a random position from the numerous random keys and passes all the Hardware Software Process (400) of the computer system.
[61] The Real Keycode Extraction Module (12) precisely extracts the real key from the numerous random keys by the random key array information of the Random Key Transfer Module (11) and removes the random keys.
[62] Even though a Keylogger exists in a process point of the computer hardware or software, it may make any sense whether or not it records a numerous number of meaningless random keys since the real key and random key take the same form.
[63] Finally, the Real Keycode Tranfer Module (13) directly enters (S4) the secured input to the Application Program (500).
[64] Also, if a certain user desires, user can directly enter to the application (300) through the Real Key code Tranfer Module (13) with the Virtual Keyboard Module (14).
[65] Additionally, when transmitting the random keys to the Input Port (300) which is the initial keycode input phase of the computer mainboard from the Random Key Transfer Module (11), it can realize the system- wide Key logger security that has not been accomplished by any existing software Keylogger security module and when applying to the Keyboard (100) or Physical Interface Device (200), it can accomplish the system-wide Keylogger security that is more economical, fast and reliable than any other hardware Keylogger security devices.
[66] Also, it allows to accomplish a complete security only by modifying the firmware routines of existing Keyboard (100) or Physical Interface Device (200) without adding a new chip or device for the hardware Keylogger security and all these processes are optimized to be maintained with the kernel level of memory occupation level and almost 0% of CPU load, resource occupation and speed reduction and support all the keycodes such as English, Korean, digits, special keys, and function keys. Mode for the Invention
[67] The characteristics of system-wide Keylogger security by the random keycode security software for the realization of above goals are made by the technology of using random keycode. This random key security technology is a new technology of improving the performance more than tens or hundreds times in the perspectives of the execution speed, applicability and security while eliminating the decoding key itself.
[68] Drawing No. 3 shows the real example of the system- wide Keylogger security program according to this invention.
[69] Referring to Drawing No. 3, no data is recorded in a specific Keylogger-B (B) although the User Input Information (A) is really entered and another Keylogger-C (C) has recorded a numerous number of meaningless data by the randomized security process. In other words, the Keylogger has completely lost its function by this security program and it has recorded a numerous number of meaningless data even though it has logged.
[70] Since these data are completely randomized, no decoding key is necessary and they simply are meaningless data that even this security program can t recognize. In other words, only the real key extraction module can tell that when having the input in a real-time and no program or OS can restore the original data after or before the input.
[71] Also, since this invention has the advantage of providing security to all the hardware Keyloggers only by updating the firmware without a hardware modification when applying it to a Keyboard (100), it can secure high competitive advantages over
the performance, applicability and economy.
[72] Also, the security to all the hardware Keylogger can be made simply by adding a
Physical Interface Device (200) of holding a firm without modifying the existing keyboard firmware. Additionally, if it is applied only to the Input Port (300) of the body without modifying a firmware or adding an interface device, the security to a software Keylogger may be provided and further, it has the advantage of providing security to all the hardware Keyloggers when using a virtual keyboard. Industrial Applicability
[73] This invention can realize the ultimate security goals of keyboard input by overcoming the practical, applicable and economical limitations of existing software and hardware Keylogger security solutions while enabling to use all the applications on the OS by applying a software random key security module that provides security to all the hardware and software Keyloggers.
[74] Also, this invention maintains the security to all the hardware and software
Keyloggers, it can be applied to all the windows applications at the same time, and security can be made on the online as well as offline environment.
[75] This invention can be reliably operated beyond various encoding/decoding limitations and the speed limitation while not depending on the encoding method since all the hardware and software of the basic computer OS are systematically integrated. Also in the perspectives of production costs, it can greatly improve the security performance, system performance and economy tens and hundreds times more than those of existing Keylogger security tools in the overall performance since it allows providing a high level of security functions without causing any additional cost.
[76] Also, this invention in the current society of rapid information exchange, can not only contribute to the stable operation of economy and information in the perspectives of enterprise and public institution information security as well as important personal information, but also can make a rapid progress in the security solution market domestic and overseas more than any other security solutions.