• Title/Summary/Keyword: Keyboard

Search Result 468, Processing Time 0.027 seconds

Analysis on a New Intrinsic Vulnerability to Keyboard Security (PS/2 키보드에서의 RESEND 명령을 이용한 패스워드 유출 취약점 분석)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.177-182
    • /
    • 2011
  • This paper introduces a possibility for attackers to acquire the keyboard scan codes through using the RESEND command provided by the keyboard hardware itself, based on the PS/2 interface that is a dominant interface for input devices. Accordingly, a keyboard sniffing program using the introduced vulnerability is implemented to prove the severeness of the vulnerability, which shows that user passwords can be easily exposed. As one of the intrinsic vulnerabilities found on the existing platforms, for which there were little considerations on the security problems when they were designed, it is required to consider a hardware approach to countermeasure the introduced vulnerability.

A Study on Software algorithm for Processing n-key roll-over at Matrix Keyboard (매트릭스 구성 키보드의 n-키 롤-오버 처리를 위한 소프트웨어 알고리즘에 관한 연구)

  • Jun, Ho-Ik;Lee, Hyun-Chang
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.89-94
    • /
    • 2020
  • In this paper, we propose a software algorithm that can configure n-key roll-over that detects all keys without limitation on the number of pressed keys in the dynamic scanning detection of a keyboard composed of a matrix. The proposed algorithm uses the timer interrupt of the microcontroller for computer keyboard control, so that a constant and accurate detection interval can be obtained, and an accurate debounce time can be provided. In order to confirm the effectiveness of the proposed algorithm, a microcontroller was connected to a toy keyboard constructed in the form of a clavier and experiments were conducted. As a result of the experiment, it was confirmed that detection of all keys was performed accurately regardless of the number of keys pressed.

A Comparison and Analysis for the Korean Typewriter Keyboards (한글 타자기 자판들에 대한 비교 연구)

  • Gang, Seok-Ho;Jeong, Seung-Hak
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.5 no.1
    • /
    • pp.27-44
    • /
    • 1979
  • The purpose of this study is to detect the problems of the Korean typewriter keyboards, and to analyze and compare the standard keyboard with other keyboards. We find that the standard Korean keyboard has a lot of problems in terms of mechanical engineering and human factors engineering and that it is less efficient than Kong's keyboard.

  • PDF

Functional Stroke Methods of Korean Keyboards Using Special Feature of Korean Vowels (한글 모음의 특성을 고려한 자판의 기능성 입력 방법)

  • Kim, Kuk
    • Journal of the Ergonomics Society of Korea
    • /
    • v.28 no.4
    • /
    • pp.167-169
    • /
    • 2009
  • Korean vowels have special feature such that same vowels do not appear sequentially in a syllable. And two vowels appear with consistent rules. Using this feature, functional key stroke methods are available to Korean computer keyboard. Tapping a key makes diphthong easily. This will be used to Korean computer keyboard design.

A New Computer Keyboard Design for Korean Alphabets with Frequency and Standard Considerations (사용빈도와 표준정합성을 고려한 컴퓨터 한글자판의 개선에 관한 연구)

  • Kim, Kuk;Yoo, Young-Kwan
    • Journal of the Ergonomics Society of Korea
    • /
    • v.27 no.3
    • /
    • pp.7-14
    • /
    • 2008
  • In this study, four alternatives for the arrangement of Korean alphabets on computer keyboards are developed and analyzed to find the better design than the KS(Korean Standard) keyboard. Among the developed four modified models MOD 1 to MOD4, we suggest MOD3 as the best design which incorporates the keys usage frequencies and the compatibility of present standard.

Ortho-Phonics Alpabetic One Hand Strock Keyboad's Structure and Design for Intergation of Language and Scription (어문결합을 지향하는 정음한손자판의 배치와 설계)

  • Kim Yong-Gi;Chin Yong-Ohk
    • The KIPS Transactions:PartB
    • /
    • v.11B no.7 s.96
    • /
    • pp.861-866
    • /
    • 2004
  • Keyboard is a link between human and terminal, so we can input knowledge to information device. The misstyping is occured or the speed is reduced if there would be transmission error. We always have to consider human interface and behavior effect, because the keyboard system is the harmony of human and machine. This paper is designed for representation of ortho-phonics alpabetic one hand strock keyboard which is enable to correct error and to edit word.

Learning of Skilled Typist´s Finger Positioning for New Input Device Scheme

  • Kim, Jin-Young;Lee, Ho-Gil;Hwang, Sung-Ho;Park, Hyouk-Ryeol
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.153.4-153
    • /
    • 2001
  • Skilled typists can type characters or wrds without looking at keyboard, relying on the finger´s relative position. If the relative positions of the fingers can be identified, a virtual keyboard may be accomplished by applying the concept of "DataGlove" or "FingerRing". The virtual keyboard may be efficient as a new mobile input device supporting QWERTY keyboard layout. For the purpose of investigating skilled typing pattern, in this paper the touch-positions of the fingers are measured with a touchscreen while four skilled typists type a long sentence. From these measurements it can be observed that the groups of touch-positions are classified into alphabet characters. Though there are some overlapped groups we can find constant distances capable of being discriminated ...

  • PDF

Implementation of Efficient Keyboard-hacking prevention and Authentication Systems using a Smart Card (스마트카드를 이용한 효율적인 키보드 해킹 방지 및 인증 시스템 구현)

  • 황선태;박종선
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.191-194
    • /
    • 2003
  • In this paper, we describe the effective way of keyboard-hacking prevention and authentication system using a Smart Card. These days the securing information matters for pc-users are becoming more important as the internet business grows rapidly, and the ubiquitous computing environment is open tot everyone. Therefore, PC authentication is necessary to handle the access control to the target PC. Also, the keyboard-inputting information is necessary to be protected properly against the malicious attack. In this paper, we propose the keyboard-hacking protect systems and authentication system using a Smart Card, and show the conveniency and efficiency in the results.

  • PDF

User experience testing of mobile phone keypad and touchpad (키패드와 터치패드 휴대전화 자판의 사용성 평가)

  • Chung, Dong Hun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.237-250
    • /
    • 2010
  • The present paper focuses on the comparison of user experience of mobile phone keypad and touchpad. Mobile phone has recently adopted a touchpad keyboard style and it gives users advantages and disadvantages as well. This paper examined usability, usefulness, affect and attitude of those two keyboard styles and disclosed interesting outcomes. First, keypad is better than touchpad in usefulness and usability. Second, touchpad is better than keypad in affect. Finally, touchpad is better than keypad in attitude. Overall, although touchapd is evaluated as worse keyboard in usability and usefulness, test subjects favored touchpad keyboard because it is more emotional and affective. It implies new digital device including mobile phone has to get more affective appeal to the young users and emotion will be a key point in digital consumption.

Vulnerability Verification of 27 MHz Wireless Keyboards (27MHz 무선 키보드의 취약성 분석)

  • Kim, Ho-Yeon;Sim, Bo-Yeon;Park, Ae-Sun;Han, Dong-Guk
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2145-2152
    • /
    • 2016
  • Internet generalization has led to increased demands for Internet banking. Various security programs to protect authentication information are being developed; however, these programs cannot protect the wireless communication sections of wireless keyboards. In particular, vulnerabilities have been reported in the radio communication sections of 27 MHz wireless keyboards. In this paper, we explain how to analyze M's 27 MHz wireless keyboard. We also experimentally show that an attacker can acquire authentication information during domestic Internet banking using a 27 MHz wireless keyboard. To do this, we set up an experimental encironment to analyze the electromagnetic signal of a 27 MHz wireless keyboard.