• Title/Summary/Keyword: Paper keyboard

Search Result 233, Processing Time 0.029 seconds

A Keyboard Security Method Based on a Subclassing (서브클래싱 기반의 키보드보안 기법)

  • Hwang, Sung-Jin;Park, Kyung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.15-23
    • /
    • 2011
  • In this paper, we propose a keyboard security method that is based on a subclassing. This method doesn't need an additional hardware and can be applied to Web browsers that do not support ActiveX controls. As the users of Web browsers such as Firefox, Safari, Chrome etc. are increased, it is more required to have the keyboard security methods that are based on software and don't use ActiveX controls. Thus we developed the user mode keyboard security method that is based on a subclassing with plugins. Our method doesn't need an additional hardware module and is interoperable with general kernel mode security programs.

Preliminary Study on Soft Keyboard with Recommendation for Mobile Device (모바일 단말기를 위한 추천 소프트 키보드)

  • Hwang, Kitae;Lee, Jae-Moon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.137-145
    • /
    • 2013
  • Recently most mobile devices have soft keyboards on their LCD touch screens. Because of the tiny size of the touch screen of the soft keyboard, adjacent keys are mistakenly typed. Also utilizing a key for multiple key inputs causes key type errors. In this paper, we proposed an algorithm to recommend proper words to the user while the user continues to type keys, which helps to easily correct key type errors. In addition, we presented a soft keyboard called MissLess which implemented the recommendation algorithm. We evaluated recommendation performance of MissLess keyboard through experiments by using 3 test sets. The test results showed that the success ratio of recommendation reached up to about 90% although there were some differences between results. However it is needed to be considered that we recommended 4 words for an input word in this experiments.

Analysis of an Intrinsic Vulnerability on Keyboard Security (키보드 보안의 근본적인 취약점 분석)

  • Yim, Kang-Bin;Bae, Kwang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.89-95
    • /
    • 2008
  • This paper analyzes the intrinsic vulnerability problems of the authentication system for Internet commerce based on the ID and password strings gathered from the computer keyboard. Through the found vulnerability, it is easy to sniff user passwords as well as any other keyboard inputs even when each of the existing keyboard protection softwares is running. We propose several countermeasures against the possible attacks to the vulnerability at both points of the hardware and the software concerns. The more secure environment for Internet commerce is highly required by implementing the proposed countermeasures.

Analysis on a New Intrinsic Vulnerability to Keyboard Security (PS/2 키보드에서의 RESEND 명령을 이용한 패스워드 유출 취약점 분석)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.177-182
    • /
    • 2011
  • This paper introduces a possibility for attackers to acquire the keyboard scan codes through using the RESEND command provided by the keyboard hardware itself, based on the PS/2 interface that is a dominant interface for input devices. Accordingly, a keyboard sniffing program using the introduced vulnerability is implemented to prove the severeness of the vulnerability, which shows that user passwords can be easily exposed. As one of the intrinsic vulnerabilities found on the existing platforms, for which there were little considerations on the security problems when they were designed, it is required to consider a hardware approach to countermeasure the introduced vulnerability.

A Study on Software algorithm for Processing n-key roll-over at Matrix Keyboard (매트릭스 구성 키보드의 n-키 롤-오버 처리를 위한 소프트웨어 알고리즘에 관한 연구)

  • Jun, Ho-Ik;Lee, Hyun-Chang
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.89-94
    • /
    • 2020
  • In this paper, we propose a software algorithm that can configure n-key roll-over that detects all keys without limitation on the number of pressed keys in the dynamic scanning detection of a keyboard composed of a matrix. The proposed algorithm uses the timer interrupt of the microcontroller for computer keyboard control, so that a constant and accurate detection interval can be obtained, and an accurate debounce time can be provided. In order to confirm the effectiveness of the proposed algorithm, a microcontroller was connected to a toy keyboard constructed in the form of a clavier and experiments were conducted. As a result of the experiment, it was confirmed that detection of all keys was performed accurately regardless of the number of keys pressed.

Design of Efficient Hacking Prevention Systems Using a Smart Card (스마트카드 기반의 효율적인 해킹 방지 시스템 설계)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF

User Identification Using Real Environmental Human Computer Interaction Behavior

  • Wu, Tong;Zheng, Kangfeng;Wu, Chunhua;Wang, Xiujuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3055-3073
    • /
    • 2019
  • In this paper, a new user identification method is presented using real environmental human-computer-interaction (HCI) behavior data to improve method usability. User behavior data in this paper are collected continuously without setting experimental scenes such as text length, action number, etc. To illustrate the characteristics of real environmental HCI data, probability density distribution and performance of keyboard and mouse data are analyzed through the random sampling method and Support Vector Machine(SVM) algorithm. Based on the analysis of HCI behavior data in a real environment, the Multiple Kernel Learning (MKL) method is first used for user HCI behavior identification due to the heterogeneity of keyboard and mouse data. All possible kernel methods are compared to determine the MKL algorithm's parameters to ensure the robustness of the algorithm. Data analysis results show that keyboard data have a narrower range of probability density distribution than mouse data. Keyboard data have better performance with a 1-min time window, while that of mouse data is achieved with a 10-min time window. Finally, experiments using the MKL algorithm with three global polynomial kernels and ten local Gaussian kernels achieve a user identification accuracy of 83.03% in a real environmental HCI dataset, which demonstrates that the proposed method achieves an encouraging performance.

Keyboard Solo System based on Hand Recognition (손 인식을 통한 건반 연주 시스템)

  • Lee, Eun-kyung;Ha, Jung-hee;Seo, Eun-sung;Park, So-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.171-172
    • /
    • 2009
  • Nowadays the music market is getting bigger while students are losing their creativity because of the cramming education even in the music class. Based on the growing music market, we made a project for students to play the musical instruments more easily. The suggested program is different from any other system because, with this program, we can play the musical instruments if only we have a keyboard made of paper and Webcam, which made us save money. When an user put his finger on the paper keyboard, Webcam makes a sound recognizing the position of the finger on the keyboard. We can choose one instrument out of four; Piano, drum, base and guitar. With this system, we can get an opportunity to learn many sounds of musical instruments and make our own melody.

  • PDF

Efficient Mobile Writing System with Korean Input Interface Based on Face Recognition

  • Kim, Jong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.49-56
    • /
    • 2020
  • The virtual Korean keyboard system is a method of inputting characters by touching a fixed position. This system is very inconvenient for people who have difficulty moving their fingers. To alleviate this problem, this paper proposes an efficient framework that enables keyboard input and handwriting through video and user motion obtained through the RGB camera of the mobile device. To develop this system, we use face recognition to calculate control coordinates from the input video, and develop an interface that can input and combine Hangul using this coordinate value. The control position calculated based on face recognition acts as a pointer to select and transfer the letters on the keyboard, and finally combines the transmitted letters to integrate them to perform the Hangul keyboard function. The result of this paper is an efficient writing system that utilizes face recognition technology, and using this system is expected to improve the communication and special education environment for people with physical disabilities as well as the general public.

Development of Youngwoo Keyboard for Dysarthria Patients (구음장애 환자용 영우글자판 개발)

  • Yun, Hyun-Jin;Kim, Young-Chul
    • Journal of Practical Engineering Education
    • /
    • v.14 no.2
    • /
    • pp.341-350
    • /
    • 2022
  • In this paper, we propseded the Youngwoo keyboard to help the communication disorders experienced by patients with dysarthria. Existing methods for communication by patients with dysarthria include a letter board with consonants and vowels, a mouse using eye tracking, and communication assistance applications. However, there was a delay of more than 5 minutes per sentence, so there were many difficulties in communication. However, unlike the existing method, the proposed method has been improved so that the patient with dysarthria can communicate by completing the sentences with eye movements. In the conclusion and future work of this paper, the educational use value for Yeongwoo keyboard was analyzed, and it was shown that this training can be of great help to families with ALS patients. The proposed keyboard will be able to improve the difficulties of families by facilitating communication of patients with dysarthria.