SAFETY CONNECTION TO KEYBOARD OR RELATED DEVICE Russian patent published in 2009 - IPC G06F3/02 G06F1/00 G06F21/00 G09C1/00 

Abstract RU 2371756 C2

FIELD: information technologies.

SUBSTANCE: first initial value is known both to the keyboard and the component. Keyboard and component exchange time values. Both the keyboard and the component compute the second initial value and the third initial value on the basis of time values and the first initial value. Both the keyboard and the component make one and the same computation so that both the keyboard and the component have one and the same second and third initial values. The keyboard encodes keystrokes meant for the component by using CBC-3DES method on the basis of the key and the second initial component, as well as creates message authentication code for each keystroke by using CBC-3DESMAC on the basis of the key and the third initial value. The component encodes and verifies keystrokes by using the key and the second and the third initial values.

EFFECT: providing safety connection between two components, such as a keyboard or a related device, and software component via an unsafe communication channel.

26 cl, 6 dwg

Similar patents RU2371756C2

Title Year Author Number
METHOD OF EXECUTING FINANCIAL TRANSACTION THROUGH INSECURE PUBLIC COMMUNICATION INFRASTRUCTURE AND DEVICE THEREFOR 2010
  • Ibasko Aleks D.
  • Posadas Patrik B.
  • Ko Vinsent K.
  • Ju Uill'Jam Ehmmanuehl' S.
RU2571733C2
EFFICIENT CODING AND IDENTIFICATION FOR DATA PROCESSING SYSTEMS 2003
  • Khoks Filip Majkl
  • Rouz Gregori Dzh.
RU2336646C2
DYNAMIC SUBSTITUTION OF USB DATA FOR EFFICIENT CODING/DECODING 2004
  • Rehj Kennet
  • Kel Teodor
RU2352986C2
EFFICIENT ENCRYPTION AND AUTHENTICATION FOR DATA PROCESSING SYSTEMS 2003
  • Khoks Filip Majkl
  • Rouz Gregori Dzh.
RU2340108C2
COMMAND TO ENCRYPT AUTHENTICATION MESSAGE 2017
  • Grajner Den
  • Sledzhel Timoti
  • Tsellin Kristian
  • Dzhekobi Kristian
  • Paprotskij Volodimir
  • Vishegradi Tamash
  • Byundgen Rajnkhard Teodor
  • Bredberi Dzhonatan
  • Puranik Aditya Nitin
RU2727152C1
BIOMETRIC COMPARISON FOR PRIVACY PROTECTION USING SERVER 2018
  • Sheets, John F.
  • Wagner, Kim R.
  • Arora, Sunpreet Singh
  • Best-Rowden, Lacey
  • Jiang, Chunxi
RU2776258C2
SYSTEM ON-A-CHIP TO IMPLEMENT SAFE BOOTSTRAP LOADING, USING ITS DEVICE OF IMAGE FORMATION AND METHOD OF ITS USE 2013
  • Dzang Tae-Khong
  • Li Dzong-Seung
  • Dzun Dzin-Khvi
RU2628325C2
METHODS AND SYSTEMS FOR AUTHENTICATION OF COMPONENTS IN GRAPHIC SYSTEM 2003
  • Inglehnd Pol
  • Pejnado Markus
  • Uilt Nikolas P.
RU2310227C2
METHODS AND SYSTEMS FOR CRYPTOGRAPHIC PROTECTION OF PROTECTED CONTENT 2002
  • Inglehnd Pol
  • Pejnado Markus
  • Uilt Nikolas P.
RU2308077C2
DEVICE AND METHOD FOR MOVING AND COPYING RIGHTS OBJECTS BETWEEN DEVICE AND PORTABLE STORAGE DEVICE 2005
  • Li Biung-Rae
  • Kim Tae-Sung
  • Dzung Kiung-Im
  • Okh Jun-Sang
  • Kim Shin-Khan
RU2377642C2

RU 2 371 756 C2

Authors

Pejnado Markus

Benalo Dzhosh

Dates

2009-10-27Published

2004-04-30Filed