Input encryption

In one example in accordance with the present disclosure, a computing device is described. An example computing device includes an operating system to execute an operation based on received input. The example computing device includes a port to receive a connector of an input device and a processor....

Full description

Saved in:
Bibliographic Details
Main Authors GUNYUZLU, MASON ANDREW, MCMILLAN, ERICH WOLFGANG GERSTACKER, SWANN, THOMAS, CRAIG, ROBERT, HUYNH, KHOA, RICHARDS, TEVIN JAUPAUL
Format Patent
LanguageChinese
English
Published 01.05.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In one example in accordance with the present disclosure, a computing device is described. An example computing device includes an operating system to execute an operation based on received input. The example computing device includes a port to receive a connector of an input device and a processor. An example processor is to intercept input received from the input device along a communication path between the port and the operating system and select an encryption key based on an application to receive encrypted input. The example processor is to encrypt the input based on a selected encryption key and transmit encrypted input to the application.
Bibliography:Application Number: TW202211105839