Input encryption
In one example in accordance with the present disclosure, a computing device is described. An example computing device includes an operating system to execute an operation based on received input. The example computing device includes a port to receive a connector of an input device and a processor....
Saved in:
Main Authors | , , , , , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
01.05.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In one example in accordance with the present disclosure, a computing device is described. An example computing device includes an operating system to execute an operation based on received input. The example computing device includes a port to receive a connector of an input device and a processor. An example processor is to intercept input received from the input device along a communication path between the port and the operating system and select an encryption key based on an application to receive encrypted input. The example processor is to encrypt the input based on a selected encryption key and transmit encrypted input to the application. |
---|---|
Bibliography: | Application Number: TW202211105839 |