(12) Patent Application Publication (10) Pub. No.: US 2007/0208949 A1 Lu Et Al

Total Page:16

File Type:pdf, Size:1020Kb

(12) Patent Application Publication (10) Pub. No.: US 2007/0208949 A1 Lu Et Al US 20070208949A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2007/0208949 A1 Lu et al. (43) Pub. Date: Sep. 6, 2007 (54) INFORMATION SECURITY DEVICE OF Publication Classification UNIVERSAL SERAL BUS HUMAN (51) Int. Cl. INTERFACE DEVICE CLASS AND DATA H04LK LM00 (2006.01) TRANSMISSION METHOD FOR SAME (52) U.S. Cl. ....................................................... 713/186 (75) Inventors: Zhou Lu, Beijing (CN); (57) ABSTRACT Huazhang Yu, Beijing (CN) The present invention relates to an information security device of Universal Serial Bus (USB) Human Interface Correspondence Address: Device (HID) class and the data transmission method for the Richard L. Wood same. With a master chip that has a built-in HID descriptor and a USB interface chip connected to the master chip, the 22nd Floor, 120 South Riverside Plaza device of the present invention itself may be designed to be Chicago, IL 60606-3945 compact and easy to use, and provide powerful functions. With the USB HID interface, the device user does not need (73) Assignee: Feitian Technologies, Co., Ltd, to install a driver and the user can use the device anywhere Beijing (CN) and anytime. And the user does not need to manage the driver whose version updates constantly, consider the com patibility of various product drivers, face the risk caused by (21) Appl. No.: 111534,991 the driver when running OS, and worry about the pollution to the system resulted from the installation and uninstalla (22) Filed: Sep. 25, 2006 tion of the driver. CPU, SCM or smart card chip used as the master chip ensures that the security of identity authentica Foreign Application Priority Data tion is reliable. Moreover, the security of identity authenti (30) cation device can be further improved by adding biometric Jan. 27, 2006 (CN) ....... 20061OOOO2400.1 identification module and/or the like. 101 <1 Initialization > i 102 erform two-factor - ... | authentication File management encryption/d 3. mow tion a Y Operation ' ---. ends Patent Application Publication Sep. 6, 2007 Sheet 1 of 2 US 2007/0208949 A1 : t Ol < Initialization ) - 102 erform tWO-factor - --. authentication--- -- 106 ----- - - - - - - -*/Ose service o Service - 108 re Operation - denied --- ends FIG. 1 Initialization -> - - - - 202 re-PKI auth.- - - nonUse the services offered by f device l 206 Date R/W Algorithm------ Data - download encryption'd --- ecryption v-uum Y----,- 2094U. (Use serviceby app offered / Service ends Patent Application Publication Sep. 6, 2007 Sheet 2 of 2 US 2007/0208949 A1 301 CPU orchip smart card r — FIG. 3 401 USB HID host - chip -----------m-www.m-rm-mm-mm USB HID-------------- host 1 - 501 4N or w ------ - - - ------m - a - - - - - - - - - - - - SO2 - -- N4-, -i-m-- -t |- sni 4.Y - Y - u-1504 Other master chip - - - - Y - -- 505 Sensor - US 2007/0208949 A1 Sep. 6, 2007 INFORMATION SECURITY DEVICE OF class, comprising a master chip with a built-in HID descrip UNIVERSAL SERAL BUS HUMAN tor, and a USB interface module connected to the master INTERFACE DEVICE CLASS AND DATA chip. TRANSMISSION METHOD FOR SAME 0008. The information security device may comprise an additional authentication module, which is an intelligent FIELD OF THE INVENTION authentication module including a biometric identification module or a card reader module. 0001. The present invention relates to an information The USB interface module may be built in the master chip, security device of Universal Serial Bus (USB) Human or be a USB HID interface chip separated from the master Interface Device (HID) class and the data transmission chip. method for the same. 0009. The master chip may be a microprocessor or smart card chip, comprising a Central Processing Unit (CPU), a BACKGROUND OF THE INVENTION Microcontroller Unit (MCU), or a Single Chip Micyoco 0002. With the popularity of the Internet and the rise of (SCM). e-business and e-government, more and more people begin 0010. A data transmission method for the information to try online transactions. Meanwhile, more and more per security device, comprising the steps of Sonal privacy and business secrets information is transmitted 0011 1) the host recognizing the information security over the network. However, the malicious threats, such as device; virus, hacker, and phishing fraud, bring a great challenge to 0012. 2) the host sending control commands to the the security of online transactions. Endless network crimes device; lead to a trust crisis to the identity on network. We have to 0013 3) the device resolving and processing the control focus on the problems on how to prove “who am I?’ and commands after receiving them; how to prevent identify thefts again. It is urgent to safeguard 0014. 4) the device responding to the application and identify authentication/recognition which is the primary returning the execution results. problem in network security. The major identify authenti 0015 The control commands are transmitted through cation/recognition methods used in computer and network HID instructions between the host and the information systems are username?password, ID card, dynamic password security device. 0016. The control commands may include PIN authenti and USB Key (Token). cation, signature authentication, data downloading, file 0003 Username?password is the commonest and sim access, privilege management and/or read/write operation. plest method for identity authentication, but the password is 0017. The control commands may be transmitted in the easy to be doped out by other people. In addition, the form of cipher text after being encrypted. password is static data and is transmitted through computer 0018. The HID instructions may include Set Report and memory and network during authentication, So it is easy to Get Report commands. be captured by Trojan or listener on network. Therefore, its 0019. The algorithm used to encrypt the control com not a good method for identity authentication. mands is RSA, DES, 3DES, HMAC-MD5 or TEA, or the 0004 ID card authentication prevents user identity from combination of some of them. being counterfeited as ID card cannot be duplicated. But the 0020. The advantages of the present invention compared data read from ID card is also static and it is easy to be with existing technologies are: the information security captured by memory scan or network listening. The security device itself may be designed to be compact and easy to use, problems persist. and provide powerful functions. With the USB HID inter 0005. Dynamic password is a technology that allows user face, the device user does not need to install a driver and the password to change with time or the number of uses, and the user can use the device anywhere and anytime. And the user password can be used only once. Since each password must does not need to manage the driver whose version updates be generated by dynamic token and the private hardware of constantly, consider the compatibility of various product dynamic token is held only by valid user, the user identity drivers, face the risk caused by the driver when running OS, can be authenticated through password verification. But if and worry about the pollution to the system resulted from the the time or the number of uses between the client and the installation and uninstallation of the driver. CPU, SCM or server is not synchronized properly, a valid user probably Smart card chip used as the master chip ensures that the could not log in. And the user is required to enter a long security of identity authentication is reliable. Moreover, the string of ruleless password using keyboard each time the security of identity authentication device can be further user logs in, once there is a typo, the user must enter the improved by adding biometric identification module and/or password again. Obviously, it is not easy to use. the like. SUMMARY OF THE INVENTION BRIEF DESCRIPTION OF THE DRAWINGS 0006. The present invention overcomes above defects 0021. The present invention may be further understood and provides a simple and secure information security from the following description in conjunction with the device of the Universal Serial Bus (USB) Human Interface appended drawings. In the drawings: Device (HID) class, which is integrated with the features and 0022 FIG. 1 is a control flow diagram of the first advantages of both USB Key (Token) and HID devices, and embodiment of the present invention; the data transmission method for the device. 0023 FIG. 2 is a control flow diagram of the second 0007. The solution of the present invention to the tech embodiment of the present invention; nical problems is: an information security device of Uni 0024 FIG. 3 is a hardware structure diagram of the first versal Serial Bus (USB) Human Interface Device (HID) embodiment of the present invention; US 2007/0208949 A1 Sep. 6, 2007 0025 FIG. 4 is a hardware structure diagram of the command. This request can be PIN authentication, signature second embodiment of the present invention; authentication, data downloading, file access, privilege man 0026 FIG. 5 is a hardware structure diagram of the third agement or read/write. embodiment of the present invention. 0037 3. The device resolves and processes the command. 0038. After receiving Set Report command from the DETAILED DESCRIPTION OF THE host, the information security device resolves the command EMBODIMENTS according to the data resolving protocol defined previously and performs appropriate security operations, such as con 0027. As a more and more widely used PC interconnec ducting PIN authentication and signature authentication, tion protocol, USB makes the connection between periph downloading necessary data to the specified location, read erals and computer more effective and convenient. This kind ing/writing/modifying/adding/deleting files according to file of interface applies to many devices. It is quick, Supports for access privilege, or changing operation privileges on files.
Recommended publications
  • The Future of Human-Computer Interaction: Overview of Input Devices
    The future of human-computer interaction: overview of input devices Fabrizio Fornari School of Computer Science H´ask´olinn´ıReykjav´ık- Reykjav´ıkUniversity Reykjav´ık,Iceland November, 2012 Abstract We are in 2012 and we are still using the mouse and the keyboard to interact with a computer. We have seen a lot of changes in the world of Computer Science, relating to: performance, design and the way we interact with the computer. Differ- ent input devices have been developed around the computer, starting from the most recent touchscreens, continuing with webcams, microphones, and arriving to the oldest mice and keyboards. The aim of this research is to let the reader imagine a new way to interact with the computer. To reach our purpose, we introduce advanced technologies such as: Speech and Voice Recognition, Electronic Perception, Eye Tracking and Brain Computer In- terfaces. We propose examples of the cited technologies that may change the paradigm that saw, until now, keyboard and mouse as leaders of the input devices. 1 1 Introduction From the computer's birth1, we saw a lot of changes in the world of Com- puter Science. Changes relating to: performance, design and human-computer interaction [49]. A few years ago, the words \input device" evoked in our mind only two specific objects: the keyboard and the mouse - the main instruments used to provide data to a personal computer. Keyboard and mouse are, in fact, two of the first input devices in the history of computer. Nowadays, with the evolution of computers, we have a large set of input de- vices that changed the way we interact with the computer.
    [Show full text]
  • Orbit Reader 20™ User Guide
    PROPRIETARY INFORMATION Orbit Reader 20™ User Guide 17th April, 2019 Version 2.5 Orbit Reader 20 – User guide Version 2.5 Contents 1 INTRODUCTION ------------------------------------------------------------------------------------------------ 5 2 HOW THE ORBIT READER 20 IS USED ---------------------------------------------------------------- 5 2.1 STAND-ALONE MODE ------------------------------------------------------------------------------------- 5 2.2 REMOTE MODE--------------------------------------------------------------------------------------------- 6 3 TRANSCRIBED BRAILLE ----------------------------------------------------------------------------------- 6 4 AUTOMATIC TRANSLATION------------------------------------------------------------------------------- 6 5 TRANSLATE BRAILLE --------------------------------------------------------------------------------------- 7 6 DOCUMENTATION CONVENTIONS --------------------------------------------------------------------- 7 7 IN THE BOX ----------------------------------------------------------------------------------------------------- 8 8 FEATURES ------------------------------------------------------------------------------------------------------ 8 9 ORIENTATION -------------------------------------------------------------------------------------------------- 8 9.1 KEY PLACEMENTS AND USE ----------------------------------------------------------------------------- 9 9.2 PANNING KEYS ------------------------------------------------------------------------------------------- 10 9.3
    [Show full text]
  • Siouxland Fabricating Inc.: Windows USB Devices List All Detected USB Devices (56 Items) Generated on Oct 02, 2014 @ 08:28 Am
    Siouxland Fabricating Inc.: Windows USB Devices List all detected USB devices (56 items) Generated on Oct 02, 2014 @ 08:28 am Name Product Identifier Manufacturer Vendor Identifier Number of Instances Service 3Dconnexion Space Pilot 3D Mouse C625 Logitech, Inc. 046D 1 Input 3Dconnexion SpacePilot PRO C629 Logitech, Inc. 046D 1 Unknown (LGPBTDD) 3Dconnexion SpacePilot Pro 3D Mouse C629 Logitech, Inc. 046D 1 Input ActiveJet K-2024 Multimedia Keyboard 0103 Elan Microelectronics Corp. 04F3 1 Input ASIX AX88772 USB2.0 to Fast Ethernet Adapter 7720 ASIX Electronics Corp. 0B95 1 Unknown (AX88772) Audio Adapter 000C C-Media Electronics, Inc. 0D8C 1 Input Bar Code Scanner 1200 Symbol Technologies 05E0 9 Input Basic Optical Mouse v2.0 00CB Microsoft Corp. 045E 1 Input Benq X120 Internet Keyboard Pro 001C Darfon Electronics Corp. 0D62 2 Input C-Media USB Headphone Set 000C C-Media Electronics, Inc. 0D8C 1 Audio Comfort Curve Keyboard 2000 V1.0 00DD Microsoft Corp. 045E 1 Input Cordless Mouse Receiver C50E Logitech, Inc. 046D 2 Input Cordless Mouse Receiver C521 Logitech, Inc. 046D 1 Input Dell N889 Optical Mouse 4D81 Primax Electronics, Ltd 0461 1 Input Intel(R) Centrino(R) Wireless Bluetooth(R) 3.0 + High Speed Adapter 0189 Intel Corp. 8086 1 Bluetooth Keyboard 2003 Dell Computer Corp. 413C 3 Input Keyboard 2010 Dell Computer Corp. 413C 1 Input Keyboard K120 for Business C31C Logitech, Inc. 046D 1 Input Laptop Integrated Webcam 63E0 Microdia 0C45 1 Unknown (OEM13VID) Logitech Unifying USB receiver C52B Logitech, Inc. 046D 1 Unknown (LEQDUSB) M-BT96a Pilot Optical Mouse C03D Logitech, Inc. 046D 1 Input Microsoft USB Wheel Mouse Optical 0040 Microsoft Corp.
    [Show full text]
  • A Unified Toolkit for Accessing Human Interface Devices in Pure Data And
    Proceedings of the 2007 Conference on New Interfaces for Musical Expression (NIME07), New York, NY, USA A Unified Toolkit for Accessing Human Interface Devices in Pure Data and Max/MSP Hans-Christoph Steiner David Merrill Olaf Matthes IDMI/Polytechnic University MIT Media Lab nullmedium Brooklyn, NY, USA Cambridge, MA, USA Greifswald, Germany [email protected] [email protected] [email protected] ABSTRACT For an electronic musical instrument designer, easy ac- In this paper we discuss our progress on the HID toolkit, cess to gestural data (motion, pressure, buttonpresses, etc.) a collection of software modules for the Pure Data and and output capabilities (lights, force feedback) enables rapid Max/MSP programming environments that provide unified, prototyping of musical affordances and mapping strategies. user-friendly and cross-platform access to human interface Many HIDs are temporally and gesturally sensitive enough devices (HIDs) such as joysticks, digitizer tablets, and for musical performance, including gaming mice, certain joy- stomp-pads. These HIDs are ubiquitous, inexpensive and sticks, and most graphics tablets. Another factor that makes capable of sensing a wide range of human gesture, making many existing HIDs appealing for electronic music perfor- them appealing interfaces for interactive media control. mances is that they are relatively familiar objects (as com- However, it is difficult to utilize many of these devices for pared to custom electronic hardware), which can allow an custom-made applications, particularly for novices. The audience to more easily understand the connection between modules we discuss in this paper are [hidio] 1, which a performer’s actions and the resulting sonic output.
    [Show full text]
  • RX Family USB Host Human Interface Device Class Driver for USB Mini Firmware Using Firmware Integration Technology Contents
    APPLICATION NOTE R01AN2168EJ0120 RX Family Rev.1.20 Jun 1, 2020 USB Host Human Interface Device Class Driver for USB Mini Firmware Using Firmware Integration Technology Introduction This application note describes USB Host Human Interface Device Class Driver (HHID), which utilizes Firmware Integration Technology (FIT). This module operates in combination with the USB Basic Mini Host and Peripheral Driver. It is referred to below as the USB HHID FIT module. Target Device RX111 Group RX113 Group RX231 Group RX23W Group When using this application note with other Renesas MCUs, careful evaluation is recommended after making modifications to comply with the alternate MCU. Related Documents 1. Universal Serial Bus Revision 2.0 specification http://www.usb.org/developers/docs/ 2. USB Class Definitions for Human Interface Devices Version 1.1 3. HID Usage Tables Version 1.1 http://www.usb.org/developers/docs/ 4. RX111 Group User’s Manual: Hardware (Document number .R01UH0365) 5. RX113 Group User’s Manual: Hardware (Document number.R01UH0448) 6. RX231 Group User’s Manual: Hardware (Document number .R01UH0496) 7. RX23W Group User’s Manual: Hardware (Document number .R01UH0823) 8. USB Basic Mini Host and Peripheral Driver (USB Mini Firmware) using Firmware Integration Technology Application Note (Document number.R01AN2166) • Renesas Electronics Website http://www.renesas.com/ • USB Devices Page http://www.renesas.com/prod/usb/ R01AN2168EJ0120 Rev.1.20 Page 1 of 17 Jun 1, 2020 RX Family USB Host Human Interface Device Class Driver for USB Mini Firmware
    [Show full text]
  • USB Human Interface Device Class on an Embedded Host
    AN1144 USB Human Interface Device Class on an Embedded Host Author: Amardeep Gupta The class, subclass and protocol designators for an HID bDeviceClass Microchip Technology Inc. device are not contained in the , bDeviceSubClass and bDeviceProtocol fields of the device descriptor. Instead, these fields are all set to INTRODUCTION 0x00 and the designators are specified in the bInterfaceClass, bInterfaceSubClass and With the introduction of Microchip’s microcontrollers with bInterfaceProtocol fields of the interface the USB OTG peripheral, microcontroller applications descriptor. The most common configurations for HID can easily support USB embedded host functionality. class devices are: Traditionally, the PC is used as a host in an USB network. Now, with Microchip’s microcontroller with host capability, • bInterfaceClass – the host can be implemented in an embedded system. 0x03 (HID Class) Some of the most common uses of this capability are to bInterfaceSubClass interface to Human Interface Devices (HIDs). • – 0x00 (No Subclass) USB HUMAN INTERFACE DEVICE 0x01 (Boot Interface Subclass) (HID) CLASS 0x02-0xFF (Reserved) Overview • bInterfaceProtocol – The HID class primarily consists of devices that are 0x00 (None) used to control any particular application. 0x01 (Keyboard) Typical examples of HID class devices include: 0x02 (Mouse) • Keyboard and pointing devices 0x03-0xFF (Reserved) • Control switches, sliders and so on A host communicates with the HID class device using • Joystick, steering and other gaming control inputs either the control (default) pipe or an interrupt pipe. • Point-of-sale bar code scanners and magnetic card The control pipe is used for: readers having an HID Keyboard Emulation mode • Sending and receiving the control transfer data. The HID class can be used for devices without human interface, too; such applications just need to be able to • Transmitting and receiving reports if the interrupt function within the limits of the HID class specifications.
    [Show full text]
  • Usbcheckin: Preventing Badusb Attacks by Forcing Human-Device Interaction
    USBCheckIn: Preventing BadUSB Attacks by Forcing Human-Device Interaction Federico Griscioli∗, Maurizio Pizzonia∗ and Marco Sacchetti∗ ∗Roma Tre University, Department of Engineering Via della Vasca Navale 79, 00146 Rome, Italy fgriscioli,[email protected] [email protected] GoodUSB [3] is a software solution that aims at protecting Abstract—The BadUSB attack leverages the modification of the host against BadUSB attacks. When a new USB device is firmware of USB devices in order to mimic the behaviour of a attached, a message is shown to the user, which must declare keyboard or a mouse and send malicious commands to the host. This is a new and dreadful threat for any organization. Current his/her expectation about the functionalities of the device. countermeasures either require special USB devices or ask the In this paper we present USBCheckIn, an hardware solution user to decide if the device can be used. that is able to protect any kind of USB host against attacks We propose a new approach that, before allowing the device from devices that claim to be human interface devices but are to be used, forces the user to interact with it physically, to not. The basic idea is that the authenticity of a real human ensure that a real human-interface device is attached. Our implementation is hardware-based and, hence, can be used with interface device can be easily checked by asking the user to any host, comprising embedded devices, and also during boot, use it. To authorize a human intreface device to connect to i.e., before any operating system is running.
    [Show full text]
  • DRM014, USB and PS/2 Multimedia Keyboard Interface Designer
    USB and PS/2 Multimedia Keyboard Interface Designer Reference Manual M68HC08 Microcontrollers DRM014 Rev. 1 4/2006 freescale.com USB and PS/2 Multimedia Keyboard Interface Designer Reference Manual by: Derek Lau Freescale Semiconductor, Inc. Hong Kong To provide the most up-to-date information, the revision of our documents on the World Wide Web will be the most current. Your printed copy may be an earlier revision. To verify that you have the latest information available, refer to http://www.freescale.com The following revision history table summarizes changes contained in this document. For your convenience, the page number designators have been linked to the appropriate location. Revision History Revision Page Date Description Level Number(s) 04/2006 1 Replaced unclear schematic. 26 03/2003 0 Initial release N/A USB and PS/2 Multimedia Keyboard Interface, Rev. 1.0 Freescale Semiconductor 3 Revision History USB and PS/2 Multimedia Keyboard Interface, Rev. 1.0 4 Freescale Semiconductor Table of Contents Chapter 1 USB and PS/2 Multimedia Keyboard Interface 1.1 Introduction . 7 1.2 Overview . 7 1.3 44-pin QFP MC68HC908JB8 Features . 7 1.4 Hardware Descriptions. 8 1.4.1 Key Matrix . 9 1.4.2 In-Circuit Programming . 10 1.5 Firmware Description . 11 1.5.1 USB and PS/2 Detection . 12 1.5.2 PS/2 Main Routine . 12 1.5.3 PS/2 Protocol . 12 1.5.4 Host to Device Communications . 14 1.5.5 Device to Host Communications . 14 1.5.6 PS/2 Keyboard Command . 15 1.5.7 Host to Keyboard Commands .
    [Show full text]
  • Design Guide
    ADNK-3061 Optical Mouse Designer’s Kit Design Guide Introduction Introduction to ADNS-3060 Optical Mouse Sensor This design guide describes how a cost-effective combi- Avago’s ADNS-3060 optical mouse sensor is used in nation USB­-PS/2 yet feature-rich optical mouse can be this reference design as the primary navigation engine. built using the Avago Technologies high performance This Optical Navigation Technology contains an Image ADNS-3060 optical mouse sensor and Cypress Semi- Acquisition System, a Digital Signal Processor, and a conductor CY7C63743-PC USB­ microcontroller. The four-wire serial port. The CY7C63743-PC periodically document starts with the basic operations of a computer reads the ADNS-3060’s Delta_X and Delta_Y registers mouse peripheral followed by an introduction to the to obtain any horizontal and vertical motion informa- ADNS-3060 optical mouse sensor and CY7C63743-PC tion happening as a result of the mouse being moved. USB­ microcontroller. A schematic of the ADNS-3060 The four-wire synchronous serial port is used to set optical mouse sensor to the CY7C63743-PC USB­ micro- and read parameters in the ADNS-3060, and to read controller buttons of a standard mouse is also shown in out the motion, (triangle)x and (triangle)y information. this document. The software section of this design guide This motion information is reported to the PC updating describes the architecture of the firmware required to the position of the cursor. The advantages of using the implement the USB­ and PS/2 mouse functions. ADNS-3060 optical sensor are: best tracking accuracy, sensor programming flexibility via SPI port, and the Optical Mouse Basics automatic frame rate feature (1000fps to 6400fps).
    [Show full text]
  • I Installed the Drivers for My Thrustmaster Force Feedback Game Controller, and Even Though the Controls Are Working Properly, I Cannot Get Any Effect in My Games
    I installed the drivers for my Thrustmaster Force Feedback game controller, and even though the controls are working properly, I cannot get any effect in my games. What is wrong? Concerning games: • First, make sure that the game you are playing supports force feedback controllers and that you have installed the latest update (patch) available. The game support web site can also provide information about known issues and hardware compatibility. • If the game support force feedback controllers, be certain that all options have been enabled within the game configuration options (see the game manual for more details) Test your game controller The Thrustmaster Force Feedback testing application can be used in order to test the force feedback functionalities of your accessories. Note: The test will only work if your accessory is recognized as the preferred or first game controller. To prevent any confusion, simply disconnect any other game controllers from the computer. If using the test failed to provide any force feedback effects, it means that the drivers haven’t been installed properly. Verify the driver installation It’s important to understand a few notions about your accessory in order to verify that it is installed correctly. Your controller, be it a gamepad, a joystick or a wheel, is fully compliant with the Human Interface Device specifications, and was developed in such a way that it will be recognize under the Microsoft Operating systems (Windows 98 SE, Me, 2000 and Windows XP) as a "HID compliant Game Device". The drivers provided by Microsoft will ensure you a perfect compatibility with any games using DirectX technology (100% of today's games!).
    [Show full text]
  • Application Note BRT an 012 Ft9xx USBD HID Touch Panel Version 1.2
    Application Note BRT_AN_012 FT9xx USBD HID Touch Panel Version 1.2 Issue Date: 2018-08-20 This Application Note describes a virtual keyboard implemented with an FT9XX device and an FT81X touch screen. The virtual keyboard behaves as a standard hardware keyboard when connected via USB to a host computer. Use of Bridgetek devices in life support and/or safety applications is entirely at the user’s risk, and the user agrees to defend, indemnify and hold Bridgetek harmless from any and all damages, claims, suits or expense resulting from such use. Bridgetek Pte Ltd (BRTChip) 178 Paya Lebar Road, #07-03, Singapore 409030 Tel: +65 6547 4827 Fax: +65 6841 6071 Web Site: http://www.brtchip.com Copyright © Bridgetek Pte Ltd Application Note BRT_AN_012 FT9xx USBD HID Touch Panel Version 1.2 Document No.: BRT_000120 Clearance No.: BRT#083 Table of Contents 1 Introduction .............................................................. 4 1.1 Overview ............................................................................. 4 1.2 Scope .................................................................................. 4 1.2.1 Features ............................................................................................ 5 1.2.2 Possible Enhancements ........................................................................ 5 2 Project Overview ....................................................... 6 2.1 Sources Folder..................................................................... 6 2.2 eve Folder ..........................................................................
    [Show full text]
  • ATEN the Rise of USB in the Data
    USB and K-V-M switches The Rise of USB in the Data Center - The Implementation can Make the Difference 2007 ATEN The Rise of USB in the Data Center The offi cial standard symbol for a USB connection Historical Overview The past 12 years have seen the Universal Serial Bus (USB) grow from pipe dream into the de facto standard to power devices such as peripherals, portable memory devices, video game consoles, PDAs and portable media players. USB was originally designed to bring all serial and parallel ports on PCs to obsolescence since these were not standardized and required multiple device drivers to be continually developed and updated. The original implementation of the “Universal Serial Bus” (USB) was driven by three things: 1. A desire for a more universal means to connect PCs to the telephone, 2. Greater ease of use and fl exibility in connecting computers to peripheral hardware 3. The need for inexpensive, user-friendly port expansion for bi-directional devices In its early years, the market was unsure of the direction to take with this emerging technology. USB was offi cially introduced by a consortium of seven computer and telecommunications industry leaders in 1995 and today is a truly universal technology playing a major role in the convergence of consumer and business products. Today, the 1000-member USB Implementers Forum, Inc. (USB-IF) is steered by many USB promoters that are optimizing the technology. Originally, the USB 1 standard specifi ed 1.5 megabits/second (Mb/s) and 12 Mb/s data rates. USB truly went mainstream with the introduction of USB 2.0 which increased the bus speed from 12 Mbps to 480 Mbps, a forty time increase.
    [Show full text]