US20160026275A1 - Data device including ofn functionality - Google Patents

Data device including ofn functionality Download PDF

Info

Publication number
US20160026275A1
US20160026275A1 US14/802,305 US201514802305A US2016026275A1 US 20160026275 A1 US20160026275 A1 US 20160026275A1 US 201514802305 A US201514802305 A US 201514802305A US 2016026275 A1 US2016026275 A1 US 2016026275A1
Authority
US
United States
Prior art keywords
housing
ofn
data entry
circuitry
ofn module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/802,305
Inventor
John Henry Barrowman
Doug Leigh MANCHESTER
William Martin JOHANSEN, JR.
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Verifone Inc
Original Assignee
Verifone Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Verifone Inc filed Critical Verifone Inc
Priority to US14/802,305 priority Critical patent/US20160026275A1/en
Assigned to VERIFONE, INC. reassignment VERIFONE, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BARROWMAN, John Henry, JOHANSEN, WILLIAM MARTIN, JR, MANCHESTER, DOUG LEIGH
Publication of US20160026275A1 publication Critical patent/US20160026275A1/en
Priority to US15/900,317 priority patent/US11397835B2/en
Assigned to JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT reassignment JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HYPERCOM CORPORATION, VERIFONE, INC.
Assigned to HYPERCOM CORPORATION, VERIFONE, INC. reassignment HYPERCOM CORPORATION RELEASE (R045575F0019) Assignors: JPMORGAN CHASE BANK, N.A.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • G06F3/0354Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor with detection of 2D relative movements between the device, or an operating part thereof, and a plane or surface, e.g. 2D mice, trackballs, pens or pucks
    • G06F3/03547Touch pads, in which fingers can move on a surface
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • G06F1/1626Constructional details or arrangements for portable computers with a single-body enclosure integrating a flat display, e.g. Personal Digital Assistants [PDAs]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • G06F1/1633Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
    • G06F1/1662Details related to the integrated keyboard
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • G06F21/87Secure or tamper-resistant housings by means of encapsulation, e.g. for integrated circuits
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • G06F3/038Control and interface arrangements therefor, e.g. drivers or device-embedded control circuitry
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0489Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using dedicated keyboard keys or combinations thereof

Definitions

  • the present invention relates generally to data devices.
  • the present invention seeks to provide an improved data entry device.
  • a data entry device including a housing, data entry circuitry located within the housing, a keypad mounted in the housing and having a plurality of movable key elements which, when depressed, are displaced to at least a predetermined extent from a first location within the housing to a second location within the housing and Optical Finger Navigation (OFN) circuitry mounted inside the housing, being operative for sensing at least some of the plurality of movable key elements when depressed and displaced to at least the predetermined extent from the first location within the housing to the second location within the housing and providing a key displacement output indicating key displacement to the data entry circuitry.
  • OFN Optical Finger Navigation
  • a data entry device including a housing, data entry circuitry located within the housing, tamper detection circuitry located within the housing, a keypad mounted in the housing and having a plurality of movable key elements and OFN circuitry mounted inside the housing, being operative for sensing displacement of the plurality of movable key elements and tampering with the device and providing a key displacement output indicating key displacement to at least a predetermined extent to the data entry circuitry and a tamper indication output to the tamper detection circuitry.
  • a sensitive data device including a housing, sensitive data handling circuitry located within the housing, tamper detection circuitry located within the housing and OFN circuitry mounted inside the housing, being operative for sensing tampering with the device and providing a tamper indication output to the tamper detection circuitry.
  • the OFN circuitry is mounted on an electrical circuit board spaced from the movable key elements.
  • the device also includes a spacer mounted between the electrical circuit board and the keypad.
  • the electrical circuit board is arranged such that displacement of a key from a first location within the housing to a second location within the housing by the finger of a user is detected and identified by the OFN circuitry.
  • the OFN circuitry is incorporated within an OFN module which includes an illuminator and optics. Additionally, the OFN module is generally centered with respect to the plurality of movable key elements and lies therebelow so as to be in a line of sight with all of the plurality of movable key elements. Preferably, the OFN module is also in a line of sight with other regions within the housing.
  • the OFN module views optically identifiable markings on the plurality of movable key elements as well as other objects which provide a background useful in detecting tampering.
  • a background output of the OFN module is employed as a reference against which an output of said OFN module indicating possible tampering is compared.
  • at least one of the following events produces a tampering indication: creating a hole in the data entry device using a tool, the tool being seen by the OFN module and removal of the tool, allowing light to enter the housing, the light being seen by the OFN module.
  • FIGS. 1A and 1B are simplified exploded view illustrations, taken in respective opposite directions, of a secure keypad device constructed and operative in accordance with a preferred embodiment of the present invention and including Optical Finger Navigation (OFN) circuitry operative for at least one of tamper detection and key displacement identification;
  • OFN Optical Finger Navigation
  • FIG. 2A is a simplified, not to scale, illustration of a steady state scene as viewed by OFN circuitry in the embodiment of FIGS. 1A & 1B in the absence of key displacement to at least a predetermined extent and tampering;
  • FIG. 2B is a simplified, not to scale, illustration of a scene as viewed by OFN circuitry upon depression of a number 5 key in the absence of tampering;
  • FIG. 2C is a simplified, not to scale, illustration of a scene as viewed by OFN circuitry upon depression of a number 1 key in the absence of tampering;
  • FIG. 2D is a simplified, not to scale, illustration of a scene as viewed by OFN circuitry upon tampering by inserting a non-reflecting probe into the housing;
  • FIG. 2E is a simplified, not to scale, illustration of a scene as viewed by OFN circuitry upon tampering by removing a key;
  • FIGS. 3A and 3B are simplified exploded view illustrations, taken in respective opposite directions, of a secure keypad device constructed and operative in accordance with another preferred embodiment of the present invention and including OFN circuitry operative for at least one of tamper detection and key displacement identification;
  • FIG. 4A is a simplified illustration of a steady state scene as viewed by OFN circuitry in the embodiment of FIGS. 3A & 3B in the absence of key displacement to at least a predetermined extent and tampering;
  • FIG. 4B is a simplified, not to scale, illustration of a scene as viewed by OFN circuitry in the embodiment of FIGS. 3A & 3B upon depression of a number 5 key in the absence of tampering;
  • FIG. 4C is a simplified, not to scale, illustration of a scene as viewed by OFN circuitry in the embodiment of FIGS. 3A & 3B upon depression of a number 1 key in the absence of tampering;
  • FIG. 4D is a simplified, not to scale, illustration of a scene as viewed by OFN circuitry in the embodiment of FIGS. 3A & 3B upon tampering by inserting a non-reflecting probe into the housing;
  • FIG. 4E is a simplified, not to scale, illustration of a scene as viewed by OFN circuitry in the embodiment of FIGS. 3A & 3B upon tampering by removing a key;
  • FIGS. 5A and 5B are simplified, not to scale, sectional illustrations showing detection of key displacement to at least a predetermined extent in a data entry device including OFN circuitry;
  • FIGS. 6A and 6B are simplified, not to scale, sectional illustrations showing detection of insertion of a probe in a data entry device including OFN circuitry;
  • FIGS. 7A and 7B are simplified, not to scale, sectional illustrations showing detection of key removal in a data entry device including OFN circuitry;
  • FIGS. 8A and 8B are, not to scale, simplified sectional illustrations showing detection of opening of a data entry device including OFN circuitry.
  • FIG. 9 is a simplified functional block diagram illustrating operation of the secure keypad device constructed and operative in accordance with a preferred embodiment of the present invention and including OFN circuitry operative for at least one of tamper detection and key displacement identification of FIGS. 1A-8B .
  • FIGS. 1A and 1B partially illustrate a secure keypad device constructed and operative in accordance with a preferred embodiment of the present invention.
  • a secure keypad device 100 including a top housing element 102 and a bottom housing element (not shown), which together define a keypad device housing.
  • Housing element 102 includes, on a top surface 104 thereof, a display aperture 106 , through which a display (not shown) may be viewed, and an array 108 of key apertures 110 .
  • An optional anti-tamper circuit board 112 which preferably includes an anti-tampering grid 114 formed of a multiplicity of interconnected anti-tampering electrical conductors 116 , underlies top surface 104 and is provided with key apertures 120 in registration with key apertures 110 .
  • a peripheral anti-tamper keypad enclosure 122 Fixedly and electrically coupled to anti-tamper circuit board 112 is a peripheral anti-tamper keypad enclosure 122 , which preferably includes an anti-tampering grid 124 formed of a multiplicity of interconnected anti-tampering electrical conductors.
  • a key mat 132 preferably formed of a resilient plastic or rubber, defines a plurality of depressible keys 134 , preferably integrally formed with mat 132 , which partially extend through key apertures 110 and 120 and preferably have readily optically identifiable markings 136 formed on corresponding bottom facing surfaces 138 thereof. Additional optically identifiable markings 139 may be provided on other interior surfaces, such as inner surfaces of the housing.
  • An electrical circuit board 140 which functions, inter alia, as a mounting board for an OFN module 142 , is disposed in predetermined spaced relationship with key mat 132 .
  • OFN module 142 is preferably a Model ADBS-A350 commercially available from Pixart Imaging Inc., No. 5, Innovation Road 1, HsinChu Science Park, Hsin-Chu, Taiwan, R.O.C.
  • the arrangement of key mat 132 and of electrical circuit board 140 is such that depression of a key 134 by the finger of a user is detected and identified by OFN module 142 . It is noted that the OFN module 142 is operative to sense changes in the level of light received by it from various locations within its field of view.
  • the OFN module 142 is generally centered with respect to the plurality of depressible keys 134 and lies therebelow so as to be in a line of sight with readily optically identifiable markings 136 formed on corresponding bottom facing surfaces 138 of all of depressible keys 134 and preferably also in a line of sight with other regions within the housing and more particularly with features and/or markings, such as optically identifiable markings 139 which can be sensed by the OFN module 142 .
  • a spacer 143 preferably formed of a transparent material or defining open side walls, is provided between electrical circuit board 140 and key mat 132 in order to enhance the ability of the OFN module 142 to view not only all of the markings on all of the keys but also as much as possible of the interior of the housing and the markings and features thereof.
  • Circuit board 140 preferably includes an anti-tampering grid 144 formed of a multiplicity of interconnected anti-tampering electrical conductors.
  • anti tampering grids 144 , 114 and 124 and enclosure 122 are preferably interconnected so as to define a keyboard anti-tampering enclosure, which is coupled to anti-tampering detection circuitry 160 .
  • Anti-tampering detection circuitry 160 is typically enclosed in an anti-tampering enclosure (not shown). Alternatively, anti-tampering detection circuitry 160 may itself be secure against tampering.
  • anti-tampering grids can be interconnected in numerous ways using various types of connectors.
  • the OFN module 142 functions, inter alia, as a case-open switch which senses physical tampering with and opening of the housing.
  • the output of the OFN module is preferably provided to anti-tampering detection circuitry 160 to enable the output of the OFN module to be used for detection of tampering.
  • anti-tampering detection circuitry 160 to enable the output of the OFN module to be used for detection of tampering.
  • the key displacements of one or more function keys may be sensed by engagement thereof with corresponding conventional electrical contacts, such as contacts 174 , 176 and 178 .
  • the secure keypad device 100 includes a main microprocessor 180 which preferably includes, inter alia, encryption/decryption capabilities.
  • a main microprocessor may beneficially be included in the secure keypad devices and data entry devices described hereinbelow with reference to FIGS. 5A-8B . It is appreciated that the functionality of anti-tampering detection circuitry 160 may be carried out by main microprocessor 180 .
  • FIG. 2A is a simplified, not to scale, illustration of an image captured by the OFN module 142 , located generally below the 5 key, in the embodiment of FIGS. 1A & 1B , in the absence of key displacement beyond a predetermined extent and tampering.
  • the dark spots represent light reflected from readily optically identifiable markings 136 formed on corresponding bottom facing surfaces 138 of keys 134 .
  • FIG. 2A shows a state in which none of the keys is displaced. It is appreciated that angular optical distortions in the shape of the spots are generally not shown in FIGS. 2A-2E .
  • the grid shown in FIGS. 2A-2E represents a pixel grid, with each block representing a single pixel or an X by Y array of pixels.
  • FIG. 2B is a simplified illustration of a scene as viewed by the OFN module 142 upon displacement of a number 5 key from a first location within the housing to a second location within the housing in the absence of tampering. It is seen that the spot corresponding to the reflected light from marking 136 on the bottom facing surface of the number 5 key is enlarged. It is further appreciated that normally displacement of a key causes the intensity of the reflected light received by the OFN module 142 to increase.
  • FIG. 2C is a simplified illustration of a scene as viewed by OFN module 142 upon displacement of a number 1 key from a first location within the housing to a second location within the housing in the absence of tampering. It is seen that the spot corresponding to the reflected light from marking 136 on the bottom facing surface of the number 1 key is enlarged.
  • a general approximation of the angular optical distortion in the shape of the enlarged spot corresponding to the displaced number 1 key is shown, not necessarily to scale.
  • FIG. 2D is a simplified illustration of a scene as viewed by OFN module 142 upon tampering by inserting a non-reflecting probe into the housing.
  • the probe blocks the reflected light from the optically identifiable markings 136 on the bottom surfaces of number 8 and 9 keys.
  • FIG. 2E is a simplified illustration of a scene as viewed by OFN module 142 upon tampering by removing a key.
  • a key such as the number 5 key
  • FIG. 2E is a simplified illustration of a scene as viewed by OFN module 142 upon tampering by removing a key.
  • removal of a key such as the number 5 key
  • FIG. 2E allows a flood of light into the housing, such that the OFN module sees an image which may be similar to what is shown in FIG. 2E .
  • FIGS. 3A and 3B partially illustrate a secure keypad device constructed and operative in accordance with another preferred embodiment of the present invention.
  • an OFN module is not centered below the number 5 key as in the embodiment of FIGS. 1A-2E , but rather is located at a side of the housing outwardly from all of the keys.
  • FIGS. 4A-4E show, in a simplified, not to scale, manner, an overall angular distortion resulting from the non-centered position of the OFN module.
  • a secure keypad device 300 including a top housing element 302 and a bottom housing element (not shown), which together define a keypad device housing.
  • Housing element 302 includes, on a top surface 304 thereof, a display aperture 306 , through which a display (not shown) may be viewed, and an array 308 of key apertures 310 .
  • An anti-tamper circuit board 312 which preferably includes an anti-tampering grid 314 formed of a multiplicity of interconnected anti-tampering electrical conductors 316 , underlies top surface 304 and is provided with key apertures 320 in registration with key apertures 310 .
  • a peripheral anti-tamper keypad enclosure 322 Fixedly and electrically coupled to anti-tamper circuit board 312 is a peripheral anti-tamper keypad enclosure 322 , which preferably includes an anti-tampering grid 324 formed of a multiplicity of interconnected anti-tampering electrical conductors.
  • a key mat 332 preferably formed of a resilient plastic or rubber, defines a plurality of depressible keys 334 , preferably integrally formed with mat 332 , which partially extend through key apertures 310 and 320 and preferably have readily optically identifiable markings 336 formed on corresponding bottom facing surfaces 338 thereof. Additional optically identifiable markings 339 may be provided on other interior surfaces, such as inner surfaces of the housing.
  • An electrical circuit board 340 which functions, inter alia, as a mounting board for an OFN module 342 , is disposed in predetermined spaced relationship with key mat 332 .
  • OFN module 342 is preferably a Model ADBS-A350 commercially available from Pixart Imaging Inc., No. 5, Innovation Road 1, HsinChu Science Park, Hsin-Chu, Taiwan, R.O.C.
  • the arrangement of key mat 332 and of electrical circuit board 340 is such that depression of a key 334 by the finger of a user is detected and identified by OFN module 342 . In the illustrated embodiment of FIGS.
  • the OFN module 342 is generally not centered with respect to the plurality of depressible keys 334 but lies therebelow so as to be in a line of sight with all of depressible keys 334 and preferably also in a line of sight with other regions within the housing.
  • a spacer 343 preferably formed of a transparent material or defining open side walls, is provided between electrical circuit board 340 and key mat 332 in order to enhance the ability of the OFN module to view not only all of the keys but also as much as possible of the interior of the housing.
  • Circuit board 340 preferably includes an anti-tampering grid 344 formed of a multiplicity of interconnected anti-tampering electrical conductors.
  • anti tampering grids 344 , 314 and 324 and enclosure 322 are preferably interconnected so as to define a keyboard anti-tampering enclosure, which is coupled to anti-tampering detection circuitry 360 .
  • Anti-tampering detection circuitry 360 is typically enclosed in an anti-tampering enclosure (not shown). Alternatively, anti-tampering detection circuitry 360 may itself be secure against tampering.
  • anti-tampering grids can be interconnected in numerous ways using various types of connectors.
  • the OFN module functions, inter alia, as a case-open switch which senses physical tampering and opening of the housing.
  • the output of the OFN module is preferably provided to anti-tampering detection circuitry 360 to enable the output of the OFN module to be used for detection of tampering.
  • the key displacements of one or more function keys may be sensed by engagement thereof with corresponding conventional electrical contacts, such as contacts 374 , 376 and 378 .
  • the secure keypad device 300 includes a main microprocessor 380 which preferably includes, inter alia, encryption/decryption capabilities.
  • a main microprocessor may beneficially be included in the secure keypad devices and data entry devices described hereinbelow with reference to FIGS. 5A-8B . It is appreciated that the functionality of anti-tampering detection circuitry 360 may be carried out by main microprocessor 380 .
  • FIG. 4A is a simplified, not to scale, illustration of an image captured by OFN module 342 in the embodiment of FIGS. 3A & 3B in the absence of key displacement beyond a predetermined extent and tampering.
  • the dark spots represent light reflected from readily optically identifiable markings 336 formed on corresponding bottom facing surfaces 338 of keys 334 .
  • FIG. 4A shows a state in which none of the keys is depressed. It is appreciated that angular optical distortions in the shape of the spots are generally not shown in FIGS. 4A-4E .
  • the grid shown in FIGS. 4A-4E represents a pixel grid, with each block representing a single pixel or an X by Y array of pixels.
  • FIG. 4B is a simplified illustration of a scene as viewed by OFN module 342 upon depression of a number 5 key from a first location within the housing to a second location within the housing in the absence of tampering. It is seen that the spot corresponding to the reflected light from marking 336 on the bottom facing surface of the number 5 key is enlarged. It is further appreciated that normally depression of a key causes the intensity of the reflected light received by OFN module 342 to increase.
  • FIG. 4C is a simplified illustration of a scene as viewed by OFN module 342 upon depression of a number 1 key from a first location within the housing to a second location within the housing in the absence of tampering. It is seen that the spot corresponding to the reflected light from marking 336 on the bottom facing surface of the number 1 key is enlarged.
  • a general approximation of the angular optical distortion in the shape of the enlarged spot corresponding to the depressed number 1 key is shown, not necessarily to scale.
  • FIG. 4D is a simplified illustration of a scene as viewed by OFN module 342 upon tampering by inserting a non-reflecting probe into the housing.
  • the probe blocks the reflected light from the optically identifiable markings 336 on the bottom surfaces of number 8 and 9 keys.
  • FIG. 4E is a simplified illustration of a scene as viewed by OFN module 342 upon tampering by removing a key.
  • a key such as the number 5 key
  • FIG. 4E shows an image which may be similar to what is shown in FIG. 4E .
  • FIGS. 5A and 5B are simplified, not to scale, sectional illustrations showing detection of a key displacement beyond a predetermined extent in a data entry device 500 including OFN circuitry, typically in the form of an OFN module 502 , such as a Model 27903 commercially available from Parallax Inc.
  • FIG. 5A shows three keys 504 , 506 and 508 , none of which is depressed and all of which are sensed by the OFN module 502 , as indicated schematically by respective beam designations 514 , 516 and 518 .
  • FIG. 5B shows key 508 being depressed and this key displacement beyond a predetermined extent being optically sensed by the OFN module 502 .
  • FIGS. 6A and 6B are simplified, not to scale, sectional illustrations showing detection of insertion of a probe in a data entry device 600 including OFN circuitry, typically in the form of an OFN module 602 , such as a Model 27903 commercially available from Parallax Inc., having a lens 603 , which may be provided to widen the field of view of the OFN module 602 .
  • FIG. 6A shows three keys 604 , 606 and 608 , all of which are sensed by the OFN module 602 , as indicated schematically by respective beam designations 614 , 616 and 618 .
  • additional features such as interior housing mounted reflective surfaces 620 and 622 , are also sensed by the OFN module 602 , as indicated schematically by respective beam designations 630 and 632 .
  • FIG. 6B shows that the insertion of a probe 634 blocks sensing of reflective surface 622 , which, in accordance with a preferred embodiment of the present inventions, results in a tamper alarm indication.
  • FIGS. 7A and 7B are simplified, not to scale, sectional illustrations showing detection of a key displacement beyond a predetermined extent in a data entry device 700 including OFN circuitry, typically in the form of an OFN module 702 , such as a Model 27903 commercially available from Parallax Inc.
  • FIG. 7A shows three keys 704 , 706 and 708 , all of which are sensed by the OFN module 702 , as indicated schematically by respective beam designations 714 , 716 and 718 .
  • Keys 704 , 706 and 708 preferably have readily optically identifiable markings similar to readily optically identifiable markings 136 ( FIG.
  • FIG. 7B shows key 708 having been removed and this key removal being optically sensed by the OFN module 702 , resulting in a tamper alarm indication.
  • FIGS. 8A and 8B are simplified, not to scale, sectional illustrations showing detection of opening of a data entry device 800 including OFN circuitry, typically in the form of an OFN module 802 , such as a Model ADBS-A350 commercially available from Pixart No. 5, Innovation Road 1, HsinChu Science Park, Hsin-Chu, Taiwan, R.O.C (HQ) having a lens 803 , which may be provided to widen the field of view of the OFN module 802 .
  • FIG. 8A shows typically four reflecting panels 804 , 806 , 808 and 810 mounted onto an interior surface of a housing portion 812 , all of which are sensed by the OFN module 802 , as indicated schematically by respective beam designations 814 , 816 and 818 and 820 .
  • FIG. 8B shows that opening of the data entry device and removal of housing portion 812 eliminates sensing of the four reflecting panels 804 , 806 , 808 and 810 mounted onto an interior surface of a housing portion 812 , as sensed by the OFN module 802 , resulting in a tamper alarm indication.
  • FIG. 9 is a simplified functional block diagram illustrating operation of the a secure keypad device constructed and operative in accordance with a preferred embodiment of the present invention and including OFN circuitry operative for at least one of tamper detection and key displacement beyond a predetermined extent identification of FIGS. 1A-8B .
  • OFN circuitry 900 such as circuitry embodied in an OFN module of the type described hereinabove, provides an image output to at least two functional units, a key displacement analysis unit 902 and an image-based tamper detection unit 904 .
  • the output of the OFN circuitry and or of the OFN module is encrypted by suitable encryption functionality.
  • functional units 902 and 904 may be embodied in a microprocessor included on an OFN module, such as OFN module 142 ( FIGS. 1A & 1B ), OFN module 342 ( FIGS. 3A & 3B ), OFN module 502 ( FIGS. 5A & 5B ), OFN module 602 ( FIGS. 6A & 6B ), OFN module 702 ( FIGS. 7A & 7B ) or OFN module 802 ( FIGS. 8A & 8B ).
  • units 902 and 904 may be separate from the OFN Module.
  • units 902 and 904 may be embodied in anti-tampering detection circuitry 160 ( FIGS.
  • the key displacement analysis unit 902 is preferably operable to ascertain which of a plurality of mechanical keys is mechanically depressed and to provide a corresponding output indication, preferably via a secure connection to a data receiver, such as a PIN data receiving module 906 .
  • the key displacement analysis unit 902 preferably employs optical information received from the OFN module including at least one of size, shape and intensity of reflected optical image elements.
  • the image-based tamper detection unit 904 is operative, for example, as described hereinabove with respect to one or more of the embodiments shown in FIGS. 1A-8B , to detect tampering with a data entry device.
  • the image-based tamper detection unit upon ascertaining the existence of a tamper situation, provides a tamper output to tamper alarm circuitry 908 .
  • both the key displacement analysis unit 902 and the image-based tamper detection unit 904 may receive stored information from an approved key-depression database 910 , which stores data, such as image data or data derived therefrom, which corresponds to depressions of predetermined keys or combinations thereof.
  • the key displacement analysis unit 902 preferably employs the information stored in the database 910 for key displacement identification and the image-based tamper detection unit 904 preferably employs the information stored in the database 910 for eliminating false tamper alarms when actual key displacement to at least a predetermined extent is detected.
  • the OFN circuitry in any of the OFN modules can provide various types of tamper detection functionality.
  • OFN module 142 FIGS. 1A & 1B
  • OFN module 342 FIGS. 3A & 3B
  • OFN module 502 FIGS. 5A & 5B
  • OFN module 602 FIGS. 6A & 6B
  • OFN module 702 FIGS. 7A & 7B
  • OFN module 802 FIGS. 8A & 8B
  • OFN module 142 will see optically identifiable markings 136 and 139 and will likely see many other things in its field of vision. Some of the other things seen by the OFN module 142 , other than optically identifiable markings 136 and 139 , may be considered as quiescent background noise, and may be very useful in detecting tampering. This background noise may be used as a thumbprint, captured upon manufacture of the device at the factory, employed for verification, typically each time that the device is booted up, that the device has not been tampered with.
  • a tool such as probe 634
  • a data entry device equipped with an OFN module 602 in accordance with an embodiment of the present invention, preferably one, more than one, or all of the following events is sensed:
  • the tool that is inserted into the device is sensed by the OFN module as a foreign object, either by virtue of blocking a reflection from an identifiable marking, such as reflective surface 622 , or by virtue of a reflection from the tool, which is not recognized as an identifiable marking;
  • Raw data outputted by an OFN module such as OFN module 142 ( FIGS. 1A & 1B ), OFN module 342 ( FIGS. 3A & 3B ), OFN module 502 ( FIGS. 5A & 5B ), OFN module 602 ( FIGS. 6A & 6B ), OFN module 702 ( FIGS. 7A & 7B ) or OFN module 802 ( FIGS. 8A & 8B ) typically includes a data array of M bytes (N ⁇ N pixels), wherein the value of each byte may vary between 0 to K proportionally, or inversely proportionally, to the amount of light sensed by each given pixel.
  • the OFN module typically includes a small on-board microcontroller and memory.
  • the OFN module can operate in two operational modes: a Raw Data Mode and a Configurable Mode.
  • the OFN module When operating in the Raw Data Mode, the OFN module sends the data array to the on board microcontroller when requested by the on board microcontroller.
  • the OFN module When operating in the Configurable Mode, the OFN module can be programmed at the factory to sense and store in memory various alarm scenarios and to generate an alarm signal upon the occurrence of one of the pre-configured alarm scenarios. Alternatively, the OFN module can be configured to generate an alarm signal when the scene viewed by the OFN module does match a thumbprint stored in memory. Additionally, the OFN module can be configured to provide different alarm signals depending on the occurrence of different tampering scenarios as sensed by the OFN module.
  • the encryption functionality of the OFN circuitry 900 vis a vis the main microprocessor 180 ( FIGS. 1A & 1B ) or main microprocessor 380 ( FIGS. 3A & 3B ) or the corresponding main microprocessor of any of the secure keypads or data entry devices of FIGS. 5A-8B includes the following functional features, described hereinbelow with respect to FIGS. 1A & 1B as an example:
  • the main microprocessor 180 becomes aware that there is no encryption key for its OFN module 142 .
  • the main microprocessor 180 generates an encryption key, which is typically a symmetric encryption key, and transmits it to the OFN module 142 as clear text. From then on, all communication between the main microprocessor 180 and the OFN module 142 is encrypted.
  • an encryption key which is typically a symmetric encryption key
  • the alarm detection circuitry 160 Upon occurrence of sensed tampering, the alarm detection circuitry 160 will cause the main microprocessor 180 to erase the encryption key and any other sensitive information and thus prevent further communication and PIN entry from taking place.
  • the OFN module of each device can be configured, inter alia, to carry out any one or more of the following functions:
  • the OFN module When the OFN module is not in the sleep mode, the OFN module preferably verifies its current thumbprint every second and alerts the main microprocessor if the current thumbprint differs from stored thumbprint beyond a threshold amount. If requested by the main microprocessor, the OFN module verifies its current thumbprint as a condition to allowing PIN entry. When PIN entry is allowed, key displacement to at least a predetermined extent is reported by the OFN module to the main microprocessor.
  • the main microprocessor periodically requests the status of the OFN module.
  • the OFN module When the device is in a sleep mode, the OFN module goes into deep sleep mode, and wakes up every second to validate its current thumbprint. If the current thumbprint matches the stored thumbprint, the OFN module returns to the sleep mode. If the current thumbprint does not match the stored thumbprint, the OFN module records this state in a nonvolatile memory, wakes up the main microprocessor and reports the not matching current thumbprint to the main microprocessor when the main microprocessor periodically requests the current status.
  • the system can be configured so that the OFN module determines that a tamper condition has occurred, or can be configured it only report raw data, in which configuration the main microprocessor makes all determinations of tamper conditions based, inter alia, on the raw data received from the OFN module. Additionally, any suitable combination of configurations of the OFN module and the main microprocessor is also possible.
  • the OFN module will also determine which PIN keys are pressed and report PIN keys to the main microprocessor.
  • the OFN module sends raw data to the main microprocessor, which determines whether a tamper condition exists or not.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

A data entry device including a housing, data entry circuitry located within the housing, a keypad mounted in the housing and having a plurality of movable key elements which, when depressed, are displaced to at least a predetermined extent from a first location within the housing to a second location within the housing and Optical Finger Navigation (OFN) circuitry mounted inside the housing, being operative for sensing at least some of the plurality of movable key elements when depressed and displaced to at least the predetermined extent from the first location within the housing to the second location within the housing and providing a key displacement output indicating key displacement to the data entry circuitry.

Description

    REFERENCE TO RELATED APPLICATIONS
  • Reference is hereby made to U.S. Provisional Patent Application Ser. No. 62/027,890, filed Jul. 23, 2014 and entitled “SENSITIVE DATA DEVICE”, the disclosure of which is incorporated by reference in its entirety and priority of which is hereby claimed pursuant to 37 CFR 1.78(a) (4) and (5)(i).
  • FIELD OF THE INVENTION
  • The present invention relates generally to data devices.
  • BACKGROUND OF THE INVENTION
  • Various types of data devices are known.
  • SUMMARY OF THE INVENTION
  • The present invention seeks to provide an improved data entry device.
  • There is thus provided in accordance with a preferred embodiment of the present invention a data entry device including a housing, data entry circuitry located within the housing, a keypad mounted in the housing and having a plurality of movable key elements which, when depressed, are displaced to at least a predetermined extent from a first location within the housing to a second location within the housing and Optical Finger Navigation (OFN) circuitry mounted inside the housing, being operative for sensing at least some of the plurality of movable key elements when depressed and displaced to at least the predetermined extent from the first location within the housing to the second location within the housing and providing a key displacement output indicating key displacement to the data entry circuitry.
  • There is also provided in accordance with another preferred embodiment of the present invention a data entry device including a housing, data entry circuitry located within the housing, tamper detection circuitry located within the housing, a keypad mounted in the housing and having a plurality of movable key elements and OFN circuitry mounted inside the housing, being operative for sensing displacement of the plurality of movable key elements and tampering with the device and providing a key displacement output indicating key displacement to at least a predetermined extent to the data entry circuitry and a tamper indication output to the tamper detection circuitry.
  • There is further provided in accordance with yet another preferred embodiment of the present invention a sensitive data device including a housing, sensitive data handling circuitry located within the housing, tamper detection circuitry located within the housing and OFN circuitry mounted inside the housing, being operative for sensing tampering with the device and providing a tamper indication output to the tamper detection circuitry.
  • Preferably, the OFN circuitry is mounted on an electrical circuit board spaced from the movable key elements. Additionally, the device also includes a spacer mounted between the electrical circuit board and the keypad.
  • Preferably, the electrical circuit board is arranged such that displacement of a key from a first location within the housing to a second location within the housing by the finger of a user is detected and identified by the OFN circuitry.
  • In accordance with a preferred embodiment of the present invention the OFN circuitry is incorporated within an OFN module which includes an illuminator and optics. Additionally, the OFN module is generally centered with respect to the plurality of movable key elements and lies therebelow so as to be in a line of sight with all of the plurality of movable key elements. Preferably, the OFN module is also in a line of sight with other regions within the housing.
  • In accordance with a preferred embodiment of the present invention the OFN module views optically identifiable markings on the plurality of movable key elements as well as other objects which provide a background useful in detecting tampering. Additionally or alternatively, a background output of the OFN module is employed as a reference against which an output of said OFN module indicating possible tampering is compared. Preferably, at least one of the following events produces a tampering indication: creating a hole in the data entry device using a tool, the tool being seen by the OFN module and removal of the tool, allowing light to enter the housing, the light being seen by the OFN module.
  • Accordingly, even if tampering occurs in a darkened environment, such tampering will be detected.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The present invention will be understood and appreciated more fully from the following detailed description, taken in conjunction with the drawings in which:
  • FIGS. 1A and 1B are simplified exploded view illustrations, taken in respective opposite directions, of a secure keypad device constructed and operative in accordance with a preferred embodiment of the present invention and including Optical Finger Navigation (OFN) circuitry operative for at least one of tamper detection and key displacement identification;
  • FIG. 2A is a simplified, not to scale, illustration of a steady state scene as viewed by OFN circuitry in the embodiment of FIGS. 1A & 1B in the absence of key displacement to at least a predetermined extent and tampering;
  • FIG. 2B is a simplified, not to scale, illustration of a scene as viewed by OFN circuitry upon depression of a number 5 key in the absence of tampering;
  • FIG. 2C is a simplified, not to scale, illustration of a scene as viewed by OFN circuitry upon depression of a number 1 key in the absence of tampering;
  • FIG. 2D is a simplified, not to scale, illustration of a scene as viewed by OFN circuitry upon tampering by inserting a non-reflecting probe into the housing;
  • FIG. 2E is a simplified, not to scale, illustration of a scene as viewed by OFN circuitry upon tampering by removing a key;
  • FIGS. 3A and 3B are simplified exploded view illustrations, taken in respective opposite directions, of a secure keypad device constructed and operative in accordance with another preferred embodiment of the present invention and including OFN circuitry operative for at least one of tamper detection and key displacement identification;
  • FIG. 4A is a simplified illustration of a steady state scene as viewed by OFN circuitry in the embodiment of FIGS. 3A & 3B in the absence of key displacement to at least a predetermined extent and tampering;
  • FIG. 4B is a simplified, not to scale, illustration of a scene as viewed by OFN circuitry in the embodiment of FIGS. 3A & 3B upon depression of a number 5 key in the absence of tampering;
  • FIG. 4C is a simplified, not to scale, illustration of a scene as viewed by OFN circuitry in the embodiment of FIGS. 3A & 3B upon depression of a number 1 key in the absence of tampering;
  • FIG. 4D is a simplified, not to scale, illustration of a scene as viewed by OFN circuitry in the embodiment of FIGS. 3A & 3B upon tampering by inserting a non-reflecting probe into the housing;
  • FIG. 4E is a simplified, not to scale, illustration of a scene as viewed by OFN circuitry in the embodiment of FIGS. 3A & 3B upon tampering by removing a key;
  • FIGS. 5A and 5B are simplified, not to scale, sectional illustrations showing detection of key displacement to at least a predetermined extent in a data entry device including OFN circuitry;
  • FIGS. 6A and 6B are simplified, not to scale, sectional illustrations showing detection of insertion of a probe in a data entry device including OFN circuitry;
  • FIGS. 7A and 7B are simplified, not to scale, sectional illustrations showing detection of key removal in a data entry device including OFN circuitry;
  • FIGS. 8A and 8B are, not to scale, simplified sectional illustrations showing detection of opening of a data entry device including OFN circuitry; and
  • FIG. 9 is a simplified functional block diagram illustrating operation of the secure keypad device constructed and operative in accordance with a preferred embodiment of the present invention and including OFN circuitry operative for at least one of tamper detection and key displacement identification of FIGS. 1A-8B.
  • DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
  • Reference is now made to FIGS. 1A and 1B, which partially illustrate a secure keypad device constructed and operative in accordance with a preferred embodiment of the present invention.
  • As seen in FIGS. 1A and 1B, there is provided a secure keypad device 100 including a top housing element 102 and a bottom housing element (not shown), which together define a keypad device housing. Housing element 102 includes, on a top surface 104 thereof, a display aperture 106, through which a display (not shown) may be viewed, and an array 108 of key apertures 110.
  • An optional anti-tamper circuit board 112, which preferably includes an anti-tampering grid 114 formed of a multiplicity of interconnected anti-tampering electrical conductors 116, underlies top surface 104 and is provided with key apertures 120 in registration with key apertures 110. Fixedly and electrically coupled to anti-tamper circuit board 112 is a peripheral anti-tamper keypad enclosure 122, which preferably includes an anti-tampering grid 124 formed of a multiplicity of interconnected anti-tampering electrical conductors.
  • A key mat 132, preferably formed of a resilient plastic or rubber, defines a plurality of depressible keys 134, preferably integrally formed with mat 132, which partially extend through key apertures 110 and 120 and preferably have readily optically identifiable markings 136 formed on corresponding bottom facing surfaces 138 thereof. Additional optically identifiable markings 139 may be provided on other interior surfaces, such as inner surfaces of the housing.
  • An electrical circuit board 140, which functions, inter alia, as a mounting board for an OFN module 142, is disposed in predetermined spaced relationship with key mat 132. OFN module 142 is preferably a Model ADBS-A350 commercially available from Pixart Imaging Inc., No. 5, Innovation Road 1, HsinChu Science Park, Hsin-Chu, Taiwan, R.O.C. The arrangement of key mat 132 and of electrical circuit board 140 is such that depression of a key 134 by the finger of a user is detected and identified by OFN module 142. It is noted that the OFN module 142 is operative to sense changes in the level of light received by it from various locations within its field of view.
  • In the illustrated embodiment of FIGS. 1A-2E, the OFN module 142 is generally centered with respect to the plurality of depressible keys 134 and lies therebelow so as to be in a line of sight with readily optically identifiable markings 136 formed on corresponding bottom facing surfaces 138 of all of depressible keys 134 and preferably also in a line of sight with other regions within the housing and more particularly with features and/or markings, such as optically identifiable markings 139 which can be sensed by the OFN module 142.
  • A spacer 143, preferably formed of a transparent material or defining open side walls, is provided between electrical circuit board 140 and key mat 132 in order to enhance the ability of the OFN module 142 to view not only all of the markings on all of the keys but also as much as possible of the interior of the housing and the markings and features thereof.
  • Circuit board 140 preferably includes an anti-tampering grid 144 formed of a multiplicity of interconnected anti-tampering electrical conductors.
  • It is appreciated that the anti tampering grids 144, 114 and 124 and enclosure 122 are preferably interconnected so as to define a keyboard anti-tampering enclosure, which is coupled to anti-tampering detection circuitry 160. Anti-tampering detection circuitry 160 is typically enclosed in an anti-tampering enclosure (not shown). Alternatively, anti-tampering detection circuitry 160 may itself be secure against tampering.
  • It is appreciated that the anti-tampering grids can be interconnected in numerous ways using various types of connectors.
  • In accordance with a preferred embodiment of the present invention, the OFN module 142 functions, inter alia, as a case-open switch which senses physical tampering with and opening of the housing. The output of the OFN module is preferably provided to anti-tampering detection circuitry 160 to enable the output of the OFN module to be used for detection of tampering. Upon detection of tampering one or both of the following actions may take place:
  • registration of a tampered condition and prevention of data entry, such as PIN entry.
  • It is appreciated that not all key displacements need be sensed by the OFN module. For example, the key displacements of one or more function keys, such as keys 162, 164, 166 and 168, may be sensed by engagement thereof with corresponding conventional electrical contacts, such as contacts 174, 176 and 178.
  • Preferably, the secure keypad device 100 includes a main microprocessor 180 which preferably includes, inter alia, encryption/decryption capabilities. Such a main microprocessor may beneficially be included in the secure keypad devices and data entry devices described hereinbelow with reference to FIGS. 5A-8B. It is appreciated that the functionality of anti-tampering detection circuitry 160 may be carried out by main microprocessor 180.
  • Reference is now made to FIG. 2A, which is a simplified, not to scale, illustration of an image captured by the OFN module 142, located generally below the 5 key, in the embodiment of FIGS. 1A & 1B, in the absence of key displacement beyond a predetermined extent and tampering. It is appreciated that the dark spots represent light reflected from readily optically identifiable markings 136 formed on corresponding bottom facing surfaces 138 of keys 134. FIG. 2A shows a state in which none of the keys is displaced. It is appreciated that angular optical distortions in the shape of the spots are generally not shown in FIGS. 2A-2E. The grid shown in FIGS. 2A-2E represents a pixel grid, with each block representing a single pixel or an X by Y array of pixels.
  • Reference is now made to FIG. 2B, which is a simplified illustration of a scene as viewed by the OFN module 142 upon displacement of a number 5 key from a first location within the housing to a second location within the housing in the absence of tampering. It is seen that the spot corresponding to the reflected light from marking 136 on the bottom facing surface of the number 5 key is enlarged. It is further appreciated that normally displacement of a key causes the intensity of the reflected light received by the OFN module 142 to increase.
  • Reference is now made to FIG. 2C, which is a simplified illustration of a scene as viewed by OFN module 142 upon displacement of a number 1 key from a first location within the housing to a second location within the housing in the absence of tampering. It is seen that the spot corresponding to the reflected light from marking 136 on the bottom facing surface of the number 1 key is enlarged. Here a general approximation of the angular optical distortion in the shape of the enlarged spot corresponding to the displaced number 1 key is shown, not necessarily to scale.
  • Reference is now made to FIG. 2D, which is a simplified illustration of a scene as viewed by OFN module 142 upon tampering by inserting a non-reflecting probe into the housing. Here it is seen that the probe blocks the reflected light from the optically identifiable markings 136 on the bottom surfaces of number 8 and 9 keys.
  • Reference is now made to FIG. 2E, which is a simplified illustration of a scene as viewed by OFN module 142 upon tampering by removing a key. In this example, where ambient light is present, removal of a key, such as the number 5 key, allows a flood of light into the housing, such that the OFN module sees an image which may be similar to what is shown in FIG. 2E.
  • Reference is now made to FIGS. 3A and 3B, which partially illustrate a secure keypad device constructed and operative in accordance with another preferred embodiment of the present invention. In this embodiment, an OFN module is not centered below the number 5 key as in the embodiment of FIGS. 1A-2E, but rather is located at a side of the housing outwardly from all of the keys. Accordingly, FIGS. 4A-4E show, in a simplified, not to scale, manner, an overall angular distortion resulting from the non-centered position of the OFN module.
  • As seen in FIGS. 3A and 3B, there is provided a secure keypad device 300 including a top housing element 302 and a bottom housing element (not shown), which together define a keypad device housing. Housing element 302 includes, on a top surface 304 thereof, a display aperture 306, through which a display (not shown) may be viewed, and an array 308 of key apertures 310.
  • An anti-tamper circuit board 312, which preferably includes an anti-tampering grid 314 formed of a multiplicity of interconnected anti-tampering electrical conductors 316, underlies top surface 304 and is provided with key apertures 320 in registration with key apertures 310. Fixedly and electrically coupled to anti-tamper circuit board 312 is a peripheral anti-tamper keypad enclosure 322, which preferably includes an anti-tampering grid 324 formed of a multiplicity of interconnected anti-tampering electrical conductors.
  • A key mat 332, preferably formed of a resilient plastic or rubber, defines a plurality of depressible keys 334, preferably integrally formed with mat 332, which partially extend through key apertures 310 and 320 and preferably have readily optically identifiable markings 336 formed on corresponding bottom facing surfaces 338 thereof. Additional optically identifiable markings 339 may be provided on other interior surfaces, such as inner surfaces of the housing.
  • An electrical circuit board 340, which functions, inter alia, as a mounting board for an OFN module 342, is disposed in predetermined spaced relationship with key mat 332. OFN module 342 is preferably a Model ADBS-A350 commercially available from Pixart Imaging Inc., No. 5, Innovation Road 1, HsinChu Science Park, Hsin-Chu, Taiwan, R.O.C. The arrangement of key mat 332 and of electrical circuit board 340 is such that depression of a key 334 by the finger of a user is detected and identified by OFN module 342. In the illustrated embodiment of FIGS. 3A-4E, the OFN module 342 is generally not centered with respect to the plurality of depressible keys 334 but lies therebelow so as to be in a line of sight with all of depressible keys 334 and preferably also in a line of sight with other regions within the housing. A spacer 343, preferably formed of a transparent material or defining open side walls, is provided between electrical circuit board 340 and key mat 332 in order to enhance the ability of the OFN module to view not only all of the keys but also as much as possible of the interior of the housing.
  • Circuit board 340 preferably includes an anti-tampering grid 344 formed of a multiplicity of interconnected anti-tampering electrical conductors.
  • It is appreciated that the anti tampering grids 344, 314 and 324 and enclosure 322 are preferably interconnected so as to define a keyboard anti-tampering enclosure, which is coupled to anti-tampering detection circuitry 360. Anti-tampering detection circuitry 360 is typically enclosed in an anti-tampering enclosure (not shown). Alternatively, anti-tampering detection circuitry 360 may itself be secure against tampering.
  • It is appreciated that the anti-tampering grids can be interconnected in numerous ways using various types of connectors.
  • In accordance with a preferred embodiment of the present invention, the OFN module functions, inter alia, as a case-open switch which senses physical tampering and opening of the housing. The output of the OFN module is preferably provided to anti-tampering detection circuitry 360 to enable the output of the OFN module to be used for detection of tampering.
  • It is appreciated that not all key displacements need be sensed by the OFN module. For example, the key displacements of one or more function keys, such as keys 362, 364, 366 and 368, may be sensed by engagement thereof with corresponding conventional electrical contacts, such as contacts 374, 376 and 378.
  • Preferably, the secure keypad device 300 includes a main microprocessor 380 which preferably includes, inter alia, encryption/decryption capabilities. Such a main microprocessor may beneficially be included in the secure keypad devices and data entry devices described hereinbelow with reference to FIGS. 5A-8B. It is appreciated that the functionality of anti-tampering detection circuitry 360 may be carried out by main microprocessor 380.
  • Reference is now made to FIG. 4A, which is a simplified, not to scale, illustration of an image captured by OFN module 342 in the embodiment of FIGS. 3A & 3B in the absence of key displacement beyond a predetermined extent and tampering. It is appreciated that the dark spots represent light reflected from readily optically identifiable markings 336 formed on corresponding bottom facing surfaces 338 of keys 334. FIG. 4A shows a state in which none of the keys is depressed. It is appreciated that angular optical distortions in the shape of the spots are generally not shown in FIGS. 4A-4E. The grid shown in FIGS. 4A-4E represents a pixel grid, with each block representing a single pixel or an X by Y array of pixels.
  • Reference is now made to FIG. 4B, which is a simplified illustration of a scene as viewed by OFN module 342 upon depression of a number 5 key from a first location within the housing to a second location within the housing in the absence of tampering. It is seen that the spot corresponding to the reflected light from marking 336 on the bottom facing surface of the number 5 key is enlarged. It is further appreciated that normally depression of a key causes the intensity of the reflected light received by OFN module 342 to increase.
  • Reference is now made to FIG. 4C, which is a simplified illustration of a scene as viewed by OFN module 342 upon depression of a number 1 key from a first location within the housing to a second location within the housing in the absence of tampering. It is seen that the spot corresponding to the reflected light from marking 336 on the bottom facing surface of the number 1 key is enlarged. Here a general approximation of the angular optical distortion in the shape of the enlarged spot corresponding to the depressed number 1 key is shown, not necessarily to scale.
  • Reference is now made to FIG. 4D, which is a simplified illustration of a scene as viewed by OFN module 342 upon tampering by inserting a non-reflecting probe into the housing. Here it is seen that the probe blocks the reflected light from the optically identifiable markings 336 on the bottom surfaces of number 8 and 9 keys.
  • Reference is now made to FIG. 4E, which is a simplified illustration of a scene as viewed by OFN module 342 upon tampering by removing a key. In this example, where ambient light is present, removal of a key, such as the number 5 key, allows a flood of light into the housing, such that OFN module 342 seems an image which may be similar to what is shown in FIG. 4E.
  • Reference is now made to FIGS. 5A and 5B, which are simplified, not to scale, sectional illustrations showing detection of a key displacement beyond a predetermined extent in a data entry device 500 including OFN circuitry, typically in the form of an OFN module 502, such as a Model 27903 commercially available from Parallax Inc. FIG. 5A shows three keys 504, 506 and 508, none of which is depressed and all of which are sensed by the OFN module 502, as indicated schematically by respective beam designations 514, 516 and 518. FIG. 5B shows key 508 being depressed and this key displacement beyond a predetermined extent being optically sensed by the OFN module 502.
  • Reference is now made to FIGS. 6A and 6B, which are simplified, not to scale, sectional illustrations showing detection of insertion of a probe in a data entry device 600 including OFN circuitry, typically in the form of an OFN module 602, such as a Model 27903 commercially available from Parallax Inc., having a lens 603, which may be provided to widen the field of view of the OFN module 602. FIG. 6A shows three keys 604, 606 and 608, all of which are sensed by the OFN module 602, as indicated schematically by respective beam designations 614, 616 and 618. Here it is seen that additional features, such as interior housing mounted reflective surfaces 620 and 622, are also sensed by the OFN module 602, as indicated schematically by respective beam designations 630 and 632.
  • FIG. 6B shows that the insertion of a probe 634 blocks sensing of reflective surface 622, which, in accordance with a preferred embodiment of the present inventions, results in a tamper alarm indication.
  • Reference is now made to FIGS. 7A and 7B, which are simplified, not to scale, sectional illustrations showing detection of a key displacement beyond a predetermined extent in a data entry device 700 including OFN circuitry, typically in the form of an OFN module 702, such as a Model 27903 commercially available from Parallax Inc. FIG. 7A shows three keys 704, 706 and 708, all of which are sensed by the OFN module 702, as indicated schematically by respective beam designations 714, 716 and 718. Keys 704, 706 and 708 preferably have readily optically identifiable markings similar to readily optically identifiable markings 136 (FIG. 1B) formed on corresponding bottom facing surfaces thereof, one of which is designated by reference number 736. FIG. 7B shows key 708 having been removed and this key removal being optically sensed by the OFN module 702, resulting in a tamper alarm indication.
  • Reference is now made to FIGS. 8A and 8B, which are simplified, not to scale, sectional illustrations showing detection of opening of a data entry device 800 including OFN circuitry, typically in the form of an OFN module 802, such as a Model ADBS-A350 commercially available from Pixart No. 5, Innovation Road 1, HsinChu Science Park, Hsin-Chu, Taiwan, R.O.C (HQ) having a lens 803, which may be provided to widen the field of view of the OFN module 802. FIG. 8A shows typically four reflecting panels 804, 806, 808 and 810 mounted onto an interior surface of a housing portion 812, all of which are sensed by the OFN module 802, as indicated schematically by respective beam designations 814, 816 and 818 and 820.
  • FIG. 8B shows that opening of the data entry device and removal of housing portion 812 eliminates sensing of the four reflecting panels 804, 806, 808 and 810 mounted onto an interior surface of a housing portion 812, as sensed by the OFN module 802, resulting in a tamper alarm indication.
  • Reference is now made to FIG. 9, which is a simplified functional block diagram illustrating operation of the a secure keypad device constructed and operative in accordance with a preferred embodiment of the present invention and including OFN circuitry operative for at least one of tamper detection and key displacement beyond a predetermined extent identification of FIGS. 1A-8B.
  • As seen in FIG. 9, OFN circuitry 900, such as circuitry embodied in an OFN module of the type described hereinabove, provides an image output to at least two functional units, a key displacement analysis unit 902 and an image-based tamper detection unit 904. Preferably, the output of the OFN circuitry and or of the OFN module is encrypted by suitable encryption functionality.
  • In accordance with one embodiment of the invention, functional units 902 and 904 may be embodied in a microprocessor included on an OFN module, such as OFN module 142 (FIGS. 1A & 1B), OFN module 342 (FIGS. 3A & 3B), OFN module 502 (FIGS. 5A & 5B), OFN module 602 (FIGS. 6A & 6B), OFN module 702 (FIGS. 7A & 7B) or OFN module 802 (FIGS. 8A & 8B). Alternatively, units 902 and 904 may be separate from the OFN Module. For example, units 902 and 904 may be embodied in anti-tampering detection circuitry 160 (FIGS. 1A & 1B) or anti-tampering detection circuitry 360 (FIGS. 3A & 3B) or in main microprocessor 180 (FIGS. 1A & 1B) or main microprocessor 380 (FIGS. 3A & 3B).
  • The key displacement analysis unit 902 is preferably operable to ascertain which of a plurality of mechanical keys is mechanically depressed and to provide a corresponding output indication, preferably via a secure connection to a data receiver, such as a PIN data receiving module 906. The key displacement analysis unit 902 preferably employs optical information received from the OFN module including at least one of size, shape and intensity of reflected optical image elements.
  • The image-based tamper detection unit 904 is operative, for example, as described hereinabove with respect to one or more of the embodiments shown in FIGS. 1A-8B, to detect tampering with a data entry device. The image-based tamper detection unit, upon ascertaining the existence of a tamper situation, provides a tamper output to tamper alarm circuitry 908.
  • It is appreciated that both the key displacement analysis unit 902 and the image-based tamper detection unit 904 may receive stored information from an approved key-depression database 910, which stores data, such as image data or data derived therefrom, which corresponds to depressions of predetermined keys or combinations thereof.
  • The key displacement analysis unit 902 preferably employs the information stored in the database 910 for key displacement identification and the image-based tamper detection unit 904 preferably employs the information stored in the database 910 for eliminating false tamper alarms when actual key displacement to at least a predetermined extent is detected.
  • It is appreciated that the OFN circuitry in any of the OFN modules, such as OFN module 142 (FIGS. 1A & 1B), OFN module 342 (FIGS. 3A & 3B), OFN module 502 (FIGS. 5A & 5B), OFN module 602 (FIGS. 6A & 6B), OFN module 702 (FIGS. 7A & 7B) or OFN module 802 (FIGS. 8A & 8B) can provide various types of tamper detection functionality.
  • For the sake of conciseness, reference is made in the following discussion to one example, namely OFN module 142 (FIGS. 1A & 1B). It is appreciated that OFN module 142 will see optically identifiable markings 136 and 139 and will likely see many other things in its field of vision. Some of the other things seen by the OFN module 142, other than optically identifiable markings 136 and 139, may be considered as quiescent background noise, and may be very useful in detecting tampering. This background noise may be used as a thumbprint, captured upon manufacture of the device at the factory, employed for verification, typically each time that the device is booted up, that the device has not been tampered with.
  • Turning now to the example illustrated in FIGS. 6A & 6B, it is appreciated that in the event that a tool, such as probe 634, is employed in physical tampering with a data entry device equipped with an OFN module 602 in accordance with an embodiment of the present invention, preferably one, more than one, or all of the following events is sensed:
  • a. the tool that is inserted into the device is sensed by the OFN module as a foreign object, either by virtue of blocking a reflection from an identifiable marking, such as reflective surface 622, or by virtue of a reflection from the tool, which is not recognized as an identifiable marking;
  • b. a hole made in the device by such a tool is sensed by the OFN module as a change in the thumbprint; and
  • c. upon removal of the tool in a lighted environment, light enters the device via the hole, thereby flooding the interior of the device with light, which light is sensed by the OFN module.
  • Turning now to the example illustrated in FIGS. 7A & 7B, it is appreciated that in the event that one or more keys, such as keys 704, 706 and 708, are removed from the data entry device equipped with an OFN module 702 in accordance with an embodiment of the present invention, preferably one, more than one, or all of the following events is sensed:
  • a. upon removal of the key, such as key 708, in a lighted environment, light enters the device via the hole remaining after removal of the key, thereby flooding the interior of the device with light, which light is sensed by the OFN module;
  • b. upon removal of the key, such as key 708, the absence of a readily optically identifiable marking, such as readily optically identifiable marking 736, formed on a bottom facing surface of the removed key is sensed by the OFN module;
  • c. removal of the key 708 produces a change in the thumbprint, which change is sensed by the OFN module.
  • Raw data outputted by an OFN module, such as OFN module 142 (FIGS. 1A & 1B), OFN module 342 (FIGS. 3A & 3B), OFN module 502 (FIGS. 5A & 5B), OFN module 602 (FIGS. 6A & 6B), OFN module 702 (FIGS. 7A & 7B) or OFN module 802 (FIGS. 8A & 8B) typically includes a data array of M bytes (N×N pixels), wherein the value of each byte may vary between 0 to K proportionally, or inversely proportionally, to the amount of light sensed by each given pixel.
  • The OFN module typically includes a small on-board microcontroller and memory. The OFN module can operate in two operational modes: a Raw Data Mode and a Configurable Mode.
  • When operating in the Raw Data Mode, the OFN module sends the data array to the on board microcontroller when requested by the on board microcontroller.
  • When operating in the Configurable Mode, the OFN module can be programmed at the factory to sense and store in memory various alarm scenarios and to generate an alarm signal upon the occurrence of one of the pre-configured alarm scenarios. Alternatively, the OFN module can be configured to generate an alarm signal when the scene viewed by the OFN module does match a thumbprint stored in memory. Additionally, the OFN module can be configured to provide different alarm signals depending on the occurrence of different tampering scenarios as sensed by the OFN module.
  • Preferably, the encryption functionality of the OFN circuitry 900 vis a vis the main microprocessor 180 (FIGS. 1A & 1B) or main microprocessor 380 (FIGS. 3A & 3B) or the corresponding main microprocessor of any of the secure keypads or data entry devices of FIGS. 5A-8B includes the following functional features, described hereinbelow with respect to FIGS. 1A & 1B as an example:
  • Preferably, at the factory, the main microprocessor 180 becomes aware that there is no encryption key for its OFN module 142.
  • The main microprocessor 180 generates an encryption key, which is typically a symmetric encryption key, and transmits it to the OFN module 142 as clear text. From then on, all communication between the main microprocessor 180 and the OFN module 142 is encrypted.
  • Upon occurrence of sensed tampering, the alarm detection circuitry 160 will cause the main microprocessor 180 to erase the encryption key and any other sensitive information and thus prevent further communication and PIN entry from taking place.
  • Considering the overall operation of the devices described hereinabove, it is appreciated that the OFN module of each device, as appropriate, can be configured, inter alia, to carry out any one or more of the following functions:
      • Report a valid key displacement to at least a predetermined extent;
      • Report a combination of key displacements to at least a predetermined extent;
      • Not report when all or most of the keys are pressed;
      • Report that a foreign object is present within the housing of the device;
      • Report that a key has been removed;
      • Report that the OFN “thumbprint” of the device has changed beyond a predetermined threshold;
      • Remain in a sleep mode, as a default, to conserve energy, thereby prolonging battery life;
      • Exit from sleep mode, without being prompted by the main microprocessor, to read its current thumbprint;
      • If the thumbprint matches a stored thumbprint, return to sleep mode;
      • If the current thumbprint does not match the stored thumbprint, send an alarm signal to the main microprocessor;
      • Respond to a request from the main microprocessor to verify the current thumbprint before allowing PIN entry; and
      • Accept an encryption key to facilitate encrypted communication between the OFN module and the main microprocessor.
  • When the OFN module is not in the sleep mode, the OFN module preferably verifies its current thumbprint every second and alerts the main microprocessor if the current thumbprint differs from stored thumbprint beyond a threshold amount. If requested by the main microprocessor, the OFN module verifies its current thumbprint as a condition to allowing PIN entry. When PIN entry is allowed, key displacement to at least a predetermined extent is reported by the OFN module to the main microprocessor.
  • During times of inactivity, the main microprocessor periodically requests the status of the OFN module.
  • When the device is in a sleep mode, the OFN module goes into deep sleep mode, and wakes up every second to validate its current thumbprint. If the current thumbprint matches the stored thumbprint, the OFN module returns to the sleep mode. If the current thumbprint does not match the stored thumbprint, the OFN module records this state in a nonvolatile memory, wakes up the main microprocessor and reports the not matching current thumbprint to the main microprocessor when the main microprocessor periodically requests the current status.
  • It is appreciated that the system can be configured so that the OFN module determines that a tamper condition has occurred, or can be configured it only report raw data, in which configuration the main microprocessor makes all determinations of tamper conditions based, inter alia, on the raw data received from the OFN module. Additionally, any suitable combination of configurations of the OFN module and the main microprocessor is also possible.
  • Preferably, the OFN module will also determine which PIN keys are pressed and report PIN keys to the main microprocessor.
  • Alternatively the OFN module sends raw data to the main microprocessor, which determines whether a tamper condition exists or not.
  • It is appreciated by persons skilled in the art that the present invention is not limited by what has been particularly shown and described hereinabove. Rather the scope of the present invention includes both combinations and subcombinations of various features described hereinabove as well as variations and modifications thereto which would occur to a person of skill in the art upon reading the above description and which are not in the prior art.

Claims (30)

1. A data entry device comprising:
a housing;
data entry circuitry located within said housing;
a keypad mounted in said housing and having a plurality of movable key elements which, when depressed, are displaced to at least a predetermined extent from a first location within said housing to a second location within said housing; and
Optical Finger Navigation (OFN) circuitry mounted inside said housing, being operative for sensing at least some of said plurality of movable key elements when depressed and displaced to at least said predetermined extent from said first location within said housing to said second location within said housing and providing a key displacement output indicating key displacement to said data entry circuitry.
2. A data entry device according to claim 1 and wherein said OFN circuitry is mounted on an electrical circuit board spaced from said movable key elements.
3. A data entry device according to claim 2 and also comprising a spacer mounted between said electrical circuit board and said keypad.
4. A data entry device according to claim 2 and wherein said electrical circuit board is arranged such that displacement of a key from a first location within the housing to a second location within the housing by the finger of a user is detected and identified by said OFN circuitry.
5. A data entry device according to claim 1 and wherein said OFN circuitry is incorporated within an OFN module which includes an illuminator and optics.
6. A data entry device according to claim 5 and wherein said OFN module is generally centered with respect to said plurality of movable key elements and lies therebelow so as to be in a line of sight with all of said plurality of movable key elements.
7. A data entry device according to claim 6 and wherein said OFN module is also in a line of sight with other regions within the housing.
8. A data entry device according to claim 6 and wherein said OFN module views optically identifiable markings on said plurality of movable key elements as well as other objects which provide a background useful in detecting tampering.
9. A data entry device according to claim 6 and wherein a background output of said OFN module is employed as a reference against which an output of said OFN module indicating possible tampering is compared.
10. A data entry device according to claim 6 and wherein at least one of the following events produces a tampering indication:
creating a hole in the data entry device using a tool, said tool being seen by said OFN module; and
removal of said tool, allowing light to enter the housing, said light being seen by said OFN module.
11. A data entry device comprising:
a housing;
data entry circuitry located within said housing;
tamper detection circuitry located within said housing;
a keypad mounted in said housing and having a plurality of movable key elements; and
OFN circuitry mounted inside said housing, being operative for sensing displacement of said plurality of movable key elements and tampering with said device and providing a key displacement output indicating key displacement to at least a predetermined extent to said data entry circuitry and a tamper indication output to said tamper detection circuitry.
12. A data entry device according to claim 11 and wherein said OFN circuitry is mounted on an electrical circuit board spaced from said movable key elements.
13. A data entry device according to claim 12 and also comprising a spacer mounted between said electrical circuit board and said keypad.
14. A data entry device according to claim 11 and wherein said electrical circuit board is arranged such that displacement of a key from a first location within the housing to a second location within the housing by the finger of a user is detected and identified by said OFN circuitry.
15. A data entry device according to claim 11 and wherein said OFN circuitry is incorporated within an OFN module which includes an illuminator and optics.
16. A data entry device according to claim 15 and wherein said OFN module is generally centered with respect to said plurality of movable key elements and lies therebelow so as to be in a line of sight with all of said plurality of movable key elements.
17. A data entry device according to claim 16 and wherein said OFN module is also in a line of sight with other regions within the housing.
18. A data entry device according to claim 16 and wherein said OFN module views optically identifiable markings on said plurality of movable key elements as well as other objects which provide a background useful in detecting tampering.
19. A data entry device according to claim 16 and wherein a background output of said OFN module is employed as a reference against which an output of said OFN module indicating possible tampering is compared.
20. A data entry device according to claim 16 and wherein at least one of the following events produce a tampering indication:
creating a hole in the data entry device using a tool, said tool being seen by said OFN module; and
removal of said tool, allowing light to enter the housing, said light being seen by said OFN module.
21. A sensitive data device comprising:
a housing;
sensitive data handling circuitry located within said housing;
tamper detection circuitry located within said housing; and
OFN circuitry mounted inside said housing, being operative for sensing tampering with said device and providing a tamper indication output to said tamper detection circuitry.
22. A sensitive data device according to claim 21 and wherein said OFN circuitry is mounted on an electrical circuit board spaced from a plurality of movable key elements.
23. A sensitive data device according to claim 22 and also comprising a spacer mounted between said electrical circuit board and a keypad mounted in said housing and having said plurality of movable key elements.
24. A sensitive data device according to claim 22 and wherein said electrical circuit board is arranged such that displacement of a key from a first location within the housing to a second location within the housing by the finger of a user is detected and identified by said OFN circuitry.
25. A sensitive data device according to claim 22 and wherein said OFN circuitry is incorporated within an OFN module which includes an illuminator and optics.
26. A sensitive data device according to claim 25 and wherein said OFN module is generally centered with respect to said plurality of movable key elements and lies therebelow so as to be in a line of sight with all of said plurality of movable key elements.
27. A sensitive data device according to claim 26 and wherein said OFN module is also in a line of sight with other regions within the housing.
28. A sensitive data device according to claim 26 and wherein said OFN module views optically identifiable markings on said plurality of movable key elements as well as other objects which provide a background useful in detecting tampering.
29. A sensitive data device according to claim 26 and wherein a background output of said OFN module is employed as a reference against which an output of said OFN module indicating possible tampering is compared.
30. A sensitive data device according to claim 26 and wherein at least one of the following events produce a tampering indication:
creating a hole in the data entry device using a tool, said tool being seen by said OFN module; and
removal of said tool, allowing light to enter the housing, said light being seen by said OFN module.
US14/802,305 2014-07-23 2015-07-17 Data device including ofn functionality Abandoned US20160026275A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US14/802,305 US20160026275A1 (en) 2014-07-23 2015-07-17 Data device including ofn functionality
US15/900,317 US11397835B2 (en) 2014-07-23 2018-02-20 Data device including OFN functionality

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201462027890P 2014-07-23 2014-07-23
US14/802,305 US20160026275A1 (en) 2014-07-23 2015-07-17 Data device including ofn functionality

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/900,317 Continuation US11397835B2 (en) 2014-07-23 2018-02-20 Data device including OFN functionality

Publications (1)

Publication Number Publication Date
US20160026275A1 true US20160026275A1 (en) 2016-01-28

Family

ID=55166754

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/802,305 Abandoned US20160026275A1 (en) 2014-07-23 2015-07-17 Data device including ofn functionality
US15/900,317 Active US11397835B2 (en) 2014-07-23 2018-02-20 Data device including OFN functionality

Family Applications After (1)

Application Number Title Priority Date Filing Date
US15/900,317 Active US11397835B2 (en) 2014-07-23 2018-02-20 Data device including OFN functionality

Country Status (1)

Country Link
US (2) US20160026275A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10248941B2 (en) * 2015-05-12 2019-04-02 Ingenico Group System and method for the optical detection of intrusion, and corresponding electronic device, program and recording medium
US20190122008A1 (en) * 2016-03-07 2019-04-25 Bluebird Inc. Mobile terminal having security function
US10544923B1 (en) 2018-11-06 2020-01-28 Verifone, Inc. Devices and methods for optical-based tamper detection using variable light characteristics
US20200349253A1 (en) * 2017-11-15 2020-11-05 Enrico Maim Terminals and methods for secure transactions

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6561659B1 (en) * 2001-11-15 2003-05-13 Wintek Corporation Photoconductor panel for lighting a keyboard
US20070040674A1 (en) * 2005-08-16 2007-02-22 Honeywell International, Inc. Conductive tamper switch for security devices
US20070109152A1 (en) * 2005-11-14 2007-05-17 Wald Steven F Method and apparatus for optically detecting selections made on an input device
US20090184850A1 (en) * 2008-01-22 2009-07-23 Verifone, Inc. Secured keypad devices
US20110100788A1 (en) * 2008-03-21 2011-05-05 Ingenico France Protection device for electronic system
US20110279279A1 (en) * 2008-01-22 2011-11-17 Verifone, Inc. Secure point of sale terminal
US20120020045A1 (en) * 2010-07-21 2012-01-26 Research In Motion Limited Portable electronic device having a waterproof keypad
US20130072771A1 (en) * 2011-09-21 2013-03-21 Pixart Imaging Inc. Optical finger mouse, electronic device and physiological characteristics detection device
US20130127722A1 (en) * 2011-11-17 2013-05-23 Pixart Imaging Inc. Keyboard module and display system
US9201511B1 (en) * 2010-04-23 2015-12-01 Cypress Semiconductor Corporation Optical navigation sensor and method

Family Cites Families (121)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB892198A (en) 1960-06-07 1962-03-21 American District Telegraph Co Electrical protection system
US3466643A (en) 1966-03-18 1969-09-09 Carlton Swain Moorefield Transmission line tampering alarm system
CH543142A (en) 1971-09-22 1973-10-15 Securiton Ag Distribution box for alarm systems
US3735353A (en) 1971-10-28 1973-05-22 Johnson Service Co Alarm transmission line security system utilizing pseudo random encoding
DE3041859A1 (en) 1980-11-06 1982-06-03 Preh Elektro Feinmechanik KEYBOARD
US4417824A (en) 1982-03-29 1983-11-29 International Business Machines Corporation Optical keyboard with common light transmission members
CA1188389A (en) 1982-06-28 1985-06-04 Northern Telecom Limited Pushbutton switch assembly
US4593384A (en) 1984-12-21 1986-06-03 Ncr Corporation Security device for the secure storage of sensitive data
GB8508808D0 (en) 1985-04-04 1985-05-09 British Telecomm Keypad
BR8701399A (en) 1986-04-03 1988-01-05 Du Pont CONTACT STRIP AND PROCESS FOR THE PRODUCTION OF A ROW OF EDGE CLAMP CONNECTORS, OR OF A SINGLE EDGE CLAMP CONNECTOR
JPH07104891B2 (en) 1986-08-05 1995-11-13 沖電気工業株式会社 Transaction processor
GB2193591B (en) * 1986-08-07 1990-07-25 Gen Electric Plc Security arrangement
GB2195478B (en) 1986-09-24 1990-06-13 Ncr Co Security device for sensitive data
US4836636A (en) 1986-11-13 1989-06-06 The Furukawa Electric Co., Ltd. Optical switch and optical keyboard utilizing the same
JPS63143698A (en) 1986-12-08 1988-06-15 アツミ電氣株式会社 Alarm
US5321143A (en) 1988-05-26 1994-06-14 Massachusetts Institute Of Technology Ruthenium-catalyzed production of cyclic sulfates
US5239664A (en) 1988-12-20 1993-08-24 Bull S.A. Arrangement for protecting an electronic card and its use for protecting a terminal for reading magnetic and/or microprocessor cards
FR2640781B1 (en) 1988-12-20 1992-04-10 Bull Sa DEVICE FOR PROTECTING AN ELECTRONIC CARD AND USE FOR PROTECTING A MAGNETIC AND / OR MICROPROCESSOR READING TERMINAL
IL95903A (en) 1989-10-03 1995-08-31 Univ Technology Electro-active cradle circuits for the detection of access or penetration
US5086292A (en) 1989-10-31 1992-02-04 Iris Systems Inc. Tamper detection device for utility meter
US5237307A (en) 1991-11-27 1993-08-17 The United States Of America As Represented By The United States Department Of Energy Non-contact tamper sensing by electronic means
US5469364A (en) 1993-03-15 1995-11-21 Hughey; Bradley W. Apparatus and methods for measuring and detecting variations in the value of a capacitor
US5561282A (en) 1993-04-30 1996-10-01 Microbilt Corporation Portable signature capture pad
US5506566A (en) 1993-05-06 1996-04-09 Northern Telecom Limited Tamper detectable electronic security package
FR2727227B1 (en) 1994-11-17 1996-12-20 Schlumberger Ind Sa ACTIVE SECURITY DEVICE WITH ELECTRONIC MEMORY
TW471144B (en) 1995-03-28 2002-01-01 Intel Corp Method to prevent intrusions into electronic circuitry
US5998858A (en) 1995-07-20 1999-12-07 Dallas Semiconductor Corporation Microcircuit with memory that is protected by both hardware and software
CA2165384C (en) 1995-12-15 2008-04-01 Andre Gagnon Open transmission line intrusion detection system using frequency spectrum analysis
US5675319A (en) 1996-04-26 1997-10-07 David Sarnoff Research Center, Inc. Tamper detection device
US5861662A (en) 1997-02-24 1999-01-19 General Instrument Corporation Anti-tamper bond wire shield for an integrated circuit
JPH10293915A (en) 1997-04-21 1998-11-04 Nippon Mektron Ltd Flexible circuit board for magnetic head
EP1019792B1 (en) 1997-09-29 2003-05-14 Varatouch Technology Incorporated Pointing device with integrated switch
US6301670B1 (en) 1998-10-06 2001-10-09 Ricoh Corporation Method and apparatus for erasing data when a problem is identified
DE69902574T2 (en) 1999-02-01 2003-04-24 Telefonaktiebolaget Lm Ericsson (Publ), Stockholm communication station
US6272562B1 (en) * 1999-05-28 2001-08-07 Cross Match Technologies, Inc. Access control unit interface
JP3454471B2 (en) 1999-07-09 2003-10-06 沖電気工業株式会社 Semiconductor device
US6396400B1 (en) 1999-07-26 2002-05-28 Epstein, Iii Edwin A. Security system and enclosure to protect data contained therein
GB2353399A (en) 1999-08-20 2001-02-21 3Com Corp Testing printed or integrated circuits
US7283066B2 (en) 1999-09-15 2007-10-16 Michael Shipman Illuminated keyboard
US6552713B1 (en) * 1999-12-16 2003-04-22 Hewlett-Packard Company Optical pointing device
FI108096B (en) 1999-12-28 2001-11-15 Nokia Mobile Phones Ltd Capacitively connected keypad structure
US6414884B1 (en) 2000-02-04 2002-07-02 Lucent Technologies Inc. Method and apparatus for securing electronic circuits
WO2001059544A2 (en) 2000-02-14 2001-08-16 Rainbow Technologies B.V., Netherlands Security module system, apparatus and process
WO2001063994A2 (en) 2000-02-23 2001-08-30 Iridian Technologies, Inc. Tamper proof case for electronic devices having memories with sensitive information
FR2806507B1 (en) 2000-03-17 2003-09-05 Dassault Automatismes ANTI-INTRUSION ELASTOMERIC MEMBRANE FOR SECURE ELECTRONIC UNITS
US6646565B1 (en) 2000-06-01 2003-11-11 Hewlett-Packard Development Company, L.P. Point of sale (POS) terminal security system
JP2002108711A (en) 2000-09-29 2002-04-12 Tamura Electric Works Ltd Data processor and data processing method
GB2372363A (en) 2000-12-01 2002-08-21 Peter Gwynne Security device having a capacitive sensor
US6710269B2 (en) 2001-07-18 2004-03-23 International Business Machines Corporation Foil keyboard with security system
WO2003019467A1 (en) 2001-08-31 2003-03-06 Trintech Limited A pin pad
US20060139185A1 (en) * 2002-03-29 2006-06-29 Pierre Bonnat Input device for a computer system that utilizes ambient light, and a method of manufacturing the same
JP2003317202A (en) 2002-04-11 2003-11-07 Cis Electronica Industria & Comercio Ltda Magnetic head of magnetic reader
US6466118B1 (en) 2002-04-17 2002-10-15 Duraswitch Industries, Inc. Overlay electrical conductor for a magnetically coupled pushbutton switch
DE60328319D1 (en) * 2002-05-23 2009-08-20 Digit Wireless Llc Electric push-button
US6912280B2 (en) 2002-07-22 2005-06-28 Sony Ericsson Mobile Communications Ab Keypad device
ATE400842T1 (en) * 2002-08-29 2008-07-15 Koninkl Philips Electronics Nv DEVICE EQUIPPED WITH AN OPTICAL KEYBOARD AND AN OPTICAL INPUT DEVICE
US20040041792A1 (en) * 2002-09-03 2004-03-04 Criscione John C. Keypad input device
US6784384B2 (en) 2002-12-03 2004-08-31 Samsung Electronics Co., Ltd. Rotation key device for a portable terminal
US6853093B2 (en) 2002-12-20 2005-02-08 Lipman Electronic Engineering Ltd. Anti-tampering enclosure for electronic circuitry
WO2004078787A1 (en) 2003-03-06 2004-09-16 Cypak Ab Tamper evident packaging
EP1523228A3 (en) 2003-10-09 2008-03-05 Matsushita Electric Industrial Co., Ltd. Mobile terminal, circuit board, circuit board design aiding apparatus and method, design aiding program, and storage medium having stored therein design aiding program
EP1676182B8 (en) 2003-10-24 2009-04-01 VeriFone Systems Ireland Limited Circuit security
US7042371B2 (en) 2004-02-24 2006-05-09 Nokia Corporation Optical keyboard with geodesic optical elements
US7064670B2 (en) 2004-02-25 2006-06-20 Dmatek, Ltd. Method and apparatus for portable transmitting devices
GB0404922D0 (en) 2004-03-04 2004-04-07 Dione Plc Secure card reader
WO2005086546A2 (en) 2004-03-04 2005-09-15 Lipman Electronics Engineering Limited Secure card reader
JP2005340154A (en) 2004-03-12 2005-12-08 Fuji Denshi Kogyo Kk Two-step operation switch
US7274289B2 (en) * 2004-05-27 2007-09-25 Eastman Kodak Company System and device for detecting object tampering
US7270275B1 (en) * 2004-09-02 2007-09-18 Ncr Corporation Secured pin entry device
US7506812B2 (en) 2004-09-07 2009-03-24 Semtek Innovative Solutions Corporation Transparently securing data for transmission on financial networks
US7309012B2 (en) 2004-09-07 2007-12-18 Semtek Innovative Solutions, Inc. Secure magnetic stripe reader for handheld computing and method of using same
US7214874B2 (en) * 2004-11-04 2007-05-08 International Business Machines Corporation Venting device for tamper resistant electronic modules
US20060109251A1 (en) * 2004-11-19 2006-05-25 Jesse Kelly Combined keyboard and movement detection system
TW200617748A (en) * 2004-11-23 2006-06-01 Mitac Technology Corp Integrated module used to control the displacement of the cursor displayed on a computer and the input of number keys
US20060192653A1 (en) 2005-02-18 2006-08-31 Paul Atkinson Device and method for selectively controlling the utility of an integrated circuit device
GB2423615A (en) * 2005-02-25 2006-08-30 Hewlett Packard Development Co Identifier for a memory tag
US7832628B2 (en) 2005-10-21 2010-11-16 Verifone, Inc. Protective cover for terminal keypad security switches
US7388486B2 (en) * 2006-01-05 2008-06-17 Honeywell International Inc. Method and system to detect tampering using light detector
US20070204173A1 (en) 2006-02-15 2007-08-30 Wrg Services Inc. Central processing unit and encrypted pin pad for automated teller machines
WO2007149977A2 (en) * 2006-06-21 2007-12-27 Rf Code, Inc. Location-based security, privacy, access control and monitoring system
US7671324B2 (en) * 2006-09-27 2010-03-02 Honeywell International Inc. Anti-tamper enclosure system comprising a photosensitive sensor and optical medium
US7497378B2 (en) 2006-12-08 2009-03-03 Verifone, Inc. Anti-tampering protection for magnetic stripe reader
US7784691B2 (en) 2006-12-08 2010-08-31 Verifone Inc. Security functionality for magnetic card readers and point of sales devices
US7898413B2 (en) 2007-01-25 2011-03-01 Verifone, Inc. Anti-tamper protected enclosure
DE102007009551B3 (en) * 2007-02-27 2008-08-21 Ludwig-Maximilian-Universität Device for the confocal illumination of a sample
JP4838349B2 (en) * 2007-03-27 2011-12-14 三菱電機株式会社 Secret information storage device, secret information erasing method, and secret information erasing program
US20080278353A1 (en) 2007-05-11 2008-11-13 Measurement Specialties, Inc. Tamper resistant electronic transaction assembly
DE502007004787D1 (en) * 2007-06-14 2010-09-30 Edelmann Carl Gmbh Folding box with unverklebtem originality closure
US7843339B2 (en) 2007-08-27 2010-11-30 Verifone, Inc. Secure point of sale device employing capacitive sensors
DE102007057477B4 (en) 2007-11-29 2010-01-28 Hypercom Gmbh Device for monitoring a room by serially connected closing contacts, in particular cover switch in a fuse housing
US8130200B2 (en) * 2008-01-14 2012-03-06 Benjamin Slotznick Combination thumb keyboard and mouse
US8443458B2 (en) * 2008-01-16 2013-05-14 Telefonaktiebolaget Lm Ericsson (Publ) Method and device for detecting the opening of a cover enclosing the device
US8317384B2 (en) * 2009-04-10 2012-11-27 Intellectual Discovery Co., Ltd. Light guide film with cut lines, and optical keypad using such film
CN101859199A (en) * 2009-04-13 2010-10-13 深圳富泰宏精密工业有限公司 Keyboard device
US8172444B2 (en) * 2009-04-24 2012-05-08 Avago Technologies Ecbu Ip (Singapore) Pte. Ltd. Light guide display with multiple light guide layers
US20140240234A1 (en) * 2013-02-28 2014-08-28 Hewlett-Packard Development Company, L.P. Input Device
US8358218B2 (en) * 2010-03-02 2013-01-22 Verifone, Inc. Point of sale terminal having enhanced security
US8330606B2 (en) * 2010-04-12 2012-12-11 Verifone, Inc. Secure data entry device
US20110316805A1 (en) * 2010-06-28 2011-12-29 Youji Yamada Electronic device
US8513548B2 (en) * 2010-07-21 2013-08-20 Maxim Integrated Products, Inc. Keypad having tamper-resistant keys
HK1149884A2 (en) 2010-08-26 2011-10-14 耀光联有限公司 An optical keypad based on gesture control
TWI408574B (en) * 2010-09-03 2013-09-11 Primax Electronics Ltd Shape changeable camera mouse
US20120068846A1 (en) * 2010-09-20 2012-03-22 Honeywell International Inc. Tamper event detection
CN201984457U (en) 2011-04-26 2011-09-21 友碁科技股份有限公司 Optical keyboard input device
US8847923B1 (en) * 2011-07-15 2014-09-30 James Harrison Bowen Keyboard with reflected light beam finger detection
CA3044757C (en) * 2011-10-21 2021-11-09 Google Llc User-friendly, network connected learning thermostat and related systems and methods
US9009860B2 (en) * 2011-11-03 2015-04-14 Cram Worldwide, Llc Tamper resistance extension via tamper sensing material housing integration
US9123222B2 (en) * 2012-03-15 2015-09-01 Ninve Jr. Inc. Apparatus and method for detecting tampering with an infra-red motion sensor
KR20130126804A (en) * 2012-04-24 2013-11-21 이철재 Coverage for detecting illegal opening for electronic device
WO2014004553A1 (en) * 2012-06-25 2014-01-03 Xceedid Corporation Access credential reader connector
US20140132516A1 (en) * 2012-11-12 2014-05-15 Sunrex Technology Corp. Optical keyboard
US9394723B1 (en) * 2013-01-22 2016-07-19 Amazon Technologies, Inc. Lock that mechanically detects tampering
JP6290373B2 (en) * 2013-04-04 2018-03-07 フィリップス ライティング ホールディング ビー ヴィ Daylight daylighting system to prevent unauthorized changes
US9218069B2 (en) * 2013-04-11 2015-12-22 Avago Technologies General Ip (Singapore) Pte. Ltd. Optical sensing device to sense displacement
CA2913856A1 (en) * 2013-06-12 2014-12-18 Sicpa Holding Sa Heat sensitive tamper indicating markings
US10218383B2 (en) * 2013-06-25 2019-02-26 Ncr Corporation Keypad
US9368300B2 (en) * 2013-08-29 2016-06-14 Dell Products Lp Systems and methods for lighting spring loaded mechanical key switches
US20150077256A1 (en) * 2013-09-19 2015-03-19 Dubois Limited Retail security tag
EP3138088A4 (en) * 2014-05-02 2017-12-06 Synthetic Genomics, Inc. Tamper-resistant assembly for securing valuable material
US9991952B2 (en) * 2015-09-01 2018-06-05 Allied Telesis Holdings Kabushiki Kaisha Optical signal monitoring
US10088424B2 (en) * 2016-08-24 2018-10-02 Industrial Technology Research Institute Tapered optical needle

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6561659B1 (en) * 2001-11-15 2003-05-13 Wintek Corporation Photoconductor panel for lighting a keyboard
US20070040674A1 (en) * 2005-08-16 2007-02-22 Honeywell International, Inc. Conductive tamper switch for security devices
US20070109152A1 (en) * 2005-11-14 2007-05-17 Wald Steven F Method and apparatus for optically detecting selections made on an input device
US20090184850A1 (en) * 2008-01-22 2009-07-23 Verifone, Inc. Secured keypad devices
US20110279279A1 (en) * 2008-01-22 2011-11-17 Verifone, Inc. Secure point of sale terminal
US20110100788A1 (en) * 2008-03-21 2011-05-05 Ingenico France Protection device for electronic system
US9201511B1 (en) * 2010-04-23 2015-12-01 Cypress Semiconductor Corporation Optical navigation sensor and method
US20120020045A1 (en) * 2010-07-21 2012-01-26 Research In Motion Limited Portable electronic device having a waterproof keypad
US20130072771A1 (en) * 2011-09-21 2013-03-21 Pixart Imaging Inc. Optical finger mouse, electronic device and physiological characteristics detection device
US20130127722A1 (en) * 2011-11-17 2013-05-23 Pixart Imaging Inc. Keyboard module and display system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10248941B2 (en) * 2015-05-12 2019-04-02 Ingenico Group System and method for the optical detection of intrusion, and corresponding electronic device, program and recording medium
US20190122008A1 (en) * 2016-03-07 2019-04-25 Bluebird Inc. Mobile terminal having security function
US10891401B2 (en) * 2016-03-07 2021-01-12 Bluebird Inc. Mobile terminal having security function
US20200349253A1 (en) * 2017-11-15 2020-11-05 Enrico Maim Terminals and methods for secure transactions
US12111917B2 (en) * 2017-11-15 2024-10-08 Enrico Maim Terminals and methods for secure transactions
US10544923B1 (en) 2018-11-06 2020-01-28 Verifone, Inc. Devices and methods for optical-based tamper detection using variable light characteristics

Also Published As

Publication number Publication date
US20180173903A1 (en) 2018-06-21
US11397835B2 (en) 2022-07-26

Similar Documents

Publication Publication Date Title
US11397835B2 (en) Data device including OFN functionality
US8358218B2 (en) Point of sale terminal having enhanced security
KR20190088822A (en) Sensor and electronic apparatus for fingerprint recognition
US9213869B2 (en) Magnetic stripe reading device
EP3041018B1 (en) Secure data entry device
CN113557710A (en) Biometric input device
US8284387B2 (en) Methods and systems for recognizing tamper events
JP2017117056A (en) Transaction terminal device and information input device
US8126141B2 (en) Interferometric communication
ES2708086T3 (en) System and method of optical detection of intrusion, electronic device, program and corresponding recording support
WO2023162779A1 (en) Information processing device
EP3286742B1 (en) Point of sale terminal having enhanced security
CN208014115U (en) A kind of cell intrusion alarm system with self-checking function
KR20060076530A (en) Mobile communication terminal with fingerprint recognition function
US8669886B2 (en) Data entry module
US20200387764A1 (en) System and method for reading an information code
ES2453291T3 (en) Portable electronic payment terminal adapted to run non-certified programs
CN218100314U (en) Circuit is prevented tearing open by optics of access control equipment
KR20200072670A (en) Fingerprint sensing apparatus
US20240029540A1 (en) Enhanced visual and audio device for use in access control systems
US12051277B1 (en) Multi-sensor input device
JP2023145883A (en) input device
KR20200112614A (en) Electronic device including an image sensor and method of operating the same
KR20160029189A (en) Encrypting pin pad
FR3033659A1 (en) SECURE ANALOG KEYBOARD KEY, INTRUSION DETECTION METHOD AND MODULE, ELECTRONIC PAYMENT TERMINAL, PROGRAM AND RECORDING MEDIUM THEREOF

Legal Events

Date Code Title Description
AS Assignment

Owner name: VERIFONE, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BARROWMAN, JOHN HENRY;MANCHESTER, DOUG LEIGH;JOHANSEN, WILLIAM MARTIN, JR;REEL/FRAME:036680/0007

Effective date: 20150816

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, ILLINOIS

Free format text: SECURITY INTEREST;ASSIGNORS:VERIFONE, INC.;HYPERCOM CORPORATION;REEL/FRAME:045575/0019

Effective date: 20180202

Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, IL

Free format text: SECURITY INTEREST;ASSIGNORS:VERIFONE, INC.;HYPERCOM CORPORATION;REEL/FRAME:045575/0019

Effective date: 20180202

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: VERIFONE, INC., CALIFORNIA

Free format text: RELEASE (R045575F0019);ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:046865/0270

Effective date: 20180820

Owner name: HYPERCOM CORPORATION, CALIFORNIA

Free format text: RELEASE (R045575F0019);ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:046865/0270

Effective date: 20180820