Password Keyer - detailed description
Our Password Keyer is an extremely safe device for storing passwords, addresses, and other texts and strings.
In addition to storing strings Password Keyer can also act as an emulated keyboard entering the chosen password to a computer automatically.
The device is based on a proprietary hardware, designed right for this application which makes it both - safe and handy.
The entire Password Keyer consists of two modules - a Portable Module and a Fixed Module.
User can have his portable module always with him. It contains battery, screen, etc. - allowing browsing through stored texts.
Of course every time it is possible reading a password from the display and enter it manually to a computer. But this is an awful thing,
no one likes typing passwords manually...
This is why our Password Keyer device offers two other ways for entering a stored password to a computer (or to a tablet or phone).
The fixed module is the main possibility. This module is connected to a computer as a keyboard.
All what an user needs is selecting a password on the portable module screen. And the fixed module does the rest - it types the characters into the connected computer automatically emulating a standard keyboard.
The second possibility is a Bluetooth module instead of the fixed module.
When the portable unit of Password Keyer is equipped by a Bluetooth module it acts as a Bluetooth keyboard entering a selected password to the paired computer this way. Of course these works for mobile phones and tablets as well.
But please note - using Bluetooth is easy, handy, cool, etc., but it is still a wirelless connection. For applications where security is the main concern the wired "fixed module" would be a better choice. This is why the Bluetooth module is designed as an external peripheral. When removing it no wirelless connection can happen, including every unwanted events of any kind.
Because our Pasword Keyer emulates a normal external keyboard it works for computers, tablets, smartphones and other devices. The device simply sees a keyboard connected. There is no need for installing any driver, it works for every operating systems. Any device accepting a normal external keyboard will accept our Password Keyer with no special configuration is required.
And even more - the Password Keyer pretends it is an external keyboard operated by a human! Even reCapcha sees a normal keyboard operation.
There's no way how the Password Keyer device can be hacked!
How is this possible? Simply because there is no way how an attack can reach the Password Keyer' inside.
Where is it connected? It would be connected to a computer keyboard. Keyboards aren't known trying to hack devices. But anyway - try to imagine: There is a (dirty) person with his/her fingers on the keyboard. Trying to compromise a piece of Password Keyer. What can happen? There is no operating system inside, just a simple hardware with the only one function - when activated it stores keystrokes received to the internal memory. But this is not activated now, the approved user authorisation is required before. So all the signals from the keyboard are simply ignored by the hardware. The front-end electronic is out of power that time, as result there is no IC even hearing the keyboard - no way to compromise.
The other wire is connected to a computer (or to a phone or to a tablet). This is a keyboard connection. It is plugged in an USB connector or to an old PS/2. Ordinary keyboards are communicating with computers using a very simple old communication protocol. And the protocol we are emulating is the same when connected to a PS/2 or to an USB. Roughly one can say it is an unidirectional communication. Keyboard sends keystrokes and computer has nothing to say to the keyboard. When we like considering details this is not true fully. The computer can send commands to the keyboard attached. But these commands are very simple ones. For instance the computer can ask the keyboard for waiting a while, etc. It is impossible using this kind of communication for trying to compromise anything. And if even it would be possible - it does not matter for our Password Keyer! The internal communication inside Password Keyer is a fully unidirectional one. A stored 'keystroke' is withdrawn from memory and sent to the front-end electronics. This communication is unidirectional only, no attemtp from computer can reach the memory (even if such an attempt is possible which isn't). Again - no way to compromise!
Of course things may become more complicated when a Bluetooth module is used instead of the Fixed module. This time a chance for compromising the communication would be imaginable. A third party would become able sniffing the radiocommunication. Using Bluetooth would be more handy but when security matters wires are wires...