• Title/Summary/Keyword: Keyboard

Search Result 468, Processing Time 0.029 seconds

The Effect of Standard Keyboard and Fixed-Split Keyboard on Wrist Posture During Word Processing (문서입력 작업 시 컴퓨터 키보드 유형이 손목관절의 운동학적 특성에 미치는 영향)

  • Kwon, Hyuk-Cheol;Jeong, Dong-Hoon;Kong, Jin-Yong
    • Physical Therapy Korea
    • /
    • v.11 no.1
    • /
    • pp.35-43
    • /
    • 2004
  • There were two purposes of this study. The first was to research the effects of standard and fixed-split keyboards on wrist posture and movements during word processing. The second was to select optimal computer input devices in order to prevent cummulative trauma disorder in the wrist region. The group of subjects consisted of thirteen healthy men and women who all agreed to participate in this study. Kinematic data was measured from both wrist flexion and extension, and wrist radial and ulnar deviation during a 20 minute period of word processing work. The measuring tool was an electrical goniometer, and was produced by Biometrics Cooperation. The results were as follows: 1. The wrist flexion and extension at resting starting position were not significantly different (p>.05), however the angle of radial and ulnar deviation were significantly different in standard and split keyboard use during word processing (p<.05). 2. In the initial 10 minutes, the dynamic angle of wrist flexion and extension were not significantly different (p>.05), however the dynamic angle of radial and ulnar deviation was significantly different in standard and split keyboard use during word processing (p<.05). These results suggest that the split keyboard is more optimal than the standard keyboard, because it prevented excessive ulnar deviation during word processing.

  • PDF

Soft Keyboard Interface Design for Mobile Device (모바일기기를 위한 소프트키보드 인터페이스 디자인)

  • Oh, Hyoung-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.6
    • /
    • pp.79-88
    • /
    • 2007
  • As the mobile computers such as Personal Digital Assistants (PDAs) or Smart Phone has been widespread in our daily life, the demand of an extensive data input will gradually be increased. Consequently, many alternative soft keyboards have been proposed to satisfy this requirement. However none of them can provide an absolute solutions for that, the segregated guideline for keyboard arrangement and usage still cause much confusion to the user. Therefore, an integrated guideline is seriously required. In order to come up with the integrated guideline for Korean Soft keyboard GUI, the questionnaire and the experimental test compared with five soft keyboards were conducted in this study. As a result this paper presents five guidelines for improving an input speed of soft keyboard on the mobile computing; following familiarity for effective screen use, using a single key rather than grouping key, considering position of prediction word, considering prompt feedback, finally, considering optimized keyboard size.

Design and Implementation of a Keyboard Input Security System for Safe md Trusted E-Commerce (안전하고 신뢰성있는 전자상거래를 위한 키보드 입력 보안 시스템의 설계 및 구현)

  • Choi Sung-Wook;Kim Ki-Tae
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.55-62
    • /
    • 2006
  • It is growing to use the E-Commerce, recently However, if a cracking tool that detects e keyboard input is set up, users' input values and personal information could be taken away. This paper shows the design and implementation of security system that prevent the keyboard input information leaking. The ideas of thus paper are encrypting the keyboard input values with using the keyboard interrupt hooking, the browser embedding program's decrypting the values in case of need and decrypting all values in the web server. The own input control was developed for direct attacks to the browser, and that the values of password fields which are showed as *(asterisk character) won't be decrypted in the client PC is different from other commercial keyboard input security systems. Consequently, this paper shows the chance of realizing a lot safer customer information protective system than before.

A study on Password Input Method to Protect Keyboard hooking (Keyboard hooking 방지를 위한 패스워드 입력 방법 연구)

  • Kang, Seung-Gu;Kwak, Jin-Suk;Lee, Young-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.241-244
    • /
    • 2011
  • Recently, Due to development of Internet techniques, user suddenly increased that Used of Web services and with out constraints of place and time has been provided. typically, Web services used ID/Password authentication. User confirmed personal data Stored on Web servers after user authorized. web service provider is to provide variety security techniques for the protection personal information. However, recently accident has happened is the malicious attackers may capture user information such as users entered personal information through new keyboard hooking. In this paper, we propose a keyboard hooking protected password input method using CAPTCHA. The proposed password input method is based on entering the password using mouse click or touch pad on the CAPTCHA image. The mapping of CAPTCHA image pixels is random.

  • PDF

N-gram based Language Model for the QWERTY Keyboard Input Errors in a Touch Screen Environment (터치스크린 환경에서 쿼티 자판 오타 교정을 위한 n-gram 언어 모델)

  • Ong, Yoon Gee;Kang, Seung Shik
    • Smart Media Journal
    • /
    • v.7 no.2
    • /
    • pp.54-59
    • /
    • 2018
  • With the increasing use of touch-enabled mobile devices such as smartphones and tablet PCs, the works are done on desktop computers and smartphones, and tablet PCs perform laptops. However, due to the nature of smart devices that require portability, QWERTY keyboard is densely arranged in a small screen. This is the cause of different typographical errors when using the mechanical QWERTY keyboard. Unlike the mechanical QWERTY keyboard, which has enough space for each button, QWERTY keyboard on the touch screen often has a small area assigned to each button, so that it is often the case that the surrounding buttons are input rather than the button the user intends to press. In this paper, we propose a method to automatically correct the input errors of the QWERTY keyboard in the touch screen environment by using the n-gram language model using the word unigram and the bigram probability.

Performance Evaluation of MissLess Soft Keyboard with Recommendation (추천 소프트 키보드 MissLess의 성능 평가)

  • Hwang, Kitae;Kim, Tae-Wan;Cho, Hye-Kyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.187-195
    • /
    • 2014
  • In this paper, we evaluated the performance of recommendation and run time of the MissLess soft keyboard developed in the previous research. The MissLess keyboard assigns a hash code per each word for all words within its mobile dictionary. It decides recommendation words through three consecutive processes such as hash filtering, sorting based on spelling similarity, and finally recommendation based on frequency of use. Each process has some factors to have an impact on the recommendation success. We conducted experiments in an Android mobile device running the MissLess keyboard and measured performance of recommendation and run time overhead according to the impact factors. In this paper, we showed the experiment results.

A Keyboard Security Method Based on a Subclassing (서브클래싱 기반의 키보드보안 기법)

  • Hwang, Sung-Jin;Park, Kyung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.15-23
    • /
    • 2011
  • In this paper, we propose a keyboard security method that is based on a subclassing. This method doesn't need an additional hardware and can be applied to Web browsers that do not support ActiveX controls. As the users of Web browsers such as Firefox, Safari, Chrome etc. are increased, it is more required to have the keyboard security methods that are based on software and don't use ActiveX controls. Thus we developed the user mode keyboard security method that is based on a subclassing with plugins. Our method doesn't need an additional hardware module and is interoperable with general kernel mode security programs.

Preliminary Study on Soft Keyboard with Recommendation for Mobile Device (모바일 단말기를 위한 추천 소프트 키보드)

  • Hwang, Kitae;Lee, Jae-Moon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.137-145
    • /
    • 2013
  • Recently most mobile devices have soft keyboards on their LCD touch screens. Because of the tiny size of the touch screen of the soft keyboard, adjacent keys are mistakenly typed. Also utilizing a key for multiple key inputs causes key type errors. In this paper, we proposed an algorithm to recommend proper words to the user while the user continues to type keys, which helps to easily correct key type errors. In addition, we presented a soft keyboard called MissLess which implemented the recommendation algorithm. We evaluated recommendation performance of MissLess keyboard through experiments by using 3 test sets. The test results showed that the success ratio of recommendation reached up to about 90% although there were some differences between results. However it is needed to be considered that we recommended 4 words for an input word in this experiments.

Analysis of an Intrinsic Vulnerability on Keyboard Security (키보드 보안의 근본적인 취약점 분석)

  • Yim, Kang-Bin;Bae, Kwang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.89-95
    • /
    • 2008
  • This paper analyzes the intrinsic vulnerability problems of the authentication system for Internet commerce based on the ID and password strings gathered from the computer keyboard. Through the found vulnerability, it is easy to sniff user passwords as well as any other keyboard inputs even when each of the existing keyboard protection softwares is running. We propose several countermeasures against the possible attacks to the vulnerability at both points of the hardware and the software concerns. The more secure environment for Internet commerce is highly required by implementing the proposed countermeasures.