Katana VentraIP

Keyboard technology

The technology of computer keyboards includes many elements. Many different keyboard technologies have been developed for consumer demands and optimized for industrial applications. The standard full-size (100%) computer alphanumeric keyboard typically uses 101 to 105 keys; keyboards integrated in laptop computers are typically less comprehensive.

This article is about the physical structure and electronic mechanisms of computer keyboards. For layout and behaviour in software, see Keyboard layout. For keyboards used in music, see Keyboard instrument.

Virtual keyboards, which are mostly accessed via a touchscreen interface, have no physical switches and provide artificial audio and haptic feedback instead. This variety of keyboard can prove useful, as it is not limited by the rigid nature of physical computer keyboards.


The majority of modern keyboards include a control processor and indicator lights to provide feedback to the user (and to the central processor) about what state the keyboard is in. Plug-and-play technology means that its "out of the box" layout can be notified to the system, making the keyboard immediately ready to use without the need for further configuration, unless the user so desires. This also enables manufacture of generic keyboards for a variety of language markets, that differ only in the symbols engraved on the keytops.

Keycaps[edit]

Keycaps are used on full-travel keyboards. While modern keycaps are typically surface-printed, they can also be double-shot molded, laser marked, dye sublimation printed, engraved, or made of transparent material with printed paper inserts. There are also keycaps which utilize thin shells that are placed over key bases, which were used on several IBM PC keyboards.


Switches allow for the removal and replacement of keycaps with a common stem type.

Stabilizers[edit]

Almost all keyboards which utilize keys 2 or more units in length (such as the typical space bar or enter key) use stabilizers. Various lubricants and padding techniques can be used to reduce the rattle of components.

Other parts [edit]

A modern PC keyboard typically includes a control processor and indicator lights to provide feedback to the user about what state the keyboard is in. Depending on the sophistication of the controller's programming, the keyboard may also offer other special features. The processor is usually a single chip 8048 microcontroller variant. The keyboard switch matrix is wired to its inputs and it processes the incoming keystrokes and sends the results down a serial cable (the keyboard cord) to a receiver in the main computer box. It also controls the illumination of the "caps lock", "num lock" and "scroll lock" lights.


A common test for whether the computer has crashed is pressing the "caps lock" key. The keyboard sends the key code to the keyboard driver running in the main computer; if the main computer is operating, it commands the light to turn on. All the other indicator lights work in a similar way. The keyboard driver also tracks the shift, alt and control state of the keyboard.

Other issues[edit]

Keystroke logging[edit]

Unencrypted Bluetooth keyboards are known to be vulnerable to signal theft for keylogging by other Bluetooth devices in range. Microsoft wireless keyboards 2011 and earlier are documented to have this vulnerability.[16]


Keystroke logging (often called keylogging) is a method of capturing and recording user keystrokes. While it can be used legally to measure employee activity, or by law enforcement agencies to investigate suspicious activities, it is also used by hackers for illegal or malicious acts. Hackers use keyloggers to obtain passwords or encryption keys.


Keystroke logging can be achieved by both hardware and software means. Hardware key loggers are attached to the keyboard cable or installed inside standard keyboards. Software keyloggers work on the target computer's operating system and gain unauthorized access to the hardware, hook into the keyboard with functions provided by the OS, or use remote access software to transmit recorded data out of the target computer to a remote location. Some hackers also use wireless keylogger sniffers to collect packets of data being transferred from a wireless keyboard and its receiver, and then they crack the encryption key being used to secure wireless communications between the two devices.


Anti-spyware applications are able to detect many keyloggers and remove them. Responsible vendors of monitoring software support detection by anti-spyware programs, thus preventing abuse of the software. Enabling a firewall does not stop keyloggers per se, but can possibly prevent transmission of the logged material over the net if properly configured. Network monitors (also known as reverse-firewalls) can be used to alert the user whenever an application attempts to make a network connection. This gives the user the chance to prevent the keylogger from "phoning home" with his or her typed information. Automatic form-filling programs can prevent keylogging entirely by not using the keyboard at all. Most keyloggers can be fooled by alternating between typing the login credentials and typing characters somewhere else in the focus window.[17]


Keyboards are also known to emit electromagnetic signatures that can be detected using special spying equipment to reconstruct the keys pressed on the keyboard. Neal O'Farrell, executive director of the Identity Theft Council, revealed to InformationWeek that "More than 25 years ago, a couple of former spooks showed me how they could capture a user's ATM PIN, from a van parked across the street, simply by capturing and decoding the electromagnetic signals generated by every keystroke," O'Farrell said. "They could even capture keystrokes from computers in nearby offices, but the technology wasn't sophisticated enough to focus in on any specific computer."[18]

List of mechanical keyboards

Keyboard layout

AZERTY

Keyboard mapping

List of keyboard switches