接触型/非接触型カードリーダーおよび暗号化されたキー送信

CHERRY SECURE BOARD 1.0

CHERRY Secure Board 1.0

CHERRY SECURE BOARD 1.0は、スマートカードおよびRF/NFCインターフェース対応のカードやタグに対応したリーダーを内蔵したエルゴノミクスキーボードです。 セキュリティと機密性をさらに高めるため、本製品はセキュアモードに切り替えることが可能です。 このモードでは、デバイス自体が証明書を用いて認証を行い、キー伝送は暗号化されます。 これにより、ハードウェアキーロガーは無効化され、また標準のキーボードチャネルがロックされるため、BadUSB攻撃も実行不可能になります。 これらの機能を活用するには、必要なソフトウェアが統合されたシンクライアント環境が特に適しています。

特長

  • PC/SC スマートカードリーダー、CCID 互換
  • プロトコル:T=0、T=1、T=CL
  • ISO 7816 および ISO 14443 A/B 準拠カードの読み書き
  • FIDO2 NFC トークンの読み書き
  • フラットデザイン、低背型チップカード接点ユニット
  • FIPS-201 要件に準拠
  • DIN/GS 準拠レイアウトの DE バージョン、BGI-650 人間工学ガイドラインに準拠
  • チップカードモジュールは片手操作可能
  • 特にシンクライアントでの認証および暗号化によるセキュアモード
Secure Board 1.0
Robust keyboard with dual-interface card reader

CHERRY SECURE BOARD 1.0

A central component of modern security concepts is the authentication of users and the authorization of access. Passwords have long since ceased to provide comprehensive access protection - they are all too easily forgotten, changed too infrequently or inadvertently disclosed to third parties due to carelessness. 

State of the art, especially in highly sensitive areas, is often two-factor authentication using a smart card. CHERRY follows the “make two into one” approach here and offers a space-saving alternative with the KC 1000 SC and the SECURE BOARD 1.0, in which the card reader is integrated into the keyboard.

In addition, the SECURE BOARD 1.0 also has a contactless card reader located at the back of the keypad. This can also conveniently read RFID and NFC cards or tags contactless This equipment opens up a whole range of applications for the SECURE BOARD 1.0: ID card systems for closed user groups can be used via the keypad and company ID cards, for example, can be read. 

security keyboard

Security starts with the input device

We live in a digital world in which everyone is increasingly connected to everything - companies, authorities, institutions with citizens, partners, suppliers and customers. A fundamental element of any security strategy is controlling who has access to the respective IT infrastructure. Cyber security is still often seen as a software problem and assumes that endpoints for trusted applications are secure. However, input devices can also be gateways through which sensitive data input can be tapped before further security measures such as firewalls or virus scanners even take effect. Security keyboards such as the SECURE BOARD 1.0 from CHERRY provide a remedy here.

Insider attacks as one of the greatest sources of danger

Developments such as digitalization and big data and the exponentially growing mountains of data that come with them are arousing desires. Not only from cyber criminals attacking from outside the company, but also from malicious employees or external visitors - insiders who are after information from their employers, customers, partners and government agencies.

Most data breaches are committed by insiders.​

According to Verizon's "2024 Data Breach Investigations Report”, insiders are responsible for 70% of incidents in the healthcare industry and 59% in the Public Sector. These breaches involved someone coming in from within the organization.

See how CHERRY products help you close the security breach!

In the past, the insider risk consisted of paper files, for example, which left the company unnoticed and without authorization. Today, the risk is many times higher - digital data, the most valuable asset in any company, often fits on a USB stick or can be removed directly from the company. 

In many cases, companies only tackle the problem on the software side. For example, intrusion and prevention systems should help to detect and analyze attacks from the inside at an early stage. In many cases, security starts at the input device.

The human factor: closing the gateway from the inside

Like the environment, the equipment should also be protected according to the security requirements. Possible threats include theft, sabotage, internal hacking or unauthorized access. Cyber criminals - whether malicious employees or external attackers - like to use keyloggers or BadUSB devices for this purpose. Sensitive data, passwords or access codes are tapped by manipulating the input device. This form of sabotage can be prevented comparatively simply but very effectively with the SECURE BOARD 1.0 from CHERRY. With the integrated secure mode, proof of authenticity of the device is certificate-based and key transmission is encrypted. This makes it impossible for hardware keyloggers to intercept sensitive access data and passwords. By blocking the standard keyboard channel, “BadUSB” attacks are also a thing of the past: USB sticks that log on to the system as a keyboard cannot inject uncontrolled input and malicious code.

Defense against malicious code from BadUSB devices

They are small, fit in trouser pockets and the palm of your hand and can transport huge amounts of data: USB sticks. If these mobile data carriers are used for data theft or other malicious actions, the USB sticks, which are neutral in themselves, quickly become a bad USB device. 

The problem is that each USB stick has its own controller and firmware in an area that is not visible to the normal user or the operating system. This means that manipulations cannot be detected. For example, the firmware of USB controllers and therefore the BIOS of USB devices can be read and changed. The communication of the USB controller with the host system is completely controlled here.

The manipulated firmware can then turn the USB stick into a network card or a keyboard and redirect or manipulate data traffic, or even inject malicious code into the computer. Unfortunately, existing USB devices can also be reprogrammed in this way and thus subsequently compromised. 

 The SECURE BOARD from CHERRY provides a remedy here: when the keyboard's secure mode is activated, the standard keyboard channel is blocked. This makes “bad USB” attacks a thing of the past. USB sticks that log on to the system as a keyboard cannot inject any uncontrolled input or malicious code. Well-known thin client manufacturers (e.g. IGEL) already support the use of secure mode and have integrated the necessary software for this. A corresponding solution for Windows will be available soon.

Protect sensitive data (passwords, emails) from hardware keyloggers

A keylogger is a piece of hardware or software that is used to log the user's entries on a computer keyboard and thus monitor or reconstruct them. Keyloggers are used, for example, by crackers, intelligence services or investigative authorities to obtain confidential data such as passwords or PINs. A keylogger can either record all entries or wait for specific keywords, such as access codes, and only then record them in order to save storage space. 

Hardware keyloggers are plugged directly between the keyboard and the computer and can therefore be installed within seconds. Devices that store the spied-out data in an integrated memory (RAM, EPROM, etc.) are then removed again later. The entries logged by them are then read out on another computer. Other techniques send the logged data via networks or wirelessly.

The keylogging scenario

How the CHERRY SECURE BOARD 1.0 protects sensitive data

With the SECURE BOARD 1.0, CHERRY has a solution in its portfolio that effectively eliminates precisely these threats posed by hardware keyloggers: With the secure mode, the device's proof of authenticity is certificate-based and key transmission is encrypted. This makes it impossible for hardware keyloggers to intercept sensitive access data and passwords.

The CHERRY SECURE BOARD 1.0 offers first-class security features and reliable performance, ideal for use in sensitive and demanding work environments.

Further chip card-based applications and advantages of the dual-interface feature can be found here:

仕様

ギャランティ 2年保証
ソフトウェアサポート CHERRY KEYS, PC/SC Diagnose Tool
キーキャップの材質 ABS
キーのラベリング レーザーエッチング
特殊キー機能 計算機, 電子メールプログラム, ブラウザ, 次のトラック
スタンディングフット 一体型
ステータスLED ハウジング内
ボタンテクノロジー ラバードーム
ボタンストローク 総移動量 3 mm
初期移動量 2,5 mm
作動力 (cN) 70 cN
Service life per key 1,000万回作動
スイッチング特性 スタンダード
Keyboard format フルサイズ(100%)
一体型メタルプレート はい
N-Key Rollover いいえ
アンチゴースト いいえ
キー暗号化 Cha Cha 20
応答時間 3-5 ms
内蔵メモリー いいえ
操作システム Linux, Mac OS, Windows Vista (64Bit), Windows XP, Windows XP (64Bit), Windows 7, Windows 8, Windows 10, Windows 11
System Requirements-Hardware USB-A
梱包なし製品の長さ 458 mm
梱包なしの製品の幅 188 mm
梱包なしの製品の高さ 46 mm
配送範囲 マニュアル, キーボード
照明 いいえ

同梱物

  • マニュアル
  • キーボード
品番 レイアウト カラー
JK-A0400BE-2
EAN: 4025112090615
データシート
BE(ベルギー) ブラック
JK-A0400CH-2
EAN: 4025112090516
データシート
CH(スイス) ブラック
JK-A0400DE-2
EAN: 4025112090127
データシート
DE(ドイツ) ブラック
JK-A0400ES-2
EAN: 4025112090530
データシート
ES(スペイン) ブラック
JK-A0400EU-2
EAN: 4025112090141
データシート
EU(米国+ €-シンボル) ブラック
JK-A0400FR-2
EAN: 4025112090554
データシート
FR(フランス) ブラック
JK-A0400GB-2
EAN: 4025112090578
データシート
GB(イギリス) ブラック
JK-A0400IT-2
EAN: 4025112090592
データシート
IT(イタリア) ブラック
JK-A0400PN-2
EAN: 4025112091421
データシート
PN (パンノルディック) ブラック
JK-A0400BE-0
EAN: 4025112090608
データシート
BE(ベルギー) 灰色
JK-A0400CH-0
EAN: 4025112090509
データシート
CH(スイス) 灰色
JK-A0400DE-0
EAN: 4025112090110
データシート
DE(ドイツ) 灰色
JK-A0400ES-0
EAN: 4025112090523
データシート
ES(スペイン) 灰色
JK-A0400EU-0
EAN: 4025112090134
データシート
EU(米国+ €-シンボル) 灰色
JK-A0400FR-0
EAN: 4025112090547
データシート
FR(フランス) 灰色
JK-A0400GB-0
EAN: 4025112090561
データシート
GB(イギリス) 灰色
JK-A0400IT-0
EAN: 4025112090585
データシート
IT(イタリア) 灰色
JK-A0400PN-0
EAN: 4025112094958
データシート
PN (パンノルディック) 灰色