์ ‘์ด‰์‹/๋น„์ ‘์ด‰์‹ ์นด๋“œ ๋ฆฌ๋”๊ธฐ ๋ฐ ์•”ํ˜ธํ™”๋œ ํ‚ค ์ „์†ก

CHERRY SECURE BOARD 1.0

CHERRY Secure Board 1.0

CHERRY SECURE BOARD 1.0์€ ์Šค๋งˆํŠธ์นด๋“œ ๋ฐ RF/NFC ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ์‚ฌ์šฉํ•˜๋Š” ์นด๋“œ/ํƒœ๊ทธ์šฉ ๋ฆฌ๋”๊ธฐ๊ฐ€ ํ†ตํ•ฉ๋œ ์ธ์ฒด๊ณตํ•™์  ํ‚ค๋ณด๋“œ์ž…๋‹ˆ๋‹ค. ๋ณด์•ˆ์„ฑ๊ณผ ๊ธฐ๋ฐ€์„ฑ์„ ๊ฐ•ํ™”ํ•˜๊ธฐ ์œ„ํ•ด ํ‚ค๋ณด๋“œ๋Š” ๋ณด์•ˆ ๋ชจ๋“œ๋กœ ์ „ํ™˜ํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ด ๋ชจ๋“œ์—์„œ๋Š” ์žฅ์น˜๊ฐ€ ์ธ์ฆ์„œ๋ฅผ ํ†ตํ•ด ์Šค์Šค๋กœ๋ฅผ ์ธ์ฆํ•˜๊ณ  ํ‚ค ์ž…๋ ฅ์ด ์•”ํ˜ธํ™”๋˜์–ด ์ „์†ก๋ฉ๋‹ˆ๋‹ค. ์ด๋กœ ์ธํ•ด ํ•˜๋“œ์›จ์–ด ํ‚ค๋กœ๊ฑฐ๋Š” ๋ฌด๋ ฅํ™”๋˜๋ฉฐ, ํ‘œ์ค€ ํ‚ค๋ณด๋“œ ์ฑ„๋„์ด ์ฐจ๋‹จ๋˜๊ธฐ ๋•Œ๋ฌธ์— BadUSB ๊ณต๊ฒฉ ๋˜ํ•œ ์‹คํ–‰๋  ์ˆ˜ ์—†์Šต๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ๊ธฐ๋Šฅ์€ ๊ด€๋ จ ์†Œํ”„ํŠธ์›จ์–ด๊ฐ€ ํƒ‘์žฌ๋œ ์”ฌ ํด๋ผ์ด์–ธํŠธ ํ™˜๊ฒฝ์—์„œ ํŠนํžˆ ํšจ๊ณผ์ ์œผ๋กœ ํ™œ์šฉ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

ํ•˜์ด๋ผ์ดํŠธ

  • PC/SC ์Šค๋งˆํŠธ์นด๋“œ ๋ฆฌ๋”, CCID ํ˜ธํ™˜
  • ํ”„๋กœํ† ์ฝœ: T=0, T=1, T=CL
  • ISO 7816 ๋ฐ ISO 14443 A/B ๊ทœ๊ฒฉ ์นด๋“œ ์ฝ๊ธฐ/์“ฐ๊ธฐ
  • FIDO2 NFC ํ† ํฐ ์ฝ๊ธฐ/์“ฐ๊ธฐ
  • ์Šฌ๋ฆผํ•œ ๋””์ž์ธ, ๋‚ฎ์€ ์นฉ์นด๋“œ ์ ‘์  ๋ชจ๋“ˆ
  • FIPS-201 ์š”๊ตฌ์‚ฌํ•ญ ์ถฉ์กฑ
  • DIN/GS ๊ทœ๊ฒฉ ๋ ˆ์ด์•„์›ƒ ๋ฐ BGI-650 ์ธ์ฒด๊ณตํ•™ ๊ฐ€์ด๋“œ ์ค€์ˆ˜ DE ๋ฒ„์ „
  • ์นฉ์นด๋“œ ๋ชจ๋“ˆ์˜ ํ•œ ์† ์กฐ์ž‘ ๊ฐ€๋Šฅ
  • ์ธ์ฆ ๋ฐ ์•”ํ˜ธํ™”๋ฅผ ํ†ตํ•œ ๋ณด์•ˆ ๋ชจ๋“œ, ํŠนํžˆ ์”ฌ ํด๋ผ์ด์–ธํŠธ ํ™˜๊ฒฝ์—์„œ ์œ ์šฉ
Secure Board 1.0
Robust keyboard with dual-interface card reader

CHERRY SECURE BOARD 1.0

A central component of modern security concepts is the authentication of users and the authorization of access. Passwords have long since ceased to provide comprehensive access protection - they are all too easily forgotten, changed too infrequently or inadvertently disclosed to third parties due to carelessness. 

State of the art, especially in highly sensitive areas, is often two-factor authentication using a smart card. CHERRY follows the โ€œmake two into oneโ€ approach here and offers a space-saving alternative with the KC 1000 SC and the SECURE BOARD 1.0, in which the card reader is integrated into the keyboard.

In addition, the SECURE BOARD 1.0 also has a contactless card reader located at the back of the keypad. This can also conveniently read RFID and NFC cards or tags contactless This equipment opens up a whole range of applications for the SECURE BOARD 1.0: ID card systems for closed user groups can be used via the keypad and company ID cards, for example, can be read. 

security keyboard

Security starts with the input device

We live in a digital world in which everyone is increasingly connected to everything - companies, authorities, institutions with citizens, partners, suppliers and customers. A fundamental element of any security strategy is controlling who has access to the respective IT infrastructure. Cyber security is still often seen as a software problem and assumes that endpoints for trusted applications are secure. However, input devices can also be gateways through which sensitive data input can be tapped before further security measures such as firewalls or virus scanners even take effect. Security keyboards such as the SECURE BOARD 1.0 from CHERRY provide a remedy here.

Insider attacks as one of the greatest sources of danger

Developments such as digitalization and big data and the exponentially growing mountains of data that come with them are arousing desires. Not only from cyber criminals attacking from outside the company, but also from malicious employees or external visitors - insiders who are after information from their employers, customers, partners and government agencies.

Most data breaches are committed by insiders.โ€‹

According to Verizon's "2024 Data Breach Investigations Reportโ€, insiders are responsible for 70% of incidents in the healthcare industry and 59% in the Public Sector. These breaches involved someone coming in from within the organization.

See how CHERRY products help you close the security breach!

In the past, the insider risk consisted of paper files, for example, which left the company unnoticed and without authorization. Today, the risk is many times higher - digital data, the most valuable asset in any company, often fits on a USB stick or can be removed directly from the company. 

In many cases, companies only tackle the problem on the software side. For example, intrusion and prevention systems should help to detect and analyze attacks from the inside at an early stage. In many cases, security starts at the input device.

The human factor: closing the gateway from the inside

Like the environment, the equipment should also be protected according to the security requirements. Possible threats include theft, sabotage, internal hacking or unauthorized access. Cyber criminals - whether malicious employees or external attackers - like to use keyloggers or BadUSB devices for this purpose. Sensitive data, passwords or access codes are tapped by manipulating the input device. This form of sabotage can be prevented comparatively simply but very effectively with the SECURE BOARD 1.0 from CHERRY. With the integrated secure mode, proof of authenticity of the device is certificate-based and key transmission is encrypted. This makes it impossible for hardware keyloggers to intercept sensitive access data and passwords. By blocking the standard keyboard channel, โ€œBadUSBโ€ attacks are also a thing of the past: USB sticks that log on to the system as a keyboard cannot inject uncontrolled input and malicious code.

Defense against malicious code from BadUSB devices

They are small, fit in trouser pockets and the palm of your hand and can transport huge amounts of data: USB sticks. If these mobile data carriers are used for data theft or other malicious actions, the USB sticks, which are neutral in themselves, quickly become a bad USB device. 

The problem is that each USB stick has its own controller and firmware in an area that is not visible to the normal user or the operating system. This means that manipulations cannot be detected. For example, the firmware of USB controllers and therefore the BIOS of USB devices can be read and changed. The communication of the USB controller with the host system is completely controlled here.

The manipulated firmware can then turn the USB stick into a network card or a keyboard and redirect or manipulate data traffic, or even inject malicious code into the computer. Unfortunately, existing USB devices can also be reprogrammed in this way and thus subsequently compromised. 

 The SECURE BOARD from CHERRY provides a remedy here: when the keyboard's secure mode is activated, the standard keyboard channel is blocked. This makes โ€œbad USBโ€ attacks a thing of the past. USB sticks that log on to the system as a keyboard cannot inject any uncontrolled input or malicious code. Well-known thin client manufacturers (e.g. IGEL) already support the use of secure mode and have integrated the necessary software for this. A corresponding solution for Windows will be available soon.

Protect sensitive data (passwords, emails) from hardware keyloggers

A keylogger is a piece of hardware or software that is used to log the user's entries on a computer keyboard and thus monitor or reconstruct them. Keyloggers are used, for example, by crackers, intelligence services or investigative authorities to obtain confidential data such as passwords or PINs. A keylogger can either record all entries or wait for specific keywords, such as access codes, and only then record them in order to save storage space. 

Hardware keyloggers are plugged directly between the keyboard and the computer and can therefore be installed within seconds. Devices that store the spied-out data in an integrated memory (RAM, EPROM, etc.) are then removed again later. The entries logged by them are then read out on another computer. Other techniques send the logged data via networks or wirelessly.

The keylogging scenario

How the CHERRY SECURE BOARD 1.0 protects sensitive data

With the SECURE BOARD 1.0, CHERRY has a solution in its portfolio that effectively eliminates precisely these threats posed by hardware keyloggers: With the secure mode, the device's proof of authenticity is certificate-based and key transmission is encrypted. This makes it impossible for hardware keyloggers to intercept sensitive access data and passwords.

The CHERRY SECURE BOARD 1.0 offers first-class security features and reliable performance, ideal for use in sensitive and demanding work environments.

Further chip card-based applications and advantages of the dual-interface feature can be found here:

์†์„ฑ

๋ณด์ฆ 2๋…„ ๋ณด์ฆ
์†Œํ”„ํŠธ์›จ์–ด ์ง€์› CHERRY KEYS, PC/SC Diagnose Tool
ํ‚ค์บก์˜ ์žฌ์งˆ ABS
ํ‚ค ๋ผ๋ฒจ๋ง ๋ ˆ์ด์ € ์—์นญ
ํŠน์ˆ˜ ํ‚ค ๊ธฐ๋Šฅ ๊ณ„์‚ฐ๊ธฐ, ์ด๋ฉ”์ผ ํ”„๋กœ๊ทธ๋žจ, ๋ธŒ๋ผ์šฐ์ €, PC ์ž ๊ธˆ
์Šคํƒ ๋”ฉ ํ”ผํŠธ ํ†ตํ•ฉ
์ƒํƒœ LED ํ•˜์šฐ์ง• ๋‚ด
๋ฒ„ํŠผ ๊ธฐ์ˆ  ๊ณ ๋ฌด๋”
๋ฒ„ํŠผ ์ŠคํŠธ๋กœํฌ ์ด ์ด๋™ ๊ฑฐ๋ฆฌ 3 mm
์ดˆ๊ธฐ ์ด๋™ 2,5 mm
์ž‘๋™๋ ฅ(cN) 70 cN
Service life per key (in million strokes) 1000๋งŒํšŒ ์ž‘๋™
์Šค์œ„์นญ ํŠน์„ฑ ํ‘œ์ค€
Keyboard format ํ’€์‚ฌ์ด์ฆˆ(100%)
ํ†ตํ•ฉ ๋ฉ”ํƒˆ ํ”Œ๋ ˆ์ดํŠธ ์˜ˆ
N-Key ๋กค์˜ค๋ฒ„ ์•„๋‹ˆ์š”
์•ˆํ‹ฐ ๊ณ ์ŠคํŒ… ์•„๋‹ˆ์š”
ํ‚ค ์•”ํ˜ธํ™” Cha Cha 20
์‘๋‹ต ์‹œ๊ฐ„ 3-5ms
๋‚ด๋ถ€ ๋ฉ”๋ชจ๋ฆฌ ์•„๋‹ˆ์š”
์šด์˜ ์ฒด์ œ Linux, Mac OS, Windows Vista(64๋น„ํŠธ), Windows XP, Windows XP(64๋น„ํŠธ), Windows 7, Windows 8, Windows 10, Windows 11
System Requirements-Hardware USB-A
ํฌ์žฅ์„ ์ œ์™ธํ•œ ์ œํ’ˆ ๊ธธ์ด 458 mm
ํฌ์žฅ์„ ์ œ์™ธํ•œ ์ œํ’ˆ์˜ ๋„ˆ๋น„ 188 mm
ํฌ์žฅ์„ ์ œ์™ธํ•œ ์ œํ’ˆ์˜ ๋†’์ด 46 mm
์ œ๊ณต ๋ฒ”์œ„ ๋งค๋‰ด์–ผ, ํ‚ค๋ณด๋“œ
์กฐ๋ช… ์•„๋‹ˆ์š”

๋ฐฐ์†ก ๋ฒ”์œ„

  • ๋งค๋‰ด์–ผ
  • ํ‚ค๋ณด๋“œ
์ œํ’ˆ ๋ฒˆํ˜ธ ๋ ˆ์ด์•„์›ƒ ์ƒ‰์ƒ
JK-A0400BE-2
EAN: 4025112090615
๋ฐ์ดํ„ฐ์‹œํŠธ
BE (๋ฒจ๊ธฐ์—) ๋ธ”๋ž™
JK-A0400CH-2
EAN: 4025112090516
๋ฐ์ดํ„ฐ์‹œํŠธ
CH(์Šค์œ„์Šค) ๋ธ”๋ž™
JK-A0400DE-2
EAN: 4025112090127
๋ฐ์ดํ„ฐ์‹œํŠธ
DE(๋…์ผ) ๋ธ”๋ž™
JK-A0400ES-2
EAN: 4025112090530
๋ฐ์ดํ„ฐ์‹œํŠธ
ES(์ŠคํŽ˜์ธ) ๋ธ”๋ž™
JK-A0400EU-2
EAN: 4025112090141
๋ฐ์ดํ„ฐ์‹œํŠธ
EU(๋ฏธ๊ตญ+์œ ๋กœ-๊ธฐํ˜ธ) ๋ธ”๋ž™
JK-A0400FR-2
EAN: 4025112090554
๋ฐ์ดํ„ฐ์‹œํŠธ
FR(ํ”„๋ž‘์Šค) ๋ธ”๋ž™
JK-A0400GB-2
EAN: 4025112090578
๋ฐ์ดํ„ฐ์‹œํŠธ
GB(์˜๊ตญ) ๋ธ”๋ž™
JK-A0400IT-2
EAN: 4025112090592
๋ฐ์ดํ„ฐ์‹œํŠธ
IT(์ดํƒˆ๋ฆฌ์•„) ๋ธ”๋ž™
JK-A0400PN-2
EAN: 4025112091421
๋ฐ์ดํ„ฐ์‹œํŠธ
PN(ํŒฌ๋…ธ๋ฅด๋”•) ๋ธ”๋ž™
JK-A0400BE-0
EAN: 4025112090608
๋ฐ์ดํ„ฐ์‹œํŠธ
BE (๋ฒจ๊ธฐ์—) ํšŒ์ƒ‰
JK-A0400CH-0
EAN: 4025112090509
๋ฐ์ดํ„ฐ์‹œํŠธ
CH(์Šค์œ„์Šค) ํšŒ์ƒ‰
JK-A0400DE-0
EAN: 4025112090110
๋ฐ์ดํ„ฐ์‹œํŠธ
DE(๋…์ผ) ํšŒ์ƒ‰
JK-A0400ES-0
EAN: 4025112090523
๋ฐ์ดํ„ฐ์‹œํŠธ
ES(์ŠคํŽ˜์ธ) ํšŒ์ƒ‰
JK-A0400EU-0
EAN: 4025112090134
๋ฐ์ดํ„ฐ์‹œํŠธ
EU(๋ฏธ๊ตญ+์œ ๋กœ-๊ธฐํ˜ธ) ํšŒ์ƒ‰
JK-A0400FR-0
EAN: 4025112090547
๋ฐ์ดํ„ฐ์‹œํŠธ
FR(ํ”„๋ž‘์Šค) ํšŒ์ƒ‰
JK-A0400GB-0
EAN: 4025112090561
๋ฐ์ดํ„ฐ์‹œํŠธ
GB(์˜๊ตญ) ํšŒ์ƒ‰
JK-A0400IT-0
EAN: 4025112090585
๋ฐ์ดํ„ฐ์‹œํŠธ
IT(์ดํƒˆ๋ฆฌ์•„) ํšŒ์ƒ‰
JK-A0400PN-0
EAN: 4025112094958
๋ฐ์ดํ„ฐ์‹œํŠธ
PN(ํŒฌ๋…ธ๋ฅด๋”•) ํšŒ์ƒ‰