“19. The system according to claim 14, wherein any key logging malware active on the computer would receive the combined user input data and the random sequence of input events.” For more information, ...