CN100362204C - Rotating disk managed anti-peep keying-in cipher key - Google Patents

Rotating disk managed anti-peep keying-in cipher key Download PDF

Info

Publication number
CN100362204C
CN100362204C CNB2004100266660A CN200410026666A CN100362204C CN 100362204 C CN100362204 C CN 100362204C CN B2004100266660 A CNB2004100266660 A CN B2004100266660A CN 200410026666 A CN200410026666 A CN 200410026666A CN 100362204 C CN100362204 C CN 100362204C
Authority
CN
China
Prior art keywords
spoon
key
rotating disk
bayonet socket
cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100266660A
Other languages
Chinese (zh)
Other versions
CN1676841A (en
Inventor
罗晓晖
罗凤禧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNB2004100266660A priority Critical patent/CN100362204C/en
Publication of CN1676841A publication Critical patent/CN1676841A/en
Application granted granted Critical
Publication of CN100362204C publication Critical patent/CN100362204C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Supports Or Holders For Household Use (AREA)

Abstract

The present invention relates to a rotary disk managed anti-peep keying-in cipher key, which is a metal product for helping the rank and file to national security, the volume is similar to that of an ordinary key, and the present invention can be conveniently carried and can prevent the damage and the leakage. The inner part of an arranged rotary disk sliding bush key plate is tunably inserted and clamped with a plurality of different key nails which can array a plurality of modes of tooth shapes, the tooth shapes represent different ciphers, the rotary disk sliding bush key plate is used for inserting and pushing locks or keyboards bespoke in various occasions by a user for handling affairs, the mutually unlocking rate is 1/100000000. Two members costing dozens of cents can replace a plurality of keys or magnetic cards, a keyboard of a cash machine or a telephone can be changed with thirty dollars, and the present invention is an innovatory cipher input mode which has the advantages of high efficiency, peep prevention, damage prevents and convenience; the present and ZL99206393.0 are matched to synthesize a cheaper and high energy antitheft lock by using three dollars, and a matched blueprint or sample is provided. The existing thief technique and electronic intelligent offenders can be suppressed. The arraying method of the cipher can be easily remembered by the blind, old people, and children and can prevent the cheat, a thief who does not know the unlocking cipher can not unlock the lock with the key, when the thief knows the cipher, the key is different, and the lock can not be unlocked. The user can easily remember the cipher and can purchase parts for matching the key, the worry of losing the key is greatly reduced, and computers, etc., only help good person to good turn.

Description

Rotating disk scheduling formula peep-proof key feeding cipher spoon
Affiliated technical field
The present invention is the little metal product that helps ordinary person and even state secret security personnel, in order to back down user's agreement be provided with demand maintain secrecy on security personnel's occasion or the facility lock or be disposed at the new-type keyboard of teller machine, replace press key-poking type input password and start working.
Background technology
Keyboards such as existing teller machine, the user is button input password character by character, and this had not only been peeped slowly but also easily and had been let out.03 about 23 o'clock of on December 4, Hong Kong Pei Cui TV just broadcasting crafty widening hole shooting signalling generator is arranged before keyboard, peep then and there know the user by sign indicating number fast robber's huge sum of money case, once heard this non-rare event at home and abroad.
Just be with the button electronic anti-theft door, all easily seeing before every fan has the playboy to know with the password unlatching that ought to only be ensured public security and just be known by the entrance guard.Almost do not have very anti-crafty function, return the user and bring many troubles and consumption.Listening has the people to say: just can guess password as long as smear a dirt liquid in keyboard.As seen this class now extensively adopt give again by mistake highly trust close that high-tech maintains secrecy by code system, as if improving, just must recruit to social trouble.
And the user also is no lack of when the time comes by error code and mistakes, and old dim eyesight person is more very.Copy and read just easier letting out of mnemonic(al) password, can predict with upgrading rare software code number again, definitely It dones't help the situation.Even if adopt extremely expensive finger-print cipher system, also having says so is not difficult that imitative seal falsely uses.The obvious encrypted message input that has no to screen is appointed to such an extent that crafty young examination is recklessly disorderly emitted, and unavoidable one loses.Buy back the release tricks of the trade if spend to produce house again to it, that more electronic just especially the thief just enough the time enough hearts know and known.If the thief slightly executes destruction when helpless, the user also be lose not low.The password of no wonder ensuring public security has become one of modern's worry.
Though besides the latent mandrel of the variable key that the ZL99206393.0 item provides has been got rid of the crisis of being peeped to the pellet shot from a slingshot built-in lock when lockset is dialled password, and has optimized the tamper-proof function of maintaining secrecy, its key is very inconvenient for the change code operations of the variable key that user's hand is dialled, and easily loses part; This spoon taken even if collude with oneself with the back inconvenience sign indicating number that disappears, and also easily stays the fraud that allows the thief peep sign indicating number.It does not more consider the function to the keyboard input password of electronic equipment.If will be whenever and wherever possible to keyboards such as certain teller machine input password, then its shortcoming more highlights.
Summary of the invention
Easily peeped the shortcoming that destroyed inconvenience is again used in order to overcome existing input cryptographic facility, the invention provides a kind of rotating disk scheduling formula peep-proof key feeding cipher spoon, its volume class as key be easy to collude with oneself and take loss prevention and let out, itself remove to represent corresponding password, peeped in the time of can preventing dial-up with regard to the adjustable tooth shapes that becomes.The thief who does not know unlock code obtains spoon and also fails to see usefulness; And the user easily purchases part with other special password and is made into spoon with hand, subtracts the sorrow of losing spoon greatly.Gold has kept the advantage of ZL99206393.0 item, has reformed structure again, and handled easily can be fast becomes sign indicating number and splits user's agreement and be equipped on lock or keyboard on different occasions or the facility, and two on body band can replace many keys commonly used or magnetic cards.More will never loose and take off wherein part, the very easily fast again dial-up vestige of eliminating after using.
The technical solution adopted for the present invention to solve the technical problems is:
Do a spoon plate with the thick rectangle 29 * 26mm of about 1mm sheet metal, nearly central authorities determine about φ 18mm macropore, and the hole periphery connects determines some radially stub mouths, but every bayonet socket sliding sleeve is gone into spoonful nail.The spoon plate connects intrinsic with the rectangle supporting spring, constitutes the middle crack cunning of two sheet materials and clips a spoon ailhead, and the length that allows spoon nail bar protrude from spoon plate one plane keeps stable.Each spoon nail shape has different, and just can form tooth shapes by the radially stub mouth that different order are arranged in spoon plate.Go back in the macropore of spoon plate sliding sleeve the rotating disk sheet only relatively spoon plate rotate as the plane.The spoon nail that this rotating disk periphery can withstand in the stub mouth radially locates.Rotating disk also is connected with some radially long bayonet sockets along periphery, when radially long and short bayonet socket on time, spoon nail can move along bayonet socket.When two spoons of nails move into two radially long bayonet sockets respectively, just can be rotated simultaneously with rotating disk and the radially stub mouth location order of exchanging two nail original places by folder, thereby modulation thread form.This sheet spoon is inserted the side slit of spoon box, relend the knob of companys of helping structure in the spoon box outside vertical push away spoon [be knob reference at Fig. 1 paper pusher spoon plate 1 before paper] be affixed to tapered end or keyboard just can push into yard.
The sheet spoon that constitutes like this, just very easily insert ad hoc screening and give the little slit that ZL992063930 tapered end or teller machine are offered by the outer spoon box of the keyboard [separate case is described in detail] of similar repacking, remove to push survey sense degree of the heading into device input cipher that tapered end or keyboard very easily establish with spoon nail thread form and handled affairs.
The invention has the beneficial effects as follows:
This sheet spoon minimum be convenient to ingeniously the user contact key commonly used collude with oneself take the time spent needn't with collude the body chaining and free, more needn't from key-ring, free.Be not difficult for being stolen and even being copied than more convenient more can not the damage of general key, this class function is more winning than magnetic card.
2. the user can have the sufficient time to set thread form correctly on this spoon in advance peep-proof, can insert in the very little slit, and it is tamper-proof to leave screened corresponding tapered end or keyboard peep-proof of very big chance, makes the extremely hidden quick fault-avoidance of its input cryptographic processes.Neither can stay and can let out a yard vestige, work efficiencies such as the bank of can heightening again also subtract the user greatly and operate the occupation of land space.
3. the easier modulation of thread form, order is just in case the thief also fails to see usefulness when obtaining spoon.And user Ze Gengyi recalls and specially joins in addition a spoon password and purchase the manual reprovision of part, the bigger sorrow of losing spoon that subtracts.
4. easier different profiles of spoon piece collection or the material of allowing of its operating principle formed thousand kinds of cochlears, and all part and production overall process can simple and easyly be born by hardware factory.As long as set four kinds of spoons nail, get altogether and do not surpass 14 various combinations and be arranged in ten short bayonet slot again or stay in six long bayonet slot, appear 1,000,000 kinds of thread forms [secret] with regard to mutability more than common six figure place sign indicating numbers.Multiply by thousands of kinds of cochlears again, its mutual opening rate has been exactly part per billion.Any secret degree is foot all! If increase spoon nail kind of number again or put spoon nail number, mutual opening rate just can be better than any imaginabale computer lock.Just by the simplest above-mentioned shape, several dollars are just produced a victory far away and now sell 200 dollars imported mechanical lock.
5. the spoon nail of its cartridge clip can not take off and lose, and the shape perception of more changing hands is other, so that the blind person also is easy to dial-up.Its group code method remembers easily flexibly that again for example " 2 change 8 " promptly exchanges the spoon nail of No. 2 and No. 8 stub mouths in original place can unblank; And for example " move back 4 ", promptly the spoon nail of No. 4 stub mouths in original place is moved to long bayonet socket and can open in addition again and locked.So analogize, Lian Laoyou also very easily remembers usefulness, needn't copy and read to cheated letting out.If want the encipherer, then can arbitrarily add change, for example " 2 change 8, move back 4,7 and change 6 ... " or the like, easily note is much easy-to-use generally to be applicable to the different retaining time comparable again six common figure place sign indicating numbers of demand.
6. but Lian Yi efficiently is applicable to the lock of machinery or electronic structure or the facility of teller machine telephone and various input passwords simultaneously, only is equipped with one and can opens the user and be located at everywhere cryptographic facility approximately, subtracts the burden of many keys, magnetic card greatly.Especially when being used in electronic equipment, can be equipped with two.Go into after sign indicating number handles affairs when one, another part inserts immediately and changes sign indicating number, fast later group of random erasion.Institute change sign indicating number in advance easily a note set correctly well and exempt to forget.Thereby very easily constitute incomparable senior secrecy system function, far away honest and clean in being better than by surveying the secrecy system of fingerprint, pupil or the like user's body information.Change to disturb because of any biological information all can be subjected to body condition, and the constant unlocking signal of any setting, the chance of being guessed right is all easily arranged, the society of especially numerous unemployments must have and countlessly want that the people who eats skilful meal is constantly guessing! As seen survey letter only according to electronics and come secret being difficult to reliably.The electronic security data of the Pentagon is also let out real front truck repeatly and should be reflected.
With regard to above-mentioned 6 aspects contrast ZL99206393.0 project, also can obvious the present invention very big innovation be arranged than its variable key, function has improved greatly.The secret standard of security personnel of must be big sharp modern commerce society promotes huge commercial opportunities.And this sheet spoon cost only is about several cents, and such lock that is used in the ordinary person door is three dollars only approximately, reequips teller machine configuration 36 dollars on keyboard [newly making by its operating principle can be more honest and cleaner], very easily penetration and promotion.You Li promotes domestic stable and united, and the security personnel that maintain secrecy surely console the popular feelings, and Qi Li founds the state.
Description of drawings
The present invention is further described below in conjunction with drawings and Examples:
Fig. 1 is that the rotating disk scheduling formula peep-proof key feeding cipher spoon that proposes according to the present invention is that will pressing to of embodiment waits to input the tapered end of password or the work plane of keyboard from up to down to insert certain slit working method, the forward projection's view in the time can being transferred sign indicating number.Fig. 2 is that the A-A of Fig. 1 is to view.This two figure ratio is 2: 1.
Fig. 3 is Fig. 1 No. 1 part time job figure in the same way the time.Fig. 4 is that the B-B of Fig. 3 is to view.Fig. 5 is that the C-C of Fig. 3 is to view.Fig. 6 is that the D-D of Fig. 3 is to view.
Fig. 7 is Fig. 1 No. 2 part time job figure in the same way the time.Fig. 8 is that the E of Fig. 7 is to view.
Fig. 9 is Fig. 13 and No. 4 part cooperating figure in the same way the time.Figure 10 is that the F-F of Fig. 9 is to view.
Figure 11 is Fig. 1 No. 6 part time job figure in the same way the time.Figure 12 is that the G of Figure 11 is to view.
Fig. 3 to 12 ratio is 4: 1.
Each is schemed same sequence number and represents same implication: 1, spoon plate, 2, spoon nail, 3, jack-post, 4, rotating disk, 5, bearing pin, 6, the lid page or leaf.7 to 27 is the shape and structure key elements on the corresponding part, rather than individual part.
This paper noun of locality is all with Fig. 1 reference, for example " reach " promptly shift to intraocular along the figure paper.
The specific embodiment
In the drawings, spoon plate 1 is cut out by firmer rectangular metal sheet and is pressed into " U " shape two-layer equation, and before the formation, back two width of cloth pitch of fins should be a bit larger tham the thickness of spoon nail 2 square toes 17.Preceding width of cloth sheet central authorities go up the place slightly and establish macropore 7, and connected entrance 9 can allow the spoon nail be inserted under the limit, hole; From then on cross 25 ° to 35 ° to the about revolution in both sides respectively along 7 peripheries again and offer some radially stub mouths 8 successively.Should be just can sliding sleeve go into the cross section of one 2 bar portion 18 and be advisable at every place 8.Back plane at 1 back panel and 7 concentric places width of cloth sheet before the big plane that antecurvature belling goes out round platform 12,12 should be parallel to approximately." U " shape mouth both sides of 1 also all establish curved button 16 and add weldering with help 1 before, the back panel adult that is connected is indeformable." U " shape turn of bilge 10 of 1 is gone up the both sides, place slightly and is all established clubfoot 11 and cooperate 10 inner surface chuck bearing pin 5 to locate, and adds weldering to help 10 enhancing degree in 11 ends.
Spoon nail 2 causes square toes 17 square bar 18 shapes that are connected by hard and wear-resisting metal.Each 18 length x of 2 should have several and add chamfering 19 in 18 ends and distinguishes.This example is established four kinds of x; Elder establishes 19 elder's triangles for four jiaos and establishes 19, and inferior short person establishes 19 for adjacent two jiaos, and the shortest person establishes 19 in single angle, and each nail can be established 0 to 10 confession again and select for use.And each 2 all the other size is identical.
Rotating disk 4 is by causing the disk shape with 1 sheet stock, and external diameter presses close to can add between 12 the big plane shim [common because of belonging to, this example is omitted, in full with] with 7 with matched in clearance 4 back planes, and pad makes 4 frontal planes parallel with 1 frontal plane.4 peripheries are along radially cutting out several radially long bayonet sockets 20.
Jack-post 3 is by causing two sections to be connected cylindricly than 1 soft slightly metal, its pillar slug is gone into 4 centre bores and made interference fit and penetrate 1 centre bore 13 again and make after the matched in clearance still surplus long slightly end 21 and struck slightly, and riveting connects 1 and 4 and only can relatively rotate flexibly.3 big shell of column be exposed to 4 frontal planes long with the longest 2 equal in length that are exposed to 1 frontal plane that are placed in 7.This huge pillar circumference annular knurl is convenient to turn.3 and 4 can add weldering even, but weld seam should not influence corresponding actions.
Each accessory size should guarantee to be enclosed within 2 in 20 can with 4 relative to 1 rotates and not be enclosed within the interference of 2 in 8; And 20 have an opportunity aligns 8 and allow 2 can move between the two; If 20 all do not line up at 8 o'clock, it is motionless being enclosed within 2 in 8; And these 2 contact with 1 or 4 all the time.
Like this 1,3 and 4 each one assemble, turn again and allow a place 20 aim at 9 just can therefrom to be inserted in one 2 companion 4 pivoted housings and to go into certain bar 8 and promptly prepare a tooth.Turn repeatedly and be inserted in 2 an amount of covers in corresponding 8, just can form required thread form.Seal 2 no longer deviating from that 9 orders are inserted in glue wax or tin at last, just constituted operative body of the present invention.When each 20 equal misalignment 8, just can work; Otherwise then can stir some 2 at 8 and 20 relative position, just can realize becoming thread form and remove to represent different passwords or disappeared sign indicating number.
This example is respectively selected three from four kind 2, establish ten 8 and six 20, appears 1,000,000 kinds of thread forms with regard to variable.If the different number of each choosing from four kind 2, as seen then have extremely multiple nail shape to mix thousand kinds of cochlears more again is unprecedented maintaining secrecy.
Its different cochlears are to use differently contoured formation by 1 periphery.Place, nearly angle, the both sides of this example 1 establishes cochlear lonely 15 and helps arc 14,14 is located at preceding partition everywhere, and 15 in back panel everywhere.Everywhere 14 and 15 not only plane curve have differently, and 15 all 14 positions, corner of blocking that are not subjected to can bend up 0 forward at random to 2mm.Form the three-dimensional curved different different cochlears that go out, order is outer, and to go into difficult seal imitative.Different cochlears will very easily be located at the outer backing pin retaining of oneself special-purpose tapered end working face and limit the different top in-degree on plane, 1 foremost, so that same 2 of existing together also has the different top in-degree.Have only cochlear, nail shape and thread form are all right, just can go into sign indicating number and unblank.
For the electric and electronic keyboard of public everywhere full unanimity, with regard to more convenient resistance or certain electromagnetism different parameters when surveying sensor and going to survey different cochlears and press close to spoon box or keyboard that adds, more can limit exactly only has same cochlear, and nail shape and thread form just can be gone into sign indicating number and handled affairs.
Lid page or leaf 6 causes the sheet of 1 rectangle together by plastics, and its thickness should equal 3 and expose 4 length.6 establish a macropore 24 and some apertures 23, with avoid 3 and each 2.Allow 6 can cover and be affixed on 1 frontal plane, form the very level and smooth rectangular block shape attractive in appearance of similar 29 * 26 * 5mm, more do not have the pointed tooth of stabbing skin more than general key.
Locate in the bottom near 1,6 also are provided with pivoted arm 27, to allow the 26 and 1 formation activity of wherein reaming of bearing pin 5 companies of wearing be hinged.Resemble 6 relative 1 to open as the page and be mutually 180 °, just can pinch 6 and support 1 to insert slit, can be more more convenient than key insertion key commonly used hole.This example is bottom-up insertion, this is just more hidden subtract again foreign matter plug resistance slit [certainly by the plug slit also can than common lockhole filled in easy-clear many].If be obedient to custom, also very easily change into from up to down or other inserted mode.As long as the spoon box caused to paste is connected in that tapered end or keyboard are outer can do that the plane rotates, conveniently allow the user take the inserted mode of different directions.It is right wherein having only a direction again, and this makes crafty Wen Gengnan catch mould.
From 5 farthest Yi Jiaochu, 6 also establish a cover button hole 25 makes things convenient for the user to collude band with oneself.Will with 25 near the place, corresponding 14 and 15 should open dark bigger breach on 1, avoid and link 25 key-ring and interfere.

Claims (3)

1. rotating disk scheduling formula peep-proof key feeding cipher spoon master is slided over by rotating disk and is clamping the spoon nail in spoon plate jointly and constitute, it is characterized in that: establish in the sheet spoon plate (1) that a macropore and a disk shape rotating disk (4) form revolute pair and inside and outside this circumference both sides respectively contract and cut more than four radially bayonet socket, and every bayonet socket can form moving sets with every spoon nail (2) respectively, this revolute pair do not influence by moving sets, and revolute pair is being controlled moving sets and can be moved and maybe can not move.
2. the described rotating disk of root a tree name claim 1 is dispatched formula peep-proof key feeding cipher spoon, it is characterized in that: spoon nail (2) that is placed in rotating disk (4) bayonet socket when rotating, is being not follow closely (2) interference with the spoon that is enclosed within a spoon plate (1) bayonet socket relative to spoon plate (1) with rotating disk (4) simultaneously.
3. the described rotating disk of root a tree name claim 1 is dispatched formula key feeding cipher spoon, it is characterized in that: the shape of contained many spoons nails (2) has different, and when rotating disk (4) bayonet socket was aimed at spoon plate (1) bayonet socket, spoon nail (2) that bayonet socket is aimed at every place can move along bayonet socket; Otherwise, be enclosed in that spoon nail (2) in a spoon plate (1) bayonet socket is being kept off by the external diameter of rotating disk (4) and relatively spoon plate (1) locate.
CNB2004100266660A 2004-03-30 2004-03-30 Rotating disk managed anti-peep keying-in cipher key Expired - Fee Related CN100362204C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100266660A CN100362204C (en) 2004-03-30 2004-03-30 Rotating disk managed anti-peep keying-in cipher key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100266660A CN100362204C (en) 2004-03-30 2004-03-30 Rotating disk managed anti-peep keying-in cipher key

Publications (2)

Publication Number Publication Date
CN1676841A CN1676841A (en) 2005-10-05
CN100362204C true CN100362204C (en) 2008-01-16

Family

ID=35049556

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100266660A Expired - Fee Related CN100362204C (en) 2004-03-30 2004-03-30 Rotating disk managed anti-peep keying-in cipher key

Country Status (1)

Country Link
CN (1) CN100362204C (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4686358A (en) * 1984-03-15 1987-08-11 Bauer Kaba Ag Programmable electronic-mechanical reversing flat key interactively communicatable with data processing means
CN2419326Y (en) * 1999-03-28 2001-02-14 罗晓晖 Embedded lock with axical balls and hiding core with variable keys
CN2526396Y (en) * 2002-03-06 2002-12-18 梁照源 Key for puzzle lock
CN1482330A (en) * 2002-09-10 2004-03-17 金 林 A novel electronic lock

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4686358A (en) * 1984-03-15 1987-08-11 Bauer Kaba Ag Programmable electronic-mechanical reversing flat key interactively communicatable with data processing means
CN2419326Y (en) * 1999-03-28 2001-02-14 罗晓晖 Embedded lock with axical balls and hiding core with variable keys
CN2526396Y (en) * 2002-03-06 2002-12-18 梁照源 Key for puzzle lock
CN1482330A (en) * 2002-09-10 2004-03-17 金 林 A novel electronic lock

Also Published As

Publication number Publication date
CN1676841A (en) 2005-10-05

Similar Documents

Publication Publication Date Title
US5193114A (en) Consumer oriented smart card system and authentication techniques
CN101351826B (en) Method and apparatus for verifying a person's identity or entitlement using one-time transaction codes
CN1100303C (en) Electronic wallet and method of operation of the same
US6257486B1 (en) Smart card pin system, card, and reader
TW565786B (en) Electronic transaction systems and methods therefor
CN101233469B (en) Memory lock system
TW527568B (en) Fingerprint comparison system
TW487864B (en) Electronic transaction systems and methods therefor
US20180047014A1 (en) Multi-Function Data Key
US5538291A (en) Anti-theft credit card
US20090106042A1 (en) System for product authentication by mobile phone
US20070145121A1 (en) Authentication system for the authorization of a transaction using a credit card, ATM card, or secured personal ID card
TW201038039A (en) Improvements relating to multifunction authentication systems
CN103714626A (en) Multi-password pre-warning type bank card capable of being controlled by different card
GB2433147A (en) A method for verifying a person's identity or entitlement using one-time transaction codes
US20090204417A1 (en) System for product authentication using covert codes
CN100362204C (en) Rotating disk managed anti-peep keying-in cipher key
KR101226316B1 (en) Avs for confirming authenticity of various products through verification of uniquely dedicated password and serial number and releasing the pre installed lock on the product, for generating newly created password databases and updating unlocking release number in case of loss of password information databases, and authenticity verification method by obtaining the unlocking release number
JP2005004333A (en) Personal identification method
TWI375747B (en) Combination lock
JP2008106509A (en) Door key system
CN201063151Y (en) Upside down whole-shielding cipher input keyboard
JP2006235694A (en) Password code authentication system
JP2524331Y2 (en) Key card
JPS6279565A (en) Applying method for password number in credit card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080116

Termination date: 20100330