CN108073835B - Password mapping method, system and keyboard - Google Patents

Password mapping method, system and keyboard Download PDF

Info

Publication number
CN108073835B
CN108073835B CN201810005943.1A CN201810005943A CN108073835B CN 108073835 B CN108073835 B CN 108073835B CN 201810005943 A CN201810005943 A CN 201810005943A CN 108073835 B CN108073835 B CN 108073835B
Authority
CN
China
Prior art keywords
key
contact
fingerprint information
user
keyboard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810005943.1A
Other languages
Chinese (zh)
Other versions
CN108073835A (en
Inventor
何丰宇
宋探
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Knownsec Information Technology Co Ltd
Original Assignee
Beijing Knownsec Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Knownsec Information Technology Co Ltd filed Critical Beijing Knownsec Information Technology Co Ltd
Priority to CN201810005943.1A priority Critical patent/CN108073835B/en
Publication of CN108073835A publication Critical patent/CN108073835A/en
Application granted granted Critical
Publication of CN108073835B publication Critical patent/CN108073835B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes

Abstract

The invention discloses a keyboard, comprising: the fingerprint sensor is arranged on each key; the operation recording module is suitable for recording the contact operation of a user on at least one key in a preset time interval in a first mode and acquiring the fingerprint information of the user through the fingerprint sensor on each key; determining the operation type of the contact operation according to the recorded contact operation and the acquired fingerprint information; the password mapping module is suitable for acquiring key values matched with the fingerprint information and the operation type in a prestored mapping table in a first mode; and the communication module is suitable for outputting the matched key values of the keys to the computing equipment connected with the keyboard in the first mode. The invention also discloses a corresponding password mapping method, equipment and a system.

Description

Password mapping method, system and keyboard
Technical Field
The invention relates to the technical field of computer security, in particular to a password mapping method, a password mapping system and a keyboard.
Background
Computing equipment has become an indispensable tool in work and life of people, and the use of the computing equipment brings convenience to life of people, and a keyboard is the most common and most main input equipment in the computing equipment, and English letters, numbers, punctuations and the like can be input into the computing equipment through the keyboard, so that commands, input data and the like can be sent to the computing equipment. The operator can conveniently use the keyboard and the display to talk with the computing equipment, modify and edit the program, and control and observe the operation of the computer. Therefore, the keyboard is the most common computer input device, and is widely applied to micro-computing devices and various terminal devices. However, since the conventional keyboard is open and visible to any user, when the user inputs personal privacy data (such as a password) through the keyboard, the user is easily peeped by others, which may cause privacy leakage.
Therefore, a more advanced keyboard is required.
Disclosure of Invention
To this end, the present invention provides a keyboard and password mapping scheme in an attempt to solve or at least alleviate at least one of the problems presented above.
According to an aspect of the present invention, there is provided a keyboard comprising: the fingerprint sensor is arranged on each key; the operation recording module is suitable for recording the contact operation of a user on at least one key in a preset time interval in a first mode and acquiring the fingerprint information of the user through the fingerprint sensor on each key; determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information; the password mapping module is suitable for acquiring key values matched with the fingerprint information and the operation type in a prestored mapping table in a first mode; and the communication module is suitable for outputting the matched key values of the keys to the computing equipment connected with the keyboard in the first mode.
Optionally, in the keyboard according to the present invention, the operation recording module is further adapted to record, in the second mode, a contact operation of the user on at least one key within a predetermined time interval, and acquire fingerprint information of the user via a fingerprint sensor on each key; determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information; recording the key value of a key subsequently contacted by a user; the password mapping module is further adapted to store the recorded key values in the mapping table in association with the fingerprint information and the operation type in the second mode.
Optionally, in the keyboard according to the present invention, the password mapping module is further adapted to query whether there is a key value of a key matching the fingerprint information and the operation type in the mapping table before storing; if yes, prompting the user to change the operation.
Optionally, in the keyboard according to the present invention, the communication module is further adapted to output key values pressed by the user to a computing device connected to the keyboard in the third mode.
Optionally, in the keyboard according to the present invention, a mode switching module is further included, which is adapted to receive a specific operation of the keyboard by the user, and perform mode switching accordingly.
Optionally, in the keyboard according to the present invention, the operation recording module is adapted to record, for each key, the number of times of contact with the key by the user within a predetermined time interval, and/or the duration of each contact with the key, and/or the time of each contact with the key in the first mode or the second mode; and determining the operation type of the contact operation according to the fingerprint information, the contact times, and/or the contact time of each key.
According to another aspect of the present invention, there is provided a password mapping method, adapted to be performed in a keyboard having a fingerprint sensor disposed on each key, the method comprising the steps of: in a first mode, recording the contact operation of a user on at least one key within a preset time interval, and acquiring fingerprint information of the user through a fingerprint sensor on each key; determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information; acquiring key values matched with the fingerprint information and the operation types in a pre-stored mapping table; and outputting the matched key values of the keys to a computing device connected with the keyboard.
According to another aspect of the present invention, there is provided a password mapping method, adapted to be performed in a keyboard having a fingerprint sensor disposed on each key, the method comprising the steps of: in a first mode, recording the contact operation of a user on at least one key within a preset time interval, and acquiring fingerprint information of the user through a fingerprint sensor on each key; determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information; and transmitting the fingerprint information and the operation type to a predetermined server.
According to another aspect of the present invention, there is provided a password mapping method, adapted to be executed in a server, where the server stores a mapping table, and the mapping table records key values of a keyboard, and fingerprint information and operation types matched with the key values, and the method includes: receiving fingerprint information acquired based on a contact operation of a user on a keyboard and an operation type to which the contact operation belongs; and acquiring a key value of the key matched with the received fingerprint information and the operation type in the mapping table.
According to another aspect of the present invention, there is provided a keyboard comprising: the fingerprint sensor is arranged on each key; the operation recording module is suitable for recording the contact operation of a user on at least one key in a preset time interval in a first mode and acquiring the fingerprint information of the user through the fingerprint sensor on each key; determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information; and a communication unit adapted to transmit the fingerprint information and the operation type to a predetermined server in the first mode.
According to another aspect of the present invention, there is provided a password mapping apparatus, residing in a server, and including: the communication module is suitable for receiving fingerprint information acquired based on contact operation of a user on a keyboard and an operation type to which the contact operation belongs; the server storage module is suitable for storing a mapping table, and the mapping table records key values of a keyboard, fingerprint information matched with the key values and operation types; and the password mapping module is suitable for acquiring the key values of the keys matched with the received fingerprint information and the operation types in the mapping table.
According to still another aspect of the present invention, there is provided a cryptographic mapping system comprising: a keyboard according to the present invention; and a cryptographic mapping device according to the invention.
According to the keyboard and password mapping scheme, the fingerprint sensor of each key on the keyboard is used for acquiring the fingerprint information of the user, and the corresponding key value of the key is acquired in the mapping table according to the operation type and the fingerprint information of the contact operation of the user on the key, so that the problem that the password is peeped and leaked is effectively solved.
Furthermore, the operation type and the fingerprint information of the touch operation of the user on the key can be sent to the preset server for mapping, so that the security of the password is further improved, and the risks of account embezzlement and the like caused by password leakage are avoided.
Drawings
To the accomplishment of the foregoing and related ends, certain illustrative aspects are described herein in connection with the following description and the annexed drawings, which are indicative of various ways in which the principles disclosed herein may be practiced, and all aspects and equivalents thereof are intended to be within the scope of the claimed subject matter. The above and other objects, features and advantages of the present disclosure will become more apparent from the following detailed description read in conjunction with the accompanying drawings. Throughout this disclosure, like reference numerals generally refer to like parts or elements.
FIG. 1 illustrates a block diagram of a cryptographic mapping system 100 according to an exemplary embodiment of the present invention;
FIG. 2 illustrates a block diagram of a keyboard 200 according to an exemplary embodiment of the present invention;
FIG. 3 illustrates a block diagram of a cryptographic mapping apparatus 300 according to an exemplary embodiment of the invention;
FIG. 4 shows a block diagram of a keyboard 400 according to an exemplary embodiment of the present invention;
FIG. 5 illustrates a flow diagram of a method 500 of cryptographic mapping in accordance with an exemplary embodiment of the invention;
FIG. 6 illustrates a flow diagram of a method 600 of cryptographic mapping in accordance with an exemplary embodiment of the invention; and
FIG. 7 shows a flowchart of a method 700 of cryptographic mapping according to an example embodiment of the invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
FIG. 1 shows a block diagram of a cryptographic mapping system 100 according to an example embodiment of the invention. As shown in FIG. 1, the password mapping system 100 includes a keyboard 200 coupled to a computing device and a password mapping device 300. Where password mapping device 300 resides in a server and is connected to a computing device connected to keyboard 200 via a network.
Fig. 2 shows a block diagram of a keyboard 200 according to an exemplary embodiment of the present invention. As shown in fig. 2, the keypad 200 may include a number of keys 210, an operation recording module 220, and a communication module 230. Each key 210 is provided with a fingerprint sensor 212, and the fingerprint sensor 212 can acquire fingerprint information of a finger on the key 210 where the finger is located.
The operation recording module 220 is connected to each key 210 and the fingerprint sensor 212 thereof, and can record the contact operation of the user on at least one key 210 within a predetermined time interval (typically 2-4 seconds) in the first mode, and acquire the fingerprint information of the user within the predetermined time interval via the fingerprint sensor 212 on the at least one key 210. Specifically, recording the user's contact operation of at least one key 210 within the predetermined time interval may include recording, for each key 210 contacted by the user, the number of times the user makes contact with the key 210 within the predetermined time interval, and/or the duration of each contact with the key 210, and/or the time of each contact with the key.
Then, the operation recording module 220 may determine an operation type to which the contact operation belongs, based on the recorded contact operation and the acquired fingerprint information. First, the operation recording module 220 may determine whether the user performs a contact operation on one key or a plurality of keys within a predetermined time interval. If a touch operation is performed on a key, the operation types may include, for example, the following:
contacting with a key 210 for 1 time within a preset time interval, wherein the contact time with the key 210 does not exceed a preset time (usually 1-2 seconds), and the operation type is 1; 2 times of contact with one key 210 within a preset time interval, wherein the contact time with the key 210 each time does not exceed the preset time, and the fingerprint information acquired 2 times is the same and is an operation type 2; 2 times of contact with one key 210 within a preset time interval, wherein the contact time with the key 210 each time does not exceed the preset time, and the fingerprint information acquired 2 times is different and is an operation type 3; contacting with a key 210 for 1 time within a preset time interval, wherein the contact time with the key 210 exceeds a preset time, and the operation type is 4; 2 times of contact with one key 210 within a preset time interval, wherein the contact time with the key 210 each time exceeds the preset time, and the fingerprint information acquired 2 times is the same and is an operation type 5; and 2 times of contact with one key 210 in a preset time interval, wherein the contact time with the key 210 each time exceeds a preset time, and the fingerprint information acquired 2 times is different and is operation type 6. By analogy, there may be more operation types, which are not described in detail here.
If a plurality of keys are touched, the operation types may include, for example, the following:
the fingerprint sensor 210 is in contact with the two keys 210 for 1 time at the same time within a preset time interval, the contact time with each key 210 does not exceed the preset time, and the fingerprint information acquired by the fingerprint sensor 212 on each key 210 is different, and is operation type 7; the fingerprint sensor 210 is in contact with the two keys 210 for 1 time at the same time within a preset time interval, the contact time with each key 210 exceeds a preset time, and the fingerprint information acquired by the fingerprint sensor 212 on each key 210 is different, namely operation type 8; sequentially contacting the two keys 210 for 1 time within a preset time interval, wherein the contact time with each key 210 does not exceed a preset time, and the fingerprint information acquired by the fingerprint sensor 212 on each key 210 is different, and is an operation type 9; the two keys 210 are contacted with each other 1 time in sequence within the preset time interval, the contact time with each key 210 does not exceed the preset time, and the fingerprint information acquired by the fingerprint sensor 212 on each key 210 is the same, which is operation type 10. By analogy, there may be more operation types, which are not described in detail here.
Then, the communication module 230 connected to the operation recording module 220 may send the acquired fingerprint information and the determined operation type to a predetermined server in the first mode, so that the predetermined server maps the fingerprint information and the operation type to corresponding key values. The mapping relationship between the fingerprint information and the operation type and the key value of the key can be configured by a user in advance. According to an embodiment of the present invention, the operation recording module 220 may record a contact operation of the user on at least one key 210 within a predetermined time interval in the second mode, acquire fingerprint information of the user via the fingerprint sensor 212 on each key 210, and determine an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information. As above, recording the user's contact operation of at least one key 210 within the predetermined time interval may include recording, for each key 210 contacted by the user, the number of times the user makes contact with the key 210 within the predetermined time interval, and/or the duration of each contact with the key 210, and/or the time of each contact with the key.
Next, the operation recording module 220 records key values of a key subsequently contacted by the user (i.e., a key contacted by the user after a predetermined time interval). The communication unit 230 may transmit the recorded key values to the predetermined server in association with the fingerprint information and the operation type in the second mode, so that the predetermined server stores the fingerprint information and the operation type and the corresponding key values in the mapping table.
In addition, in consideration of the normal use requirement of the keyboard, according to an embodiment of the present invention, the communication module 230 may further output key values pressed by the user to the computing device connected to the keyboard 200 in the third mode. The keyboard 200 may further include a mode switching module adapted to receive a specific operation (e.g., pressing a specific key) of the keyboard by the user and perform mode switching accordingly.
Fig. 3 shows a block diagram of a structure of a password mapping apparatus 300 according to an exemplary embodiment of the present invention. The cryptographic mapping apparatus 300 resides in a server and may include a communication module 310, a server storage module 320, and a cryptographic mapping module 330.
The communication module 310 may receive fingerprint information acquired based on a contact operation of a user on a keyboard and an operation type to which the contact operation belongs, and key values associated therewith. The cryptographic mapping module 330 may store the key value to a mapping table in association with fingerprint information and an operation type. Before storing the mapping table, whether a key value of a key matched with the fingerprint information and the operation type exists in the mapping table can be inquired, if yes, a user is prompted to change the operation, and if not, the key value is stored in the mapping table. The server storage module 320 may store a mapping table, where the mapping table records key values of the keyboard, and fingerprint information and operation types matched with the key values.
The communication module 310 may further receive fingerprint information acquired based on a contact operation of the user on the keyboard 200 and an operation type to which the contact operation belongs, and the password mapping module 330 may further acquire a key value in a mapping table that matches the received fingerprint information and the operation type. Therefore, the mapping from the fingerprint information and the operation type to the key value of the key is completed in the server, the problem that the password is peeped and leaked is effectively solved, the security of password transmission is further improved, and the risks of account embezzlement and the like caused by password leakage are avoided.
Fig. 4 shows a block diagram of a keyboard 400 according to an exemplary embodiment of the present invention. The keyboard 400 includes a plurality of keys 410, an operation recording module 420, a communication module 430, and a password mapping module 440, wherein each key 410 has a fingerprint sensor 412 disposed thereon. The keyboard 400 and the keyboard 200 have the same corresponding modules and functions except for the difference between the password mapping module 440 and the communication module 430.
The keyboard 400 differs from the keyboard 200 in that: the password mapping module 440 is connected to the operation recording module 430, the operation recording module 430 records a contact operation of a user on at least one key at a predetermined time interval in the first mode, acquires fingerprint information of the user via a fingerprint sensor on each key, and after determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information, the password mapping module 440 may acquire a key value, which is matched with the fingerprint information and the operation type, in a pre-stored mapping table in the first mode. The communication module 430 may output the matched key values to a computing device connected to the keyboard 400 in the first mode.
Wherein the mapping table may be configured in the keyboard 400 by the user in advance. Specifically, the operation recording module 430 records the contact operation of the user on at least one key 410 within a predetermined time interval in the second mode, acquires fingerprint information of the user via the fingerprint sensor on each key 410, determines an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information, and records a key value of a key subsequently contacted by the user, and after the key value is recorded, the password mapping module 440 may store the recorded key value in the mapping table in association with the fingerprint information and the operation type in the second mode.
The password mapping module 440 may also query whether there is a keystroke key value matching the fingerprint information and the operation type in the mapping table before storing the mapping table. If yes, prompting the user to change the operation, and if not, storing the operation into the mapping table.
Therefore, the mapping from the fingerprint information and the operation type to the key value of the key is completed in the keyboard, and the problem that the password is peeped and leaked is effectively solved.
FIG. 5 shows a flowchart of a method 500 for cryptographic mapping in accordance with an example embodiment of the present invention. The password mapping method 500 is adapted to be performed in the keypad 400 having a fingerprint sensor disposed on each key and begins at step S510.
In step S510, in the first mode, within a predetermined time interval, a contact operation of a user on at least one key is recorded, and fingerprint information of the user is acquired via a fingerprint sensor on each key.
Then, in step S520, the operation type to which the contact operation belongs is determined based on the recorded contact operation and the acquired fingerprint information. Then, in step S530, key values matched with the fingerprint information and the operation type in the pre-stored mapping table are obtained. Finally, in step S540, the matched key values are output to the computing device connected to the keyboard 400. Here, steps S510 to S540 are all performed in the first mode.
According to an embodiment of the present invention, the method 500 for mapping a password may further include the steps of: in a second mode, within a preset time interval, recording the contact operation of a user on at least one key, and acquiring fingerprint information of the user through a fingerprint sensor on each key; determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information; recording the key value of a key subsequently contacted by a user; and storing the recorded key values in a mapping table in association with the fingerprint information and the operation types. Before storing the fingerprint information and the operation type into the mapping table, whether a key value matched with the fingerprint information and the operation type exists in the mapping table can be inquired; if yes, prompting the user to change the operation.
In the first mode or the second mode, the step of recording the contact operation of the user on the at least one key may include: for each key, recording the number of times the user contacts the key within a preset time interval, and/or the duration of each contact with the key, and/or the time of each contact with the key. In the first mode or the second mode, the step of determining an operation type to which the contact operation belongs from the recorded contact operation and the acquired fingerprint information may include: and determining the operation type of the contact operation according to the fingerprint information, the contact times, and/or the contact time of each key.
According to an embodiment of the present invention, the method 500 for mapping a password may further include the steps of: in the third mode, key values of keys pressed by the user are output to the computing device connected to the keyboard 400.
According to an embodiment of the present invention, the method 500 for mapping a password may further include the steps of: the specific operation of the keyboard 400 by the user is received, and the mode switching is performed accordingly.
FIG. 6 shows a flowchart of a method 600 for cryptographic mapping in accordance with an example embodiment of the present invention. The password mapping method 600 is adapted to be performed in the keypad 200 having a fingerprint sensor disposed on each key and begins with step S610.
In step S610, in the first mode, within a predetermined time interval, a contact operation of a user on at least one key is recorded, and fingerprint information of the user is acquired via a fingerprint sensor on each key.
Then, in step S620, the operation type to which the contact operation belongs is determined based on the recorded contact operation and the acquired fingerprint information. Finally, in step S630, the fingerprint information and the operation type are transmitted to a predetermined server. Here, steps S610 to S630 are all performed in the first mode.
According to an embodiment of the present invention, the method 600 for mapping a password may further include the steps of: in a second mode, within a preset time interval, recording the contact operation of a user on at least one key, and acquiring fingerprint information of the user through a fingerprint sensor on each key; determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information; recording the key value of a key subsequently contacted by a user; the recorded key values are transmitted to a predetermined server in association with fingerprint information and an operation type.
In the first mode or the second mode, the step of recording the contact operation of the user on the at least one key may include: for each key, recording the number of times the user contacts the key within a preset time interval, and/or the duration of each contact with the key, and/or the time of each contact with the key. In the first mode or the second mode, the step of determining an operation type to which the contact operation belongs from the recorded contact operation and the acquired fingerprint information may include: and determining the operation type of the contact operation according to the fingerprint information, the contact times, and/or the contact time of each key.
According to an embodiment of the present invention, the method 600 for mapping a password may further include the steps of: in the third mode, key values of keys pressed by the user are output to the computing device connected to the keyboard 400.
According to an embodiment of the present invention, the method 600 for mapping a password may further include the steps of: the specific operation of the keyboard 400 by the user is received, and the mode switching is performed accordingly.
FIG. 7 shows a flowchart of a method 700 of cryptographic mapping according to an example embodiment of the invention. The password mapping method 700 is suitable for being executed in a server, and the server stores a mapping table, wherein the mapping table records key values of a keyboard, and fingerprint information and operation types matched with the key values. The password mapping method 700 begins at step S710. In step S710, fingerprint information acquired based on a contact operation of a user on a keyboard and an operation type to which the contact operation belongs are received. Then, in step S720, a key value in the mapping table matching the received fingerprint information and the operation type is obtained.
According to an embodiment of the present invention, the method 700 for mapping a password may further include the steps of: receiving fingerprint information acquired based on contact operation of a user on a keyboard, an operation type to which the contact operation belongs, and key values associated with the operation type; and storing the key value of the key, the fingerprint information and the operation type in a mapping table in an associated manner.
It should be understood that the various techniques described herein may be implemented in connection with hardware or software or, alternatively, with a combination of both. Thus, the methods and apparatus of the present invention, or certain aspects or portions thereof, may take the form of program code (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium, wherein, when the program is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the invention.
In the case of program code execution on programmable computers, the computing device will generally include a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device. Wherein the memory is configured to store program code; the processor is configured to perform the various methods of the present invention according to instructions in the program code stored in the memory.
By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer-readable media includes both computer storage media and communication media. Computer storage media store information such as computer readable instructions, data structures, program modules or other data. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. Combinations of any of the above are also included within the scope of computer readable media.
It should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules or units or components of the devices in the examples disclosed herein may be arranged in a device as described in this embodiment or alternatively may be located in one or more devices different from the devices in this example. The modules in the foregoing examples may be combined into one module or may be further divided into multiple sub-modules.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
The present invention may further comprise: a4, the keyboard of any of a1-3, wherein the communication module is further adapted to output key values pressed by the user to a computing device connected to the keyboard in the third mode. A5, the keyboard as in any A1-4, further comprising: and the mode switching module is suitable for receiving the specific operation of the user on the keyboard and switching the modes according to the specific operation. A6 keyboard as in any one of a1-5, wherein the operation recording module is adapted to record, for each key, the number of times the user makes contact with the key within a predetermined time interval, and/or the duration of each contact with the key, and/or the time of each contact with the key in the first mode or the second mode; and determining the operation type of the contact operation according to the fingerprint information, the contact times, and/or the contact time of each key.
B9, the method according to B8, wherein the method further comprises the steps of: before storing the fingerprint information and the operation type into the mapping table, inquiring whether a key value matched with the fingerprint information and the operation type exists in the mapping table; if yes, prompting the user to change the operation. B10, the method according to any of B7-9, wherein the method further comprises the steps of: and in the third mode, outputting key values of keys pressed by a user to the computing equipment connected with the keyboard. B11, the method according to any of B7-10, wherein the method further comprises the steps of: and receiving the specific operation of the user on the keyboard, and switching the modes according to the specific operation. B12, the method according to any one of B7-11, wherein the step of recording the contact operation of the user on at least one key in the first mode or the second mode comprises: for each key, recording the contact times of a user with the key in a preset time interval, and/or the contact duration of each time with the key, and/or the contact time of each time with the key; the step of determining an operation type to which the contact operation belongs from the recorded contact operation and the acquired fingerprint information in the first mode or the second mode includes: and determining the operation type of the contact operation according to the fingerprint information, the contact times, and/or the contact time of each key.
C14, the method as claimed in C13, wherein the method further comprises the steps of: in a second mode, within a preset time interval, recording the contact operation of a user on at least one key, and acquiring fingerprint information of the user through a fingerprint sensor on each key; determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information; recording the key value of a key subsequently contacted by a user; and transmitting the recorded key value to a predetermined server in association with the fingerprint information and the operation type. D16, the method of D15, wherein the method further comprises the steps of: receiving fingerprint information acquired based on a contact operation of a user on a keyboard, an operation type to which the contact operation belongs, and key values associated with the operation type; and storing the key value, the fingerprint information and the operation type in the mapping table in an associated manner. E18, the keyboard of E17, wherein the operation recording module is further adapted to record the touch operation of the user on at least one key in the second mode within a preset time interval, and acquire the fingerprint information of the user via the fingerprint sensor on each key; determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information; recording the key value of a key subsequently contacted by a user; the communication unit is further adapted to transmit the recorded key value to a predetermined server in association with the fingerprint information and the operation type in the second mode. F20, the device as F19, wherein the communication module is further adapted to receive fingerprint information acquired based on a user's contact operation on a keyboard and an operation type, associated with the operation type, of the contact operation; the password mapping module is further adapted to store the key value to the mapping table in association with the fingerprint information and the operation type. Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
Furthermore, some of the described embodiments are described herein as a method or combination of method elements that can be performed by a processor of a computer system or by other means of performing the described functions. A processor having the necessary instructions for carrying out the method or method elements thus forms a means for carrying out the method or method elements. Further, the elements of the apparatus embodiments described herein are examples of the following apparatus: the apparatus is used to implement the functions performed by the elements for the purpose of carrying out the invention.
As used herein, unless otherwise specified the use of the ordinal adjectives "first", "second", "third", etc., to describe a common object, merely indicate that different instances of like objects are being referred to, and are not intended to imply that the objects so described must be in a given sequence, either temporally, spatially, in ranking, or in any other manner.
While the invention has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this description, will appreciate that other embodiments can be devised which do not depart from the scope of the invention as described herein. Furthermore, it should be noted that the language used in the specification has been principally selected for readability and instructional purposes, and may not have been selected to delineate or circumscribe the inventive subject matter. Accordingly, many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the appended claims. The present invention has been disclosed in an illustrative rather than a restrictive sense, and the scope of the present invention is defined by the appended claims.

Claims (21)

1. A keyboard, comprising:
the fingerprint sensor is arranged on each key;
an operation recording module adapted to, in a first mode,
recording the contact operation of a user on at least one key in a preset time interval, and acquiring the fingerprint information of the user through a fingerprint sensor on each key, wherein the contact operation comprises the number of times of contact of the user with the key in the preset time interval, and/or the time length of contact with the key every time, and/or the time of contact with the key every time;
determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information;
the password mapping module is suitable for acquiring a key value matched with the fingerprint information and the operation type in a prestored mapping table in a first mode; and
and the communication module is suitable for outputting the matched key values to the computing equipment connected with the keyboard in the first mode.
2. The keyboard of claim 1, wherein,
the operation recording module is further adapted to in a second mode,
recording the contact operation of a user on at least one key in a preset time interval, and acquiring fingerprint information of the user through a fingerprint sensor on each key;
determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information;
recording the key value of a key subsequently contacted by a user;
the password mapping module is further adapted to store the recorded key values in the mapping table in association with the fingerprint information and the operation type in a second mode.
3. The keyboard of claim 2, wherein,
the password mapping module is also suitable for inquiring whether a key value matched with the fingerprint information and the operation type exists in the mapping table or not before storage; if yes, prompting the user to change the operation.
4. The keyboard of any of claims 1-3,
the communication module is further adapted to output key values of keys pressed by a user to a computing device connected to the keyboard in a third mode.
5. The keyboard of claim 4, further comprising:
and the mode switching module is suitable for receiving the specific operation of the user on the keyboard and switching the modes according to the specific operation.
6. The keyboard of claim 5, wherein the operation recording module is adapted to record, in a first mode or a second mode,
for each key, recording the contact times of a user with the key in a preset time interval, and/or the contact duration of each time with the key, and/or the contact time of each time with the key;
and determining the operation type of the contact operation according to the fingerprint information, the contact times, and/or the contact time of each key.
7. A password mapping method is suitable for being executed in a keyboard with a fingerprint sensor arranged on each key, and comprises the following steps:
in the first mode of the operation, the first mode,
recording the contact operation of a user on at least one key in a preset time interval, and acquiring the fingerprint information of the user through a fingerprint sensor on each key, wherein the contact operation comprises the number of times of contact with the key in the preset time interval, and/or the time length of each contact with the key, and/or the time of each contact with the key;
determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information;
acquiring a key value matched with the fingerprint information and the operation type in a pre-stored mapping table; and
and outputting the matched key values of the keys to a computing device connected with the keyboard.
8. The method of claim 7, further comprising the steps of:
in the second mode of operation, the first mode of operation,
recording the contact operation of a user on at least one key in a preset time interval, and acquiring fingerprint information of the user through a fingerprint sensor on each key;
determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information;
recording the key value of a key subsequently contacted by a user;
and storing the recorded key values in the mapping table in association with the fingerprint information and the operation types.
9. The method of claim 8, wherein the method further comprises the steps of:
before storing the fingerprint information and the operation type into the mapping table, inquiring whether a key value matched with the fingerprint information and the operation type exists in the mapping table;
if yes, prompting the user to change the operation.
10. The method according to any of claims 7-9, wherein the method further comprises the step of:
and in the third mode, outputting key values of keys pressed by a user to the computing equipment connected with the keyboard.
11. The method of claim 10, wherein the method further comprises the steps of:
and receiving the specific operation of the user on the keyboard, and switching the modes according to the specific operation.
12. The method of claim 11, wherein the step of recording the user's touch operation of the at least one key in the first mode or the second mode comprises:
for each key, recording the contact times of a user with the key in a preset time interval, and/or the contact duration of each time with the key, and/or the contact time of each time with the key;
in the first mode or the second mode, the step of determining the operation type to which the contact operation belongs from the recorded contact operation and the acquired fingerprint information includes:
and determining the operation type of the contact operation according to the fingerprint information, the contact times, and/or the contact time of each key.
13. A password mapping method is suitable for being executed in a keyboard with a fingerprint sensor arranged on each key, and comprises the following steps:
in the first mode of the operation, the first mode,
recording the contact operation of a user on at least one key in a preset time interval, and acquiring the fingerprint information of the user through a fingerprint sensor on each key, wherein the contact operation comprises the number of times of contact with the key in the preset time interval, and/or the time length of each contact with the key, and/or the time of each contact with the key;
determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information; and
and sending the fingerprint information and the operation type to a preset server, wherein the server stores a mapping table, and the mapping table records a key value of a keyboard, and the fingerprint information and the operation type matched with the key value.
14. The method of claim 13, wherein the method further comprises the steps of:
in the second mode of operation, the first mode of operation,
recording the contact operation of a user on at least one key in a preset time interval, and acquiring fingerprint information of the user through a fingerprint sensor on each key;
determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information;
recording the key value of a key subsequently contacted by a user; and
and sending the recorded key value to a predetermined server in association with the fingerprint information and the operation type.
15. A password mapping method is suitable for being executed in a server, the server stores a mapping table, the mapping table records key values of a keyboard, fingerprint information matched with the key values and operation types, and the method comprises the following steps:
receiving an operation type which is determined based on the contact operation of a user on a keyboard and the acquired fingerprint information and to which the contact operation belongs, wherein the contact operation comprises the number of times of contact with the key in a preset time interval, and/or the time length of each contact with the key, and/or the time of each contact with the key; and
and acquiring a key value of the key matched with the received fingerprint information and the operation type in the mapping table.
16. The method of claim 15, wherein the method further comprises the steps of:
receiving fingerprint information acquired based on a contact operation of a user on a keyboard, an operation type to which the contact operation belongs, and key values associated with the operation type;
and storing the key value, the fingerprint information and the operation type in the mapping table in an associated manner.
17. A keyboard, comprising:
the fingerprint sensor is arranged on each key;
an operation recording module adapted to, in a first mode,
recording the contact operation of a user on at least one key in a preset time interval, and acquiring the fingerprint information of the user through a fingerprint sensor on each key, wherein the contact operation comprises the number of times of contact with the key in the preset time interval, and/or the time length of each contact with the key, and/or the time of each contact with the key;
determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information; and
and the communication unit is suitable for sending the fingerprint information and the operation type to a preset server in a first mode, wherein the server stores a mapping table, and the mapping table records key values of a keyboard, and the fingerprint information and the operation type matched with the key values.
18. The keyboard of claim 17, wherein,
the operation recording module is further adapted to in a second mode,
recording the contact operation of a user on at least one key in a preset time interval, and acquiring fingerprint information of the user through a fingerprint sensor on each key;
determining an operation type to which the contact operation belongs according to the recorded contact operation and the acquired fingerprint information;
recording the key value of a key subsequently contacted by a user;
the communication unit is further adapted to transmit the recorded key value to a predetermined server in association with the fingerprint information and the operation type in the second mode.
19. A cryptographic mapping device residing in a server and comprising:
the communication module is suitable for receiving an operation type which is determined based on contact operation of a user on a keyboard and acquired fingerprint information and belongs to the contact operation, wherein the contact operation comprises the number of times of contact with a key in a preset time interval, and/or the time length of each contact with the key, and/or the time of each contact with the key;
the server storage module is suitable for storing a mapping table, and the mapping table records key values of a keyboard, fingerprint information matched with the key values and operation types; and
and the password mapping module is suitable for acquiring the key values of the keys matched with the received fingerprint information and the operation types in the mapping table.
20. The apparatus of claim 19, wherein,
the communication module is also suitable for receiving fingerprint information acquired based on contact operation of a user on a keyboard, operation types to which the contact operation belongs and key values associated with the contact operation;
the password mapping module is further adapted to store the key value to the mapping table in association with the fingerprint information and the operation type.
21. A cryptographic mapping system comprising:
a keyboard as claimed in claim 17 or 18; and
a cryptographic mapping device as claimed in claim 19 or 20.
CN201810005943.1A 2018-01-03 2018-01-03 Password mapping method, system and keyboard Active CN108073835B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810005943.1A CN108073835B (en) 2018-01-03 2018-01-03 Password mapping method, system and keyboard

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810005943.1A CN108073835B (en) 2018-01-03 2018-01-03 Password mapping method, system and keyboard

Publications (2)

Publication Number Publication Date
CN108073835A CN108073835A (en) 2018-05-25
CN108073835B true CN108073835B (en) 2020-11-06

Family

ID=62156357

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810005943.1A Active CN108073835B (en) 2018-01-03 2018-01-03 Password mapping method, system and keyboard

Country Status (1)

Country Link
CN (1) CN108073835B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109117678A (en) * 2018-08-10 2019-01-01 天地融科技股份有限公司 A kind of information transferring method and system
CN109344608B (en) * 2018-08-10 2021-09-21 天地融科技股份有限公司 Information transmission method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1378169A (en) * 2001-03-30 2002-11-06 王建勤 Keyboard for information input by means of finger print identification technology
CN1841280A (en) * 2005-03-31 2006-10-04 联想(北京)有限公司 Portable keyboard and fingerprint feature information extracting method thereof
CN104205019A (en) * 2012-02-28 2014-12-10 阿尔卡特朗讯 System and method for inputting symbols
KR20160012027A (en) * 2014-07-23 2016-02-02 엘지전자 주식회사 Remote controller and operating method thereof
CN105511784A (en) * 2015-12-02 2016-04-20 北京新美互通科技有限公司 Information input method, device and mobile terminal based on pressure detection
CN106648125A (en) * 2016-11-30 2017-05-10 上海斐讯数据通信技术有限公司 Fingerprint keyboard, verification system and method based on fingerprint keyboard
CN106775282A (en) * 2016-11-10 2017-05-31 宇龙计算机通信科技(深圳)有限公司 Operate the method and device of terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1378169A (en) * 2001-03-30 2002-11-06 王建勤 Keyboard for information input by means of finger print identification technology
CN1841280A (en) * 2005-03-31 2006-10-04 联想(北京)有限公司 Portable keyboard and fingerprint feature information extracting method thereof
CN104205019A (en) * 2012-02-28 2014-12-10 阿尔卡特朗讯 System and method for inputting symbols
KR20160012027A (en) * 2014-07-23 2016-02-02 엘지전자 주식회사 Remote controller and operating method thereof
CN105511784A (en) * 2015-12-02 2016-04-20 北京新美互通科技有限公司 Information input method, device and mobile terminal based on pressure detection
CN106775282A (en) * 2016-11-10 2017-05-31 宇龙计算机通信科技(深圳)有限公司 Operate the method and device of terminal
CN106648125A (en) * 2016-11-30 2017-05-10 上海斐讯数据通信技术有限公司 Fingerprint keyboard, verification system and method based on fingerprint keyboard

Also Published As

Publication number Publication date
CN108073835A (en) 2018-05-25

Similar Documents

Publication Publication Date Title
CN107302539B (en) Electronic identity registration and authentication login method and system
JP5573293B2 (en) Authentication device, encryption device, token device, authentication method, and authentication program
WO2017050093A1 (en) Login information input method, login information storage method, and associated device
US20090298468A1 (en) System and method for deleting data in a communication device
US20210266171A1 (en) Method and system for operating internet of things device
CN111897786B (en) Log reading method, device, computer equipment and storage medium
US11132426B2 (en) Acknowledgment authentication system and method
US9712499B2 (en) Method and apparatus for cryptographic processing
KR102045488B1 (en) Electronic terminal apparatus performing login authentication processing based on biometrics and operating method thereof
CN105141427A (en) Login authentication method, device and system based on voiceprint recognition
CN108073835B (en) Password mapping method, system and keyboard
WO2017088686A1 (en) Method and apparatus for realizing fingerprint login for website, and client device
US20170076285A1 (en) Payment Method and Apparatus and Payment Factor Processing Method and Apparatus
CN107517180B (en) Login method and device
CN104901937A (en) Data processing method and system thereof, terminal, server
CN104915588A (en) Privacy protection method and device for electronic equipment
EP2775658A2 (en) A password based security method, systems and devices
CN114615031A (en) File storage method and device, electronic equipment and storage medium
CN109766681A (en) User ID authentication method, device, fingerprint logger and readable storage medium storing program for executing
JP2006285697A (en) File management method and file management system
US10430617B2 (en) Terminal determination device and method
CN114448722B (en) Cross-browser login method and device, computer equipment and storage medium
CN115941360A (en) Security verification method and device for data interaction, storage medium and electronic equipment
US9058476B2 (en) Method and image forming apparatus to authenticate user by using smart card
CN114338156A (en) Data processing method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 311501, Unit 1, Building 5, Courtyard 1, Futong East Street, Chaoyang District, Beijing 100102

Applicant after: Beijing Zhichuangyu Information Technology Co., Ltd.

Address before: 100097 Jinwei Building 803, 55 Lanindichang South Road, Haidian District, Beijing

Applicant before: Beijing Knows Chuangyu Information Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant