CN111145394B - Scanning control method and scanning control device for capacitive touch keys - Google Patents
Scanning control method and scanning control device for capacitive touch keys Download PDFInfo
- Publication number
- CN111145394B CN111145394B CN201911343418.1A CN201911343418A CN111145394B CN 111145394 B CN111145394 B CN 111145394B CN 201911343418 A CN201911343418 A CN 201911343418A CN 111145394 B CN111145394 B CN 111145394B
- Authority
- CN
- China
- Prior art keywords
- key
- random number
- target key
- trigger threshold
- scanning control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03K—PULSE TECHNIQUE
- H03K17/00—Electronic switching or gating, i.e. not by contact-making and –breaking
- H03K17/14—Modifications for compensating variations of physical values, e.g. of temperature
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03K—PULSE TECHNIQUE
- H03K17/00—Electronic switching or gating, i.e. not by contact-making and –breaking
- H03K17/94—Electronic switching or gating, i.e. not by contact-making and –breaking characterised by the way in which the control signals are generated
- H03K17/96—Touch switches
- H03K17/962—Capacitive touch switches
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
The invention provides a scanning control method and a scanning control device for a capacitive touch key, wherein the scanning control method comprises the following steps: randomly generating a first random number and a second random number; determining a first target key in the n-way keys according to the first random number; determining a second target key in the n-way keys according to the second random number; when n paths of keys of the keyboard are scanned, controlling the first target key to be scanned, and compensating the trigger threshold value of the second target key, so that the trigger threshold value corresponding to the second target key is different from that before uncompensated. The invention can resist information leakage and ensure safety by adding random scanning sequence and random compensation capacitor.
Description
Technical Field
The present invention relates to the field of capacitive touch keys, and in particular, to a scanning control method and a scanning control device for a capacitive touch key.
Background
Nowadays, human society is highly informationized, and things around are gradually accessing to a network, and enter an internet of things era of interconnection of everything. The smart home is a typical application scene of the internet of things. The intelligent home is also called as an intelligent house, takes a house as a platform, has building, network communication, information appliance and equipment automation, and integrates system, structure, service and management into a whole, thereby being a high-efficiency, comfortable, safe, convenient and environment-friendly living environment. The intelligent home utilizes advanced computer technology, network communication technology and comprehensive wiring technology to organically combine various subsystems related to home life together, and the home life is more comfortable and safer through overall management.
With the development of the internet of things technology and the continuous improvement of the requirements of people on the living standard, the intelligent door lock gradually enters every family by virtue of the ultra-strong convenience, and becomes an entrance of intelligent home application; in 2017, the goods output of the household intelligent door lock reaches 600 thousands of sets, and the speed increase is over 100% on a same scale; from the data of the last half year of 2018, the sales volume of the household intelligent door lock is expected to be doubled continuously.
The unlocking method of the universal key password is an unlocking method still reserved by the existing intelligent door lock. The capacitive touch key has the advantages of long service life, small occupied panel space and the like, so that the capacitive touch key is a key mode commonly adopted by the intelligent door lock.
The capacitive touch key also faces a problem of how to defend against attacks and peeking. Because the capacitive touch key is a way to open the door lock, the password for opening the door can be revealed in the process of universal operation of the key. Therefore, it has become very urgent to solve the problem of password leakage caused by the key of the general intelligent door lock.
A new powerful attack method, called bypass attack (SCA), has emerged in recent years. The bypass attack is to utilize the bypass information, such as power consumption, time, electromagnetic wave, error information and the like, leaked by the device in the operation process to attack and inspect the hardware system. The bypass attack has become a great threat to information security chip products, and the harm of the bypass attack is far greater than that of the traditional mathematical analysis means.
A power consumption attack is a type of bypass attack that uses the power consumption of a hardware chip to perform certain operations to determine the specific operations that the hardware performs. The capacitive touch key is used for determining whether a finger is pressed down or not by utilizing the charge and discharge process of a capacitor. In the process of capacitor charging and discharging, the power consumption consumed by the chip is far greater than that consumed in idle, so that a power consumption profile is formed on a time axis in the key scanning process.
Taking fig. 1 and 2 as examples, fig. 1 shows waveforms of the 8-way key when the key is not pressed for scanning, and fig. 2 shows scanning waveforms when the key 4 is pressed. It can be clearly found from the figure that the power consumption waveforms are different in the two situations, the charging and discharging time of the key 4 is obviously reduced, and the key 4 is pressed for the self-capacitance touch key. Therefore, an attacker can steal the password by monitoring the power consumption consumed by the intelligent door lock, and the security is poor.
Disclosure of Invention
The invention provides a scanning control method and a scanning control device of a capacitive touch key, which aim to solve the problem of poor safety.
According to a first aspect of the present invention, a scanning control method for a capacitive touch key is provided, which includes:
randomly generating a first random number and a second random number;
determining a first target key in the n-way keys according to the first random number;
determining a second target key in the n-way keys according to the second random number;
when n-way keys of the keyboard are scanned, controlling the first target key to be scanned, and compensating the trigger threshold value of the second target key so as to enable the trigger threshold value corresponding to the second target key to be different from other keys.
Optionally, compensating the trigger threshold of the second target key includes:
and compensating the trigger threshold value of the second target key according to a preset compensation capacitance value.
Optionally, the trigger threshold value corresponding to the second target key satisfies the following formula one:
the trigger threshold value corresponding to the second target key before uncompensation meets the following formula two:
wherein:
n1 represents charging the channel of the second target key to VrefThe number of cycles of (a);
n2 represents charging the channel of any key other than the second target key to VrefThe number of cycles of (a);
Vkeyrepresenting the charging voltage of the channel capacitor of the corresponding key;
Csan external discharge capacitor representing a corresponding key;
Cxrepresenting the channel capacitance of the corresponding key;
Cprepresenting the compensation capacitance value.
Optionally, the compensation capacitance value is 20 pf.
Optionally, the bit number of the first target key in the n-way key is the first random number; and the bit of the second target key in the n-way key is the second random number.
According to a second aspect of the present invention, there is provided a scanning control device for a capacitive touch key, comprising: the scanning control circuit comprises a first random number generation circuit, a second random number generation circuit, a scanning sequence control circuit, a compensation control circuit and a scanning control circuit of the capacitive touch key;
the first random number generating circuit is used for randomly generating a first random number;
the second random number generating circuit is used for randomly generating a second random number;
the scanning sequence control circuit is respectively connected with the scanning control circuit and the first random number generation circuit, and is used for: when the scanning control circuit scans n paths of keys of a keyboard, the scanning control circuit for controlling the capacitance touch keys starts scanning from a first target key, wherein the first target key is determined according to the first random number;
the compensation control circuit is respectively connected with the scanning control circuit and the second random number generation circuit, and is used for: when the scanning control circuit scans n paths of keys of the keyboard, compensating a trigger threshold value of a second target key so as to enable the trigger threshold value corresponding to the second target key to be different from other keys; the second target key is determined based on the second random number.
Optionally, the trigger threshold of the second target key is compensated according to a preset compensation capacitance value.
Optionally, the trigger threshold value corresponding to the second target key satisfies the following formula one:
the trigger threshold value corresponding to the second target key before uncompensation meets the following formula two:
wherein:
n1 represents charging the channel of the second target key to VrefThe number of cycles of (a);
n2 represents charging the channel of any key other than the second target key to VrefThe number of cycles of (a);
Vkeyrepresenting the charging voltage of the channel capacitor of the corresponding key;
Csan external discharge capacitor representing a corresponding key;
Cxrepresenting the channel capacitance of the corresponding key;
Cprepresenting the compensation capacitance value.
Optionally, the compensation capacitance value is 20 pf.
Optionally, the bit number of the first target key in the n-way key is the first random number; and the bit of the second target key in the n-way key is the second random number.
According to the scanning control method and the scanning control device for the capacitive touch keys, the scanning sequence is randomized, so that the power consumption waveform sequence sampled by an attacker each time does not have a corresponding relation with the key sequence, and the attacker cannot find out the sequential relation between the power consumption and the actual keys in sequence; meanwhile, through the random compensation capacitor, the charge and discharge time of the key can be changed randomly, so that an attacker cannot distinguish whether charge and discharge operations occur according to the time length. Therefore, the invention can resist information leakage and ensure safety by adding the random scanning sequence and the random compensation capacitor.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a waveform diagram illustrating an example of a prior art when no 8-way key has been pressed for scanning;
FIG. 2 is a waveform diagram illustrating a 4 th key press according to an exemplary prior art;
fig. 3 is a schematic flowchart illustrating a scanning control method for a capacitive touch key according to an embodiment of the present invention;
fig. 4 is a schematic circuit diagram of a scan control device of a capacitive touch key according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The technical solution of the present invention will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
Fig. 3 is a flowchart illustrating a scanning control method of a capacitive touch key according to an embodiment of the invention.
The method according to the present embodiment may be applied to, for example, a scanning control device of a capacitive touch key, and the following process may be implemented in a software manner, or may also be implemented in a hardware manner.
Referring to fig. 3, a scanning control method of a capacitive touch key includes:
s11: randomly generating a first random number and a second random number;
s12: determining a first target key in the n-way keys according to the first random number;
s13: determining a second target key in the n-way keys according to the second random number;
s14: when n-way keys of the keyboard are scanned, controlling the first target key to be scanned, and compensating the trigger threshold value of the second target key so as to enable the trigger threshold value corresponding to the second target key to be different from other keys.
The first random number and the second random number may be any integer value that is randomly generated and may be the same or different. The first random number and the second random number may be generated by a general true random number module, which may be a program module, a circuit module, or a combination of hardware and software.
Wherein: the scan order for the n-way keys may be, for example: (S)1,S2...Si...Sn) (ii) a The scanning time corresponding to the n-way key can be, for example: (T)1,T2...Ti...Tn). The first random number may be characterized as m and the second random number may be characterized as p.
In one embodiment, the bit number of the first target key in the n-way key is the first random number; and the bit of the second target key in the n-way key is the second random number. For example: if the first random number is characterized as m, then: the first random number m represents the scanning starting sequence, and if the second random number is characterized as p, the scanning starting sequence is as follows: the second random number p indicates that capacitance compensation needs to be added to the pth key.
And further:
1≤m≤n;
1≤p≤n。
in other embodiments, the relationship between the first random number and the bit of the first target key and the relationship between the second random number and the bit of the second target key may also be implemented in other manners, such as: the relationship may be proportional, or a certain difference, or any self-defined relationship (for example, random number 1 corresponds to the 3 rd key, random number 2 corresponds to the 6 th key, and random number 3 corresponds to the 2 nd key), and the security can be further improved by the change of the relationship.
In one embodiment, the order of scanning each way of keys may be, for example, according to the difference between the randomly determined values of m: assuming that n keys are scanned sequentially with m as a starting point, the scanning sequence can be as follows:
in one embodiment, in step S14, the compensating the trigger threshold value of the second target key includes: and compensating the trigger threshold value of the second target key according to a preset compensation capacitance value.
Further, in step S14, when the p-th key is scanned, the compensation capacitance may be compensated to the corresponding PAD. The PAD may be understood as a key sensing PAD, and in a specific example, one or more capacitors formed by one key, that is, one key sensing PAD and the ground have a capacitance value fixed to a small value and a fixed charging and discharging time under the condition that the surrounding environment is not changed, and when a conductor such as a finger approaches an electrode, a coupling capacitor is formed, so that the inherent charging and discharging time is changed. Whether a key is pressed down or not can be detected by measuring the change of the charging and discharging time. When the charging and discharging time or the capacitance value represented by the charging and discharging time changes to a certain amplitude or a certain threshold value, the key can be identified to be pressed down. Furthermore, the threshold value, amplitude pair can be understood as the trigger threshold value referred to above. The above formulas are described by taking capacitance as an example, and in other examples, a preset compensation charge-discharge time may be introduced.
The compensation capacitance is about the capacitance of the finger pressed down, and the capacitance increases or decreases, and may typically be 20 pf.
Specifically, the trigger threshold corresponding to the second target key satisfies the following formula one:
the trigger threshold value corresponding to the second target key before uncompensation meets the following formula two:
wherein:
n1 represents charging the channel of the second target key to VrefThe number of cycles of (a);
n2 represents charging the channel of any key other than the second target key to VrefThe number of cycles of (a);
Vkeyrepresenting the charging voltage of the channel capacitor of the corresponding key;
Csan external discharge capacitor representing a corresponding key;
Cxrepresenting the channel capacitance of the corresponding key;
Cprepresenting the compensation capacitance value.
Regarding the above formula one and formula two, it can be understood that: the threshold value without compensation is determined by equation two: the threshold value after adding the compensation can be determined by formula one.
In summary, in the scanning control method for the capacitive touch key provided in this embodiment, by randomizing the scanning sequence, there is no correspondence between the power consumption waveform sequence sampled each time by an attacker and the key sequence, and further, the attacker cannot find out the sequence relationship between the power consumption and the actual key in the sequence; meanwhile, through the random compensation capacitor, the charge and discharge time of the key can be changed randomly, so that an attacker cannot distinguish whether charge and discharge operations occur according to the time length. Therefore, the embodiment can resist information leakage and ensure safety by adding the random scanning sequence and the random compensation capacitor.
Fig. 4 is a schematic circuit diagram of a scan control device of a capacitive touch key according to an embodiment of the present invention.
Referring to fig. 4, the scanning control apparatus 200 for capacitive touch keys includes: a first random number generating circuit 201, a second random number generating circuit 202, a scanning sequence control circuit 203, a compensation control circuit 204 and a scanning control circuit 205 of a capacitance touch key;
the first random number generating circuit 201 is configured to randomly generate a first random number;
the second random number generating circuit 202 is configured to randomly generate a second random number;
the scan sequence control circuit 203, respectively connected to the scan control circuit 205 and the first random number generation circuit 201, is configured to: when the scanning control circuit scans n paths of keys of a keyboard, the scanning control circuit for controlling the capacitance touch keys starts scanning from a first target key, wherein the first target key is determined according to the first random number;
the compensation control circuit 204 is respectively connected to the scan control circuit 205 and the second random number generation circuit 202, and is configured to: when the scanning control circuit scans n paths of keys of the keyboard, compensating a trigger threshold value of a second target key so as to enable the trigger threshold value corresponding to the second target key to be different from other keys; the second target key is determined based on the second random number.
The scan control circuit 205 described above can also be understood as a button charge/discharge control circuit.
Optionally, the trigger threshold of the second target key is compensated according to a preset compensation capacitance value.
Optionally, the trigger threshold value corresponding to the second target key satisfies the following formula one:
the trigger threshold value corresponding to the second target key before uncompensation meets the following formula two:
wherein:
n1 represents charging the channel of the second target key to VrefThe number of cycles of (a);
n2 represents charging the channel of any key other than the second target key to VrefThe number of cycles of (a);
Vkeyrepresenting the charging voltage of the channel capacitor of the corresponding key;
Csan external discharge capacitor representing a corresponding key;
Cxrepresenting the channel capacitance of the corresponding key;
Cprepresenting the compensation capacitance value.
Optionally, the compensation capacitance value is 20 pf.
Optionally, the bit number of the first target key in the n-way key is the first random number; and the bit of the second target key in the n-way key is the second random number.
The above technical features, technical terms and alternative embodiments can be understood by referring to the related description of the method embodiment, and are not repeated herein.
In summary, in the scanning control apparatus for capacitive touch keys provided in this embodiment, by randomizing the scanning sequence, there is no correspondence between the power consumption waveform sequence sampled each time by an attacker and the key sequence, and further, the attacker cannot find out the sequence relationship between the power consumption and the actual keys in the sequence; meanwhile, through the random compensation capacitor, the charge and discharge time of the key can be changed randomly, so that an attacker cannot distinguish whether charge and discharge operations occur according to the time length. Therefore, the embodiment can resist information leakage and ensure safety by adding the random scanning sequence and the random compensation capacitor.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (6)
1. A scanning control method of a capacitive touch key is characterized by comprising the following steps:
randomly generating a first random number and a second random number;
determining a first target key in the n-way keys according to the first random number;
determining a second target key in the n-way keys according to the second random number;
when n paths of keys of a keyboard are scanned, controlling a first target key to be scanned, and compensating a trigger threshold value of a second target key so as to enable the trigger threshold value corresponding to the second target key to be different from that before uncompensated;
wherein compensating the trigger threshold value of the second target key comprises: and compensating the trigger threshold value of the second target key according to a preset compensation capacitance value.
2. The method of claim 1, wherein the trigger threshold corresponding to the second target key add compensation satisfies the following formula one:
the trigger threshold value corresponding to the second target key before uncompensation meets the following formula two:
wherein:
n2 represents charging the channel of any key other than the second target keyThe number of cycles of (a);
representing the charging voltage of the channel capacitor of the corresponding key;representing a preset reference voltage of a corresponding key;
3. The method of claim 1 or 2, wherein the first target key has the first random number as a bit number in the n-way key; and the bit of the second target key in the n-way key is the second random number.
4. A scanning control device of a capacitance touch key is characterized by comprising: the scanning control circuit comprises a first random number generation circuit, a second random number generation circuit, a scanning sequence control circuit, a compensation control circuit and a scanning control circuit of the capacitive touch key;
the first random number generating circuit is used for randomly generating a first random number;
the second random number generating circuit is used for randomly generating a second random number;
the scanning sequence control circuit is respectively connected with the scanning control circuit and the first random number generation circuit, and is used for: when the scanning control circuit scans n paths of keys of a keyboard, the scanning control circuit for controlling the capacitance touch keys starts scanning from a first target key, wherein the first target key is determined according to the first random number;
the compensation control circuit is respectively connected with the scanning control circuit and the second random number generation circuit, and is used for: when the scanning control circuit scans n paths of keys of the keyboard, compensating a trigger threshold value of a second target key so as to enable the trigger threshold value corresponding to the second target key to be different from other keys; the second target key is determined according to the second random number;
and the trigger threshold value of the second target key is compensated according to a preset compensation capacitance value.
5. The apparatus of claim 4, wherein the trigger threshold corresponding to the second target key add compensation satisfies the following formula one:
the trigger threshold value corresponding to the second target key before uncompensation meets the following formula two:
wherein:
n2 represents charging the channel of any key other than the second target keyThe number of cycles of (a);
representing the charging voltage of the channel capacitor of the corresponding key;representing a preset reference voltage of a corresponding key;
6. The apparatus according to claim 4 or 5, wherein the first target key has the first random number as a bit number in the n-way key; and the bit of the second target key in the n-way key is the second random number.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911343418.1A CN111145394B (en) | 2019-12-20 | 2019-12-20 | Scanning control method and scanning control device for capacitive touch keys |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911343418.1A CN111145394B (en) | 2019-12-20 | 2019-12-20 | Scanning control method and scanning control device for capacitive touch keys |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111145394A CN111145394A (en) | 2020-05-12 |
CN111145394B true CN111145394B (en) | 2021-08-03 |
Family
ID=70519554
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911343418.1A Active CN111145394B (en) | 2019-12-20 | 2019-12-20 | Scanning control method and scanning control device for capacitive touch keys |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111145394B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1614533A (en) * | 2003-11-04 | 2005-05-11 | 上海华虹集成电路有限责任公司 | Method for preventing simple power consumption analysis attack |
CN1799056A (en) * | 2003-06-03 | 2006-07-05 | 皇家飞利浦电子股份有限公司 | Secure card terminal |
CN102594363A (en) * | 2012-02-29 | 2012-07-18 | 苏州瀚瑞微电子有限公司 | Scanning method of capacitance touch button and press determination method |
US9229549B1 (en) * | 2007-05-29 | 2016-01-05 | Cypress Semiconductor Corporation | Random scanning technique for secure transactions entered with capacitive sensor input device |
CN105353889A (en) * | 2015-11-29 | 2016-02-24 | 恒宝股份有限公司 | Random scanning keyboard and scanning method therefor |
CN106295422A (en) * | 2016-08-09 | 2017-01-04 | 深圳市证通电子股份有限公司 | Keyboard scanning method and device |
CN106570993A (en) * | 2016-10-21 | 2017-04-19 | 深圳市新国都支付技术有限公司 | Matrix keyboard security improving method, device and keyboard |
CN106998207A (en) * | 2017-01-20 | 2017-08-01 | 艾体威尔电子技术(北京)有限公司 | A kind of scanning keying method applied to POS system |
CN109598872A (en) * | 2018-12-06 | 2019-04-09 | 深圳市新国都支付技术有限公司 | Apply the method and system of interference signal to keyboard by analog waveform |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2982392B1 (en) * | 2011-11-04 | 2013-12-20 | Ingenico Sa | METHOD AND DEVICE FOR MANAGING A KEY MATRIX, WITH PROTECTION AGAINST AN ACTIVE ESPION DEVICE, COMPUTER PROGRAM PRODUCT AND CORRESPONDING STORAGE MEDIUM |
-
2019
- 2019-12-20 CN CN201911343418.1A patent/CN111145394B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1799056A (en) * | 2003-06-03 | 2006-07-05 | 皇家飞利浦电子股份有限公司 | Secure card terminal |
CN1614533A (en) * | 2003-11-04 | 2005-05-11 | 上海华虹集成电路有限责任公司 | Method for preventing simple power consumption analysis attack |
US9229549B1 (en) * | 2007-05-29 | 2016-01-05 | Cypress Semiconductor Corporation | Random scanning technique for secure transactions entered with capacitive sensor input device |
CN102594363A (en) * | 2012-02-29 | 2012-07-18 | 苏州瀚瑞微电子有限公司 | Scanning method of capacitance touch button and press determination method |
CN105353889A (en) * | 2015-11-29 | 2016-02-24 | 恒宝股份有限公司 | Random scanning keyboard and scanning method therefor |
CN106295422A (en) * | 2016-08-09 | 2017-01-04 | 深圳市证通电子股份有限公司 | Keyboard scanning method and device |
CN106570993A (en) * | 2016-10-21 | 2017-04-19 | 深圳市新国都支付技术有限公司 | Matrix keyboard security improving method, device and keyboard |
CN106998207A (en) * | 2017-01-20 | 2017-08-01 | 艾体威尔电子技术(北京)有限公司 | A kind of scanning keying method applied to POS system |
CN109598872A (en) * | 2018-12-06 | 2019-04-09 | 深圳市新国都支付技术有限公司 | Apply the method and system of interference signal to keyboard by analog waveform |
Also Published As
Publication number | Publication date |
---|---|
CN111145394A (en) | 2020-05-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8730207B2 (en) | Method of driving and detection for capacitive touch screen and device thereof | |
CN105574392B (en) | A kind of display mode switching method and mobile terminal | |
CN105550557A (en) | Method for logging in different systems through fingerprint recognition and terminal device | |
WO2017032010A1 (en) | Unlocking method and mobile terminal | |
US20190018054A1 (en) | Key detecting method and apparatus | |
La Cour et al. | Wireless charging power side-channel attacks | |
CN105138884A (en) | Verification method and electronic equipment | |
Moradifar et al. | Intelligent localisation of multiple non‐linear loads considering impact of harmonic state estimation accuracy | |
CN105809017A (en) | Electronic device and screen unlocking method thereof | |
CN106203038A (en) | A kind of unlocking method and mobile terminal | |
CN103324875A (en) | Data protection system and method | |
CN105353889B (en) | A kind of random scanning keyboard and its scan method | |
CN107743112A (en) | A kind of auth method, device and system | |
Ho et al. | Efficient temporal pattern mining in big time series using mutual information | |
CN111145394B (en) | Scanning control method and scanning control device for capacitive touch keys | |
CN106547309A (en) | Terminal unit and its operational approach | |
Wu et al. | Time to rethink the design of qi standard? security and privacy vulnerability analysis of qi wireless charging | |
Ni et al. | XPorter: A study of the multi-port charger security on privacy leakage and voice injection | |
CN114938287A (en) | Method and device for detecting abnormal behavior of power network with service features fused | |
CN106681875B (en) | Method and system for detecting power interference resistance of touch screen | |
CN110099041A (en) | A kind of Internet of Things means of defence and equipment, system | |
CN104573448B (en) | A kind of method and device of acoustic control unlock | |
Ding et al. | Risk assessment‐based long‐term transmission system hardening under prior probabilistic information | |
CN106548094B (en) | A kind of physics unclonable function circuit using monostable timing deviation | |
CN105094640B (en) | A kind of terminal operation method and user terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: 200233 Room 704, Building 2, No. 2570 Hechuan Road, Minhang District, Shanghai Patentee after: Shanghai Hangxin Electronic Technology Co.,Ltd. Address before: 201103 room 704, building 2, 2570 Hechuan Road, Minhang District, Shanghai Patentee before: SHANGHAI AISINOCHIP ELECTRONIC TECHNOLOGY Co.,Ltd. |