CN1252572C - Cipher keyboard - Google Patents

Cipher keyboard Download PDF

Info

Publication number
CN1252572C
CN1252572C CN 03113026 CN03113026A CN1252572C CN 1252572 C CN1252572 C CN 1252572C CN 03113026 CN03113026 CN 03113026 CN 03113026 A CN03113026 A CN 03113026A CN 1252572 C CN1252572 C CN 1252572C
Authority
CN
China
Prior art keywords
key
keyboard
button
code
lead
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 03113026
Other languages
Chinese (zh)
Other versions
CN1532675A (en
Inventor
李布尔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 03113026 priority Critical patent/CN1252572C/en
Publication of CN1532675A publication Critical patent/CN1532675A/en
Application granted granted Critical
Publication of CN1252572C publication Critical patent/CN1252572C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Input From Keyboards Or The Like (AREA)

Abstract

When inputting a personal code in exposed public occasions, a person has no safe feeling. The present invention provides an enciphered code input method and a keyboard thereof, which causes a peeper to fail to decipher the code even at a stones throw. The specific method comprises that a key is installed in a hidden position of the outer surface of a keyboard and is operated by a left hand, a correct code which is pressed by a right hand can be verified stealthily, a false code is blocked, and the excess key is equivalent to code encryption. The keyboard transformed in this way, has the advantages of simplicity, effectivity and low cost. Entering a code in the way is civilized and decent, the method is easy to master and has high safety and reliability.

Description

Code keypad
Technical field
The invention belongs to the computer peripheral category;
Background technology
As everyone knows, be placed with the client password input keyboard on the bank savings sales counter, keyboard is also arranged on ATM (automatic teller machine), the usefulness of input password when withdrawing the money for the client, the keyboard that has is in order to maintain secrecy, and the next door is provided with shield, but in order not influence remittee's button operation, these shields can not do cross exceed tight, the offender often from the remittee by the side of or shoulder rear snooping password, and then reach the purpose of illegal false claiming wealth.The application for a patent for invention that CN1177764A discloses a kind of " mask type cipher-code input method and equipment thereof ", a kind of optical lens operation keyboard that sees through has been proposed, whole all around methods of sealing, though this method can solve the problem of divulging a secret, but equipment complexity, complex operation, the bad the elderly's use of eyesight can be had any problem, and should go to seek simpler and efficient ways.The difficulty of dealing with problems is apparent: can imagine, the people who has the inclination to peep perhaps just at you by the side of or after one's death, perhaps stare at you with telescope a long way off, reflect according to public security department, which once had the offender to train " piercing eye ", and far also can judge by key according to the movement locus of your button at a distance of five or six meters! We can say that present code keypad that uses and method have no security performance and can say.
Summary of the invention:
Purpose of the present invention is to propose a kind of method, and so-called enciphered password input method and keyboard thereof improve cipher safety greatly.
Purpose is achieved in that the author thinks by analysis, present password input mode, be open, the plane, forthright, want to guarantee the cryptosecurity input, except secretiveness, better way should be to password " encryption ", says to such an extent that accurately be to encrypt to the action of button, that is to say except by many again the password, come individual mixing the spurious with the genuine by several keys! , how can stay calm and collected with that many by several keys " do useless ", become the key point of plan, the people who peeps is dig-inning this right hand of your button, what if do what action and all can not escape his sight line? several times weigh, we have expected left hand.Left hand just is plagued with too much leisure in the process of withdrawing the money, why not entrust with an important task? both hands cooperate does things, and is exactly the speciality of primate originally, in addition human? after left hand is joined, use first one hand and then the other in quick succession, can allow the person of peeping attend to one thing and lose sight of another, if a backstage more allows it as weighing down in the mist before another platform! Particularly, we increase a button (being called " operating key ") on original keyboard signal input method basis, control by left hand, in the time that it is being pressed, ten numerical keys that the right hand is controlled can temporarily lose function, that is to say that this key is equivalent to the master switch of ten numerical keys, have only under the situation about allowing leftward, but the right hand is pressed just input signal of each numerical key.How to implement this enciphered password input method? way is a lot, and we can design a program, and the function of self-defined this button is solidificated in the chip of keyboard processing or keyboard interface circuit; We also can be connected this button through lead can influence in the common circuit of the formation of numerical key key-position signal and transmission, in discrete element such as signal transmission, interrupt routine loop, clock, matrix, power supply or the ground connection of key-position signal treatment circuit or keyboard interface circuit and IC circuit.When left hand was pressed this key, even press each numerical key, key-position signal can not form or transmit, and perhaps CPU can not receive signal, perhaps asked the signal of CPU keyboard scan to be intercepted, and whether control each numerical key output signal with this effective.When we prepare to press password on numerical key with right hand forefinger, left index finger is placed on this operating key, the right hand is many again by several keys (front or rear or middle) except password consciously, and left hand only allows password to pass through, like this, obviously have only the key instruction of representing password can be admitted to CPU, and how by those several keys only be feinting deception, it is close to have added for password more in other words conj.or perhaps, thereby reaches the purpose that the fascination person of peeping ensures cryptosecurity.We can be placed in shelter away from numerical key to this operating key of newly acquiring, as on the side panel of keyboard or on the bottom panel, drag lead termination or computer terminals to drag on the handle of lead termination and microphone outward perhaps outward.The person of peeping can't be taken into account,, also should do it smallerly, should be able to be covered fully, perhaps above key, install radome additional or done flange and gone along with sb. to guard him or have the pothole groove hidden by left index finger if still be arranged on the card.In a word, purpose is to allow the person of peeping cannot see this key, even cannot see the finger of button.The button of newly acquiring has one group of normally closed or normally opened contact at least, be not have the monostable formula switch of lock, preferably be connected into the function of when pressing, cutting off each numerical key during place in circuit, when unclamping, recover the function of each numerical key, backward compatible like this, use this key still will import the old remittee of password to make things convenient for some to be reluctant according to old way.Simultaneously, also should be at the keyboard disk conspicuous position, be printed with the literal of the of this sort meaning: " for your cryptosecurity; please before or after the password input; left hand is pressed operating key; several mess codes down of right hand input ... or the like, (is example with the closed type contact) is to remind the remittee that a feinting deception is done by association.
Simple, effective, civilized generous, easy to learn with this ciphering type method and keyboard input password thereof, can stop peep of cipher, can be used on the various customer service equipment that need password input, as ATM, POS machine, certificate exchange and ciphony equipment or the like.
Description of drawings
Fig. 1 is that embodiment one installs the operating key position view additional for the existing password keyboard.
Fig. 2 is the circuit block diagram of embodiment one.
Fig. 3 embodiment two is the code keypad structural representations that are provided with operating key
Fig. 4 is the circuit block diagram of embodiment two.
Fig. 5 is the side-looking diagrammatic cross-section of embodiment three ATM (automatic teller machine) that is provided with operating key.
Fig. 6 embodiment four is that existing ATM (automatic teller machine) installs operating key and radome synoptic diagram additional.
Fig. 7 embodiment five is that the intelligent network phones machine in street corner is transformed synoptic diagram.
Fig. 8 is a serial connection operating key position view in the single-chip microcomputer keyboard circuit block scheme commonly used.
Fig. 9 embodiment six drags lead that the operating key electrical schematic diagram is installed outside teller terminal switch dish interface circuit.
Figure 10 embodiment seven drags the lead termination that the operating key synoptic diagram is installed outside keyboard.
Embodiment
Below in conjunction with accompanying drawing in detail embodiment is described in detail.
Referring to Fig. 1, it is the code keypad of putting on the common bank savings sales counter, 10 numeric keys 3 and zero clearing acknowledgement key etc. are arranged on the card 2, link to each other with computer teller terminal in the sales counter by wire harness 4, the operating key of newly acquiring 5 is installed at dish side plate 6 (towards bank clerk one side), the remittee goes to handle it with left hand, eyes-free is seen, as long as hand does not leave button, the person of peeping is difficult to know when it is pressed, when just light finger is put down gently in the above, and remittee's right hand oneself is careful when operating key is pressed by real password as pressed numerical key in the past, when unclamping by several mess codes (being exactly so-called feinting deception), the cooperation of both hands has only and oneself knows what's what, and the person of peeping has no way of finding out about it, thereby has guaranteed cryptosecurity.Button 5 also can be installed on the base plate 7.
Referring to Fig. 2, Fig. 2 is the non-coding one dimension of the single-chip microcomputer keyboard circuit figure that uses always, and K0-K9 is the keyboard digital key, and each key takies the input-output line of CPU, when a certain key is pressed, corresponding incoming line is a low level, and height during release is when CPU finds have key to press, call the keyboard scan subroutine, the state of port is read into CPU, and CPU is by software identification key number generation key, and this all is that prior art does not describe in detail.The operating key of newly acquiring among the figure 5, its series connection are on the shared ground wire of K0-K9, obviously, have only when pressing in the time of (closure) this key, press the arbitrary key of K0-K9 just effectively, unclamp (disconnection) key 5 after, press K0-K9 again, just belong to feinting deception, be used for confusing the person of peeping.
Referring to Fig. 3, embodiment two has described the scheme of a kind of operating key design in card.One circle flange 9 is arranged at the edge of card 8, the middle recess 10 that just can hold the finger size that forms, there is operating key 5 centre, the resilient material of this key microswitch should select the movement range small voice again little, such as the sort of button of picture mobile phone, when remittee's left index finger by in recess, by with not according to, finger is not all almost seen mobile.
Referring to Fig. 4, for the determinant keyboard that works in interrupt mode, we also can adopt the mode that intercepts interrupt request to come the control figure key, and the P1.4-P1.7 of CPU8031 is the delivery outlet line among the figure, as the alignment of keyboard.Putting P1.4-P1.7 during initialization is 0.P1.0-P1.3 is the input port line, as the line of keyboard.Each line is received 8031 INTO end by AND gate, the centre has been connected in series operating key keyswitch 5 (closed type contact), when numerical key has closure, corresponding line becomes 0, AND gate output becomes 0, can have only when key 5 is closed interrupt request just can send to the INTO port, CPU can respond the interrupt request from keyboard, in interrupt service routine, finish the processing of key identification and key function, obviously, when key 5 disconnects, CPU does not receive interrupt request, can keyboard scan, this moment by numerical key be invalid action, our feinting deception of needing just.Temporarily stop the manner of execution of each numerical key function during for the pressing with the closed type contact of this example, we also can call this key " encryption key ".
Referring to Fig. 5, Fig. 5 is the side cutaway view of an ATM (automatic teller machine), and there is numeric keypad 12 display screen 11 belows, and a pothole groove 13 is thereunder arranged, and is provided with operating key 5 in the groove of hole, and people on one's feet cannot see this key, and the remittee goes to press with left hand.
Fig. 6 A has described a kind of embodiment axis side view of reequiping (Fig. 6 B is its cross-sectional schematic) display screen 14 belows on existing ATM (automatic teller machine) have numeric keypad 15, installed a semicircular radome 17 on the card 16 aside additional, operating key 5 is housed in the cover, remittee's left-hand finger puts in the cover, whether others can't discover button, and it is more convenient radome and button to be made of one such installation shown in also can image pattern 6C.Fig. 5 and Fig. 6 embodiment all are suitable for the electrical schematic diagram of Fig. 2 Fig. 4, no longer describe in detail.
Referring to Fig. 7, this ciphony equipment is without plug-in card, and directly button input password can be dialed, and we are installed in operating key 5 on the handle of microphone, press in the process of password at the right hand, " mix sand " inward under leftward " commander ".
Referring to Fig. 8, Fig. 8 is 8048 common single-chip microcomputer keyboard treatment circuit block schemes.Operating key 5 can be serially connected on the bidirectional clock lines, also can be serially connected on bidirectional data line, supply lines or the ground wire.Operating key 5 is that the nothing of a double-pole normally closed contact is locked monostable formula push switch in this example, and it is serially connected in respectively on bidirectional clock lines and the bidirectional data line.
Referring to Fig. 9, the typical keyboard interface circuit on the computer terminals system board mainly is made up of 74LS322 (U27) displacement/storage register and three d type flip flops (U21 and U70).When keyboard when main frame sends scan code, serial data is from KBDDATA line input interface circuit, promptly deliver to the DI end of 74LS322, serial data clock is imported from the KBDCLK line simultaneously, deliver to the input end U21-4 of trigger U21 (74LS175), PCLK is synchronous by the peripheral hardware clock, and the CLOCK (U27-11) that delivers to shift LD U27 behind delayed (U21-5), anti-phase (U21-6) again realizes the serial data of DI is moved in the U27 ...Operating key 5 is pinched leftward in the palm by the remittee, drags lead 18 to be serially connected on the clock line and data line between system board and the five core sockets outside long, and when pressing, each key on the keyboard is in disarmed state.
Referring to Figure 10, operating key 5 can also be connected on the termination of dragging lead 19 outside keyboard side plate 6, is pinched leftward in the palm by the remittee, and whether effectively the actuation of keys of the control right hand.

Claims (4)

1. code keypad comprises keyboard bit array, keyboard scan and interface circuit, ten numerical keys, some letter keys and clear confirmation keys compositions.It is characterized in that: acquire a button in concealed location; A). this button is connected through lead can influence in the common circuit of the formation of numerical key key-position signal and transmission; B). it has one group of normally closed or normally opened contact at least, and being does not have the monostable formula switch of lock.
2. by the described code keypad of claim 1, it is characterized in that: the button of newly acquiring can be installed on the panel of keyboard outside surface, side is pulled, on the base plate, drag lead termination, computer terminals to drag on lead termination or the microphone handle outward outward.
3. by the described code keypad of claim 1, it is characterized in that: the button of newly acquiring is connected in signal transmission, interrupt routine loop, clock, matrix, power supply or the ground path of key-position signal treatment circuit or keyboard interface circuit through lead.
4. by the described code keypad of claim 1, it is characterized in that: add radome on the button of newly acquiring or done flange on every side and gone along with sb. to guard him or done the pothole groove.
CN 03113026 2003-03-21 2003-03-21 Cipher keyboard Expired - Fee Related CN1252572C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 03113026 CN1252572C (en) 2003-03-21 2003-03-21 Cipher keyboard

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 03113026 CN1252572C (en) 2003-03-21 2003-03-21 Cipher keyboard

Publications (2)

Publication Number Publication Date
CN1532675A CN1532675A (en) 2004-09-29
CN1252572C true CN1252572C (en) 2006-04-19

Family

ID=34283705

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 03113026 Expired - Fee Related CN1252572C (en) 2003-03-21 2003-03-21 Cipher keyboard

Country Status (1)

Country Link
CN (1) CN1252572C (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006284611A (en) * 2005-03-31 2006-10-19 Alps Electric Co Ltd Semitransmissive liquid crystal display panel and color liquid crystal display device
CN105488439B (en) * 2015-11-27 2018-07-06 北京京东尚科信息技术有限公司 The input method and device of enhanced trading password

Also Published As

Publication number Publication date
CN1532675A (en) 2004-09-29

Similar Documents

Publication Publication Date Title
US10609019B2 (en) Establishing a secure channel with a human user
CN1952855B (en) Cipher input method and system preventing peeper
KR101916173B1 (en) Pin verification
EP2315155B1 (en) Method and system for granting access into a server computer system
CN108021800A (en) For the method by non-security terminal authentication user
EP2706699B1 (en) User terminal and payment system
US20060242421A1 (en) Logon system for an electronic device
CN104484612A (en) Sensitive information shielding method and system for remote desktop applications
US20030146931A1 (en) Method and apparatus for inputting secret information using multiple screen pointers
JP2002073563A (en) Device and method for providing safe access to service facility, and program product
CN108027855A (en) Multi-user's strong authentication token
CN1431575A (en) Intelligent secret keyboard with key values being changed randomly
US20070096946A1 (en) Information inputting system with a variable arrangement of keypad, and control method thereof
CN1252572C (en) Cipher keyboard
CN2606395Y (en) Coding keyboard
CN1831727A (en) Disordered keyboard with visual-angle limit for cryptographic input
CN108831009A (en) A kind of financial level security password input unit
CN101751522B (en) Method, device and system for preventing keys of keyboard from being logged
CN201063155Y (en) Cipher input device against peep
CN2544335Y (en) Code input keyboard
CN2788246Y (en) Intelligent dynamic display secret keyboard
CN1455312A (en) Enciphered password input method and its keyboard
CN113608629B (en) Intelligent keyboard system, password input method and self-service equipment
KR20170094532A (en) Input system and method for security key using graphic elements
WO2022001707A1 (en) Method and system for receiving a secure input, using a secure input means

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20060419

Termination date: 20120321