CN1455312A - Enciphered password input method and its keyboard - Google Patents

Enciphered password input method and its keyboard Download PDF

Info

Publication number
CN1455312A
CN1455312A CN 02112960 CN02112960A CN1455312A CN 1455312 A CN1455312 A CN 1455312A CN 02112960 CN02112960 CN 02112960 CN 02112960 A CN02112960 A CN 02112960A CN 1455312 A CN1455312 A CN 1455312A
Authority
CN
China
Prior art keywords
keyboard
key
button
password
password input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 02112960
Other languages
Chinese (zh)
Inventor
李布尔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 02112960 priority Critical patent/CN1455312A/en
Publication of CN1455312A publication Critical patent/CN1455312A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Input From Keyboards Or The Like (AREA)

Abstract

Under exposed public situation, it is not safe for people to input own password into computer. The invented method and the keyboard makes peepers even near at hand cannot obtain the password. One key operated by the left hand is added on the external surface in hidden position. The left hand controls whether the key pushed by the right hand is passing through or blocked off. The redundant key pushed by the right is equivalent to encryption of the password. The method for modifying the keyboard is simple, efficiency and low cost as well as easy learning and safety.

Description

Enciphered password input method and keyboard thereof
Technical field
The invention belongs to the computer peripheral category;
Background technology
As everyone knows, be placed with the client password input keyboard on the bank savings sales counter, keyboard is also arranged on ATM (automatic teller machine), the usefulness of input password when withdrawing the money for the client, the keyboard that has is in order to maintain secrecy, and the next door is provided with shield, but in order not influence remittee's button operation, these shields can not do cross exceed tight, the offender often from the remittee by the side of or shoulder rear snooping password, and then reach the purpose of illegal false claiming wealth.The application for a patent for invention that CN1177764A discloses a kind of " mask type cipher-code input method and equipment thereof ", a kind of optical lens operation keyboard that sees through has been proposed, whole all around methods of sealing, though this method can solve the problem of divulging a secret, but equipment complexity, complex operation, the bad the elderly's use of eyesight can be had any problem, and should go to seek simpler and efficient ways.The difficulty of dealing with problems is apparent: can imagine, the people who has the inclination to peep perhaps just at you by the side of or after one's death, perhaps stare at you with telescope a long way off, reflect according to public security department, which once had the offender to train " piercing eye ", and far also can judge by key according to the movement locus of your button at a distance of five or six meters! We can say that present cipher inputting keyboard that uses and method have no security performance and can say.
Summary of the invention:
Purpose of the present invention is to propose a kind of method, and so-called enciphered password input method and keyboard thereof improve cipher safety greatly.
Purpose is achieved in that the author thinks by analysis, present password input mode, be open, one dimension, forthright, want to guarantee the cryptosecurity input, except secretiveness, better way should be to password " encryption ", says to such an extent that accurately be to encrypt to the action of button, that is to say except by many again the password, come individual mixing the spurious with the genuine by several keys! , how can stay calm and collected with that many by several keys " do useless ", become the key point of plan, the people who peeps is dig-inning this right hand of your button, what if do what action and all can not escape his sight line? several times weigh, we have expected left hand.Left hand just is plagued with too much leisure in the process of withdrawing the money, why not entrust with an important task? both hands cooperate does things, and is exactly the speciality of primate originally, in addition human? after left hand is joined, use first one hand and then the other in quick succession, can allow the person of peeping attend to one thing and lose sight of another, if a backstage more allows it as weighing down in the mist before another platform! Particularly, we are in the concealed location of keyboard outside surface, newly acquire a button, (being called " operating key "), controlled by left hand, (right hand is controlled) ten numerical keys can temporarily lose function in the time that it disconnects, and that is to say that this key is equivalent to the master switch of ten numerical keys, only under situation about connecting, but press just input signal of each numerical key.How to implement this enciphered password input method? way is a lot, and from the software aspect, we can design a program, and the function of self-defined this button is solidificated in keyboard and handles and scan in the chip; From hardware aspect, we can be serially connected in this button can influence in the shared line of the formation of numerical key key-position signal and output, as common signal line, crystal oscillator line, data line, clock line, ground wire, supply lines or the like, when this key disconnects, even press each numerical key, key-position signal can not form or export; Perhaps CPU can not receive signal, perhaps asks the signal of CPU keyboard scan to be intercepted.When we prepare to press password on numerical key with right hand forefinger, left index finger is placed on this operating key, the right hand is many again by several keys (front or rear or middle) except password consciously, and left hand only keeps on-state when the right hand is pressed password, like this, obviously have only the key instruction of representing password can be admitted to CPU, and how by those several keys only be feinting deception, it is close to have added for password more in other words conj.or perhaps, thereby reaches the purpose that the fascination person of peeping ensures cryptosecurity.We can be placed in shelter away from numerical key to this operating key of newly acquiring, side or bottom surface as keyboard, the person of peeping can't be taken into account, if still be arranged on the card, also should do it smallerly, should be able to be covered fully, perhaps above key, install radome additional or done flange and gone along with sb. to guard him or have the pothole groove hidden by left index finger, allow the person of peeping cannot see this key, even cannot see the finger of button.Simultaneously, also should be at the keyboard disk conspicuous position, be printed with the literal of the of this sort meaning: " for your cryptosecurity; please before or after the password input; left hand is pressed operating key; several mess codes down of right hand input ... or the like, (is example with the closed type contact) is to remind the remittee that a feinting deception is done by association.In addition, newly this that acquire operating key also can be in parallel with the clear key on the keyboard on the circuit, utilize the function of clear key dispose silently the front by the feinting deception key, also can reach the effect of fascination.
Simple, effective, civilized generous, easy to learn with this ciphering type method and keyboard input password thereof, can stop peep of cipher, can be used on the various customer service equipment that need password input, as ATM, POS machine, stock market casual household exchange and intelligent network phones machine or the like.
Description of drawings
Fig. 1 is that embodiment one installs the operating key position view additional for the existing password input keyboard.
Fig. 2 is the circuit block diagram of embodiment one.
Fig. 3 embodiment two is the cipher inputting keyboard structural representations that are provided with operating key
Fig. 4 is the circuit block diagram of embodiment two.
Fig. 5 is the structural representation that embodiment three is provided with the ATM (automatic teller machine) of operating key.
Fig. 6 embodiment four is that existing ATM (automatic teller machine) installs operating key and radome synoptic diagram additional.
Fig. 7 embodiment five is that the intelligent network phones machine in street corner is transformed synoptic diagram.
Fig. 8 is a serial connection operating key position view in the single-chip microcomputer keyboard circuit block scheme commonly used.
Embodiment
Below in conjunction with accompanying drawing in detail embodiment is described in detail.
Referring to Fig. 1, it is the cipher inputting keyboard of putting on the common bank savings sales counter, 10 numeric keys 3 and zero clearing acknowledgement key etc. are arranged on the card 2, link to each other with the professional machine of the computer in the sales counter by wire harness 4, the operating key of newly acquiring 5 is installed at dish side 6 (towards bank clerk one side), the remittee goes to handle it with left hand, eyes-free is seen, as long as hand does not leave button, the person of peeping is difficult to know when it is pressed, when just light finger is put down gently in the above, and remittee's right hand oneself is careful when operating key is closed by real password as pressed numerical key in the past, during disconnection by several mess codes (being exactly so-called feinting deception), the cooperation of both hands has only and oneself knows what's what, and the person of peeping has no way of finding out about it, thereby has guaranteed cryptosecurity.
Referring to Fig. 2, Fig. 2 is the non-coding one dimension of the single-chip microcomputer keyboard circuit figure that uses always, and K0-K9 is the keyboard digital key, and each key takies the input-output line of CPU, when a certain key is pressed, corresponding incoming line is a low level, and height during release is when CPU finds have key to press, call the keyboard scan subroutine, the state of port is read into CPU, and CPU is by software identification key number generation key, and this all is that prior art does not describe in detail.The operating key of newly acquiring among the figure 5, its series connection are on the shared ground wire of K0-K9, obviously, have only when pressing in the time of (closure) this key, press the arbitrary key of K0-K9 just effectively, unclamp (disconnection) key 5 after, press K0-K9 again, just belong to feinting deception, be used for confusing the person of peeping.
Referring to Fig. 3, embodiment two has described the scheme of a kind of operating key design in card.One circle flange 9 is arranged at the edge of card 8, the middle recess 10 that just can hold the finger size that forms, there is operating key 5 centre, the resilient material of this key microswitch should select the movement range small voice again little, such as the sort of button of picture mobile phone, when remittee's left index finger by in recess, by with not according to, finger is not all almost seen mobile.
Referring to Fig. 4, for the determinant keyboard that works in interrupt mode, we also can adopt the mode that intercepts interrupt request to come the control figure key, and the P1.4-P1.7 of CPU8031 is the delivery outlet line among the figure, as the alignment of keyboard.Putting P1.4-P1.7 during initialization is 0.P1.0-P1.3 is the input port line, as the line of keyboard.Each line is received 8031 INTO end by AND gate, the centre has been connected in series operating key keyswitch 5 (closed type contact), when numerical key has closure, corresponding line becomes 0, AND gate output becomes 0, can have only when key 5 is closed interrupt request just can send to the INTO port, CPU can respond the interrupt request from keyboard, in interrupt service routine, finish the processing of key identification and key function, obviously, when key 5 disconnects, CPU does not receive interrupt request, can keyboard scan, this moment by numerical key be invalid action, our feinting deception of needing just.Temporarily stop the manner of execution of each numerical key function during for the pressing with the closed type contact of this example, we also can call this key " encryption key ".
Referring to Fig. 5, Fig. 5 is the side cutaway view of an ATM (automatic teller machine), and there is numeric keypad 12 display screen 11 belows, and a pothole groove 13 is thereunder arranged, and is provided with operating key 5 in the groove of hole, and people on one's feet cannot see this key, and the remittee can go to press with left hand.
Fig. 6 A has described a kind of embodiment axis side view of reequiping (Fig. 6 B is its cross-sectional schematic) display screen 14 belows on existing ATM (automatic teller machine) have numeric keypad 15, installed a semicircular radome 17 on the card 16 aside additional, operating key 5 is housed in the cover, remittee's left-hand finger puts in the cover, whether others can't discover button, and it is more convenient radome and button to be made of one such installation shown in also can image pattern 6C.Fig. 5 and Fig. 6 embodiment all are suitable for the electrical schematic diagram of Fig. 2 Fig. 4, no longer describe in detail.
Referring to Fig. 7, this phone is without plug-in card, and directly button input password can be dialed, and we are installed in operating key 5 on the handle of microphone, press in the process of password at the right hand, " mix sand " inward under leftward " commander ".
Referring to Fig. 8, Fig. 8 is 8048 common single-chip microcomputer keyboard circuit block schemes.Operating key 5 can be serially connected on the bidirectional clock lines, also can be serially connected on bidirectional data line, supply lines or the ground wire.

Claims (6)

1, enciphered password input method and keyboard thereof, comprise that keyboard bit array, keyboard processing and sweep circuit, ten numerical keys and clear confirmation key form, it is characterized in that: in the concealed location of keyboard outside surface, acquire a button, this button is serially connected in can influence in the shared line of the formation of numerical key key-position signal and output.
2, by the described keyboard of claim 1, it is characterized in that: this button is in parallel with clear key.
3, by the described keyboard of claim 1, it is characterized in that: this button is placed in the side or the bottom surface of keyboard.
4, by the described keyboard of claim 1, it is characterized in that: this button is placed in card, and its area size can be covered fully by forefinger.
5, by the described keyboard of claim 1, it is characterized in that: on this key, add radome or done flange on every side and gone along with sb. to guard him or done the pothole groove.
6, by the described keyboard of claim 1, it is characterized in that: this button is placed on the handle of microphone.
CN 02112960 2002-04-30 2002-04-30 Enciphered password input method and its keyboard Pending CN1455312A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 02112960 CN1455312A (en) 2002-04-30 2002-04-30 Enciphered password input method and its keyboard

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 02112960 CN1455312A (en) 2002-04-30 2002-04-30 Enciphered password input method and its keyboard

Publications (1)

Publication Number Publication Date
CN1455312A true CN1455312A (en) 2003-11-12

Family

ID=29256856

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 02112960 Pending CN1455312A (en) 2002-04-30 2002-04-30 Enciphered password input method and its keyboard

Country Status (1)

Country Link
CN (1) CN1455312A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101609489B (en) * 2008-06-17 2011-07-27 联想(北京)有限公司 Secure input method for computer and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101609489B (en) * 2008-06-17 2011-07-27 联想(北京)有限公司 Secure input method for computer and system

Similar Documents

Publication Publication Date Title
CN107742362B (en) PIN verification
US8836473B2 (en) Dynamic keypad and fingerprinting sequence authentication
US8910861B2 (en) Automatic teller machine (“ATM”) including a user-accessible USB port
CN201069559Y (en) Peek prevention touch password input keyboard
EP2706699B1 (en) User terminal and payment system
CN107592933A (en) Security-biometric data capture, processing and management
US5677700A (en) Apparatus and method for achieving optical data protection and intimacy for users of computer terminals
CN1952855A (en) Cipher input method and system preventing peeper
CN102246181A (en) Secure method and device of financial transaction
US20020093488A1 (en) Information entry device
US20070096946A1 (en) Information inputting system with a variable arrangement of keypad, and control method thereof
CN101021756A (en) Dynamic displaying cipher keboard
CN108831009A (en) A kind of financial level security password input unit
CN1831727A (en) Disordered keyboard with visual-angle limit for cryptographic input
CN2544335Y (en) Code input keyboard
CN1252572C (en) Cipher keyboard
CN2606395Y (en) Coding keyboard
CN1455312A (en) Enciphered password input method and its keyboard
CN101751522B (en) Method, device and system for preventing keys of keyboard from being logged
CN201063155Y (en) Cipher input device against peep
CN204946221U (en) A kind of mobile POS
CN2793805Y (en) Cipher inputting safety device
TW201629838A (en) A secretly inputing method
CN1996211A (en) Theftproof simplified cipher input device
CN201188237Y (en) Private cipher input system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication