CN204667529U - Cipher peeping-proof cover - Google Patents

Cipher peeping-proof cover Download PDF

Info

Publication number
CN204667529U
CN204667529U CN201420872926.5U CN201420872926U CN204667529U CN 204667529 U CN204667529 U CN 204667529U CN 201420872926 U CN201420872926 U CN 201420872926U CN 204667529 U CN204667529 U CN 204667529U
Authority
CN
China
Prior art keywords
peeping
cipher
proof cover
top board
small pieces
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201420872926.5U
Other languages
Chinese (zh)
Inventor
危学庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DIEBOLD FINANCIAL EQUIPMENT Co Ltd
Original Assignee
DIEBOLD FINANCIAL EQUIPMENT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DIEBOLD FINANCIAL EQUIPMENT Co Ltd filed Critical DIEBOLD FINANCIAL EQUIPMENT Co Ltd
Priority to CN201420872926.5U priority Critical patent/CN204667529U/en
Application granted granted Critical
Publication of CN204667529U publication Critical patent/CN204667529U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The utility model provides a kind of cipher peeping-proof cover, comprises a top board; Two side plates that become one with top board; Multiple lattice-shaped through holes, are positioned on top board; And multiple small pieces, each small pieces are connected with the appropriate section of top board, have certain degree the direction of each through hole is restricted between the thickness direction of top board, described angle can prevent the light to inject lattice-shaped through hole from top except any angle operator's sight angle from arriving the code keypad of cipher peeping-proof cover below.

Description

Cipher peeping-proof cover
Technical field
The utility model relates to a kind of for preventing the cipher anti-theft of the peep of cipher of inputCover.
Background technology
Along with the popularization of e-finance business, use the situation that various bank cards are concluded the businessMore and more general. For example, people, after carrying out current consumption, use silver more and moreRow card (as debit card or credit card) is swiped the card and is paid a bill instead of cash is paid a bill. Example againInquire about as, people use ATM (ATM) more and more, withdraw the money,Deposit, transfer accounts, even paying waits transaction.
In these transaction, input user cipher in a lot of situations, is needed to enter user identityRow is verified. But for ATM, to be exactly that password is stolen read maximum potential safety hazard.In order to prevent password by other people (for example by other people directly or be arranged on code keypad by other peopleThe camera of near zone) steal and read, propose and on code keypad, install cipher peeping-proof cover additionalScheme.
What propose the earliest is the iron cipher peeping-proof cover of a kind of totally enclosed type, and it can cover completelyCode keypad, but this watching shield cover also blocks operator's sight line simultaneously, gives operatorInput password is made troubles, and due to the reason of material and technique on pattern handling also thanComparatively limitation. Also have the iron cipher peeping-proof cover of a kind of venetian blind type, its top uses flat goldBelong to thin slice, it has grid, and this watching shield cover can convenient operation person be seen code keypadWith input password, can prevent again the monitored robber of partial password from reading, but, its forming materials workThe possibility that skill limitation can cause monitoring robber to read. Further, because the grid of this watching shield cover is openedMouth is vertical with code keypad, and the camera that is arranged on ATM top likely photographs operationThe password of person's input.
Utility model content
For above problem, the utility model proposes a kind of for effectively preventing the password of inputThe cipher anti-theft shield apparatus of being peeped.
According to a scheme of the present utility model, provide a kind of cipher peeping-proof cover, comprise oneIndividual top board; Two side plates that become one with top board; Multiple lattice-shaped through holes, are positioned at topOn plate; And multiple small pieces, each small pieces are connected with the appropriate section of top board, with by eachThe direction of through hole is restricted between the thickness direction of top board has certain degree, described angleCan prevent from leading to inject lattice-shaped from top except any angle operator's sight angleThe light in hole arrives the code keypad of cipher peeping-proof cover below.
In one implementation, the size of described angle is by width and the institute of described lattice-shaped through holeThe length of stating small pieces determines.
In one implementation, the appropriate section of described small pieces and top board forms as one.
In one implementation, described cipher peeping-proof cover is integrated.
In one implementation, described lattice-shaped through hole is by injection mo(u)lding.
In one implementation, described cipher peeping-proof cover is by high molecular polymer injection mo(u)lding.
In one implementation, described cipher peeping-proof cover also comprises: illuminating lamp, described in it is positioned atCipher peeping-proof cover below is towards the side of code keypad, for illuminating code keypad.
Compared with above-mentioned known cipher peeping-proof cover, the cipher peeping-proof cover the utility model proposesWhen handled easily person inputs password, the password of input comprehensively effectively can also be preventedPeeped.
Accompanying drawing explanation
By below with reference to the detailed description of the invention of the present utility model given by following accompanying drawingAfter description, the utility model will be understood better, and other objects of the present utility model,Details, feature and advantage will become more apparent. In the accompanying drawings:
Fig. 1 shows cipher peeping-proof cover according to the utility model embodiment is installedThe overview of ATM;
Fig. 2 shows the side view of an example according to cipher peeping-proof cover of the present utility model;
Fig. 3 shows when being arranged on ATM according to cipher peeping-proof cover of the present utility modelThe overall schematic of cross section;
Fig. 4 shows the horizontal stroke during critical excitation that cipher peeping-proof cover prevents peep of cipherThe schematic diagram in cross section; And
Fig. 5 and Fig. 6 respectively illustrate cross section during other duties of cipher peeping-proof coverSchematic diagram.
Wherein, in all of the figs, same or analogous label represent have identical, similarOr the element of corresponding feature or function.
Detailed description of the invention
Preferred embodiment of the present utility model is described below with reference to accompanying drawings in more detail. ThoughSo in accompanying drawing, show preferred embodiment of the present utility model, but should be appreciated that, canThe embodiment of realizing the utility model in a variety of manners and should do not set forth here limits.On the contrary, it is in order to make the utility model more thorough and complete that these embodiments are provided, andAnd complete scope of the present utility model can be conveyed to those skilled in the art.
Fig. 1 shows cipher peeping-proof cover 10 according to the utility model embodiment is installedThe overview of ATM 20, wherein cipher peeping-proof cover 10 is for preventing other people from spying on behaviourThe input that author carries out on code keypad 30. In FIG, cipher peeping-proof cover 10 is shownShow for being arranged on ATM 20, but it will be understood by those skilled in the art that according to thisThe cipher peeping-proof cover 10 of the inventive concept of utility model can be arranged on any other needs inputThe place of password, for example, be arranged on the keypad of fixing or mobile POS, be arranged on doorThe cipher inputting keyboard of access control system is first-class.
Fig. 2 shows the side-looking of an example according to cipher peeping-proof cover 10 of the present utility modelFigure. As shown in Figure 2, cipher peeping-proof cover 10 has a top board 1 and two side plates 2,Wherein top board 1 and two side plates 2 become one. Top board 1 has respectively along top board 1Widthwise edge and longitudinal edge arrange multiple lattice-shaped through holes 3. According to password of the present utility modelA main difference of watching shield cover 10 and the venetian blind type cipher peeping-proof cover described in background technologyPart is, lattice-shaped through hole 3 is not that the thickness direction along top board 1 is vertical with top board 1,But have angle α (as shown in Figure 4) with the thickness direction of top board 1, angle α makesThe code keypad below cipher peeping-proof cover must be able to be prevented in larger angular range stolenPeep. Below by way of example, angle α is described in detail. For example, lattice-shaped through hole 3Can by injection mo(u)lding.
Fig. 3 to Fig. 6 shows according to cipher peeping-proof cover 10 of the present utility model and prevents from being arranged onThe schematic diagram of the various operative scenario of the camera snooping password keyboard 30 of top.
Fig. 3 shows according to cipher peeping-proof cover 10 of the present utility model and is arranged on ATM 20The overall schematic of the cross section when upper.
As shown in Figure 3, suppose that cipher peeping-proof cover 10 is arranged on ATM 20 top upper, itsMiddle A and B is respectively the rearmost that the camera for peeping can be installed on ATM 20Position with forefront, the region that some A, A1, A2 surround is the peeped district of camera ATerritory (also referred to as region A), the region that some B, B1, B2 surround is stealing of camera BPeep region (also referred to as region B), region A and region B represent and are arranged on ATMThe maximum magnitude that the camera at 20 tops can be peeped. But the utility model does not limit toIn this, in fact, peep camera other regions may be arranged on, for example, can be arranged onThe two ends of the cell at ATM 20 place, corner etc. Therefore, prevent the region peeped shouldThis is any other region except operator position, code keypad 3 top.
When Fig. 4 shows the critical excitation that cipher peeping-proof cover 10 prevents peep of cipherThe schematic diagram of cross section.
As being shown specifically in Fig. 4, cipher peeping-proof cover 10 has multiple small pieces 4, Mei Ge littleSheet 4 is connected with the appropriate section of top board 1, so that the direction of through hole 3 is restricted to and top board 1Thickness direction there is angle α.
In one preferably realizes, small pieces 4 form as one with the appropriate section of top board 1.For example, cipher peeping-proof cover 10 is integrated, thus small pieces 4 are to be formed as with top board 1One. But the utility model is not limited to this, and small pieces 4 also can be independent portionsPart, otherwise combines with the various piece of top board 1, for example pass through to weld,Bonding etc. For integrated cipher peeping-proof cover, can realize between ATMInstallation by adhering, thus enhance integral firmness and destroy difficulty.
The size of angle α is determined by the width of through hole 3 and the length of small pieces 4. Therefore, canDesign with the length to small pieces 4 and angle α, to make with except operator's angle of sightAny angle of being outside one's consideration is injected through hole 3 light from top all can not arrive cipher peeping-proof cover 10The code keypad 30 of below.
As shown in Figures 3 and 4, along the lines C1-C2 of small pieces 4 and logical at lattice-shapedThe edge in hole 3 forms on code keypad perpendicular to the lines D1-D2 of lattice-shaped through hole 3The viewing area that forms for each lattice-shaped through hole 3, region (i.e. C2-D2 region), canFor operator (holder) input password, and the visible area that all lattice-shaped through holes 3 formRegion outside territory is effective peep-proof region, can prevent Password Input from being peeped.
Further, cipher peeping-proof cover 10 below is all right towards the side of code keypad 30Illuminating lamp (not shown) is installed, for illuminating code keypad 30, to make operationPerson also can be clear accurate as daytime when night uses ATM input password, fromAnd obtain better Consumer's Experience.
Fig. 4 shows the critical excitation of cipher peeping-proof cover 10. In this case, lightPerpendicular to top board 1 incident. As shown in Figure 4, suppose that the width of through hole 3 is d, small pieces 4Length be L, then sin α=d/L.
Therefore, can according to actual conditions the width to through hole 3, small pieces 4 length andThe size of angle α is selected, to meet various different needs.
Transversal when Fig. 5 and Fig. 6 respectively illustrate other duties of cipher peeping-proof cover 10The schematic diagram in face. For example, the light that Fig. 5 shows the incident of operator's sight angle can get atReach the situation of code keypad 30, Fig. 6 shows and is positioned at ATM 20 forefront, top (exampleAs the B point in Fig. 3) the light of camera the situation of code keypad 30 can not be arrived.
Can find out, the cipher peeping-proof cover 10 of realizing according to the utility model can ensure operationPerson's (Password Input person) normal operating, can prevent from being again arranged on the shooting of top simultaneouslyHead is spied on the input of operator on code keypad.
In one implementation, cipher peeping-proof cover 10 is made up of high molecular polymer. For example, canTo use various plastic raw materials to make.
Utilize cipher peeping-proof cover of the present utility model, no matter any side above ATM panelCamera is installed in position all cannot spy on gesture path when operator inputs password, and operatesPerson also can make it when inputting password because of watching shield cover height parameter optimal design when input passwordThe five fingers stretch, the drawback that the movement locus that doing so avoids single finger is easily captured.
In addition, use plastic raw materials make cipher peeping-proof cover, also make its outward appearance be different fromToward single outward appearance made of iron, it is same that this improves good looking appearance degree better from industrial design angleTime also improve user experience.
Above description for enabling any those of ordinary skill of this area realize of the present disclosureOr use the utility model. To those skilled in the art, of the present disclosure variousAmendment is all apparent, and general principle defined herein also can not depart fromOther distortion is applied in the situation of spirit of the present utility model and protection domain. Therefore, originallyUtility model is not limited to example as herein described and design, but with principle disclosed hereinConsistent with the widest scope of novel features.

Claims (7)

1. a cipher peeping-proof cover, is characterized in that, comprising:
A top board;
Two side plates that become one with top board;
Multiple lattice-shaped through holes, are positioned on top board; And
Multiple small pieces, each small pieces are connected with the appropriate section of top board, with by the side of each through holeHave certain degree to being restricted between the thickness direction of top board, described angle can preventTo inject the light of lattice-shaped through hole from top except any angle operator's sight angleArrive the code keypad of cipher peeping-proof cover below.
2. cipher peeping-proof cover as claimed in claim 1, is characterized in that, described angleSize is determined by the width of described lattice-shaped through hole and the length of described small pieces.
3. cipher peeping-proof cover as claimed in claim 1, is characterized in that, described small pieces withThe appropriate section of top board forms as one.
4. cipher peeping-proof cover as claimed in claim 1, is characterized in that, described password is anti-It is integrated peeping cover.
5. cipher peeping-proof cover as claimed in claim 1, is characterized in that described lattice-shapedThrough hole is by injection mo(u)lding.
6. cipher peeping-proof cover as claimed in claim 1, is characterized in that, described password is anti-Peep cover to be formed by high molecular polymer manufacture.
7. cipher peeping-proof cover as claimed in claim 1, is characterized in that, also comprise: shineBright lamp, it is positioned at described cipher peeping-proof cover below towards the side of code keypad, for illuminatingCode keypad.
CN201420872926.5U 2014-12-29 2014-12-29 Cipher peeping-proof cover Expired - Fee Related CN204667529U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201420872926.5U CN204667529U (en) 2014-12-29 2014-12-29 Cipher peeping-proof cover

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201420872926.5U CN204667529U (en) 2014-12-29 2014-12-29 Cipher peeping-proof cover

Publications (1)

Publication Number Publication Date
CN204667529U true CN204667529U (en) 2015-09-23

Family

ID=54137889

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201420872926.5U Expired - Fee Related CN204667529U (en) 2014-12-29 2014-12-29 Cipher peeping-proof cover

Country Status (1)

Country Link
CN (1) CN204667529U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104599396A (en) * 2014-12-29 2015-05-06 迪堡金融设备有限公司 Password anti-peeping cover

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104599396A (en) * 2014-12-29 2015-05-06 迪堡金融设备有限公司 Password anti-peeping cover

Similar Documents

Publication Publication Date Title
CN201331799Y (en) Self-help card-distributing apparatus
JP2013522753A (en) Mobile communication device
CN204667529U (en) Cipher peeping-proof cover
JP5463220B2 (en) Peep prevention cover and automatic transaction device
CN204155361U (en) One-stop intelligent certificate accepts the equipment of writing comments on a document
CN105225360A (en) A kind of integrated cash register
CN202454001U (en) Self-service terminal device for tax service
CN104599396A (en) Password anti-peeping cover
US20150106925A1 (en) Security system and method
CN208172927U (en) ATM machine and its Anti peep cipher inputting machine
WO2012135272A1 (en) Personal identification number at account level
CN209118428U (en) A kind of super sales counter self-aided terminal
CN103440716B (en) A kind of mobile payment deck and device
JP2012238247A (en) Automatic teller machine
Rao Automated teller machines usage in India: Emerging challenges
CN206292924U (en) Cap assembly and automatic trading apparatus
JP2017091281A (en) Cover member
CN202584302U (en) Counter interactive passageway groove
US20120319957A1 (en) Transaction terminal comprising a view shield
CN205405550U (en) Self -service hairpin equipment of membership card
JP6375693B2 (en) Cash handling equipment
CN207817709U (en) Keyboard peep-prevention cover
CN204856701U (en) Intelligence cashier slot button password control system
JP5961973B2 (en) Automatic transaction equipment
Markantonakis et al. Overview of security threats for smart cards in the public transport industry

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150923

Termination date: 20171229