CN2544335Y - Code input keyboard - Google Patents

Code input keyboard Download PDF

Info

Publication number
CN2544335Y
CN2544335Y CN 02220322 CN02220322U CN2544335Y CN 2544335 Y CN2544335 Y CN 2544335Y CN 02220322 CN02220322 CN 02220322 CN 02220322 U CN02220322 U CN 02220322U CN 2544335 Y CN2544335 Y CN 2544335Y
Authority
CN
China
Prior art keywords
keyboard
key
button
password
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 02220322
Other languages
Chinese (zh)
Inventor
李布尔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 02220322 priority Critical patent/CN2544335Y/en
Application granted granted Critical
Publication of CN2544335Y publication Critical patent/CN2544335Y/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Input From Keyboards Or The Like (AREA)

Abstract

In exposed public occasions, inputting a private password into a computer is not safe, thus the article discloses a method and a keyboard for inputting encrypted password, which ensures that a peeper is unable to decipher the password even near at hand. The specific method is that a button is additionally arranged in a concealed position on the external surface of the keyboard, and the button is manipulated by left hand, which furtively causes a real password that is input by right hand to pass and blocks a fake password, thus redundant keys input by right hand are equivalent to password encryption code. Keyboard transformation using the method is simple and effective and has low cost, and password input using the method is civilized, decent, quick to learn, and safe and reliable.

Description

Cipher inputting keyboard
Technical field
The invention belongs to the computer peripheral category;
Background technology
As everyone knows, be placed with the client password input keyboard on the bank savings sales counter, keyboard is also arranged on ATM (automatic teller machine), the usefulness of input password when withdrawing the money for the client, the keyboard that has is in order to maintain secrecy, and the next door is provided with shield, but in order not influence remittee's button operation, these shields can not do cross exceed tight, the offender often from the remittee by the side of or shoulder rear snooping password, and then reach the purpose of illegal false claiming wealth.The application for a patent for invention that CN1177764A discloses a kind of " mask type cipher-code input method and equipment thereof ", a kind of optical lens operation keyboard that sees through has been proposed, whole all around methods of sealing, though this method can solve the problem of divulging a secret, but equipment complexity, complex operation, the bad the elderly's use of eyesight can be had any problem, and should go to seek simpler and efficient ways.The difficulty of dealing with problems is apparent: can imagine, the people who has the inclination to peep perhaps just at you by the side of or after one's death, perhaps stare at you with telescope a long way off, reflect according to public security department, which once had the offender to train " piercing eye ", and far also can judge by key according to the movement locus of your button at a distance of five or six meters! We can say that present cipher inputting keyboard that uses and method have no security performance and can say.
Summary of the invention:
Purpose of the present invention is to propose a kind of method, and so-called enciphered password input method and keyboard thereof improve cipher safety greatly.
Purpose is achieved in that the author thinks by analysis, present password input mode, be open, one dimension, forthright, want to guarantee the cryptosecurity input, except secretiveness, better way should be to password " encryption ", says to such an extent that accurately be to encrypt to the action of button, that is to say except by many again the password, come individual mixing the spurious with the genuine by several keys! , how can stay calm and collected with that many by several keys " do useless ", become the key point of plan, the people who peeps is dig-inning this right hand of your button, what if do what action and all can not escape his sight line? several times weigh, we have expected left hand.Left hand just is plagued with too much leisure in the process of withdrawing the money, why not entrust with an important task? both hands cooperate does things, and is exactly the speciality of primate originally, in addition human? after left hand is joined, use first one hand and then the other in quick succession, can allow the person of peeping attend to one thing and lose sight of another, if a backstage more allows it as weighing down in the mist before another platform! Particularly, we are in the concealed location of keyboard outside surface, newly acquire a button, (being called " operating key "), controlled by left hand, (right hand is controlled) ten numerical keys can temporarily lose function in the time that it disconnects, and that is to say that this key is equivalent to the master switch of ten numerical keys, only under situation about connecting, but press just input signal of each numerical key.How to implement this enciphered password input method? way is a lot, and from the software aspect, we can design a program, and the function of self-defined this button is solidificated in keyboard and handles and scan in the chip; From hardware aspect, we can be serially connected in this button can influence in the shared line of the formation of numerical key key-position signal and output, as common signal line, crystal oscillator line, data line, clock line, ground wire, supply lines or the like, when this key disconnects, even press each numerical key, key-position signal can not form or export; Perhaps CPU can not receive signal, perhaps asks the signal of CPU keyboard scan to be intercepted.When we prepare to press password on numerical key with right hand forefinger, left index finger is placed on this operating key, the right hand is many again by several keys (front or rear or middle) except password consciously, and left hand only keeps on-state when the right hand is pressed password, like this, obviously have only the key instruction of representing password can be admitted to CPU, and how by those several keys only be feinting deception, it is close to have added for password more in other words conj.or perhaps, thereby reaches the purpose that the fascination person of peeping ensures cryptosecurity.We can be placed in shelter away from numerical key to this operating key of newly acquiring, side or bottom surface as keyboard, the person of peeping can't be taken into account, if still be arranged on the card, also should do it smallerly, should be able to be covered fully, perhaps above key, install radome additional or done flange and gone along with sb. to guard him or have the pothole groove hidden by left index finger, allow the person of peeping cannot see this key, even cannot see the finger of button.Simultaneously, also should be at the keyboard disk conspicuous position, be printed with the literal of the of this sort meaning: " for your cryptosecurity; please before or after the password input; left hand is pressed operating key; several mess codes down of right hand input ... or the like, (is example with the closed type contact) is to remind the remittee that a feinting deception is done by association.In addition, newly this that acquire operating key also can be in parallel with the clear key on the keyboard on the circuit, utilize the function of clear key dispose silently the front by the feinting deception key, also can reach the effect of fascination.
Simple, effective, civilized generous, easy to learn with this ciphering type method and keyboard input password thereof, can stop peep of cipher, can be used on the various customer service equipment that need password input, as ATM, POS machine, stock market casual household exchange and intelligent network phones machine or the like.
Description of drawings
Fig. 1 is that embodiment one installs the operating key position view additional for the existing password input keyboard.
Fig. 2 is the circuit block diagram of embodiment one.
Fig. 3 embodiment two is the cipher inputting keyboard structural representations that are provided with operating key
Fig. 4 is the circuit block diagram of embodiment two.
Fig. 5 is the structural representation that embodiment three is provided with the ATM (automatic teller machine) of operating key.
Fig. 6 embodiment four is that existing ATM (automatic teller machine) installs operating key and radome synoptic diagram additional.
Fig. 7 embodiment five is that the intelligent network phones machine in street corner is transformed synoptic diagram.
Fig. 8 is a serial connection operating key position view in the single-chip microcomputer keyboard circuit block scheme commonly used.
Embodiment
Below in conjunction with accompanying drawing in detail embodiment is described in detail.
Referring to Fig. 1, it is the cipher inputting keyboard of putting on the common bank savings sales counter, 10 numeric keys 3 and zero clearing acknowledgement key etc. are arranged on the card 2, link to each other with the professional machine of the computer in the sales counter by wire harness 4, the operating key of newly acquiring 5 is installed at dish side 6 (towards bank clerk one side), the remittee goes to handle it with left hand, eyes-free is seen, as long as hand does not leave button, the person of peeping is difficult to know when it is pressed, when just light finger is put down gently in the above, and remittee's right hand oneself is careful when operating key is closed by real password as pressed numerical key in the past, during disconnection by several mess codes (being exactly so-called feinting deception), the cooperation of both hands has only and oneself knows what's what, and the person of peeping has no way of finding out about it, thereby has guaranteed cryptosecurity.
Referring to Fig. 2, Fig. 2 is the non-coding one dimension of the single-chip microcomputer keyboard circuit figure that uses always, and K0-K9 is the keyboard digital key, and each key takies the input-output line of CPU, when a certain key is pressed, corresponding incoming line is a low level, and height during release is when CPU finds have key to press, call the keyboard scan subroutine, the state of port is read into CPU, and CPU is by software identification key number generation key, and this all is that prior art does not describe in detail.The operating key of newly acquiring among the figure 5, its series connection are on the shared ground wire of K0-K9, obviously, have only when pressing in the time of (closure) this key, press the arbitrary key of K0-K9 just effectively, unclamp (disconnection) key 5 after, press K0-K9 again, just belong to feinting deception, be used for confusing the person of peeping.
Referring to Fig. 3, embodiment two has described the scheme of a kind of operating key design in card.One circle flange 9 is arranged at the edge of card 8, the middle recess 10 that just can hold the finger size that forms, there is operating key 5 centre, the resilient material of this key microswitch should select the movement range small voice again little, such as the sort of button of picture mobile phone, when remittee's left index finger by in recess, by with not according to, finger is not all almost seen mobile.
Referring to Fig. 4, for the determinant keyboard that works in interrupt mode, we also can adopt the mode that intercepts interrupt request to come the control figure key, and the P1.4-P17 of CPU8031 is the delivery outlet line among the figure, as the alignment of keyboard.Putting P1.4-P1.7 during initialization is 0.P1.0-P13 is the input port line, as the line of keyboard.Each line is received 8031 INTO end by AND gate, the centre has been connected in series operating key keyswitch 5 (closed type contact), when numerical key has closure, corresponding line becomes 0, AND gate output becomes 0, can have only when key 5 is closed interrupt request just can send to the INTO port, CPU can respond the interrupt request from keyboard, in interrupt service routine, finish the processing of key identification and key function, obviously, when key 5 disconnects, CPU does not receive interrupt request, can keyboard scan, this moment by numerical key be invalid action, our feinting deception of needing just.Temporarily stop the manner of execution of each numerical key function during for the pressing with the closed type contact of this example, we also can call this key " encryption key ".
Referring to Fig. 5, Fig. 5 is the side cutaway view of an ATM (automatic teller machine), and there is numeric keypad 12 display screen 11 belows, and a pothole groove 13 is thereunder arranged, and is provided with operating key 5 in the groove of hole, and people on one's feet cannot see this key, and the remittee can go to press with left hand.
Fig. 6 A has described a kind of embodiment axis side view of reequiping (Fig. 6 B is its cross-sectional schematic) display screen 14 belows on existing ATM (automatic teller machine) have numeric keypad 15, installed a semicircular radome 17 on the card 16 aside additional, operating key 5 is housed in the cover, remittee's left-hand finger puts in the cover, whether others can't discover button, and it is more convenient radome and button to be made of one such installation shown in also can image pattern 6C.Fig. 5 and Fig. 6 embodiment all are suitable for the electrical schematic diagram of Fig. 2 Fig. 4, no longer describe in detail.
Referring to Fig. 7, this phone is without plug-in card, and directly button input password can be dialed, and we are installed in operating key 5 on the handle of microphone, press in the process of password at the right hand, " mix sand " inward under leftward " commander ".
Referring to Fig. 8, Fig. 8 is 8048 common single-chip microcomputer keyboard circuit block schemes.Operating key 5 can be serially connected on the bidirectional clock lines, also can be serially connected on bidirectional data line, supply lines or the ground wire.

Claims (6)

1, cipher inputting keyboard, comprise that key bit array, keyboard processing and sweep circuit, ten numerical keys and clear confirmation key form, it is characterized in that: in the concealed location of keyboard outside surface, newly acquire a button, this button is serially connected in can influence in the shared line of the formation of numerical key key-position signal and output.
2, by the described cipher inputting keyboard of claim 1, it is characterized in that: this button is in parallel with clear key.
3, by the described cipher inputting keyboard of claim 1, it is characterized in that: this button is placed in the side or the bottom surface of keyboard.
4, by the described cipher inputting keyboard of claim 1, it is characterized in that: this button is placed in card, and the area size can be covered fully by forefinger.
5, by the described cipher inputting keyboard of claim 1, it is characterized in that: above this button, add radome or done flange on every side and gone along with sb. to guard him or done the pothole groove.
6, by the described keyboard of claim 1, it is characterized in that: this button is placed on the handle of microphone.
CN 02220322 2002-04-30 2002-04-30 Code input keyboard Expired - Fee Related CN2544335Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 02220322 CN2544335Y (en) 2002-04-30 2002-04-30 Code input keyboard

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 02220322 CN2544335Y (en) 2002-04-30 2002-04-30 Code input keyboard

Publications (1)

Publication Number Publication Date
CN2544335Y true CN2544335Y (en) 2003-04-09

Family

ID=33698632

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 02220322 Expired - Fee Related CN2544335Y (en) 2002-04-30 2002-04-30 Code input keyboard

Country Status (1)

Country Link
CN (1) CN2544335Y (en)

Similar Documents

Publication Publication Date Title
CN104584086B (en) PIN is verified
CN1952855B (en) Cipher input method and system preventing peeper
US8836473B2 (en) Dynamic keypad and fingerprinting sequence authentication
US20130264384A1 (en) Automatic teller machine ("atm") including a user-accessible usb port
JP2006185449A5 (en)
US20030146931A1 (en) Method and apparatus for inputting secret information using multiple screen pointers
CN105320870A (en) Fingerprint unlocking method and apparatus and mobile terminal
KR20010090877A (en) Secure system using continuously-changing features of a body part as a key
CN101232380A (en) Method of intelligent cryptographic key equipment safety use and intelligent cryptographic key equipment
US20020093488A1 (en) Information entry device
US20070096946A1 (en) Information inputting system with a variable arrangement of keypad, and control method thereof
CN101539837A (en) Touch force numerical password input device
CN101021756A (en) Dynamic displaying cipher keboard
CN108831009A (en) A kind of financial level security password input unit
CN2544335Y (en) Code input keyboard
CN1252572C (en) Cipher keyboard
Guerar et al. Color wheel pin: Usable and resilient ATM authentication
US20090037989A1 (en) Method for presenting password codes in mobile devices for authenticating a user at a protected institution
CN2606395Y (en) Coding keyboard
CN101751522B (en) Method, device and system for preventing keys of keyboard from being logged
CN1455312A (en) Enciphered password input method and its keyboard
CN2786697Y (en) Anti-peeking disorder password input unit
CN204946221U (en) A kind of mobile POS
TW201629838A (en) A secretly inputing method
CN200947201Y (en) Dual-purpose cipher anti-peeping keyboard

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee