CN2606395Y - Coding keyboard - Google Patents

Coding keyboard Download PDF

Info

Publication number
CN2606395Y
CN2606395Y CN 03220556 CN03220556U CN2606395Y CN 2606395 Y CN2606395 Y CN 2606395Y CN 03220556 CN03220556 CN 03220556 CN 03220556 U CN03220556 U CN 03220556U CN 2606395 Y CN2606395 Y CN 2606395Y
Authority
CN
China
Prior art keywords
keyboard
key
button
password
code keypad
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN 03220556
Other languages
Chinese (zh)
Inventor
李布尔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 03220556 priority Critical patent/CN2606395Y/en
Application granted granted Critical
Publication of CN2606395Y publication Critical patent/CN2606395Y/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Abstract

Personal password input into computer in a public location is not safe and therefore the utility model provides a coded password input method and a coding keyboard, which prevent a peer near at hand from decoding the password. The concrete technical proposal is that a hidden position on the surface of the keyboard is provided with a keystroke which is controlled by the left hand to let the true password input by the right hand pass verification and stop the entrance of the false password, wherein the additional keystrokes controlled by the right hand perform a function similar to encryption of the true password. The keyboard rebuilt in the way has the advantages of simple structure, good effect and low cost, and the way to input password is civilized, liberal, easy, safe and reliable.

Description

Code keypad
Technical field
The invention belongs to the computer peripheral category;
Background technology
As everyone knows, be placed with the client password input keyboard on the bank savings sales counter, keyboard is also arranged on ATM (automatic teller machine), the usefulness of input password when withdrawing the money for the client, the keyboard that has is in order to maintain secrecy, and the next door is provided with shield, but in order not influence remittee's button operation, these shields can not do cross exceed tight, the offender often from the remittee by the side of or shoulder rear snooping password, and then reach the purpose of illegal false claiming wealth.The application for a patent for invention that CN1177764A discloses a kind of " mask type cipher-code input method and equipment thereof ", a kind of optical lens operation keyboard that sees through has been proposed, whole all around methods of sealing, though this method can solve the problem of divulging a secret, but equipment complexity, complex operation, the bad the elderly's use of eyesight can be had any problem, and should go to seek simpler and efficient ways.The difficulty of dealing with problems is apparent: can imagine, the people who has the inclination to peep perhaps just at you by the side of or after one's death, perhaps stare at you with telescope a long way off, reflect according to public security department, which once had the offender to train " piercing eye ", and far also can judge by key according to the movement locus of your button at a distance of five or six meters! We can say that present code keypad that uses and method have no security performance and can say.
Summary of the invention:
Purpose of the present invention is to propose a kind of method, and so-called enciphered password input method and keyboard thereof improve cipher safety greatly.
Purpose is achieved in that the author thinks by analysis, present password input mode, be open, the plane, forthright, want to guarantee the cryptosecurity input, except secretiveness, better way should be to password " encryption ", says to such an extent that accurately be to encrypt to the action of button, that is to say except by many again the password, come individual mixing the spurious with the genuine by several keys! , how can stay calm and collected with that many by several keys " do useless ", become the key point of plan, the people who peeps is dig-inning this right hand of your button, what if do what action and all can not escape his sight line? several times weigh, we have expected left hand.Left hand just is plagued with too much leisure in the process of withdrawing the money, why not entrust with an important task? both hands cooperate does things, and is exactly the speciality of primate originally, in addition human? after left hand is joined, use first one hand and then the other in quick succession, can allow the person of peeping attend to one thing and lose sight of another, if a backstage more allows it as weighing down in the mist before another platform! Particularly, we increase a button (being called " operating key ") on original keyboard signal input method basis, control by left hand, in the time that it is being pressed, ten numerical keys that the right hand is controlled can temporarily lose function, that is to say that this key is equivalent to the master switch of ten numerical keys, have only under the situation about allowing leftward, but the right hand is pressed just input signal of each numerical key.How to implement this enciphered password input method? way is a lot, and we can design a program, and the function of self-defined this button is solidificated in the chip of keyboard processing or keyboard interface circuit; We also can be connected this button through lead can influence in the common circuit of the formation of numerical key key-position signal and transmission, in discrete element such as signal transmission, interrupt routine loop, clock, matrix, power supply or the ground connection of key-position signal treatment circuit or keyboard interface circuit and IC circuit.When left hand was pressed this key, even press each numerical key, key-position signal can not form or transmit, and perhaps CPU can not receive signal, perhaps asked the signal of CPU keyboard scan to be intercepted, and whether control each numerical key output signal with this effective.When we prepare to press password on numerical key with right hand forefinger, left index finger is placed on this operating key, the right hand is many again by several keys (front or rear or middle) except password consciously, and left hand only allows password to pass through, like this, obviously have only the key instruction of representing password can be admitted to CPU, and how by those several keys only be feinting deception, it is close to have added for password more in other words conj.or perhaps, thereby reaches the purpose that the fascination person of peeping ensures cryptosecurity.We can be placed in shelter away from numerical key to this operating key of newly acquiring, as on the side panel of keyboard or on the bottom panel, drag lead termination or computer terminals to drag on the handle of lead termination and microphone outward perhaps outward.The person of peeping can't be taken into account,, also should do it smallerly, should be able to be covered fully, perhaps above key, install radome additional or done flange and gone along with sb. to guard him or have the pothole groove hidden by left index finger if still be arranged on the card.In a word, purpose is to allow the person of peeping cannot see this key, even cannot see the finger of button.The button of newly acquiring has one group of normally closed or normally opened contact at least, be not have the monostable formula switch of lock, preferably be connected into the function of when pressing, cutting off each numerical key during place in circuit, when unclamping, recover the function of each numerical key, backward compatible like this, use this key still will import the old remittee of password to make things convenient for some to be reluctant according to old way.Simultaneously, also should be at the keyboard disk conspicuous position, be printed with the literal of the of this sort meaning: " for your cryptosecurity; please before or after the password input; left hand is pressed operating key; several mess codes down of right hand input ... or the like, (is example with the closed type contact) is to remind the remittee that a feinting deception is done by association.
Simple, effective, civilized generous, easy to learn with this ciphering type method and keyboard input password thereof, can stop peep of cipher, can be used on the various customer service equipment that need password input, as ATM, POS machine, certificate exchange and ciphony equipment or the like.
Description of drawings
Fig. 1 is that embodiment one installs the operating key position view additional for the existing password keyboard.
Fig. 2 is the circuit block diagram of embodiment one.
Fig. 3 embodiment two is the code keypad structural representations that are provided with operating key
Fig. 4 is the circuit block diagram of embodiment two.
Fig. 5 is the side-looking diagrammatic cross-section of embodiment three ATM (automatic teller machine) that is provided with operating key.
Fig. 6 embodiment four is that existing ATM (automatic teller machine) installs operating key and radome synoptic diagram additional.
Fig. 7 embodiment five is that the intelligent network phones machine in street corner is transformed synoptic diagram.
Fig. 8 is a serial connection operating key position view in the single-chip microcomputer keyboard circuit block scheme commonly used.
Fig. 9 embodiment six drags lead that the operating key electrical schematic diagram is installed outside teller terminal switch dish interface circuit.
Figure 10 embodiment seven drags the lead termination that the operating key synoptic diagram is installed outside keyboard.
Embodiment
Below in conjunction with accompanying drawing in detail embodiment is described in detail.
Referring to Fig. 1, it is the code keypad of putting on the common bank savings sales counter, 10 numeric keys 3 and zero clearing acknowledgement key etc. are arranged on the card 2, link to each other with computer teller terminal in the sales counter by wire harness 4, the operating key of newly acquiring 5 is installed at dish side plate 6 (towards bank clerk one side), the remittee goes to handle it with left hand, eyes-free is seen, as long as hand does not leave button, the person of peeping is difficult to know when it is pressed, when just light finger is put down gently in the above, and remittee's right hand oneself is careful when operating key is pressed by real password as pressed numerical key in the past, when unclamping by several mess codes (being exactly so-called feinting deception), the cooperation of both hands has only and oneself knows what's what, and the person of peeping has no way of finding out about it, thereby has guaranteed cryptosecurity.Button 5 also can be installed on the base plate 7.
Referring to Fig. 2, Fig. 2 is the non-coding one dimension of the single-chip microcomputer keyboard circuit figure that uses always, and K0-K9 is the keyboard digital key, and each key takies the input-output line of CPU, when a certain key is pressed, corresponding incoming line is a low level, and height during release is when CPU finds have key to press, call the keyboard scan subroutine, the state of port is read into CPU, and CPU is by software identification key number generation key, and this all is that prior art does not describe in detail.The operating key of newly acquiring among the figure 5, its series connection are on the shared ground wire of K0-K9, obviously, have only when pressing in the time of (closure) this key, press the arbitrary key of K0-K9 just effectively, unclamp (disconnection) key 5 after, press K0-K9 again, just belong to feinting deception, be used for confusing the person of peeping.
Referring to Fig. 3, embodiment two has described the scheme of a kind of operating key design in card.One circle flange 9 is arranged at the edge of card 8, the middle recess 10 that just can hold the finger size that forms, there is operating key 5 centre, the resilient material of this key microswitch should select the movement range small voice again little, such as the sort of button of picture mobile phone, when remittee's left index finger by in recess, by with not according to, finger is not all almost seen mobile.
Referring to Fig. 4, for the determinant keyboard that works in interrupt mode, we also can adopt the mode that intercepts interrupt request to come the control figure key, CPU8031 among the figure
Figure Y0322055600071
Be the delivery outlet line, as the alignment of keyboard.Put during initialization
Figure Y0322055600072
Be 0. Be the input port line, as the line of keyboard.Each line is received 8031 INTO end by AND gate, the centre has been connected in series operating key keyswitch 5 (closed type contact), when numerical key has closure, corresponding line becomes 0, AND gate output becomes 0, can have only when key 5 is closed interrupt request just can send to the INTO port, CPU can respond the interrupt request from keyboard, in interrupt service routine, finish the processing of key identification and key function, obviously, when key 5 disconnects, CPU does not receive interrupt request, can keyboard scan, this moment by numerical key be invalid action, our feinting deception of needing just.Temporarily stop the manner of execution of each numerical key function during for the pressing with the closed type contact of this example, we also can call this key " encryption key ".
Referring to Fig. 5, Fig. 5 is the side cutaway view of an ATM (automatic teller machine), and there is numeric keypad 12 display screen 11 belows, and a pothole groove 13 is thereunder arranged, and is provided with operating key 5 in the groove of hole, and people on one's feet cannot see this key, and the remittee goes to press with left hand.
Fig. 6 A has described a kind of embodiment axis side view of reequiping (Fig. 6 B is its cross-sectional schematic) display screen 14 belows on existing ATM (automatic teller machine) have numeric keypad 15, installed a semicircular radome 17 on the card 16 aside additional, operating key 5 is housed in the cover, remittee's left-hand finger puts in the cover, whether others can't discover button, and it is more convenient radome and button to be made of one such installation shown in also can image pattern 6C.Fig. 5 and Fig. 6 embodiment all are suitable for the electrical schematic diagram of Fig. 2 Fig. 4, no longer describe in detail.
Referring to Fig. 7, this ciphony equipment is without plug-in card, and directly button input password can be dialed, and we are installed in operating key 5 on the handle of microphone, press in the process of password at the right hand, " mix sand " inward under leftward " commander ".
Referring to Fig. 8, Fig. 8 is 8048 common single-chip microcomputer keyboard treatment circuit block schemes.Operating key 5 can be serially connected on the bidirectional clock lines, also can be serially connected on bidirectional data line, supply lines or the ground wire.Operating key 5 is that the nothing of a double-pole normally closed contact is locked monostable formula push switch in this example, and it is serially connected in respectively on bidirectional clock lines and the bidirectional data line.
Referring to Fig. 9, the typical keyboard interface circuit on the computer terminals system board mainly is made up of 74LS322 (U27) displacement/storage register and three d type flip flops (U21 and U70).When keyboard when main frame sends scan code, serial data is from KBDDATA line input interface circuit, promptly deliver to the DI end of 74LS322, serial data clock is imported from the KBDCLK line simultaneously, deliver to the input end U21-4 of trigger U21 (74LS175), PCLK is synchronous by the peripheral hardware clock, and the CLOCK (U27-11) that delivers to shift register U27 behind delayed (U21-5), anti-phase (U21-6) again realizes the serial data of DI is moved in the U27 ...Operating key 5 is pinched leftward in the palm by the remittee, drags lead 18 to be serially connected on the clock line and data line between system board and the five core sockets outside long, and when pressing, each key on the keyboard is in disarmed state.
Referring to Figure 10, operating key 5 can also be connected on the termination of dragging lead 19 outside keyboard side plate 6, is pinched leftward in the palm by the remittee, and whether effectively the actuation of keys of the control right hand.

Claims (5)

1. code keypad comprises keyboard bit array, keyboard scan and interface circuit, ten numerical keys, some letter keys and clear confirmation keys compositions.It is characterized in that: acquire a button in concealed location, this button is connected through lead can influence in the common circuit of the formation of numerical key key-position signal and transmission.
2. by the described code keypad of claim 1, it is characterized in that: the button of newly acquiring can be installed on the panel of keyboard outside surface, side is pulled, on the base plate, drag lead termination, computer terminals to drag on lead termination or the microphone handle outward outward.
3. by the described code keypad of claim 1, it is characterized in that: the button of newly acquiring, it has one group of normally closed or normally opened contact at least, and being does not have the monostable formula switch of lock.
4. by the described code keypad of claim 1, it is characterized in that: the button of newly acquiring is connected in signal transmission, interrupt routine loop, clock, matrix, power supply or the ground path of key-position signal treatment circuit or keyboard interface circuit through lead.
5. by the described code keypad of claim 1, it is characterized in that: add radome on the button of newly acquiring or done flange on every side and gone along with sb. to guard him or done the pothole groove.
CN 03220556 2003-03-21 2003-03-21 Coding keyboard Expired - Lifetime CN2606395Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 03220556 CN2606395Y (en) 2003-03-21 2003-03-21 Coding keyboard

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 03220556 CN2606395Y (en) 2003-03-21 2003-03-21 Coding keyboard

Publications (1)

Publication Number Publication Date
CN2606395Y true CN2606395Y (en) 2004-03-10

Family

ID=34161962

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 03220556 Expired - Lifetime CN2606395Y (en) 2003-03-21 2003-03-21 Coding keyboard

Country Status (1)

Country Link
CN (1) CN2606395Y (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595268A (en) * 2013-11-26 2014-02-19 中国人民解放军重庆通信学院 Frequency converter
CN104182679A (en) * 2014-08-21 2014-12-03 广东欧珀移动通信有限公司 Character inputting method and character inputting device for mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595268A (en) * 2013-11-26 2014-02-19 中国人民解放军重庆通信学院 Frequency converter
CN104182679A (en) * 2014-08-21 2014-12-03 广东欧珀移动通信有限公司 Character inputting method and character inputting device for mobile terminal

Similar Documents

Publication Publication Date Title
US10609019B2 (en) Establishing a secure channel with a human user
CN1952855B (en) Cipher input method and system preventing peeper
CN107742362B (en) PIN verification
CN108021800A (en) For the method by non-security terminal authentication user
CN104484612A (en) Sensitive information shielding method and system for remote desktop applications
US10885164B2 (en) Login process for mobile phones, tablets and other types of touch screen devices or computers
US20030146931A1 (en) Method and apparatus for inputting secret information using multiple screen pointers
CN1431575A (en) Intelligent secret keyboard with key values being changed randomly
US20070096946A1 (en) Information inputting system with a variable arrangement of keypad, and control method thereof
CN2606395Y (en) Coding keyboard
CN1252572C (en) Cipher keyboard
CN108831009A (en) A kind of financial level security password input unit
US20090037989A1 (en) Method for presenting password codes in mobile devices for authenticating a user at a protected institution
CN201063155Y (en) Cipher input device against peep
CN101751522B (en) Method, device and system for preventing keys of keyboard from being logged
CN2786697Y (en) Anti-peeking disorder password input unit
CN2544335Y (en) Code input keyboard
CN2788246Y (en) Intelligent dynamic display secret keyboard
CN1455312A (en) Enciphered password input method and its keyboard
WO2005086559A2 (en) System and method for identity verification by dynamic codifier interface
CN113608629B (en) Intelligent keyboard system, password input method and self-service equipment
CN204883932U (en) Take password input device's cashier slot
CN201188237Y (en) Private cipher input system
WO2022001707A1 (en) Method and system for receiving a secure input, using a secure input means
CN2678005Y (en) Human function type digital input cipher keyboard with security function

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
AV01 Patent right actively abandoned

Effective date of abandoning: 20060419

C25 Abandonment of patent right or utility model to avoid double patenting