200949612 九、發明說明: 【發明所屬之技術領域】 本發明涉及一種輸入裝置,特別涉及一種電腦鍵盤。 【先前技術】 隨著網路技術之飛速發展及迅速普及,電腦已成為人 們曰常工作、生活及學習中不可缺少的工具。電腦以其性 能優異、可擴展性好以及經濟實惠等特點成為家庭及固定 辦公的最佳選擇。多媒體播放、互聯網接入及無線連接等 技術的發展,使電腦被賦予了越來越多的功能,人們藉由 電腦上網以瞭解資訊、觀看電影、欣賞音樂等。 電腦主要包括主機、顯示器及鍵盤等,主機用於接收 並執行用戶藉由鍵盤輸入的各種操作指令,顯示器用於顯 示操作介面及圖像訊息等。由於電腦使用的方便性及較大 的存儲容量,越來越來的人將一些重要的工作資料及個人 訊息存儲在電腦上。例如人們藉由w〇rd 0利用鍵盤輸入文字訊息,以完成各種文播編軟:將 文檔文件存儲在主機内部的記憶體中。 然而,上述文檔文件很容易被其他人打開,並藉由鍵 盤編輯修改。如此,資訊安全得不到保障,導致重要的工 作資料及個人訊息被破壞。 【發明内容】 有鑒於此,有必要提供一種可保障資訊安全之鍵 盤。 種電腦鍵盤’具有複數按鍵,該複數按鍵劃分為第 7 200949612 一按鍵區域及第二按鍵區域。該電腦鍵盤還包括存儲單 元、驗證單元、鎖定單元,該存儲單元用於存餘用戶設置 的密碼資料;該第一按鍵區域用於接收用戶操作,產生輸 入密碼;該驗證單s用於將輸人密碼與設置的密竭資料比 較,以進行密碼驗證,並在通過驗證時發出解鎖訊號給鎖 定單元;該鎖定單元用於在鍵盤啟動時或基於用戶在^一 按鍵區域或/及第二按鍵區域上的預定操作,鎖定第二按鍵 ❿區域,並根據驗證單元提供的解鎖訊號解除對第二按鍵區 域的鎖定。 上述電腦鍵盤,藉由使用密碼驗證的方式,當通過密 碼驗證時,用戶才可藉由第二按鍵區域輸入指令以操作電 腦。如此,可有效地保障資訊安全。 【實施方式】 凊參閱圖1’其為一較佳實施方式的電腦鍵盤的結 構示意圖。電腦鍵盤1〇具有複數按鍵2〇,所述複數按^ ❹20劃分為第一按鍵區域22及第二按鍵區域以。本實施方 式中,第一按鍵區域22為電腦鍵盤1〇右邊的副鍵區,第 二按鍵區域24為電腦鍵盤10左邊的主鍵區。 請參閱圖2’其為圖i所示的電腦鍵盤1〇的功能模組 圖,其包括第一按鍵區域22及第二按鍵區域24、存儲單 元26、驗證單元28、鎖定單元30。 存儲單元26用於存儲用戶設置的密碼資料。 第一按鍵區域22用於接收用戶操作,產生輸入密碼。 驗證單元28用於將輸入密碼與設置的密碼資科比 8 200949612 較,以進行密碼驗證,並在通過驗證時發出解鎖訊給 定單元30。 … 鎖定單元30用於在鍵盤啟動時或基於用戶在第一按 鍵區域22或/及第二按鍵區域24的上的預定操作,鎖定第 二按鍵區域24,並根據驗證單元28提供的解鎖訊號解除 對第二按鍵區域24的鎖定。所述鎖定第二按鍵區域24即 為禁用第二按鍵區域24中的按鍵,禁用方式可以係斷開第 ❹二按鍵區域24的工作電源,也可以係阻止第二按鍵:域 24的輸出,甚至可以係擾亂第二按鍵區域以的輸出。 第一按鍵區域22及第二按鍵區域24的劃分也可以為 其他形式,如第一按鍵區域22為電腦鍵盤1〇主鍵區的數 位鍵或者字母鍵,而其他按鍵為第二按鍵區域24。 。使用上述電腦鍵盤1〇時,用戶可以藉由鎖定第二按鍵 區域24來防止其他用戶藉由電腦鍵盤1〇對自己電腦系統 的操作,而且,用戶電腦系統設有開機密碼時,其他人也 ❿就無法藉由鍵盤正常輸入密碼,有效的保證了用戶資訊安 全0 ,综上所述,本發明符合發明專利要件,爰依法提出專 」申明惟,以上所述僅為本發明之較佳實施方式,舉凡 .、、、悉本案技藝之人士,在援依本案創作精神所作之等效修 飾或變化,皆應包含於以下之申請專利範圍内。 【圖式簡單說明】 圖1為一較佳實施方式之電腦鍵盤的結構示意圓。 圖2為圖1中電腦鍵盤之功能模組圖。 9 200949612 【主要元件符號說明】 電腦鍵盤 10 按鍵 20 第一按鍵區域 22 第二按鍵區域 24 存儲單元 26 驗證單元 28 鎖定單元 30 ❹ 10200949612 IX. Description of the Invention: [Technical Field] The present invention relates to an input device, and more particularly to a computer keyboard. [Prior Art] With the rapid development and rapid spread of network technology, computers have become an indispensable tool for people to work, live and learn. Computers are the best choice for home and fixed office because of their high performance, scalability and affordability. The development of technologies such as multimedia playback, Internet access and wireless connectivity has enabled computers to be given more and more functions. People use the Internet to access information, watch movies, and enjoy music. The computer mainly includes a host, a display and a keyboard, and the host is used for receiving and executing various operation commands input by the user through the keyboard, and the display is used for displaying an operation interface and an image message. Due to the convenience of using the computer and the large storage capacity, more and more people are storing some important work materials and personal information on the computer. For example, people use w键盘rd 0 to input text messages using the keyboard to complete various text-editing: storing the document files in the internal memory of the host. However, the above document file is easily opened by others and edited by keyboard editing. As a result, information security is not guaranteed, resulting in the destruction of important work materials and personal information. SUMMARY OF THE INVENTION In view of the above, it is necessary to provide a keyboard that can protect information security. The computer keyboard has a plurality of buttons, and the plurality of buttons are divided into a button area and a second button area. The computer keyboard further includes a storage unit, a verification unit, and a locking unit, wherein the storage unit is configured to store password data set by the user; the first button area is configured to receive a user operation, and generate an input password; the verification form s is used to input The password is compared with the set exhaustive data for password verification, and an unlocking signal is issued to the locking unit when the verification is passed; the locking unit is used when the keyboard is activated or based on the user's button area or/and the second button The predetermined operation on the area locks the second button area and unlocks the second button area according to the unlock signal provided by the verification unit. By using the password verification method, the user can operate the computer by inputting an instruction through the second button area when the password is verified. In this way, information security can be effectively guaranteed. [Embodiment] FIG. 1 is a schematic structural view of a computer keyboard according to a preferred embodiment. The computer keyboard 1 has a plurality of buttons 2, and the plurality is divided into a first button region 22 and a second button region by pressing ❹20. In this embodiment, the first button area 22 is the sub keypad of the right side of the computer keyboard 1 , and the second button area 24 is the main key area of the left side of the computer keyboard 10 . Referring to Fig. 2', it is a functional block diagram of the computer keyboard 1 shown in Fig. i, which includes a first button area 22 and a second button area 24, a storage unit 26, a verification unit 28, and a locking unit 30. The storage unit 26 is configured to store password data set by the user. The first button area 22 is for receiving user operations and generating an input password. The verification unit 28 is configured to compare the input password with the set password ratio 8 200949612 for password verification, and issue the unlock notification given unit 30 when the verification is passed. The locking unit 30 is configured to lock the second button area 24 when the keyboard is activated or based on a predetermined operation of the user on the first button area 22 or/and the second button area 24, and is released according to the unlocking signal provided by the verification unit 28. Locking of the second button area 24. The locking of the second button area 24 is to disable the button in the second button area 24. The disabling mode may be to disconnect the working power of the second button area 24, or to block the output of the second button: the field 24, or even It is possible to disturb the output of the second button area. The division of the first button area 22 and the second button area 24 may also be other forms, such as the first button area 22 being a digit key or a letter key of the computer keyboard 1 〇 main keypad, and the other keys being the second button area 24. . When the computer keyboard 1 is used, the user can prevent other users from operating the computer system by using the computer keyboard 1 by locking the second button area 24. Moreover, when the user computer system has a power-on password, other people may also It is impossible to input the password normally by the keyboard, and the user information security is effectively guaranteed. In summary, the present invention complies with the invention patent requirement, and the above is only a legal statement. The above description is only a preferred embodiment of the present invention. The equivalent modifications or changes made by those who have learned the skills of the case in the context of the creation of the case shall be included in the scope of the following patent application. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a schematic circle diagram of a computer keyboard according to a preferred embodiment. 2 is a functional block diagram of the computer keyboard of FIG. 1. 9 200949612 [Description of main component symbols] Computer keyboard 10 Buttons 20 First button area 22 Second button area 24 Memory unit 26 Verification unit 28 Lock unit 30 ❹ 10