Supercharge Your Innovation With Domain-Expert AI Agents!

Singly-key type code inputting method

A password input and password technology, applied in the field of password input, can solve problems such as difficulty in hardware cost control, occupation, and multiple pins.

Active Publication Date: 2007-09-19
SHANGHAI SIIC TRANSPORTATION ELECTRIC
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the commonly used access control electronic anti-theft all adopts the IC card mode, but if the IC card breaks down, you need to enter a specific password to open the door. Although the usual key mode is simple to implement, there is a decoding circuit, and Will occupy more pins, so the implementation cost is relatively high
In addition, if the password judgment device itself performs many tasks and the hardware resources are extremely limited, allocating too many hardware resources to the realization of the password input function will bring great difficulties to hardware cost control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Singly-key type code inputting method
  • Singly-key type code inputting method
  • Singly-key type code inputting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0016] As shown in Figure 1 and Figure 2, when two I / O ports are used, the controller IC 1 The password output port of Port 1 through the current limiting resistor R1 and the LED D 1 (or the speaker SPEAKER) series circuit is connected to the power supply terminal VCC; the controller IC 1 Enter the password to confirm the port Port 2 Connected to one end of resistor R4, the resistor R 4 There is a pull-up resistor R connected between the other end of the VCC and the power supply terminal VCC 3 , and the power ground is connected by a filter capacitor C 1 and confirm key S 1 constitute a parallel branch. Controller IC 1 It has logic comparator and timer functions, and its working process includes the following steps:

[0017] In the first step, when the controller IC 1 Enter the password to confirm the port Port 2 When it receives a password input start command, it outputs the password to Port Port 1 Output a pulse signal with a specific duty cycle, and monitor the p...

Embodiment 2

[0023] Embodiment 2: As shown in Fig. 3 and Fig. 4, when an I / O port is used, this pin must be used as an input / output port. Since it is impossible to set a port as input and output at the same time, when sending a low-level pulse signal, this port is used as an output port, and after each low-level transmission is completed, the output port is set as an input port. Ready to receive an acknowledgment signal. At this time, the password output port and the password input confirmation port of the controller are controlled by the controller IC 1 One of the input and output ports serves as a complete, the controller IC 1 The input and output ports with resistor R 2 connected to one end of the resistor R 2 There is a light-emitting diode D connected between the other end and the power supply terminal VCC 2 (or speaker SPEAKER 1 ) and resistor R 5 constitutes a series branch, while the resistor R 2 There is a filter capacitor C connected between the other end and the power gro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A single-key type cipher inputting method comprises: 1, outputting a special pulse signal to a cipher output port when a cipher input validation port of a controller receives a cipher input starting command, monitoring a level of the cipher input validation port, and recording current pulse transmitting number; 2, the controller dedermining the current pulse number as a bit of cipher to be inputted when the cipher input validation port of the controller monitors a effective validation command during transmission, and storing result in an appointed memory; 3, if bits of the cipher is more than one, the controller continuously outputting the special pulse signal to the cipher output port after the controller validates that the command is finished, and monitoring the level of the cipher input validation port, and recording the pulse transmitting number; then repeating the second step till all bits of the cipher are inputted; when limited time is exceeded, the controller stops to transmite the pulse signal.

Description

technical field [0001] The invention relates to a password input method, in particular to a single-key password input method. Background technique [0002] At present, the commonly used access control electronic anti-theft all adopts the IC card mode, but if the IC card breaks down, you need to enter a specific password to open the door. Although the usual key mode is simple to implement, there is a decoding circuit, and Will occupy more pins, so the implementation cost is relatively high. In addition, if the password judgment device itself performs many tasks and the hardware resources are extremely limited, allocating too many hardware resources to the realization of the password input function will bring great difficulties to hardware cost control. Contents of the invention [0003] The purpose of the present invention is to provide a very low-cost single-key password input method and a realization circuit. During the password input process, the password input judging...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07F7/02G06F3/023
Inventor 李晖杨国勋顾闻
Owner SHANGHAI SIIC TRANSPORTATION ELECTRIC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More