Unlock instant, AI-driven research and patent intelligence for your innovation.

Completely shadowing peep-preventing cipher keyboard and password inputting method thereof

A password keyboard and anti-peeping technology, applied in the input/output process of data processing, instruments, electrical digital data processing, etc., can solve the problems of difficult keyboard installation, inability to cover passwords, high environmental requirements, etc., to improve anti-sabotage ability, Eliminate peeping passwords, enter convenient and fast effects

Inactive Publication Date: 2008-04-16
张东纯
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem with this type of scheme is that the password input action cannot be completely covered, or the input action can be covered but the entered password cannot be covered, so malicious peeping cannot be completely prevented, and its security cannot be guaranteed
In addition, reducing the viewing angle will inevitably bring difficulties to the installation of keyboards using this type of scheme, and the use of this type of password keyboard by users will inevitably be affected by their natural physical conditions such as height and vision.
On the other hand, these known solutions generally have the disadvantages of complex equipment and high environmental requirements, and do not have the ability to prevent accidental or malicious damage, so they cannot be applied to relatively harsh workplaces, for example, they cannot work reliably on home security doors.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Completely shadowing peep-preventing cipher keyboard and password inputting method thereof
  • Completely shadowing peep-preventing cipher keyboard and password inputting method thereof
  • Completely shadowing peep-preventing cipher keyboard and password inputting method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The specific implementation of the password keyboard in the present invention will be described in detail below in conjunction with the accompanying drawings.

[0019] attached figure 2 It is a stand-alone password keyboard, suitable for banking windows, POS machines and other occasions. The keyboard is composed of a cover 1, a shell, and keys. The shell is designed according to the shape suitable for the human hand. When the operator's hand is naturally placed on the keyboard, the index finger and middle finger are set to align with the number keys '1' and '3' respectively. ; The 'input' key is placed between the '1' and '3' keys, and its shape is different from that of the number keys, so that the operator can easily identify it through finger contact, which is similar to the use of a computer mouse. The cover can be opened and closed, and the arrangement of the keys can be observed when the cover is opened, and the cover can be put down when entering the password t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a full-shielded anti-peek code input keyboard and a code setting method thereof, wherein the code input keyboard is provided with two number keys <1>,<3>, an <ENTER> key and a <DELETE> key; the shape of the keyboard is designed in accordance with the that of the hands of people, with the key positions arranged reasonably, thereby the fingers are corresponding to the keys one by one, and a user is capable of imputing the password without looking at the keyboard; the keyboard is provided with a shield which can shield the keys and the action of hands of people inputting the password. The code setting method is as follows: the input numbers include all the numbers input from the time waiting for input and the time when the <ENTER> key is pressed down; the number '0' is represented by 10; when the number of the keys is more than 10, the numbers are taken as wrong password. The code input key board and the code setting method of the invention eliminate the danger that the code is seen by others, better prevent incident damages and deliberate damages and are suitable to be used in places of ATM, financial business window, family anti-theft door, etc.

Description

technical field [0001] The invention relates to a new anti-peep password keyboard which can completely cover the keyboard and hand movements during input, and a new password input method. Background technique [0002] In the modern information society, digital passwords are increasingly used in various security measures. For example, bank counters and ATM withdrawals, POS machines in shopping malls, securities transactions, password locks, etc., all use digital passwords to ensure the legitimacy of users. Theoretically, digital passwords can provide high user security, but due to defects in existing password input devices, such as password keyboards, the security of digital passwords themselves cannot be guaranteed. In addition to peeping at close range, some criminals can even judge the password based on the hand movements of the user's keyboard input a few meters away, and cases of property loss caused by leaking passwords occur from time to time. Criminals have continuo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F3/023
Inventor 张东纯
Owner 张东纯