Full-shield anti-peek anti-code theft blind inputting cipher keyboard

A password keyboard and touch typing technology, applied in the input/output process of data processing, input/output of user/computer interaction, instruments, etc., can solve the problems of weak confidentiality, inconvenient password input, unsafe password input, etc. , to achieve the effect of high confidentiality

Inactive Publication Date: 2008-07-16
康振东
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing open type password input device is simple and clear, easy to operate, but, because the characters on the keyboard are exposed, bystanders can see at a glance, make password input extremely unsafe; While being peeped by others, it also brings inconvenience to the password inputter, and the effect is not good; in addition, because the current password input device only uses ten numbers from 0-9 as the coding elements, only passwords with weak security strength can be set and input , thus providing convenience for stealing passwords

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Full-shield anti-peek anti-code theft blind inputting cipher keyboard
  • Full-shield anti-peek anti-code theft blind inputting cipher keyboard
  • Full-shield anti-peek anti-code theft blind inputting cipher keyboard

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0016] Embodiment 1 In the two-dimensional table of this embodiment, a character that only appears in one character column is called a single character, and the same character column can only have one single character. Therefore, a single character in the two-dimensional table can be The basic input key input corresponding to the column where the character is located; the character that appears at least twice in different columns is called a multiple character, and each character in it is called the sub-character of the multiple character, and the number of sub-characters of different multiple characters can be different, one The combination of the column where the sub-characters of multiple characters are located is called the sub-character combination of the multiple characters. Any two sub-character combinations of multiple characters are different. Therefore, the multiple characters in the two-dimensional table can be formed by clicking the sub-character combination Corresp...

Embodiment 1

[0017] Embodiment 1 Digital touch typing input anti-peep password keyboard

[0018] figure 2 It is a schematic diagram of the keyboard body of this embodiment;

[0019] image 3 It is a schematic diagram of the privacy cover of this embodiment.

[0020] exist figure 2 On the shown keyboard body, the five strip-shaped basic input keys are separated from each other by the partition plate 4 shown in the figure, so that the five fingers can be positioned accurately on the corresponding basic input keys; Naturally positioned and arranged in a staggered front and back, and the keyboard body and the privacy cover are also designed in the shape of a palm according to the length of the five fingers, so that the inputter can search for characters on the privacy cover more intuitively and quickly.

[0021] exist image 3 The upper surface of the anti-peeping cover shown is marked with a virtual key surface composed of ten numbers from 0 to 9 and the characters "confirm" and "clear...

Embodiment approach 2

[0026] Embodiment 2 In this embodiment, the corresponding column of each row of the virtual key surface two-dimensional table is marked with more than one identification symbol 6. The above-mentioned identification symbol refers to the symbol or color located in the corresponding column in a character row. Different rows The number of the above-mentioned identification symbols can be different; the combination of all the identification symbols of a character row in the column is called the identification symbol combination of the row, and the combination of identification symbols of any two different character rows are not the same; there can be one in the same character column Said single character different from the above;

[0027] According to the two-dimensional plane coordinate positioning method, for any character in the two-dimensional table of the virtual key surface, the character can be positioned as long as the column and row where the character is located, so, by fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A full shelter anti-peep code theft preventing touch typing password input keyboard relates to a password input device in public, solving the defects that the prior anti-peep password input device is inconvenient to operate and weak in secure intensity of set passwords. The present invention comprises a keyboard body and an anti-peep cover, wherein, basic input keys arranged on the keyboard body are in one-to-one corresponding to fingers, thereby fluent touch typing input can be carried out; the anti-peep cover adopts a 360-degree full shelter design; a virtual key surface is marked on the anti-peep cover for indicating keystroke actions of fingers; the virtual key surface not only comprises ten numbers from 0 to 9, but also can comprise twenty six English letters from A to Z, underline and other characters. The technical proposal of virtual key surface character positioning provided by the present invention not only can realize the touch typing input in the mode that what people see is what people type in a full shelter state, but also can set high-security passwords including numbers and letters.

Description

【Technical field】 [0001] The invention relates to a password input device in a public place, in particular to a password input keyboard with an anti-peeping and anti-theft code function. 【Background technique】 [0002] At present, password input devices are often used in banks, stock markets and shopping malls. Existing open type password input device is simple and clear, easy to operate, but, because the characters on the keyboard are exposed, bystanders can see at a glance, make password input extremely unsafe; While being peeped by others, it also brings inconvenience to the password inputter, and the effect is not good; in addition, because the current password input device only uses ten numbers from 0-9 as the coding elements, only passwords with weak security strength can be set and input , thereby providing convenience for stealing passwords. 【Content of invention】 [0003] The purpose of the present invention is to overcome the defects and deficiencies of the pri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F3/02G06F3/023
Inventor 康振东
Owner 康振东
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products