Unlock instant, AI-driven research and patent intelligence for your innovation.

Full-shield anti-peek anti-code theft blind inputting cipher keyboard

A password keyboard and input key technology, applied in the input/output process of data processing, input/output of user/computer interaction, instruments, etc., can solve the problems of weak confidentiality, inconvenient password input, poor effect, etc. Achieve high confidentiality

Inactive Publication Date: 2010-08-18
康振东
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing open type password input device is simple and clear, easy to operate, but, because the characters on the keyboard are exposed, bystanders can see at a glance, make password input extremely unsafe; While being peeped by others, it also brings inconvenience to the password input person, and the effect is not good; in addition, because the current password input device only uses ten numbers from 0 to 9 as the coding elements, it can only be set and input with a very weak password. , thus providing convenience for stealing passwords

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Full-shield anti-peek anti-code theft blind inputting cipher keyboard
  • Full-shield anti-peek anti-code theft blind inputting cipher keyboard
  • Full-shield anti-peek anti-code theft blind inputting cipher keyboard

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0016] Embodiment 1 In the two-dimensional table of this embodiment, a character that only appears in one character column is called a single character, and the same character column can only have one single character. Therefore, a single character in the two-dimensional table can be The basic input key input corresponding to the column where the character is located; the character that appears at least twice in different columns is called a multiple character, and each character in it is called the sub-character of the multiple character, and the number of sub-characters of different multiple characters can be different, one The combination of the column where the sub-characters of multiple characters are located is called the sub-character combination of the multiple characters. Any two sub-character combinations of multiple characters are different. Therefore, the multiple characters in the two-dimensional table can be formed by clicking the sub-character combination Corresp...

Embodiment 1

[0017] Embodiment 1 Digital touch typing input anti-peep password keyboard

[0018] Fig. 2 is the schematic diagram of the keyboard body of the present embodiment;

[0019] FIG. 3 is a schematic diagram of the privacy cover of this embodiment.

[0020] On the keyboard body shown in Figure 2, the five strip-shaped basic input keys are separated from each other by the partition plate 4 shown in the figure, so that the five fingers can be positioned accurately on the corresponding basic input keys; The five fingers are naturally positioned and arranged in a staggered front and back, and the keyboard body and the privacy cover are also designed in the shape of a palm according to the length arrangement of the five fingers, so that the inputter can search for characters on the privacy cover more intuitively and quickly.

[0021] The upper surface of the anti-peep cover shown in Figure 3 is marked with a virtual key surface consisting of ten numbers from 0-9 and characters of "conf...

Embodiment approach 2

[0026] Embodiment 2 In this embodiment, the corresponding column of each row of the virtual key surface two-dimensional table is marked with more than one identification symbol 6. The above-mentioned identification symbol refers to the symbol or color located in the corresponding column in a character row. Different rows The number of the above-mentioned identification symbols can be different; the combination of all the identification symbols of a character row in the column is called the identification symbol combination of the row, and the combination of identification symbols of any two different character rows are not the same; there can be one in the same character column The above different single characters; according to the method of two-dimensional plane coordinate positioning, for any character in the two-dimensional table of the virtual key surface, as long as the column and row where it is located can be located, the character can be positioned, so, by first clickin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A full shelter anti-peep code theft preventing touch typing password input keyboard relates to a password input device in public, solving the defects that the prior anti-peep password input device is inconvenient to operate and weak in secure intensity of set passwords. The present invention comprises a keyboard body and an anti-peep cover, wherein, basic input keys arranged on the keyboard body are in one-to-one corresponding to fingers, thereby fluent touch typing input can be carried out; the anti-peep cover adopts a 360-degree full shelter design; a virtual key surface is marked on the anti-peep cover for indicating keystroke actions of fingers; the virtual key surface not only comprises ten numbers from 0 to 9, but also can comprise twenty six English letters from A to Z, underline and other characters. The technical proposal of virtual key surface character positioning provided by the present invention not only can realize the touch typing input in the mode that what people see is what people type in a full shelter state, but also can set high-security passwords including numbers and letters.

Description

technical field [0001] The invention relates to a password input device in a public place, in particular to a password input keyboard with an anti-peeping and anti-theft code function. Background technique [0002] At present, password input devices are often used in banks, stock markets and shopping malls. Existing open type password input device is simple and clear, easy to operate, but, because the characters on the keyboard are exposed, bystanders can see at a glance, make password input extremely unsafe; While being peeped by others, it also brings inconvenience to the password input person, and the effect is not good; in addition, because the current password input device only uses ten numbers from 0 to 9 as the coding elements, it can only be set and input with a very weak password. , thereby providing convenience for stealing passwords. Contents of the invention [0003] The purpose of the present invention is to overcome the defects and deficiencies of the prior...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/023G06F3/02
Inventor 康振东
Owner 康振东