Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Peep-proof cipherer and password recognition method

An identification method and technology of a cipher, which are applied in the field of anti-peep cipher and password identification, can solve the problems of poor anti-theft performance of the cipher, and achieve good anti-peep effect.

Inactive Publication Date: 2020-07-28
北京隆普智能科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The input information received by the existing cipher is in one-to-one correspondence with the password information, and the peeper can easily obtain the password by simply watching, so the existing cipher has poor anti-theft performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Peep-proof cipherer and password recognition method
  • Peep-proof cipherer and password recognition method
  • Peep-proof cipherer and password recognition method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] The embodiment of the present application provides an anti-peeping cipher, such as figure 1 As shown, the anti-peeping cipher includes a key module and a main control circuit.

[0027] The key module includes a number button, a confirm button and a cancel button. The digital button outputs pressing signals btn_out[m:1] of m digital buttons to the main control circuit, and each pressing signal in btn_out[m:1] corresponds to one bit of the digital buttons. For example, the pressing signal output by the i-th digital key is btn_out[i]. When the user presses the ith (1<=i<=m) button effectively, btn_out[i] is 1, the btn_out[i] signal is valid, and the btn_out[i] signal is output to the main control circuit. Otherwise, when the user presses the ith (1<=i<=m) key invalidly, btn_out[i] is 0, and no signal is output.

[0028] In this application, each digital key of the digital button has a sub-main control circuit, and a pressure sensor is arranged below the digital key. The...

Embodiment 2

[0045] The present application also provides a password identification method corresponding to the above-mentioned anti-peeping password device.

[0046] like Figure 4 As shown, the password identification method of the sub-main control circuit includes the following steps:

[0047] S410: The sub-main control circuit receives the pressing signal btn_in output by the digital key, that is, btn_in is 1.

[0048] S420: The sub-main control circuit collects the pressure signal prs signal output by the pressure sensor.

[0049] S430: The sub-main control circuit judges whether the pressure exceeds the threshold T, that is, the pressure≥threshold T. If yes, execute S440. Otherwise, execute S450.

[0050] S440: The sub-main control circuit outputs a valid pressing signal to the main control circuit and the vibration module, that is, btn_out is 1. The main control circuit saves the code value after receiving an effective pressing signal, and the vibration module triggers vibratio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a peep-proof cipherer and a password recognition method. The peep-proof cipherer comprises a digital button, a main control circuit and an upper computer, a digital key of thedigital button is provided with a sub main control circuit, a pressure sensor is arranged below the digital key, the input end of the sub main control circuit is connected with the digital key and thepressure sensor, and the output end of the sub main control circuit is connected with the main control circuit; the sub main control circuit collects a pressure signal output by the pressure sensor after receiving a pressing signal output by the digital key, and if the pressure exceeds a threshold value, the sub main control circuit outputs an effective pressing signal to the main control circuit; the main control circuit collects effective pressing signals output by the sub main control circuits and outputs a set of effective pressing signals to the upper computer. Normal input and interference input are distinguished according to the pressed force of each digital key, and only the normal input is added into the password sequence, so that the peep-proof purpose is achieved.

Description

technical field [0001] The present application relates to the field of locks, in particular to an anti-peeping cipher and a cipher identification method. Background technique [0002] The cipher is used to input the password, and it is easy for other people to peep and steal the password when the cipher is used to input the password. The input information received by the existing cipher is in one-to-one correspondence with the cipher information, and a peeper can easily obtain the cipher by simply watching, so the existing cipher has poor anti-theft performance. Contents of the invention [0003] The purpose of this application is to provide an anti-peeping cipher and a password identification method, which can distinguish between normal input and interference input by pressing the digital keys, and only add normal input into the password sequence to achieve the purpose of anti-peeping. [0004] The application provides an anti-peeping cipher, including a digital button, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/83G06F3/023G06F3/01
CPCG06F3/016G06F3/023G06F21/83
Inventor 徐小君李慧
Owner 北京隆普智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products