[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN111460533A - Anti-peeping cipher device and cipher anti-peeping method - Google Patents

Anti-peeping cipher device and cipher anti-peeping method Download PDF

Info

Publication number
CN111460533A
CN111460533A CN202010245132.6A CN202010245132A CN111460533A CN 111460533 A CN111460533 A CN 111460533A CN 202010245132 A CN202010245132 A CN 202010245132A CN 111460533 A CN111460533 A CN 111460533A
Authority
CN
China
Prior art keywords
password
input signal
cipher
control circuit
password input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010245132.6A
Other languages
Chinese (zh)
Inventor
苑贵全
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Longpu Intelligent Technology Co ltd
Original Assignee
Zhangjiakou Haoyang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhangjiakou Haoyang Technology Co ltd filed Critical Zhangjiakou Haoyang Technology Co ltd
Publication of CN111460533A publication Critical patent/CN111460533A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Input From Keyboards Or The Like (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application relates to the technical field of cipherers, in particular to a peep-proof cipherer and a cipher peep-proof method, wherein the peep-proof cipherer comprises a main control circuit, a vibration module and a timer; the master control circuit receives a password input signal and controls the timer to record the duration time of the password input signal; if the duration time of the password input signal reaches or exceeds a preset threshold value, the main control circuit drives the vibration module to generate vibration to prompt that the password input signal is normal input or interference input; and if the password input signal is normally input, the main control circuit takes the password input signal as a password for processing. According to the password processing method and device, the duration of pressing the key by the user is used as a part of the password to be processed, so that a peeper cannot know the correct password even if seeing the character sequence input by the user, and therefore the peeper can be effectively interfered.

Description

Anti-peeping cipher device and cipher anti-peeping method
Technical Field
The application relates to the technical field of ciphers, in particular to a peep-proof cipherer and a cipher peep-proof method.
Background
A cipher device is a device for inputting a password, and keys for inputting the password are provided on the front surface of the cipher device, such as: numeral keys 1-numeral key 9, a delete key, a confirm key, a # character key, a ﹡ character key, and the like. The password is input through the existing password input device, the password can be peeped and stolen, in the prior art, the front face of the password device is often provided with a protective cover which is in half surrounding the upper half part of the password device, and the upper surface of the protective cover is provided with openings for observing keys on the password device, so that the password is prevented from being leaked.
Therefore, how to avoid peeping and stealing the password in the process of inputting the password so as to reduce the risk of password input is a technical problem which needs to be solved urgently by technical personnel in the field at present.
Disclosure of Invention
The application provides a peep-proof cipher device and a cipher peep-proof method, which are used for avoiding that a cipher is peeped and stolen in the process of inputting the cipher, so that the risk of cipher input is reduced.
In order to solve the technical problem, the application provides the following technical scheme:
a privacy scrambler comprising: the device comprises a main control circuit, a vibration module and a timer; the master control circuit receives a password input signal and controls the timer to record the duration time of the password input signal; if the duration time of the password input signal reaches or exceeds a preset threshold value, the main control circuit drives the vibration module to generate vibration to prompt that the password input signal is normal input or interference input; and if the password input signal is normally input, the main control circuit takes the password input signal as a password for processing.
The anti-peeping cipher device as described above, wherein preferably, the duration of the cipher input signal reaches or exceeds a predetermined threshold, and the vibration module generates vibration to indicate that the cipher input signal is normally input.
The anti-peeping cipher device as described above, wherein preferably, the duration of the cipher input information reaches or exceeds a predetermined threshold, and the vibration module generates the vibration to indicate that the cipher input signal is the interference input.
The peep-proof cipher device as described above, preferably, further comprises: the main control circuit, the vibration module and the timer are all arranged inside the cipher body; the main control circuit is electrically connected with the keys of the cipher device body to receive cipher input signals sent by the keys; the main control circuit is also electrically connected with the input circuit of the cipher device body so as to input a cipher input signal into the input circuit of the cipher device body to be used as a cipher for processing.
The anti-peeping cipher device as described above, wherein preferably, a key sound for prompting to operate the key of the cipher device body is emitted during the duration of the cipher input signal.
The peep-proof cipher device as described above, wherein preferably, the main control circuit has an interface leading to the exterior of the cipher device body, and the interface is used for setting a threshold value or changing the set threshold value.
The peep-proof cipher device as described above, wherein preferably, a main control circuit, a vibration module and a timer are arranged below each key of the cipher device body, and each main control circuit is electrically connected with the input circuit of the cipher device body.
The peep-proof cipher device as described above, wherein preferably, a main control circuit is disposed below each key of the cipher device body, and the plurality of main control circuits share one vibration module and one timer, vibration signals of the plurality of main control circuits are transmitted to the shared vibration module after being subjected to or gate operation, and timing signals of the plurality of main control circuits are transmitted to the shared timer after being subjected to or gate operation.
A password peep-proof method comprises the following steps: receiving a password input signal and recording the duration of the password input signal; if the duration time of the password input signal reaches or exceeds a preset threshold value, generating vibration to prompt that the password input signal is normal input or interference input; and if the password input signal is normally input, processing the password input signal as a password.
The password privacy protecting method as described above, wherein the threshold value corresponding to different password input signals is preferably different.
Compared with the background technology, the peep-proof cipher device provided by the invention can be doped with a plurality of random irrelevant code values in the process of inputting a normal cipher sequence, meanwhile, the duration of pressing the key by a user is also used as a part of the cipher to be processed, and normal input or interference input is obtained by triggering vibration or not triggering vibration, so that a peeper cannot obtain a correct cipher even if seeing the character sequence input by the user, and the peeper is effectively interfered.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a schematic circuit diagram of a peep-proof cipher according to an embodiment of the present application;
fig. 2 is a schematic circuit diagram of a peep-proof cipher device according to another embodiment of the present application;
fig. 3 is a flowchart of a password privacy protection method according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative only and should not be construed as limiting the invention.
Example one
Referring to fig. 1, fig. 1 is a schematic circuit diagram of a peep-proof cipher device according to an embodiment of the present disclosure.
The application provides a peep-proof cipher device, includes: the main control circuit 110, the vibration module 120 and the timer 130 are all arranged inside the cipher device body (not shown in the figure).
The main control circuit 110 receives a password input signal generated by the user operating the key 140, and controls the timer 130 to record the duration of the password input signal.
Specifically, the main control circuit 110 is electrically connected to the keys 140 of the cipher device body to receive a cipher input signal generated by a user operating (e.g., pressing) the keys 140 of the cipher device body; the main control circuit 110 is further electrically connected to the enable terminal of the timer 130, and when the main control circuit 110 receives a password input signal generated by the user through the operation key 140, a timing signal is input to the enable terminal of the timer 130, and the timer 130 starts timing according to the timing signal. Specifically, when the user presses a certain key of the cipher device body, the timer 130 is cleared and starts to count time. If the user stops operating the key 140 of the cipher device body, the main control circuit 110 can no longer receive the cipher input signal, and the main control circuit 110 can no longer send the timing signal to the enabling terminal of the timer 130, at this time, the timer 130 stops timing.
On the basis, in the duration of the password input signal, no matter whether the vibration module 120 is triggered to vibrate or not, the key sound for operating (for example, pressing) the key 140 of the password device body is emitted to play a role of prompting that the key is being pressed, so that the observation of a peeper is disturbed.
If the duration of the password input signal reaches or exceeds the predetermined threshold T, the main control circuit 110 drives the vibration module 120 to generate vibration to indicate whether the password input signal is normal input or interference input.
Specifically, the main control circuit 110 is electrically connected to an enable terminal of the vibration module 120, the main control circuit 110 is electrically connected to an output terminal of the timer 130, the timer 130 transmits the recorded time information, that is, the duration time information of the password input signal, to the main control circuit 110, if the time recorded by the timer 130 reaches or exceeds the threshold T, that is, the duration time of the password input signal reaches or exceeds the threshold T, the main control circuit 110 inputs a vibration signal to the enable terminal of the vibration module 120, and the vibration module 120 starts to vibrate according to the vibration signal, specifically, for a predetermined time. During the vibration of the vibration module 120, the user stops pressing the key 140, and the vibration module 120 stops vibrating. The user can know whether the password input signal input by the key operated this time is normal input or interference input through the sensed vibration.
As an example, if the duration of the password input signal reaches or exceeds the predetermined threshold T, the password input signal is considered to be normally input and can be processed as a password, and the vibration generated by the vibration module 120 indicates to the user that the password input signal has reached the requirement of normal input, i.e., the next password input signal can be input. In this case, the user needs to wait for the next password input after the vibration prompt for normal input, and must terminate the password input before the vibration prompt for interference input, and then perform the next password input.
As another example, if the duration of the password input signal does not reach the predetermined threshold T, the password input signal is considered to be normally input and may be processed as a password, otherwise, if the duration of the password input information reaches or exceeds the predetermined threshold T, the password input signal is considered to be interference information and may not be processed as a password, and at this time, the vibration generated by the vibration module 120 prompts the user that the password input is interference input, that is, the next password input signal may be input. In this case, the user must terminate the password input before the vibration prompt for normal input and perform the next password input, and wait for the vibration prompt for the interference input before performing the next password input.
If the password input signal is normally input, the main control circuit 110 processes the password input signal as a password. Specifically, the password input signal is added to the password sequence, the main control circuit 110 is electrically connected to the input circuit of the password device body, and the password input signal is input to the input circuit of the password device body to be processed as a password.
For example: the duration of the password input signal reaches or exceeds the threshold T, and the vibration module 120 generates vibration to prompt the user that the password input signal is normally input. Specifically, the user sequentially presses six keys 1, 2, 3, 4, 5, and 6, the vibration module 120 is triggered to vibrate when the keys 1, 3, 5, and 6 are pressed, the information input by pressing the keys 1, 3, 5, and 6 is normal input, the vibration module 120 is not triggered to vibrate when the keys 2 and 4 are pressed, the information input by pressing the keys 2 and 4 is interference information, and the finally input password is 1356.
On the basis of the above, the main control circuit 110 has an interface to the outside of the cipher body, and the interface is used for setting the threshold T or changing the set threshold T. Specifically, the gear of the threshold T may be selected by a group of dial switches or jumpers, or the resistance value of the adjustable resistor may be changed, so as to set different thresholds T. Different threshold values T are correspondingly arranged on each key 140 of the cipher device body, so that the difficulty of stealing the cipher by a peeper who grasps the rule of duration time through repeated observation is increased.
When the user uses the peep-proof cipher device provided by the application, a plurality of random irrelevant code values can be doped in the process of inputting a normal cipher sequence, meanwhile, the duration time of pressing a key by the user is also used as a part of the cipher to be processed, normal input or interference input is obtained by triggering vibration or not triggering vibration, so that a peeper cannot obtain a correct cipher even if seeing the character sequence input by the user, and the peeper is effectively interfered.
For example, the user uses a 6-digit password, the user can actually input a sequence of more than 10 digits (only 6 digits are normally input, and whether the input is normal or not is distinguished by triggering vibration or not triggering vibration), even if the peeper sees the whole key sequence, the peeper cannot easily guess which 6 digits are the correct password of the user, and when the 10 digits are different, 5040 possible combinations of the 6 digits exist, so that the peep-proof password device provided by the application can effectively interfere with the peeper.
In addition, a main control circuit 110, a vibration module 120 and a timer 130 are arranged below each key 140 of the cipher device body, and each main control circuit 110 is electrically connected with an input circuit of the cipher device body to respectively identify a cipher input signal sent by the corresponding key 140, to distinguish normal input and interference input, and to input the normal input as a cipher into the input circuit of the cipher device body.
In addition, referring to fig. 2, fig. 2 is a circuit diagram of a peep-proof cipher device according to another embodiment of the present application.
The main control circuit 110 is arranged below each key 140 of the cipher body, the plurality of main control circuits 110 share one vibration module 120 and one timer 130, vibration signals of the plurality of main control circuits 110 are transmitted to the shared vibration module 120 after being subjected to OR gate operation and serve as enable signals of the vibration module 120, timing signals of the plurality of main control circuits 110 are transmitted to the shared timer 130 after being subjected to OR gate operation and serve as enable signals of the timer 130, however, according to the scheme, a user needs to avoid pressing the plurality of keys at the same time, and therefore timing disorder is avoided. For example: the main control circuit 111 is arranged below the key 141, the main control circuit 112 is arranged below the key 142, and the vibration module 120 and the timer 130 are shared by the key 141 and the key 142. In addition, the functions of the main control circuit, the vibration module and the timer are the same as those described above, and the measure of sharing the vibration module and the timer is beneficial to saving cost.
Example two
Referring to fig. 3, fig. 3 is a flowchart of a password privacy protection method implemented and provided in the present application.
The application also provides a password peep-proof method, which comprises the following steps:
step S310, receiving a password input signal and recording the duration time of the password input signal;
when a user presses a key of the cipher device, the key transmits a cipher input signal to the main control circuit, the main control circuit sends a timing signal to the timer after receiving the cipher input signal so as to clear the timer and start timing, and if the user stops pressing the key, the timer stops timing.
On the basis, after the password input signal is received, the button pressing sound of the button pressing is started to be sent out so as to prompt the user to press the button and interfere the observation of a peeper.
Step S320, if the duration time of the password input signal reaches or exceeds a preset threshold value, generating vibration to prompt that the password input signal is normal input or interference input;
the main control circuit judges the time recorded by the timer, namely the duration of the password input signal, and if the time reaches or exceeds a preset threshold value, a signal for starting vibration is sent to the vibration module, so that the vibration module starts vibration. In the vibration process of the vibration module, the user stops pressing the key, and then the vibration module stops vibrating. The user can know whether the password input signal input by the key operated this time is normal input or interference input through the sensed vibration.
In order to avoid peeping and stealing the password by repeatedly observing and mastering the duration, in the embodiment of the application, each password input signal, namely the threshold values T corresponding to different password input signals are different.
In one case, if the duration of the password input signal reaches or exceeds the predetermined threshold T, the password input signal is considered to be normally input and can be processed as a password, and the vibration generated by the vibration module prompts the user that the password input signal has reached the requirement of normal input, that is, the next password input signal can be input. In this case, the user needs to wait for the next password input after the vibration prompt for normal input, and must terminate the password input before the vibration prompt for interference input, and then perform the next password input.
In another case, if the duration of the password input signal does not reach the predetermined threshold T, the password input signal is considered to be normally input and can be processed as a password, otherwise, if the duration of the password input information reaches or exceeds the predetermined threshold T, the password input signal is considered to be interference information and cannot be processed as a password, and at this time, the vibration generated by the vibration module prompts the user that the password input is interference input, namely, the next password input signal can be input. In this case, the user must terminate the password input before the vibration prompt for normal input and perform the next password input, and wait for the vibration prompt for the interference input before performing the next password input.
And step S330, if the password input signal is normally input, processing the password input signal as a password.
Specifically, the password input signal is added to a password sequence and processed as a password.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

Claims (10)

1. A privacy cipher, comprising: the device comprises a main control circuit, a vibration module and a timer;
the master control circuit receives a password input signal and controls the timer to record the duration time of the password input signal;
if the duration time of the password input signal reaches or exceeds a preset threshold value, the main control circuit drives the vibration module to generate vibration to prompt that the password input signal is normal input or interference input;
and if the password input signal is normally input, the main control circuit takes the password input signal as a password for processing.
2. The privacy password device of claim 1, wherein the duration of the password input signal reaches or exceeds a predetermined threshold, and wherein the vibration module generates a vibration to indicate that the password input signal is a normal input.
3. The privacy password device of claim 1, wherein the password input information has a duration that meets or exceeds a predetermined threshold, and wherein the vibration module generates a vibration to indicate that the password input signal is an interfering input.
4. The privacy cipher according to any one of claims 1-3, further comprising: the main control circuit, the vibration module and the timer are all arranged inside the cipher body; the main control circuit is electrically connected with the keys of the cipher device body to receive cipher input signals sent by the keys; the main control circuit is also electrically connected with the input circuit of the cipher device body so as to input a cipher input signal into the input circuit of the cipher device body to be used as a cipher for processing.
5. The peep-proof cipher device according to claim 4, wherein a key sound for prompting to operate a key of the cipher device body is emitted during the duration of the cipher input signal.
6. The privacy cipher as claimed in claim 4 wherein the master control circuit has an interface to the exterior of the cipher body for setting a threshold or changing a set threshold.
7. The peep-proof cipher device according to claim 4, wherein a main control circuit, a vibration module and a timer are arranged below each key of the cipher device body, and each main control circuit is electrically connected with the input circuit of the cipher device body.
8. The peep-proof cipher device according to claim 4, wherein a master control circuit is arranged below each key of the cipher device body, the master control circuits share a vibration module and a timer, vibration signals of the master control circuits are transmitted to the shared vibration module after being subjected to OR gate operation, and timing signals of the master control circuits are transmitted to the shared timer after being subjected to OR gate operation.
9. A password peep-proof method is characterized by comprising the following steps:
receiving a password input signal and recording the duration of the password input signal;
if the duration time of the password input signal reaches or exceeds a preset threshold value, generating vibration to prompt that the password input signal is normal input or interference input;
and if the password input signal is normally input, processing the password input signal as a password.
10. The password privacy method of claim 9, wherein the threshold values for different password input signals are different.
CN202010245132.6A 2020-03-03 2020-03-31 Anti-peeping cipher device and cipher anti-peeping method Withdrawn CN111460533A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010139351 2020-03-03
CN2020101393516 2020-03-03

Publications (1)

Publication Number Publication Date
CN111460533A true CN111460533A (en) 2020-07-28

Family

ID=71682366

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010245132.6A Withdrawn CN111460533A (en) 2020-03-03 2020-03-31 Anti-peeping cipher device and cipher anti-peeping method

Country Status (1)

Country Link
CN (1) CN111460533A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115830749A (en) * 2022-11-24 2023-03-21 惠州市则成技术有限公司 Home access control management method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426100A (en) * 2015-10-30 2016-03-23 努比亚技术有限公司 Pressure sensor based password input method and apparatus
CN105511784A (en) * 2015-12-02 2016-04-20 北京新美互通科技有限公司 Information input method, device and mobile terminal based on pressure detection
CN106778115A (en) * 2015-11-20 2017-05-31 西安中兴新软件有限责任公司 User equipment and its unlocking method
WO2017219376A1 (en) * 2016-06-25 2017-12-28 华为技术有限公司 Method and apparatus for generating password by means of pressure touch control
CN108256300A (en) * 2017-07-24 2018-07-06 平安科技(深圳)有限公司 A kind of cipher set-up method, device and computer readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426100A (en) * 2015-10-30 2016-03-23 努比亚技术有限公司 Pressure sensor based password input method and apparatus
CN106778115A (en) * 2015-11-20 2017-05-31 西安中兴新软件有限责任公司 User equipment and its unlocking method
CN105511784A (en) * 2015-12-02 2016-04-20 北京新美互通科技有限公司 Information input method, device and mobile terminal based on pressure detection
WO2017219376A1 (en) * 2016-06-25 2017-12-28 华为技术有限公司 Method and apparatus for generating password by means of pressure touch control
CN108256300A (en) * 2017-07-24 2018-07-06 平安科技(深圳)有限公司 A kind of cipher set-up method, device and computer readable storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115830749A (en) * 2022-11-24 2023-03-21 惠州市则成技术有限公司 Home access control management method and system
CN115830749B (en) * 2022-11-24 2024-05-17 惠州市则成技术有限公司 Household access control management method and system

Similar Documents

Publication Publication Date Title
EP0809171B1 (en) Apparatus and method to provide security for a keypad processor of a transaction terminal
CN101796764B (en) Biometric authentication device, system and method of biometric authentication
US9749137B2 (en) Method and system for securing the entry of data to a device
US8495732B2 (en) Entering an identifier with security improved by time based randomization of input steps
JP3956130B2 (en) Authentication device, authentication system, authentication method, program, and recording medium
CN1952855B (en) Cipher input method and system preventing peeper
JP2005537574A (en) User authentication system and method with strong password
EP0577707A4 (en)
CN104011729A (en) Input information authentication device, server, input information authentication system, and device program
CN103150525B (en) Password input method and password input terminal
CN111460533A (en) Anti-peeping cipher device and cipher anti-peeping method
US9489663B2 (en) Keypad for the entry of authentication data
CN110781488B (en) Password prompting method and terminal equipment
CN105335672A (en) Security mode prompting method and apparatus
TWI660286B (en) An anti-peeping apparatus and method for data entering
JP5002258B2 (en) Information processing apparatus, method, system, program, and storage medium
EP3002700B1 (en) Keypad for the entry of authentication data
CN113225310A (en) Voice encryption method, device, system, electronic equipment and storage medium
Luo et al. Feel Vibration: Challenge-Response Mobile Authentication with Covert Channel
KR102487919B1 (en) Authentication data transmitting apparatus based on sound wave communication with improved securyty
JP3209213B2 (en) Keyboard device and output signal blocking method used therefor
CN111460535A (en) Anti-peeping cipher device and cipher anti-peeping method thereof
CN110765447B (en) Password enhancement method and bracelet
CN116167042A (en) Password input method, device, terminal equipment and computer readable storage medium
CN106873772A (en) A kind of VR virtual units encryption method and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 075000, No. three, B District, 04 East Zone, Chahar Century Square, Hebei, Zhangjiakou

Applicant after: Zhangjiakou dachengyuan science and Technology Service Co.,Ltd.

Address before: 075000, No. three, B District, 04 East Zone, Chahar Century Square, Hebei, Zhangjiakou

Applicant before: ZHANGJIAKOU HAOYANG TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
TA01 Transfer of patent application right

Effective date of registration: 20201130

Address after: 101300 Beijing Shunyi District Airport Street, No. 1 Anhua Street, 1st Building, 1st Floor, No. 2159

Applicant after: BEIJING LONGPU INTELLIGENT TECHNOLOGY Co.,Ltd.

Address before: 075000, No. three, B District, 04 East Zone, Chahar Century Square, Hebei, Zhangjiakou

Applicant before: Zhangjiakou dachengyuan science and Technology Service Co.,Ltd.

TA01 Transfer of patent application right
WW01 Invention patent application withdrawn after publication

Application publication date: 20200728

WW01 Invention patent application withdrawn after publication