Anti-peeping cipher device and cipher anti-peeping method
Technical Field
The application relates to the technical field of ciphers, in particular to a peep-proof cipherer and a cipher peep-proof method.
Background
A cipher device is a device for inputting a password, and keys for inputting the password are provided on the front surface of the cipher device, such as: numeral keys 1-numeral key 9, a delete key, a confirm key, a # character key, a ﹡ character key, and the like. The password is input through the existing password input device, the password can be peeped and stolen, in the prior art, the front face of the password device is often provided with a protective cover which is in half surrounding the upper half part of the password device, and the upper surface of the protective cover is provided with openings for observing keys on the password device, so that the password is prevented from being leaked.
Therefore, how to avoid peeping and stealing the password in the process of inputting the password so as to reduce the risk of password input is a technical problem which needs to be solved urgently by technical personnel in the field at present.
Disclosure of Invention
The application provides a peep-proof cipher device and a cipher peep-proof method, which are used for avoiding that a cipher is peeped and stolen in the process of inputting the cipher, so that the risk of cipher input is reduced.
In order to solve the technical problem, the application provides the following technical scheme:
a privacy scrambler comprising: the device comprises a main control circuit, a vibration module and a timer; the master control circuit receives a password input signal and controls the timer to record the duration time of the password input signal; if the duration time of the password input signal reaches or exceeds a preset threshold value, the main control circuit drives the vibration module to generate vibration to prompt that the password input signal is normal input or interference input; and if the password input signal is normally input, the main control circuit takes the password input signal as a password for processing.
The anti-peeping cipher device as described above, wherein preferably, the duration of the cipher input signal reaches or exceeds a predetermined threshold, and the vibration module generates vibration to indicate that the cipher input signal is normally input.
The anti-peeping cipher device as described above, wherein preferably, the duration of the cipher input information reaches or exceeds a predetermined threshold, and the vibration module generates the vibration to indicate that the cipher input signal is the interference input.
The peep-proof cipher device as described above, preferably, further comprises: the main control circuit, the vibration module and the timer are all arranged inside the cipher body; the main control circuit is electrically connected with the keys of the cipher device body to receive cipher input signals sent by the keys; the main control circuit is also electrically connected with the input circuit of the cipher device body so as to input a cipher input signal into the input circuit of the cipher device body to be used as a cipher for processing.
The anti-peeping cipher device as described above, wherein preferably, a key sound for prompting to operate the key of the cipher device body is emitted during the duration of the cipher input signal.
The peep-proof cipher device as described above, wherein preferably, the main control circuit has an interface leading to the exterior of the cipher device body, and the interface is used for setting a threshold value or changing the set threshold value.
The peep-proof cipher device as described above, wherein preferably, a main control circuit, a vibration module and a timer are arranged below each key of the cipher device body, and each main control circuit is electrically connected with the input circuit of the cipher device body.
The peep-proof cipher device as described above, wherein preferably, a main control circuit is disposed below each key of the cipher device body, and the plurality of main control circuits share one vibration module and one timer, vibration signals of the plurality of main control circuits are transmitted to the shared vibration module after being subjected to or gate operation, and timing signals of the plurality of main control circuits are transmitted to the shared timer after being subjected to or gate operation.
A password peep-proof method comprises the following steps: receiving a password input signal and recording the duration of the password input signal; if the duration time of the password input signal reaches or exceeds a preset threshold value, generating vibration to prompt that the password input signal is normal input or interference input; and if the password input signal is normally input, processing the password input signal as a password.
The password privacy protecting method as described above, wherein the threshold value corresponding to different password input signals is preferably different.
Compared with the background technology, the peep-proof cipher device provided by the invention can be doped with a plurality of random irrelevant code values in the process of inputting a normal cipher sequence, meanwhile, the duration of pressing the key by a user is also used as a part of the cipher to be processed, and normal input or interference input is obtained by triggering vibration or not triggering vibration, so that a peeper cannot obtain a correct cipher even if seeing the character sequence input by the user, and the peeper is effectively interfered.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a schematic circuit diagram of a peep-proof cipher according to an embodiment of the present application;
fig. 2 is a schematic circuit diagram of a peep-proof cipher device according to another embodiment of the present application;
fig. 3 is a flowchart of a password privacy protection method according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative only and should not be construed as limiting the invention.
Example one
Referring to fig. 1, fig. 1 is a schematic circuit diagram of a peep-proof cipher device according to an embodiment of the present disclosure.
The application provides a peep-proof cipher device, includes: the main control circuit 110, the vibration module 120 and the timer 130 are all arranged inside the cipher device body (not shown in the figure).
The main control circuit 110 receives a password input signal generated by the user operating the key 140, and controls the timer 130 to record the duration of the password input signal.
Specifically, the main control circuit 110 is electrically connected to the keys 140 of the cipher device body to receive a cipher input signal generated by a user operating (e.g., pressing) the keys 140 of the cipher device body; the main control circuit 110 is further electrically connected to the enable terminal of the timer 130, and when the main control circuit 110 receives a password input signal generated by the user through the operation key 140, a timing signal is input to the enable terminal of the timer 130, and the timer 130 starts timing according to the timing signal. Specifically, when the user presses a certain key of the cipher device body, the timer 130 is cleared and starts to count time. If the user stops operating the key 140 of the cipher device body, the main control circuit 110 can no longer receive the cipher input signal, and the main control circuit 110 can no longer send the timing signal to the enabling terminal of the timer 130, at this time, the timer 130 stops timing.
On the basis, in the duration of the password input signal, no matter whether the vibration module 120 is triggered to vibrate or not, the key sound for operating (for example, pressing) the key 140 of the password device body is emitted to play a role of prompting that the key is being pressed, so that the observation of a peeper is disturbed.
If the duration of the password input signal reaches or exceeds the predetermined threshold T, the main control circuit 110 drives the vibration module 120 to generate vibration to indicate whether the password input signal is normal input or interference input.
Specifically, the main control circuit 110 is electrically connected to an enable terminal of the vibration module 120, the main control circuit 110 is electrically connected to an output terminal of the timer 130, the timer 130 transmits the recorded time information, that is, the duration time information of the password input signal, to the main control circuit 110, if the time recorded by the timer 130 reaches or exceeds the threshold T, that is, the duration time of the password input signal reaches or exceeds the threshold T, the main control circuit 110 inputs a vibration signal to the enable terminal of the vibration module 120, and the vibration module 120 starts to vibrate according to the vibration signal, specifically, for a predetermined time. During the vibration of the vibration module 120, the user stops pressing the key 140, and the vibration module 120 stops vibrating. The user can know whether the password input signal input by the key operated this time is normal input or interference input through the sensed vibration.
As an example, if the duration of the password input signal reaches or exceeds the predetermined threshold T, the password input signal is considered to be normally input and can be processed as a password, and the vibration generated by the vibration module 120 indicates to the user that the password input signal has reached the requirement of normal input, i.e., the next password input signal can be input. In this case, the user needs to wait for the next password input after the vibration prompt for normal input, and must terminate the password input before the vibration prompt for interference input, and then perform the next password input.
As another example, if the duration of the password input signal does not reach the predetermined threshold T, the password input signal is considered to be normally input and may be processed as a password, otherwise, if the duration of the password input information reaches or exceeds the predetermined threshold T, the password input signal is considered to be interference information and may not be processed as a password, and at this time, the vibration generated by the vibration module 120 prompts the user that the password input is interference input, that is, the next password input signal may be input. In this case, the user must terminate the password input before the vibration prompt for normal input and perform the next password input, and wait for the vibration prompt for the interference input before performing the next password input.
If the password input signal is normally input, the main control circuit 110 processes the password input signal as a password. Specifically, the password input signal is added to the password sequence, the main control circuit 110 is electrically connected to the input circuit of the password device body, and the password input signal is input to the input circuit of the password device body to be processed as a password.
For example: the duration of the password input signal reaches or exceeds the threshold T, and the vibration module 120 generates vibration to prompt the user that the password input signal is normally input. Specifically, the user sequentially presses six keys 1, 2, 3, 4, 5, and 6, the vibration module 120 is triggered to vibrate when the keys 1, 3, 5, and 6 are pressed, the information input by pressing the keys 1, 3, 5, and 6 is normal input, the vibration module 120 is not triggered to vibrate when the keys 2 and 4 are pressed, the information input by pressing the keys 2 and 4 is interference information, and the finally input password is 1356.
On the basis of the above, the main control circuit 110 has an interface to the outside of the cipher body, and the interface is used for setting the threshold T or changing the set threshold T. Specifically, the gear of the threshold T may be selected by a group of dial switches or jumpers, or the resistance value of the adjustable resistor may be changed, so as to set different thresholds T. Different threshold values T are correspondingly arranged on each key 140 of the cipher device body, so that the difficulty of stealing the cipher by a peeper who grasps the rule of duration time through repeated observation is increased.
When the user uses the peep-proof cipher device provided by the application, a plurality of random irrelevant code values can be doped in the process of inputting a normal cipher sequence, meanwhile, the duration time of pressing a key by the user is also used as a part of the cipher to be processed, normal input or interference input is obtained by triggering vibration or not triggering vibration, so that a peeper cannot obtain a correct cipher even if seeing the character sequence input by the user, and the peeper is effectively interfered.
For example, the user uses a 6-digit password, the user can actually input a sequence of more than 10 digits (only 6 digits are normally input, and whether the input is normal or not is distinguished by triggering vibration or not triggering vibration), even if the peeper sees the whole key sequence, the peeper cannot easily guess which 6 digits are the correct password of the user, and when the 10 digits are different, 5040 possible combinations of the 6 digits exist, so that the peep-proof password device provided by the application can effectively interfere with the peeper.
In addition, a main control circuit 110, a vibration module 120 and a timer 130 are arranged below each key 140 of the cipher device body, and each main control circuit 110 is electrically connected with an input circuit of the cipher device body to respectively identify a cipher input signal sent by the corresponding key 140, to distinguish normal input and interference input, and to input the normal input as a cipher into the input circuit of the cipher device body.
In addition, referring to fig. 2, fig. 2 is a circuit diagram of a peep-proof cipher device according to another embodiment of the present application.
The main control circuit 110 is arranged below each key 140 of the cipher body, the plurality of main control circuits 110 share one vibration module 120 and one timer 130, vibration signals of the plurality of main control circuits 110 are transmitted to the shared vibration module 120 after being subjected to OR gate operation and serve as enable signals of the vibration module 120, timing signals of the plurality of main control circuits 110 are transmitted to the shared timer 130 after being subjected to OR gate operation and serve as enable signals of the timer 130, however, according to the scheme, a user needs to avoid pressing the plurality of keys at the same time, and therefore timing disorder is avoided. For example: the main control circuit 111 is arranged below the key 141, the main control circuit 112 is arranged below the key 142, and the vibration module 120 and the timer 130 are shared by the key 141 and the key 142. In addition, the functions of the main control circuit, the vibration module and the timer are the same as those described above, and the measure of sharing the vibration module and the timer is beneficial to saving cost.
Example two
Referring to fig. 3, fig. 3 is a flowchart of a password privacy protection method implemented and provided in the present application.
The application also provides a password peep-proof method, which comprises the following steps:
step S310, receiving a password input signal and recording the duration time of the password input signal;
when a user presses a key of the cipher device, the key transmits a cipher input signal to the main control circuit, the main control circuit sends a timing signal to the timer after receiving the cipher input signal so as to clear the timer and start timing, and if the user stops pressing the key, the timer stops timing.
On the basis, after the password input signal is received, the button pressing sound of the button pressing is started to be sent out so as to prompt the user to press the button and interfere the observation of a peeper.
Step S320, if the duration time of the password input signal reaches or exceeds a preset threshold value, generating vibration to prompt that the password input signal is normal input or interference input;
the main control circuit judges the time recorded by the timer, namely the duration of the password input signal, and if the time reaches or exceeds a preset threshold value, a signal for starting vibration is sent to the vibration module, so that the vibration module starts vibration. In the vibration process of the vibration module, the user stops pressing the key, and then the vibration module stops vibrating. The user can know whether the password input signal input by the key operated this time is normal input or interference input through the sensed vibration.
In order to avoid peeping and stealing the password by repeatedly observing and mastering the duration, in the embodiment of the application, each password input signal, namely the threshold values T corresponding to different password input signals are different.
In one case, if the duration of the password input signal reaches or exceeds the predetermined threshold T, the password input signal is considered to be normally input and can be processed as a password, and the vibration generated by the vibration module prompts the user that the password input signal has reached the requirement of normal input, that is, the next password input signal can be input. In this case, the user needs to wait for the next password input after the vibration prompt for normal input, and must terminate the password input before the vibration prompt for interference input, and then perform the next password input.
In another case, if the duration of the password input signal does not reach the predetermined threshold T, the password input signal is considered to be normally input and can be processed as a password, otherwise, if the duration of the password input information reaches or exceeds the predetermined threshold T, the password input signal is considered to be interference information and cannot be processed as a password, and at this time, the vibration generated by the vibration module prompts the user that the password input is interference input, namely, the next password input signal can be input. In this case, the user must terminate the password input before the vibration prompt for normal input and perform the next password input, and wait for the vibration prompt for the interference input before performing the next password input.
And step S330, if the password input signal is normally input, processing the password input signal as a password.
Specifically, the password input signal is added to a password sequence and processed as a password.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.