[go: up one dir, main page]

CN113608629B - Intelligent keyboard system, password input method and self-service equipment - Google Patents

Intelligent keyboard system, password input method and self-service equipment Download PDF

Info

Publication number
CN113608629B
CN113608629B CN202110996003.5A CN202110996003A CN113608629B CN 113608629 B CN113608629 B CN 113608629B CN 202110996003 A CN202110996003 A CN 202110996003A CN 113608629 B CN113608629 B CN 113608629B
Authority
CN
China
Prior art keywords
keyboard
key position
character
key
triggered
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110996003.5A
Other languages
Chinese (zh)
Other versions
CN113608629A (en
Inventor
黄文强
徐晨敏
訾志博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202110996003.5A priority Critical patent/CN113608629B/en
Publication of CN113608629A publication Critical patent/CN113608629A/en
Application granted granted Critical
Publication of CN113608629B publication Critical patent/CN113608629B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
    • G06F3/0233Character input methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Input From Keyboards Or The Like (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application provides an intelligent keyboard system, a password input method and self-service equipment, and relates to the technical field of information security. The intelligent keyboard system comprises a first device and a second device, wherein the second device comprises a keyboard, each key position of the keyboard is marked by a pair of externally displayed identification characters, and each key position of the keyboard is triggered to output a character; the first device is used for setting characters actually output after each key position of the keyboard is triggered according to a user request; and the second device is used for converting the character output by each key position currently into the character corresponding to each key position in the setting result of the first device according to the setting result of the first device. By utilizing the scheme provided by the application, the security in the process of inputting the password is improved, and the risk of password leakage is reduced.

Description

Intelligent keyboard system, password input method and self-service equipment
Technical Field
The application relates to the technical field of information security, in particular to an intelligent keyboard system, a password input method and self-service equipment.
Background
In daily life, when a login operation or a financial operation is performed on a device provided with a keyboard, a password is often required to be input, but when the password is input in the open air, a strange place or in a scene where other unrelated persons exist, the password is input at risk of leakage, and the risks may be caused by peeping of persons, shooting of monitoring devices, estimation according to input actions and the like.
A typical scenario is that when a business is handled in a self-service teller machine of a bank, an lawbreaker may install a camera at a hidden position of the self-service teller machine and peep at a password, so that the risk of password leakage exists, and hidden danger is brought to information security and property security of a user.
Disclosure of Invention
In order to solve the problems, the application provides an intelligent keyboard system, a password input method and self-service equipment, which improve the security during password input and reduce the risk of password leakage.
In a first aspect, the present application provides an intelligent keyboard system, the intelligent keyboard system comprising a first device and a second device, the second device comprising a keyboard, each key of the keyboard being marked by an externally displayed identification character, each key of the keyboard being triggered to output a character. The first device is used for setting characters actually output after each key position of the keyboard is triggered according to a user request. The second device is used for converting the character output by each key position currently into the character corresponding to each key position in the setting result of the first device according to the setting result of the first device.
When the first device is not set, the character output after each key position on the keyboard is triggered is the identification character displayed by the key position outwards, for example, the identification character of the key position '1' is Arabic numeral 1, and the character output after the key position '1' is triggered is Arabic numeral 1. When the first device is set, the character output after the key position on the keyboard is triggered can be different from the identification character displayed by the key position externally, for example, the identification character of the key position '1' is Arabic numeral 1, and the character output after the key position '1' is triggered after the first device is set is Arabic numeral 9. When the password is input by the keyboard on the second device, the identification characters on the key positions are inconsistent with the characters actually output by the key positions, so that even if the input process is snooped, the setting result of the first device is determined by a user, only the positions of the keys are revealed, but not the output characters of the specific representation of the keys, namely the real password cannot be revealed, and the safety of the password input is improved.
In one possible implementation, the first device is further configured to set a key position corresponding to the first triggering operation. The first triggering operation is used for indicating the setting result of the first device on the second device when the key position corresponding to the first triggering operation on the second device is triggered.
When the user inputs the password on the second device, if the user forgets the setting result of the first device, the second device indicates the setting result of the first device by triggering the first operation.
In one possible implementation, the second device includes an indicator light, and when a key position corresponding to the first triggering operation on the second device is triggered, the second device indicates a setting result of the first device by using the indicator light.
In one possible implementation, the smart keyboard system further comprises a third device. The third device is used for storing the corresponding relation between the setting result of the first device and the user information of the user. The second device is specifically configured to obtain, according to the user information, a setting result of the corresponding first device from the third device.
The third device may be a server, or a background system. The third device is capable of information interaction with the first device and the second device.
In one possible implementation manner, the second device is further configured to, after completing one password input, use the identification character corresponding to each key as the character actually output by each key.
After the password is input, the character output after each key position on the keyboard is triggered is the identification character displayed by the key position, so that other subsequent operations can be conveniently performed.
In one possible implementation, the keyboard is a numeric keyboard or an alphabetic keyboard.
In one possible implementation, the keyboard is a physical keyboard or a soft keyboard.
In a second aspect, the present application also provides a password input method, each key of a keyboard is marked by an identification character displayed externally, and after each key of the keyboard is triggered, a character is output, the method includes:
Setting characters actually output after each key position of the keyboard is triggered according to a user request;
and according to the setting result, converting the character output by each key position currently into the character corresponding to each key position in the setting result.
When the method provided by the application is used for inputting the password by the keyboard on the second device, the identification characters on the key positions are inconsistent with the characters actually output by the key positions, so that even if the input process is snooped, the real password cannot be leaked because the setting result of the first device is determined by a user, and the safety of inputting the password is improved.
In one possible implementation, the method further includes:
Setting a key position corresponding to a first trigger operation, wherein the first trigger operation is used for indicating a setting result of the first device when the key position corresponding to the first trigger operation is triggered.
When the user inputs the password on the second device, if the user forgets the setting result of the first device, the second device indicates the setting result of the first device by triggering the first operation.
In a third aspect, the present application further provides a self-service device, where the self-service device is a second device in the intelligent keyboard system provided in any one of the foregoing implementation manners, and a keyboard of the self-service device is an entity keyboard.
When the user inputs the password on the keyboard of the second device, the identification characters on the key positions are inconsistent with the characters actually output by the key positions, so that even if the input process is snooped, the real password cannot be revealed because the setting result of the first device is determined by the user, and the safety of inputting the password is improved.
In one possible implementation, the self-service device is any one of an automatic deposit machine, an automatic teller machine, an automatic deposit and withdrawal machine, a POS machine, or the like.
Drawings
FIG. 1 is a schematic diagram of a numeric keypad;
FIG. 2 is a schematic diagram of an intelligent keyboard system according to an embodiment of the present application;
FIG. 3 is a schematic diagram of another smart keyboard system according to an embodiment of the present application;
fig. 4 is a schematic diagram of a setting result of a first device according to an embodiment of the present application;
FIG. 5 is a flowchart of a method for inputting a password according to an embodiment of the present application;
Fig. 6 is a schematic diagram of a self-service device according to an embodiment of the present application.
Detailed Description
In order to make the person skilled in the art more clearly understand the solution of the present application, the following first describes an application scenario of the solution of the present application.
In daily life, password security is related to information security and property security of users, and when a login operation or a financial operation is performed on a device with a keyboard, a password is often required to be input, but when the password is input outdoors, in a strange place or in a scene where other unrelated persons exist, the password is leaked, and the risks may be caused by peeping of the persons, shooting of monitoring equipment, estimation according to input actions and the like.
A typical scenario is that when a business is handled in a self-service teller machine at a bank, an lawbreaker may install a camera in a hidden location of the self-service teller machine, thereby peeping the password, and thus there is a risk of password leakage.
Referring to fig. 1, a schematic diagram of a numeric keypad is shown.
The character output after each key position on the keyboard is triggered is the identification character displayed by the key position outwards, for example, the identification character of the key position '0' is Arabic numeral 0, and the character output after the key position '0' is triggered is Arabic numeral 0.
Thus when entering a password on the illustrated keypad, there may be a risk of password leakage if peeped or photographed.
In order to solve the above problems, an embodiment of the present application provides an intelligent keyboard system, where the intelligent keyboard system includes a first device and a second device, the second device includes a keyboard, each key of the keyboard is marked by an identification character displayed externally, and each key of the keyboard is triggered to output a character. The first device is used for setting characters actually output after each key position of the keyboard is triggered according to a user request. The second device is used for converting the character output by each key position currently into the character corresponding to each key position in the setting result of the first device according to the setting result of the first device. When the password is input on the keyboard of the second device, the identification characters on the key positions are inconsistent with the characters actually output by the key positions, so that even if the input process is snooped, the setting result of the first device is determined by a user, only the positions of the keys are revealed, but not the specific output characters of the keys are revealed, the real password is not revealed, and the safety of the password input is improved.
In order to make the solution of the present application more clearly understood by those skilled in the art, the following description will describe the solution of the present application in connection with the accompanying drawings in the embodiments of the present application.
The words "first," "second," and the like in the description of the application are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated.
In the present application, unless explicitly specified and limited otherwise, the term "connected" is to be construed broadly, and for example, "connected" may be either fixedly connected, detachably connected, or integrally formed; may be directly connected or indirectly connected through an intermediate medium.
The embodiment of the application provides an intelligent keyboard system, which is specifically described below with reference to the accompanying drawings.
Referring to fig. 2, a schematic diagram of a smart keyboard system according to an embodiment of the present application is shown.
The smart keyboard system comprises a first device 10 and a second device 20.
The second device 20 comprises a keypad 201, each key of the keypad 201 being marked by an externally displayed identification character, each key of the keypad 201 being triggered to output a character.
The first device 10 is configured to set, according to a user request, a character actually output after each key position of the keyboard 201 is activated.
When the first device 10 is not set, the character output after each key position on the keyboard 201 is triggered is the identification character displayed by the key position externally, for example, the identification character of the key position "1" is the arabic numeral 1, and the character output after the key position "1" is triggered is also the arabic numeral 1.
When the first device 10 is set, the character output after the key position on the keyboard 201 is triggered may be different from the identification character displayed by the key position externally, for example, the identification character of the key position "1" is arabic numeral 1, and the character output after the key position "1" is triggered after the first device 10 is set is arabic numeral 2. I.e. the character actually output by each key position is changed by the setting of the first device 10.
In the figure, the keyboard is taken as a numeric keyboard, and the output characters are taken as numerals for illustration. In other embodiments, the keyboard may be an alphabetic keyboard, and the characters output are letters; in still other embodiments, the keyboard may be another type of keyboard for outputting punctuation, arithmetic symbols, and the like.
The second device 20 is configured to convert, according to the setting result of the first device 10, the character output by each key currently into the character corresponding to each key in the setting result of the first device 10.
In summary, with the intelligent keyboard system provided by the embodiment of the present application, after the first device performs key setting, when the user inputs the password on the keyboard on the second device, the identification characters on the key positions are inconsistent with the characters actually output by the key positions, so that even if the input process is snooped, since the setting result of the first device is determined by the user, only the positions of the keys are revealed, but not the specific representative output characters of the keys, that is, the real password is not revealed, thereby improving the security in password input.
The following description is made in connection with specific implementations.
Referring to fig. 3, a schematic diagram of another smart keyboard system according to an embodiment of the present application is shown.
The illustrated smart keyboard system includes a first device 10, a second device 20, and a third device 30.
Wherein, the third device 30 is configured to store a correspondence between the setting result of the first device 10 and user information of the user. The second device 20 is specifically configured to obtain, from the third device 30, a setting result of the corresponding first device 10 according to the user information.
The third device 30 may be a server, or a backend system. The third device 30 is capable of information interaction with the first device 10 and the second device 20.
The first device 10 may be a terminal device, and the type of the terminal device is not particularly limited in the present application, and the terminal device may be a mobile phone, a notebook computer, a wearable electronic device (for example, a smart watch), a tablet computer, an augmented reality (augmented reality, AR) device, a Virtual Reality (VR) device, an in-vehicle device, and the like.
The second device 20 may be a self-service device, such as an automatic deposit machine, an automatic teller machine, an automatic deposit and withdrawal machine, or a POS machine, and embodiments of the present application are not limited in detail.
The first device 10 is further configured to set a key position corresponding to the first triggering operation after setting the character actually output after each key position is triggered. The first triggering operation is used for indicating a setting result of the first device on the second device when a key position corresponding to the first triggering operation on the second device 20 is triggered.
When the user inputs the password on the second device, if the user forgets the setting result of the first device, the second device indicates the setting result of the first device by triggering the first operation.
The embodiment of the application does not limit the specific key position of the first triggering operation, and can be set by a user, for example, the key position with the identification character of1 can be continuously pressed three times, and the key position can be set as a combination of a plurality of key positions.
In some embodiments, the second device 20 includes an indicator light, and when a key position corresponding to the first triggering operation on the second device 20 is triggered, the second device indicates a setting result of the first device using the indicator light.
The second device 20 is further configured to, after completing one password input, use the identification character corresponding to each key position as the character actually output by each key position.
After the password is input, the character output after each key position on the keyboard is triggered is the identification character displayed by the key position, so that other subsequent operations can be conveniently performed.
The keypad of the second device 20 is a numeric keypad or an alphabetic keypad, which may be a physical keypad or a soft keypad, and embodiments of the present application are not particularly limited.
The following specifically describes the first device 10 as a mobile phone, the second device 20 as a self-service teller machine, and the third device 30 as a server.
The user sets own exclusive password position information by using an Application program (APP) of the mobile phone, namely, sets characters actually output after each key position of the keyboard is triggered.
For example, see a schematic diagram of the setting result of the first device shown in fig. 4.
In some embodiments, the setting process is completed through a man-machine interaction interface, and the setting process is used for dragging different numbers on the surface of the keyboard to the desired positions, and meanwhile, the user can set a mode that the user forgets the positions of the password keyboard to view the sequence of the data keyboard, for example, the user clicks and submits the data keyboard by pressing 1 key twice continuously, the first device sends the setting result to the third device, the third device records the setting result, and simultaneously reads corresponding user information, and the user information and the setting result are stored correspondingly.
When the user transacts business on the self-service cash recycling machine, namely the second device, the user can choose to input own password by using the normal keyboard or the customized keyboard.
If the customized keyboard is selected to input the own password information, the second device records the position information of the password input by the user (the password keyboard shows the sequence of normal 0 to 9 at the moment, but actually the corresponding keyboard is not 0 to 9), then the corresponding setting result is obtained from the third device according to the user information, the character output by each key position at present is further converted into the character corresponding to each key position in the setting result of the first device, and the analyzed password is input to the background system to finish the password verification work.
If the user forgets the number position of the password keyboard set by the user, the user can check the number position through the password keyboard setting module of the mobile phone APP, the key position corresponding to the first triggering operation can be triggered on the self-service deposit machine, and the position of the password keyboard can be displayed on the password keyboard of the self-service deposit and withdrawal machine after the background system is verified. In one possible implementation, this may be demonstrated by an LED lamp.
After the password is input, the character output after each key position on the keyboard is triggered is the identification character displayed by the key position, so that other subsequent operations can be conveniently performed.
Based on the intelligent keyboard system provided by the embodiment, the embodiment of the application also provides a password input method, and the method is specifically described below with reference to the accompanying drawings.
Referring to fig. 5, the flowchart of a password input method according to an embodiment of the present application is shown.
The method provided by the embodiment of the application comprises the following steps:
S501: and setting the character actually output after each key position of the keyboard is triggered according to the user request.
When not set, the character output after each key position on the keyboard is triggered is the identification character displayed by the key position outwards, for example, the identification character of the key position '1' is Arabic numeral 1, and the character output after the key position '1' is triggered is Arabic numeral 1.
When the key position on the keyboard is triggered, the character output after the key position is triggered can be different from the identification character externally displayed by the key position, for example, the identification character of the key position '1' is Arabic numeral 1, and the character output after the key position '1' is triggered after the key position '1' is set is Arabic numeral 2. I.e. the character actually output by each key position is changed by setting.
S502, converting the character output by each key position currently into the character corresponding to each key position in the setting result according to the setting result.
In some embodiments, after S501 is completed, a key corresponding to a first triggering operation may also be set, where the first triggering operation is used to indicate a setting result of the first device when the key corresponding to the first triggering operation is triggered.
When the user inputs the password on the second device, if the user forgets the setting result of the first device, the second device indicates the setting result of the first device by triggering the first operation.
In some embodiments, after S502 is completed, the identification character corresponding to each key may be used as the character actually output by each key, that is, after the password is input, the character output after each key on the keyboard is triggered is the identification character displayed by the key, so as to facilitate subsequent other operations.
The above method steps of the embodiments of the present application are only for convenience of description, and do not constitute limitation of the technical solution of the present application.
In summary, by using the method provided by the embodiment of the present application, the characters actually output by each key position on the keyboard are set first, when the password is input on the keyboard, the identification characters on the key positions are inconsistent with the characters actually output by the key positions, so that even if the input process is snooped, the setting result is determined by the user, and therefore, only the positions of the keys are revealed, not the output characters specifically representing the keys, that is, the actual password is not revealed, thereby improving the security when the password is input.
Based on the intelligent keyboard system provided by the embodiment, the embodiment of the application also provides self-service equipment, and the self-service equipment is specifically described below with reference to the accompanying drawings.
Referring to fig. 6, a schematic diagram of a self-service device according to an embodiment of the present application is shown.
The self-service device 600 is a second device in the intelligent keyboard system described in the above embodiment, and the keyboard 201 of the self-service device is an entity keyboard.
The description of the self-service device 600 may be referred to the description of the second device in the above embodiments, and the embodiments of the present application are not repeated here.
The self-service device provided by the embodiment of the application can be a self-service deposit machine, a self-service withdrawal machine, a self-service deposit and withdrawal machine and the like, and the embodiment of the application is not particularly limited.
In summary, when the user inputs the password on the keyboard, the identification characters on the key positions are inconsistent with the characters actually output by the key positions, so that even if the input process is snooped, the real password cannot be revealed because the setting result of the first device is determined by the user, and the security of inputting the password is improved.
It should be noted that the intelligent keyboard system, the password input method and the self-service device provided by the application can be used in the financial field or other fields, for example, can be used in self-service application scenes in the financial field. Other fields are any field other than the financial field, for example, the smart payment field. The foregoing is merely an example, and the application fields of the intelligent keyboard system, the password input method and the self-service device provided by the application are not limited
It should be understood that in the present application, "at least one (item)" means one or more, and "a plurality" means two or more. "and/or" for describing the association relationship of the association object, the representation may have three relationships, for example, "a and/or B" may represent: only a, only B and both a and B are present, wherein a, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b or c may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b, c may be single or plural.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. The apparatus embodiments described above are merely illustrative, wherein the units and modules illustrated as separate components may or may not be physically separate.
In addition, some or all of the units and modules can be selected according to actual needs to achieve the purpose of the embodiment scheme. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
The foregoing is merely illustrative of the embodiments of this application and it will be appreciated by those skilled in the art that variations and modifications may be made without departing from the principles of the application, and it is intended to cover all modifications and variations as fall within the scope of the application.

Claims (8)

1. The intelligent keyboard system is characterized by comprising a first device and a second device, wherein the second device comprises a keyboard, each key position of the keyboard is marked by a pair of identification characters displayed outwards, and each key position of the keyboard is triggered to output a character;
The first device is used for setting characters actually output after each key position of the keyboard is triggered according to a user request;
The second device is configured to convert, according to a setting result of the first device, a character output by each key position currently into a character corresponding to each key position in the setting result of the first device;
The first device is further configured to set a key position corresponding to the first trigger operation;
The first triggering operation is used for indicating a setting result of the first device on the second device when a key position corresponding to the first triggering operation on the second device is triggered;
the smart keyboard system further includes a third device;
The third device is configured to store a corresponding relationship between a setting result of the first device and user information of the user;
the second device is specifically configured to obtain, according to the user information, a setting result of the corresponding first device from the third device.
2. The smart keyboard system of claim 1, wherein the second device includes an indicator light, the second device indicating a result of the setting of the first device using the indicator light when a key position corresponding to the first trigger operation on the second device is triggered.
3. The smart keyboard system of claim 1, wherein the second device is further configured to, after completing one password input, use the identification character corresponding to each key as the character actually output by each key.
4. The smart keyboard system of claim 1, wherein the keyboard is a numeric keyboard or an alphabetic keyboard.
5. The smart keyboard system of any of claims 1-4, wherein the keyboard is a physical keyboard or a soft keyboard.
6. A password input method, wherein each key of a keyboard is marked by an externally displayed identification character, and each key of the keyboard is triggered to output a character, the method comprising:
Setting characters actually output after each key position of the keyboard is triggered according to a user request;
according to the setting result, converting the character output by each key position currently into the character corresponding to each key position in the setting result;
Setting a key position corresponding to a first trigger operation, wherein the first trigger operation is used for indicating a setting result of first equipment when the key position corresponding to the first trigger operation is triggered;
the character actually output after each key position is triggered is set by the first device.
7. A self-service device, characterized in that it is a second device in the smart keyboard system of any one of claims 1 to 5, the keyboard of the self-service device being a physical keyboard.
8. The self-service device of claim 7, wherein the self-service device is any one of:
Automatic deposit machine, automatic teller machine, automatic deposit and teller machine or POS machine.
CN202110996003.5A 2021-08-27 2021-08-27 Intelligent keyboard system, password input method and self-service equipment Active CN113608629B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110996003.5A CN113608629B (en) 2021-08-27 2021-08-27 Intelligent keyboard system, password input method and self-service equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110996003.5A CN113608629B (en) 2021-08-27 2021-08-27 Intelligent keyboard system, password input method and self-service equipment

Publications (2)

Publication Number Publication Date
CN113608629A CN113608629A (en) 2021-11-05
CN113608629B true CN113608629B (en) 2024-05-17

Family

ID=78309550

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110996003.5A Active CN113608629B (en) 2021-08-27 2021-08-27 Intelligent keyboard system, password input method and self-service equipment

Country Status (1)

Country Link
CN (1) CN113608629B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103679448A (en) * 2013-11-29 2014-03-26 天地融科技股份有限公司 Password inputting method and password inputting system
CN105760793A (en) * 2014-12-19 2016-07-13 施豪杰 Anti-peeping password input mode
CN106022172A (en) * 2016-05-24 2016-10-12 中国银行股份有限公司 Password input method and system protecting password keyboard button input operation
WO2016184134A1 (en) * 2015-11-24 2016-11-24 中兴通讯股份有限公司 Input method and apparatus, and user equipment
WO2018014270A1 (en) * 2016-07-20 2018-01-25 华为技术有限公司 Method for securely inputting password and terminal device
TWI630508B (en) * 2017-10-19 2018-07-21 建國科技大學 Device and method of password entering
CN111079204A (en) * 2019-12-30 2020-04-28 中国银行股份有限公司 Password input method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103679448A (en) * 2013-11-29 2014-03-26 天地融科技股份有限公司 Password inputting method and password inputting system
CN105760793A (en) * 2014-12-19 2016-07-13 施豪杰 Anti-peeping password input mode
WO2016184134A1 (en) * 2015-11-24 2016-11-24 中兴通讯股份有限公司 Input method and apparatus, and user equipment
CN106022172A (en) * 2016-05-24 2016-10-12 中国银行股份有限公司 Password input method and system protecting password keyboard button input operation
WO2018014270A1 (en) * 2016-07-20 2018-01-25 华为技术有限公司 Method for securely inputting password and terminal device
TWI630508B (en) * 2017-10-19 2018-07-21 建國科技大學 Device and method of password entering
CN111079204A (en) * 2019-12-30 2020-04-28 中国银行股份有限公司 Password input method and device

Also Published As

Publication number Publication date
CN113608629A (en) 2021-11-05

Similar Documents

Publication Publication Date Title
US11715096B2 (en) Augmented reality card activation
CN107742362B (en) PIN verification
US9218596B2 (en) Method and apparatus for providing real time mutable credit card information
US8836473B2 (en) Dynamic keypad and fingerprinting sequence authentication
AU2013269368B2 (en) Method and system for secure user identification
US8910861B2 (en) Automatic teller machine (“ATM”) including a user-accessible USB port
US20170324726A1 (en) Digital authentication using augmented reality
US9196111B1 (en) Automated teller machine (“ATM”) dynamic keypad
JP2012108796A (en) Automatic transaction system, automatic transaction method and automatic transaction machine
EP3786820B1 (en) Authentication system, authentication device, authentication method, and program
US20170249450A1 (en) Device and Method for Authenticating a User
ES2835317T3 (en) Method and system for authenticating identity using a variable numeric keypad
Seetharama et al. Safetypin: Secure pin entry through eye tracking
CN113608629B (en) Intelligent keyboard system, password input method and self-service equipment
US9214051B1 (en) Dynamic touch screen for automated teller machines (“ATMs”)
US20230313898A1 (en) Augmented reality card activation
JP2009217771A (en) Automatic transaction system
CN104769621A (en) Financial transactions with a varying pin
CN114020391A (en) Information display method and device, electronic equipment and readable storage medium
JP5479820B2 (en) Input device
WO2022001707A1 (en) Method and system for receiving a secure input, using a secure input means
JP2019200501A (en) Operation screen display method and information processing system
US20220207518A1 (en) Card registration system, card registration method, and information storage medium
CN101770668A (en) Mobile telephone capable of transacting with electronic transaction device
KR20030057056A (en) Secret number protection method for automatic teller machine

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant