CN204667529U - Cipher peeping-proof cover - Google Patents
Cipher peeping-proof cover Download PDFInfo
- Publication number
- CN204667529U CN204667529U CN201420872926.5U CN201420872926U CN204667529U CN 204667529 U CN204667529 U CN 204667529U CN 201420872926 U CN201420872926 U CN 201420872926U CN 204667529 U CN204667529 U CN 204667529U
- Authority
- CN
- China
- Prior art keywords
- peeping
- cipher
- proof cover
- top board
- small pieces
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The utility model provides a kind of cipher peeping-proof cover, comprises a top board; Two side plates that become one with top board; Multiple lattice-shaped through holes, are positioned on top board; And multiple small pieces, each small pieces are connected with the appropriate section of top board, have certain degree the direction of each through hole is restricted between the thickness direction of top board, described angle can prevent the light to inject lattice-shaped through hole from top except any angle operator's sight angle from arriving the code keypad of cipher peeping-proof cover below.
Description
Technical field
The utility model relates to a kind of for preventing the cipher anti-theft of the peep of cipher of inputCover.
Background technology
Along with the popularization of e-finance business, use the situation that various bank cards are concluded the businessMore and more general. For example, people, after carrying out current consumption, use silver more and moreRow card (as debit card or credit card) is swiped the card and is paid a bill instead of cash is paid a bill. Example againInquire about as, people use ATM (ATM) more and more, withdraw the money,Deposit, transfer accounts, even paying waits transaction.
In these transaction, input user cipher in a lot of situations, is needed to enter user identityRow is verified. But for ATM, to be exactly that password is stolen read maximum potential safety hazard.In order to prevent password by other people (for example by other people directly or be arranged on code keypad by other peopleThe camera of near zone) steal and read, propose and on code keypad, install cipher peeping-proof cover additionalScheme.
What propose the earliest is the iron cipher peeping-proof cover of a kind of totally enclosed type, and it can cover completelyCode keypad, but this watching shield cover also blocks operator's sight line simultaneously, gives operatorInput password is made troubles, and due to the reason of material and technique on pattern handling also thanComparatively limitation. Also have the iron cipher peeping-proof cover of a kind of venetian blind type, its top uses flat goldBelong to thin slice, it has grid, and this watching shield cover can convenient operation person be seen code keypadWith input password, can prevent again the monitored robber of partial password from reading, but, its forming materials workThe possibility that skill limitation can cause monitoring robber to read. Further, because the grid of this watching shield cover is openedMouth is vertical with code keypad, and the camera that is arranged on ATM top likely photographs operationThe password of person's input.
Utility model content
For above problem, the utility model proposes a kind of for effectively preventing the password of inputThe cipher anti-theft shield apparatus of being peeped.
According to a scheme of the present utility model, provide a kind of cipher peeping-proof cover, comprise oneIndividual top board; Two side plates that become one with top board; Multiple lattice-shaped through holes, are positioned at topOn plate; And multiple small pieces, each small pieces are connected with the appropriate section of top board, with by eachThe direction of through hole is restricted between the thickness direction of top board has certain degree, described angleCan prevent from leading to inject lattice-shaped from top except any angle operator's sight angleThe light in hole arrives the code keypad of cipher peeping-proof cover below.
In one implementation, the size of described angle is by width and the institute of described lattice-shaped through holeThe length of stating small pieces determines.
In one implementation, the appropriate section of described small pieces and top board forms as one.
In one implementation, described cipher peeping-proof cover is integrated.
In one implementation, described lattice-shaped through hole is by injection mo(u)lding.
In one implementation, described cipher peeping-proof cover is by high molecular polymer injection mo(u)lding.
In one implementation, described cipher peeping-proof cover also comprises: illuminating lamp, described in it is positioned atCipher peeping-proof cover below is towards the side of code keypad, for illuminating code keypad.
Compared with above-mentioned known cipher peeping-proof cover, the cipher peeping-proof cover the utility model proposesWhen handled easily person inputs password, the password of input comprehensively effectively can also be preventedPeeped.
Accompanying drawing explanation
By below with reference to the detailed description of the invention of the present utility model given by following accompanying drawingAfter description, the utility model will be understood better, and other objects of the present utility model,Details, feature and advantage will become more apparent. In the accompanying drawings:
Fig. 1 shows cipher peeping-proof cover according to the utility model embodiment is installedThe overview of ATM;
Fig. 2 shows the side view of an example according to cipher peeping-proof cover of the present utility model;
Fig. 3 shows when being arranged on ATM according to cipher peeping-proof cover of the present utility modelThe overall schematic of cross section;
Fig. 4 shows the horizontal stroke during critical excitation that cipher peeping-proof cover prevents peep of cipherThe schematic diagram in cross section; And
Fig. 5 and Fig. 6 respectively illustrate cross section during other duties of cipher peeping-proof coverSchematic diagram.
Wherein, in all of the figs, same or analogous label represent have identical, similarOr the element of corresponding feature or function.
Detailed description of the invention
Preferred embodiment of the present utility model is described below with reference to accompanying drawings in more detail. ThoughSo in accompanying drawing, show preferred embodiment of the present utility model, but should be appreciated that, canThe embodiment of realizing the utility model in a variety of manners and should do not set forth here limits.On the contrary, it is in order to make the utility model more thorough and complete that these embodiments are provided, andAnd complete scope of the present utility model can be conveyed to those skilled in the art.
Fig. 1 shows cipher peeping-proof cover 10 according to the utility model embodiment is installedThe overview of ATM 20, wherein cipher peeping-proof cover 10 is for preventing other people from spying on behaviourThe input that author carries out on code keypad 30. In FIG, cipher peeping-proof cover 10 is shownShow for being arranged on ATM 20, but it will be understood by those skilled in the art that according to thisThe cipher peeping-proof cover 10 of the inventive concept of utility model can be arranged on any other needs inputThe place of password, for example, be arranged on the keypad of fixing or mobile POS, be arranged on doorThe cipher inputting keyboard of access control system is first-class.
Fig. 2 shows the side-looking of an example according to cipher peeping-proof cover 10 of the present utility modelFigure. As shown in Figure 2, cipher peeping-proof cover 10 has a top board 1 and two side plates 2,Wherein top board 1 and two side plates 2 become one. Top board 1 has respectively along top board 1Widthwise edge and longitudinal edge arrange multiple lattice-shaped through holes 3. According to password of the present utility modelA main difference of watching shield cover 10 and the venetian blind type cipher peeping-proof cover described in background technologyPart is, lattice-shaped through hole 3 is not that the thickness direction along top board 1 is vertical with top board 1,But have angle α (as shown in Figure 4) with the thickness direction of top board 1, angle α makesThe code keypad below cipher peeping-proof cover must be able to be prevented in larger angular range stolenPeep. Below by way of example, angle α is described in detail. For example, lattice-shaped through hole 3Can by injection mo(u)lding.
Fig. 3 to Fig. 6 shows according to cipher peeping-proof cover 10 of the present utility model and prevents from being arranged onThe schematic diagram of the various operative scenario of the camera snooping password keyboard 30 of top.
Fig. 3 shows according to cipher peeping-proof cover 10 of the present utility model and is arranged on ATM 20The overall schematic of the cross section when upper.
As shown in Figure 3, suppose that cipher peeping-proof cover 10 is arranged on ATM 20 top upper, itsMiddle A and B is respectively the rearmost that the camera for peeping can be installed on ATM 20Position with forefront, the region that some A, A1, A2 surround is the peeped district of camera ATerritory (also referred to as region A), the region that some B, B1, B2 surround is stealing of camera BPeep region (also referred to as region B), region A and region B represent and are arranged on ATMThe maximum magnitude that the camera at 20 tops can be peeped. But the utility model does not limit toIn this, in fact, peep camera other regions may be arranged on, for example, can be arranged onThe two ends of the cell at ATM 20 place, corner etc. Therefore, prevent the region peeped shouldThis is any other region except operator position, code keypad 3 top.
When Fig. 4 shows the critical excitation that cipher peeping-proof cover 10 prevents peep of cipherThe schematic diagram of cross section.
As being shown specifically in Fig. 4, cipher peeping-proof cover 10 has multiple small pieces 4, Mei Ge littleSheet 4 is connected with the appropriate section of top board 1, so that the direction of through hole 3 is restricted to and top board 1Thickness direction there is angle α.
In one preferably realizes, small pieces 4 form as one with the appropriate section of top board 1.For example, cipher peeping-proof cover 10 is integrated, thus small pieces 4 are to be formed as with top board 1One. But the utility model is not limited to this, and small pieces 4 also can be independent portionsPart, otherwise combines with the various piece of top board 1, for example pass through to weld,Bonding etc. For integrated cipher peeping-proof cover, can realize between ATMInstallation by adhering, thus enhance integral firmness and destroy difficulty.
The size of angle α is determined by the width of through hole 3 and the length of small pieces 4. Therefore, canDesign with the length to small pieces 4 and angle α, to make with except operator's angle of sightAny angle of being outside one's consideration is injected through hole 3 light from top all can not arrive cipher peeping-proof cover 10The code keypad 30 of below.
As shown in Figures 3 and 4, along the lines C1-C2 of small pieces 4 and logical at lattice-shapedThe edge in hole 3 forms on code keypad perpendicular to the lines D1-D2 of lattice-shaped through hole 3The viewing area that forms for each lattice-shaped through hole 3, region (i.e. C2-D2 region), canFor operator (holder) input password, and the visible area that all lattice-shaped through holes 3 formRegion outside territory is effective peep-proof region, can prevent Password Input from being peeped.
Further, cipher peeping-proof cover 10 below is all right towards the side of code keypad 30Illuminating lamp (not shown) is installed, for illuminating code keypad 30, to make operationPerson also can be clear accurate as daytime when night uses ATM input password, fromAnd obtain better Consumer's Experience.
Fig. 4 shows the critical excitation of cipher peeping-proof cover 10. In this case, lightPerpendicular to top board 1 incident. As shown in Figure 4, suppose that the width of through hole 3 is d, small pieces 4Length be L, then sin α=d/L.
Therefore, can according to actual conditions the width to through hole 3, small pieces 4 length andThe size of angle α is selected, to meet various different needs.
Transversal when Fig. 5 and Fig. 6 respectively illustrate other duties of cipher peeping-proof cover 10The schematic diagram in face. For example, the light that Fig. 5 shows the incident of operator's sight angle can get atReach the situation of code keypad 30, Fig. 6 shows and is positioned at ATM 20 forefront, top (exampleAs the B point in Fig. 3) the light of camera the situation of code keypad 30 can not be arrived.
Can find out, the cipher peeping-proof cover 10 of realizing according to the utility model can ensure operationPerson's (Password Input person) normal operating, can prevent from being again arranged on the shooting of top simultaneouslyHead is spied on the input of operator on code keypad.
In one implementation, cipher peeping-proof cover 10 is made up of high molecular polymer. For example, canTo use various plastic raw materials to make.
Utilize cipher peeping-proof cover of the present utility model, no matter any side above ATM panelCamera is installed in position all cannot spy on gesture path when operator inputs password, and operatesPerson also can make it when inputting password because of watching shield cover height parameter optimal design when input passwordThe five fingers stretch, the drawback that the movement locus that doing so avoids single finger is easily captured.
In addition, use plastic raw materials make cipher peeping-proof cover, also make its outward appearance be different fromToward single outward appearance made of iron, it is same that this improves good looking appearance degree better from industrial design angleTime also improve user experience.
Above description for enabling any those of ordinary skill of this area realize of the present disclosureOr use the utility model. To those skilled in the art, of the present disclosure variousAmendment is all apparent, and general principle defined herein also can not depart fromOther distortion is applied in the situation of spirit of the present utility model and protection domain. Therefore, originallyUtility model is not limited to example as herein described and design, but with principle disclosed hereinConsistent with the widest scope of novel features.
Claims (7)
1. a cipher peeping-proof cover, is characterized in that, comprising:
A top board;
Two side plates that become one with top board;
Multiple lattice-shaped through holes, are positioned on top board; And
Multiple small pieces, each small pieces are connected with the appropriate section of top board, with by the side of each through holeHave certain degree to being restricted between the thickness direction of top board, described angle can preventTo inject the light of lattice-shaped through hole from top except any angle operator's sight angleArrive the code keypad of cipher peeping-proof cover below.
2. cipher peeping-proof cover as claimed in claim 1, is characterized in that, described angleSize is determined by the width of described lattice-shaped through hole and the length of described small pieces.
3. cipher peeping-proof cover as claimed in claim 1, is characterized in that, described small pieces withThe appropriate section of top board forms as one.
4. cipher peeping-proof cover as claimed in claim 1, is characterized in that, described password is anti-It is integrated peeping cover.
5. cipher peeping-proof cover as claimed in claim 1, is characterized in that described lattice-shapedThrough hole is by injection mo(u)lding.
6. cipher peeping-proof cover as claimed in claim 1, is characterized in that, described password is anti-Peep cover to be formed by high molecular polymer manufacture.
7. cipher peeping-proof cover as claimed in claim 1, is characterized in that, also comprise: shineBright lamp, it is positioned at described cipher peeping-proof cover below towards the side of code keypad, for illuminatingCode keypad.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201420872926.5U CN204667529U (en) | 2014-12-29 | 2014-12-29 | Cipher peeping-proof cover |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201420872926.5U CN204667529U (en) | 2014-12-29 | 2014-12-29 | Cipher peeping-proof cover |
Publications (1)
Publication Number | Publication Date |
---|---|
CN204667529U true CN204667529U (en) | 2015-09-23 |
Family
ID=54137889
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201420872926.5U Expired - Fee Related CN204667529U (en) | 2014-12-29 | 2014-12-29 | Cipher peeping-proof cover |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN204667529U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104599396A (en) * | 2014-12-29 | 2015-05-06 | 迪堡金融设备有限公司 | Password anti-peeping cover |
-
2014
- 2014-12-29 CN CN201420872926.5U patent/CN204667529U/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104599396A (en) * | 2014-12-29 | 2015-05-06 | 迪堡金融设备有限公司 | Password anti-peeping cover |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20170364788A1 (en) | Organic light emitting diode ("oled") universal plastic | |
CN201331799Y (en) | Self-help card-distributing apparatus | |
CN204667529U (en) | Cipher peeping-proof cover | |
JP5463220B2 (en) | Peep prevention cover and automatic transaction device | |
CN204155361U (en) | One-stop intelligent certificate accepts the equipment of writing comments on a document | |
CN202454001U (en) | Self-service terminal device for tax service | |
CN105225360A (en) | A kind of integrated cash register | |
CN104599396A (en) | Password anti-peeping cover | |
US20150106925A1 (en) | Security system and method | |
WO2012135272A1 (en) | Personal identification number at account level | |
JP2010287139A (en) | Non-contact medium reading device | |
JP6375693B2 (en) | Cash handling equipment | |
Kumar et al. | Pin number theft recognition and cash transaction using sixth sense technology in ATM/CDM | |
JP2012238247A (en) | Automatic teller machine | |
CN107710287A (en) | Automatic trading apparatus | |
CN206292924U (en) | Cap assembly and automatic trading apparatus | |
JP2017091281A (en) | Cover member | |
Rao | Automated teller machines usage in India: Emerging challenges | |
CN202584302U (en) | Counter interactive passageway groove | |
CN206773830U (en) | A kind of cash teller machine | |
CN205405550U (en) | Self -service hairpin equipment of membership card | |
CN207817709U (en) | Keyboard peep-prevention cover | |
Markantonakis et al. | Overview of security threats for smart cards in the public transport industry | |
JP5961973B2 (en) | Automatic transaction equipment | |
CN204856701U (en) | Intelligence cashier slot button password control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150923 Termination date: 20171229 |