In today's information, in many cases it is necessary to enter a password. Because the input method and the device are limited by the keys, the password input method becomes open, which poses a threat to the security of the password. Although there are many patents in this area, most of them are blocked and concealed, and there is still a hidden danger of entering a complete password.
In today's information age, there are many situations where a password must be confirmed, that is, a password must be entered before entering a specific "space" or performing some "action." Such as schools, finance, retail, network and other places and industries that need to enter passwords. At present, the input methods and devices using passwords are mainly based on keyboards (including ordinary keyboards, special keyboards, and small keyboards). The disadvantages of such input devices and their input methods are: Because they are keyboard keys, their input The password mode is open, that is, when the user enters the password, the bystander can peek or calculate his password through his operation mode, and can also learn the password through the position of the button pressed by the user, thus constituting the security. Threatened. Even if bystanders do not want to know the user's password, such as: subordinates, teachers, students, colleagues, classmates, etc., both parties will feel embarrassed by this method. There are many patents in this area, but most of them are blocked or hidden, but in any case you have to enter the complete password at the site, so there is a security risk.
This design is to solve the problem that when an open password input device is used to input a password, it is easy for people around to peep into the input password information and there is a hidden safety problem, and a new password input system is proposed. Even if the system is without any protection, the person or the camera device cannot know the entered password, thus fundamentally preventing the password from being stolen by others.
Second, demand analysis2.1 Functional requirements
The purpose of the design is to solve the problem of security hidden trouble in the open password input device, and provide a password input method and a password input device. This device makes the device fundamentally prevent the password from being stolen by peeping even without any protection.
Only when the user knows the power-on password, he can open the PC and enter the user's work page, and he can modify the password through the password editing software and replace the fixed number with the string represented by the number key. The original simple numeric password can be changed into a more complicated password composed of uppercase characters, lowercase characters, numbers, underline, etc., so that the cracking of the password is more difficult, so that it can serve two purposes.
2.2 Performance Requirements
The design of the password input device in the design has also added special protection measures, the program on the microcontroller is encrypted and unreadable, the password stored in the storage module is encrypted, not the original password, the password input device with boot Password, only enter the correct power-on password to perform password operation, and power-on password can set the number of input. Once the wrong power-on password reaches a specified value, the password input device will be self-locking.
Third, the program design3.1 System Function Implementation Principle
The one-chip computer is connected with the PC through the USB interface. The application software is installed on the single chip microcomputer and the password editing software is installed on the PC. When the PC is turned on, it is required to input the power-on password. Only when the power-on password is input correctly, can the PC be turned on to enter the system. When the SCM is connected to a PC, a page appears on the display of the PC: Enter the power-on password in the password input device. If the power-on password is incorrect, the program will prompt to enter the power-on password. When the power-on password reaches the limited number of input times, the program locks itself.
If the power-on password is correct, the user work page opens. At this time, the user can modify the password through the password editing software and edit the character string represented by the number key instead of the fixed number. The essential difference between the password input device and the conventional keyboard is that the keys of the conventional keyboard correspond to the unique fixed key code, and the keys of the input device correspond to a fixed address of the memory in the device. The data stored in the mapping address of this button is the character string associated with the button as a password. This string consists of key codes, so that when a key is pressed, it is equivalent to pressing several keys in succession, and thus a key can be used for inputting a series of passwords. The essence of the association between the keys of the device and the password is that the password data is written in the corresponding address of the key in the memory. The essence of the device entering the password process is to read the password data from the corresponding address of the key in the memory, and then send the password to the device requiring the password input through the provided interface.
After the password is saved, it can be saved directly into the system. The system can retain the memory of the password. The next time you use the system, you can directly press one or two keys to enter a password.
The design of the password input device is also designed to add special protection measures, the central processor on the program is encrypted and unreadable, the storage module stored in the password is encrypted, not the original password, which ensures the password The security, therefore, is not the actual password entered at the scene, so even if there are many people looking around, they can't get the user's real password, and it truly achieves the security protection of the password. Moreover, the system itself also provides a power-on password. Only entering the power-on password correctly can enter the system, so if you accidentally lose the product, others cannot use it easily.
The selected development board conforms to the USB protocol and can be directly connected to the PC. The MCU is programmed on the PC and the password editing software that can be installed on the PC is designed. The numeric keypad keys and confirmation keys can use the keyboard input of the PC, and the display device is the screen of the PC. Only need to use SCM to program the corresponding installation application software to achieve the desired goal.
Here, an example is a password input device using EEPROM as a memory and a USB interface as a medium of communication. When the password input device is inserted into a device that requires a password input (here, an ordinary PC is taken as an example), the device appears as a standard HID keyboard. The password input device can directly send key code data to the PC just like a normal keyboard, and can also use the PC software that is provided with it to send new password data to the device through the USB interface and instruct it to modify the corresponding address of the key in the EEPROM. data.
A detailed description of the two main steps required for the password input device is as follows:
1. Association of keys and passwords
The PC software first learns from the user through the graphical interface that the user wants a password corresponding to a key, and then the software converts it into the character code of the keyboard in the HID protocol, and then encodes the encoded password and the password in the EEPROM through the USB interface. The storage location is sent to the password input device together with notification of its modification of the EEPROM data. After the password input device obtains the modified command and related data, it will store the password in the designated position of the EEPROM and complete the association of the key and the password.
For example, the user wants to set the password "123456" for the key "2". "123456" corresponding to the keyboard code is "1d 1e 1f 20 21 22", "2" key is set as the storage address "06." The PC software sends these data and commands for writing EEPROM to the password input device via the USB interface. After the data received by the device will immediately "1d 1e 1f 20 21 22" written in the EEPROM address "06", the associated key completed "2" and the password "123456" of.
2. Key input process using associated password
When the user enters a password through the key, the password input device reads the associated password data string from the corresponding address of the key in the EEPROM memory, and then sequentially sends the string data to the PC through the USB interface. At this point, the password input device represents a standard HID device to the PC (it can be regarded as a standard keyboard), and the password sent from the USB interface will be automatically filled in by the system to the position where the password is required to input the password.
The combination of one key or two keys on the password input device provided by the present invention represents a series of passwords. Pressing different keys or combination keys can output different passwords, and finally pass the passwords to the password receiver through the output interface. For example, through a USB port to a PC, or an ATM with a USB port, or a supermarket cash register with a USB port, and any system with a USB port that requires a password. The password can be edited through a password editing system, and any desired password can be edited on the PC (the password can be composed of uppercase characters, lowercase characters, numbers, and underlining, etc.), and then the edited password can be stored in the password input device through the USB port. You can also edit a simple numeric password on the password input.
3.2 Hardware Platform Selection and Resource Configuration
EVK1100 hardware selection AMTEL AVR contest provided, EVK1100 is an evaluation kit and development system AVR32 AT32UC3A single-chip controller. It is equipped with a rich set of peripherals and memory. Figure 2 shows the connection between the development board and the PC.
-- Support AT32UC3A
--JTAG connector, Nexus, USART, USB2.0 interface, TWI interface, SPI
AVR32 AT32UC3A
High Performance Low Power AVR32UC, 32-Byte Microcontroller
- Single-cycle RISC instruction, including DSP instruction system
- Read and write instructions and independent bit control
- Operating speed 1.49DMIPS/MHz
- Storage Protection System
Multi-level data bus
- High-performance data transmission, bus separation improves performance
- 15 memory direct access channels to improve peripheral communication speed
Internal high speed SRAM - 64K bytes
Derived External Memory Interface - SDRAM/SRAM Compatible Memory Bus
Interrupt Controller - Automatically Runs Low-latency Interrupt Service and Program Optimization
System functions
- Clock management includes internal RC clock and a 32KHz oscillator
- Two multi-function oscillators and two phase-locked loops allow CPU and USB frequency separation
- Watch clock, real-time clock
USB
- USB2.0, in line with OTG protocol
- DMA (memory direct access channel)
- On-chip transceiver includes pull-up resistor
A three-channel 16-bit timer/counter
Four Universal Synchronous Asynchronous Transceivers
- Support SPI, infrared, ISO 7816 interface
- Support hardware handshake, RS485 interface and debugger
Two master-slave serial interfaces (SPIs)
The development board of ATMEL meets the USB transmission protocol, and satisfies the various protocols of the serial port, and can directly communicate the microcontroller and the CPU and transfer the information, thereby ensuring the design.
3.3 System Software Architecture
When the PC is turned on, it is required to input the power-on password. Only when the power-on password is correct can the PC be turned on. After the PC is turned on, when the MCU and the PC are connected, a power-on password is also required to install the designed application software on the PC. If the power-on password is incorrect, the program will prompt to enter the power-on password. When the power-on password reaches the limited number of input times, the program locks itself. When the power-on password is all entered correctly, the user interface appears on the PC. The user can modify the password through the application program and edit the character string represented by the number key instead of the fixed number. After the password is saved, it can be saved directly into the system. The system can retain the memory of the password. The next time you use the system, you can directly press one or two keys to enter a password.
The design of the password input device is also designed to add special protection measures, the central processor on the program is encrypted and unreadable, the storage module stored in the password is encrypted, not the original password, which ensures the password Security.
The password editing software is the application software in the design so that it can run on the PC. The selected development board conforms to the USB protocol and can be directly connected with the PC. The microcontroller is programmed on the PC to achieve the purpose of designing the software. The numeric keypad keys and confirmation keys can use the keyboard input of the PC, and the display device is the screen of the PC. Only need to use MCU programming application software, you can achieve the desired goal.
3.4 System Expected Results
Design a USB or ATM with a USB port, or a supermarket cash register with a USB port, and any system with a USB port that requires a password. The password can be edited through a password editing system, and any desired password can be edited on the PC (the password can be composed of uppercase characters, lowercase characters, numbers, and underlining, etc.), and then the edited password can be stored in the password input device through the USB port. You can also edit a simple numeric password on the password input.
1. Fundamentally solve the hidden security problems existing in the traditional password input, protect the password, and avoid the huge economic losses caused by password theft.
2, using the USB interface, the connection with other devices is very simple, you can easily expand, you can automatically expand from ATM machines, supermarket cash registers, bank counters and so on.
3, the original simple digital password into a password composed of uppercase and lowercase characters, underscores, numbers, etc., so that the cracking of the password is more difficult.
4. The password input method is novel and the difficulty of implementation is not significant. It can be applied to any device with USB interface and password input, which has a very good practical value.
57 Jack.China RJ11 Jack 1X5P,RJ11 Connector with Panel supplier & manufacturer, offer low price, high quality 4 Ports RJ11 Female Connector,RJ11 Jack 6P6C Right Angle, etc.
The RJ-45 interface can be used to connect the RJ-45 connector. It is suitable for the network constructed by twisted pair. This port is the most common port, which is generally provided by Ethernet hub. The number of hubs we usually talk about is the number of RJ-45 ports. The RJ-45 port of the hub can be directly connected to terminal devices such as computers and network printers, and can also be connected with other hub equipment and routers such as switches and hubs.
RJ11 Jack 1X5P,RJ11 Connector with Panel,4 Ports RJ11 Female Connector,RJ11 Jack 6P6C Right Angle
ShenZhen Antenk Electronics Co,Ltd , https://www.antenkconn.com