CN103200011B - A kind of cipher authentication method and device - Google Patents

A kind of cipher authentication method and device Download PDF

Info

Publication number
CN103200011B
CN103200011B CN201310149658.4A CN201310149658A CN103200011B CN 103200011 B CN103200011 B CN 103200011B CN 201310149658 A CN201310149658 A CN 201310149658A CN 103200011 B CN103200011 B CN 103200011B
Authority
CN
China
Prior art keywords
touchscreen
identification information
several
identification
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310149658.4A
Other languages
Chinese (zh)
Other versions
CN103200011A (en
Inventor
许元进
许林锋
林直堂
陈美霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Rongan Technology Co.,Ltd.
Original Assignee
FUJIAN ETIM INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUJIAN ETIM INFORMATION TECHNOLOGY Co Ltd filed Critical FUJIAN ETIM INFORMATION TECHNOLOGY Co Ltd
Priority to CN201310149658.4A priority Critical patent/CN103200011B/en
Publication of CN103200011A publication Critical patent/CN103200011A/en
Application granted granted Critical
Publication of CN103200011B publication Critical patent/CN103200011B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a kind of cipher authentication method, realize cipher authentication process password not easily expose, more safe and reliable, the method comprises: receive the standard cipher that presets of user, standard cipher is made up of the characteristic value of several identification informations; When receiving unlock command, several identification informations of stochastic generation on the touchscreen, and the record positional information of identification information on the touchscreen and the corresponding relation of the characteristic value of this identification information; Obtain the positional information that user clicks on the touchscreen, obtain the characteristic value of several corresponding identification informations according to several positional informations of user's click, the unlocking pin of the characteristic value composition user input of several identification informations of acquisition; Judge that whether unlocking pin is identical with standard cipher, if so, then unlock successfully, if not, then unlock failure.The invention also discloses a kind of cipher authentication device.

Description

A kind of cipher authentication method and device
Technical field
The present invention relates to technical field of information processing, be specifically related to a kind of cipher authentication method and device.
Background technology
Along with information technology development; the messaging device (such as computer, mobile phone or PDA etc.) that people use is intelligence more and more; the protection of people to individual privacy simultaneously is also more and more paid attention to; ID authentication mechanism is also in continuous upgrading, and wherein input cipher authentication and path authentication are current Application comparison cipher authentication techniques widely.On the many application of path authentication and smart mobile phone, as the nine grids mobile phone screen unblock etc. of Google.
But, the method inputting cipher authentication in prior art exists easily by eye recognition, easily by the problem of Brute Force, and there is the sliding process of gesture easily by eye recognition in the method for path authentication, can leave finger slide mark on the touchscreen after slip, malicious person can penetrate the problem in path according to slide mark.In addition, the random cryptographic consumer for setting is easily forgotten.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of cipher authentication method and device, easily identifies and exposes, and then there is the problem of potential safety hazard to solve password in prior art.
For solving the problem, technical scheme provided by the invention is as follows:
A kind of cipher authentication method, described method comprises:
Receive the standard cipher that user presets, described standard cipher is made up of the characteristic value of several identification informations;
When receiving unlock command, several identification informations of stochastic generation on the touchscreen, and the record positional information of identification information on the touchscreen and the corresponding relation of the characteristic value of this identification information;
Obtain the positional information that user inputs on the touchscreen, obtain the characteristic value of several corresponding identification informations according to several positional informations obtained, the unlocking pin of the characteristic value composition user input of several identification informations of acquisition;
Judge that whether described unlocking pin is identical with described standard cipher, if so, then unlock successfully, if not, then unlock failure.
Accordingly, described method also comprises:
Set up encrypted message storehouse, described encrypted message storehouse comprises password default information bank and/or User Defined encrypted message storehouse; Described password default information bank comprises several identification informations that system generates; Described User Defined encrypted message storehouse comprises several identification informations that user adds; For each identification information in described encrypted message storehouse distributes characteristic of correspondence value; Described identification information is numeral, character or picture.
Accordingly, the corresponding relation of the positional information of described record identification information on the touchscreen and the characteristic value of this identification information, comprising:
The record positional information of each identification information on the touchscreen and the one-to-one relationship of the characteristic value of this identification information.
Accordingly, the corresponding relation of the positional information of described record identification information on the touchscreen and the characteristic value of this identification information, comprising:
Record the one-to-one relationship of the positional information of the identification information in described standard cipher and the characteristic value of this identification information, record the positional information of other identification informations on the touchscreen and the corresponding relation of miscue characteristic value.
Accordingly, obtain the positional information that user inputs on the touchscreen, comprising:
Obtain the positional information of the identification information that user clicks on the touchscreen successively;
Or,
Obtain user's line positional information of identification information of streaking on the touchscreen;
Or,
Obtain the positional information that user drags to the identification information of appointed area on the touchscreen.
Accordingly, described method also comprises:
Preset Password Input region, and record the position range in described Password Input region;
After the positional information that acquisition user inputs on the touchscreen, judge whether positional information that user inputs on the touchscreen belongs to the position range in described Password Input region, if, continue to perform step obtains several corresponding identification informations characteristic value and subsequent step thereof according to several positional informations obtained, if not, then failure is unlocked.
A kind of cipher authentication device, described device comprises:
Create password unit, for receiving the standard cipher that user presets, described standard cipher is made up of the characteristic value of several identification informations;
Unlock interface generation unit, for when receiving unlock command, several identification informations of stochastic generation on the touchscreen, and the record positional information of identification information on the touchscreen and the corresponding relation of the characteristic value of this identification information;
Obtaining password unit, for obtaining the positional information that user inputs on the touchscreen, obtaining the characteristic value of several corresponding identification informations according to several positional informations obtained, the unlocking pin of the characteristic value composition user input of several identification informations of acquisition;
Verification unit, for judging that whether described unlocking pin is identical with described standard cipher, if so, then unlocking successfully, if not, then unlocking failure.
Accordingly, described device also comprises:
Set up cryptographic libraries unit, for setting up encrypted message storehouse, described encrypted message storehouse comprises password default information bank and/or User Defined encrypted message storehouse; Described password default information bank comprises several identification informations that system generates; Described User Defined encrypted message storehouse comprises several identification informations that user adds; For each identification information in described encrypted message storehouse distributes characteristic of correspondence value; Described identification information is numeral, character or picture.
Accordingly, described unlock interface generation unit comprises:
Generate subelement, for when receiving unlock command, several identification informations of stochastic generation on the touchscreen;
Record subelement, for recording the one-to-one relationship of the positional information of each identification information on the touchscreen and the characteristic value of this identification information.
Accordingly, described unlock interface generation unit comprises:
Generate subelement, for when receiving unlock command, several identification informations of stochastic generation on the touchscreen;
Record subelement, for the one-to-one relationship of the characteristic value of the positional information and this identification information that record the identification information in described standard cipher, records the positional information of other identification informations on the touchscreen and the corresponding relation of miscue characteristic value.
Accordingly, described acquisition password unit comprises:
First obtains subelement, for obtaining the positional information of the identification information that user clicks on the touchscreen successively; Or, obtain user's line positional information of identification information of streaking on the touchscreen; Or, obtain the positional information that user drags to the identification information of appointed area on the touchscreen.
Second obtains subelement, and several positional informations for clicking according to user obtain the characteristic value of several corresponding identification informations, the unlocking pin of the characteristic value composition user input of several identification informations of acquisition.
Accordingly, described device also comprises:
Setting code territory element, for presetting Password Input region, and records the position range in described Password Input region;
Judging unit, for after obtaining the positional information that inputs on the touchscreen of user, judge whether positional information that user inputs on the touchscreen belongs to the position range in described Password Input region, if, the characteristic value of several corresponding identification informations is obtained according to several positional informations obtained, if not, then failure is unlocked.
As can be seen here, the present invention has following beneficial effect:
The present invention is when user unlocks, stochastic generation comprises the identifying information of each password symbol in standard cipher on the touchscreen, user completes Password Input by the random site clicking each password symbol place, realize when unlocking at every turn, the position that user inputs password is all different, password is not easily by eye recognition, and the certification of the slide mark stayed on next time does not affect, and inputs not easily Brute Force by touch.In addition, user can arrange self-defined encrypted message storehouse, and use pattern order for user's comparison image (such as tourism order), password is not easily forgotten, and for other people without any meaning, password not easily cracks.
Accompanying drawing explanation
Fig. 1 is the flow chart of cipher authentication method of the present invention;
Fig. 2 is the schematic diagram of stochastic generation unlock interface in cipher authentication method of the present invention;
Fig. 3 is the flow chart of a kind of specific embodiment of cipher authentication method of the present invention;
Fig. 4 is the schematic diagram of cipher authentication device of the present invention;
Fig. 5 is a kind of specific embodiment schematic diagram of cipher authentication device of the present invention;
Fig. 6 is the schematic diagram of unlock interface generation unit in cipher authentication device of the present invention;
Fig. 7 is the schematic diagram obtaining password unit in cipher authentication device of the present invention.
Embodiment
For enabling above-mentioned purpose of the present invention, feature and advantage become apparent more, are described in further detail the embodiment of the present invention below in conjunction with the drawings and specific embodiments.
Cipher authentication method of the present invention, for there is password in prior art by eye recognition, and cut can be left on the touchscreen, there is the risk that password is revealed, propose when being unlocked by password at every turn, to several identification informations of standard cipher be included (as numeral, character or picture) stochastic generation is on the touchscreen, user is by the identification information input password of the upper relevant position of point touching screen, realize the certification of password, because several identification informations that each touch-screen generates can be different, the position of each identification information also can be different, therefore the position clicked when user inputs password is random, other people are not easy to identify, reduce the possibility that password is revealed, thus improve the fail safe of cipher authentication.
Based on above-mentioned thought, shown in Figure 1, cipher authentication method of the present invention comprises the following steps:
Step 101: receive the standard cipher that user presets, standard cipher is made up of the characteristic value of several identification informations.
User presets the standard cipher for unlocking, the figure place of standard cipher can by user's sets itself, each of standard cipher all can be represented by an identification information, this identification information can be numeral, character or picture, each identification information can correspond to a characteristic value, for identification information be numeral or character time, its characteristic value can be this identification information itself, the characteristic value of such as identification information " a " can be " a ", the characteristic value of such as identification information " 1 " can be " 1 ", and identification information is when being picture, its characteristic value can be the sequence number of setting, namely standard cipher formally can by set of number, the combination of character or picture is formed, the so final standard cipher preserved is several identification information characteristic of correspondence values composition.
Can set up encrypted message storehouse in advance, encrypted message storehouse can comprise password default information bank and/or User Defined encrypted message storehouse; Password default information bank comprises several identification informations that system generates; User Defined encrypted message storehouse comprises several identification informations that user adds; For each identification information in encrypted message storehouse distributes characteristic of correspondence value; Identification information is numeral, character or picture.
That is, encrypted message storehouse comprises several can as the identification information of password symbol, user can by the mode in self-defined encrypted message storehouse, picture or pattern is added voluntarily in encrypted message storehouse, the travelling picture etc. of such as user, make user can use self-defining identification information when established standards password, make this standard cipher be not easy to pass into silence.Each identification information in encrypted message storehouse needs to distribute characteristic of correspondence value, such as, be different picture distributing serial numbers.
Step 102: when receiving unlock command, on the touchscreen several identification informations of stochastic generation, and the record positional information of identification information on the touchscreen and the corresponding relation of the characteristic value of this identification information.
Unlock command can be pressed by user and separate locking key triggering, and also can need trigger in the application unlocked at other, when receiving unlock command, several identification informations of stochastic generation, shown in Figure 2 on the touchscreen.Several identification informations of stochastic generation need each identification information of comprising in standard cipher on the touchscreen, on touch-screen, the quantity of identification information should be more than or equal to the quantity of standard cipher identification information, the quantity of the identification information that touch-screen occurs also can by user's sets itself, and what user also can set the identification information of stochastic generation on the touchscreen carrys out source range.The identification information quantity that such as user sets stochastic generation on touch-screen is 8,100 identification informations are had in encrypted message storehouse, several identification informations that user can set stochastic generation are on the touchscreen to be derived from certain subset in encrypted message storehouse or some subset (as the identification information of 15 in encrypted message storehouse), then finally generate unlock interface time can from 15 identification informations of this encrypted message storehouse subset Stochastic choice 8 stochastic generation optional positions on the touchscreen, with adding users use flexibility.
Further, several identification informations (numeral can be selected from encrypted message storehouse, character or picture) be randomly distributed on touch-screen, comprising the identification information of standard cipher, the corresponding relation of each position and identification information is all random, therefore the corresponding relation of the positional information of the identification information recorded on the touchscreen and the characteristic value of this identification information is needed, so that the positional information clicked by user in the process of subsequent check obtains the identification information of its correspondence, thus obtain the characteristic value of this identification information, contrast eventually through characteristic value judges whether cipher authentication passes through.
Concrete, the one-to-one relationship of the positional information of each identification information on the touchscreen and the characteristic value of this identification information can be recorded; Also can the one-to-one relationship of the positional information of identification information only in record standard password and the characteristic value of this identification information, record the positional information of other identification informations on the touchscreen and the corresponding relation of miscue characteristic value, the positional information of such as other identification informations is all corresponding with miscue characteristic value Err, then in subsequent cryptographic verification process, if the identification information in the non-standard password that user clicks, what then obtain is miscue characteristic value Err, does not need the real characteristic of correspondence value of identification information obtaining this mistake.
Step 103: obtain the positional information that user inputs on the touchscreen, obtains the characteristic value of several corresponding identification informations according to several positional informations obtained, the unlocking pin of the characteristic value composition user input of several identification informations of acquisition.
The positional information clicked on the touchscreen by user can obtain the characteristic value of identification information corresponding to this positional information, such as identification information " picture 1 " positional information is on the touchscreen coordinate (1,1), identification information " picture 1 " characteristic of correspondence value is " 001 ", then user's click coordinate (1,1) position can obtain identification information " picture 1 " characteristic of correspondence value " 001 ".
Concrete, the positional information of the identification information that user clicks on the touchscreen successively can be obtained; Or, obtain user's line positional information of identification information of streaking on the touchscreen; Or, obtain the positional information that user drags to the identification information of appointed area on the touchscreen.
Several positional informations clicked during by obtaining user and inputting password on the touchscreen, several characteristic values can be obtained, the stack features value obtained when then can input password by user and a stack features value of standard cipher contrast, and judge that whether the unlocking pin that user inputs is correct.
Step 104: judge that whether unlocking pin is identical with standard cipher, if so, then unlocks successfully, if not, then unlocks failure.
Namely the unlocking pin and standard cipher that input generation from touch-screen are compared under equipment lock-out state, then unlock when comparative result is consistent state.If unlock unsuccessfully, can also step 102 be returned to, again several identification informations of stochastic generation on the touchscreen, again carry out cipher authentication.
In addition, cipher authentication method of the present invention can also comprise:
Preset Password Input region, and record the position range in Password Input region;
After the positional information that acquisition user inputs on the touchscreen, judge whether positional information that user inputs on the touchscreen belongs to the position range in Password Input region, if, continue to perform step obtains several corresponding identification informations characteristic value and subsequent step thereof according to several positional informations obtained, if not, then failure is unlocked.
Preset Password Input region, and record the position range in Password Input region, several identification informations of each identification information comprised in standard cipher are generated in setting code input area, also several identification informations comprising part or all of identification information in standard cipher can be generated in other positions of touch-screen, then when user inputs password, because Password Input region presets, do not show, the identification information only inputted in Password Input region can form unlocking pin.Like this, even if the password of user is revealed, also need in the Password Input region of presetting, input password and can realize unlocking, and Password Input region does not show, the password in other regions is actual in distracter, further ensures the fail safe of user.Shown in Figure 3, provide a kind of specific embodiment of cipher authentication method, user can carry out cipher authentication by variable path.
Step 201: set up encrypted message storehouse, encrypted message storehouse can comprise password default information bank and/or User Defined encrypted message storehouse.Namely include several can accord with (i.e. password each) identification information as password in encrypted message storehouse, identification information can be numeral, character or picture.For identification information assigned characteristics value, this characteristic value can be identification information itself.
Step 202: receive the standard cipher that user presets.Specify several identification informations by user and determine that order realizes.Standard cipher can be the characteristic value of one group of identification information, and when only comprising numeral or character in password, because its characteristic value when numeral or character are identification information can be itself, then in fact standard cipher is equal to and is made up of one group of identification information.
Step 203: stochastic generation unlock interface.When needs unlock, several identification informations (numeral, character or picture) chosen in encrypted message storehouse are randomly distributed on touch-screen, and the corresponding relation of each identification information and positional information is random.Generate complete, then identification information and positional information establish and determine relation, therefore need the corresponding relation of the positional information of the identification information recorded on the touchscreen and the characteristic value of this identification information.
It should be noted that, if take user to streak the mode obtaining positional information at line on the touchscreen, namely the mode being similar to path authentication carries out cipher authentication, then the contact (positional information) of any three identification informations can not point-blank occur.Such as, if three identification informations on the same line, user wishes the identification information inputting straight line two ends, takes the mode that line streaks, and there is the possibility of simultaneously having streaked three identification informations, and wishes that the identification information inputted is different from user.Therefore, in order to avoid the possibility of user misoperation, the contact of any three identification informations can not point-blank occur.
Step 204: the unlocking pin receiving user's input, namely user's line positional information of identification information of streaking on the touchscreen is obtained, the characteristic value of several corresponding identification informations is obtained, the unlocking pin of the characteristic value composition user input of several identification informations of acquisition according to several positional informations of user's input.
Step 205: judge that whether unlocking pin is identical with standard cipher, if so, then unlocks successfully, if not, then unlocks failure, return step 203.
Like this, when user unlocks, stochastic generation comprises the identifying information of each password symbol in standard cipher on the touchscreen, user completes Password Input by the random site clicking each password symbol place, realize when unlocking at every turn, the position that user inputs password is all different, and password is not easily by eye recognition, the certification of the slide mark stayed on next time does not affect, and inputs not easily Brute Force by touch.In addition, user can arrange self-defined encrypted message storehouse, and use pattern order for user's comparison image (such as tourism order), password is not easily forgotten, and for other people without any meaning, password not easily cracks.
Accordingly, the present invention also provides a kind of cipher authentication device, shown in Figure 4, and this device comprises:
Create password unit 301, for receiving the standard cipher that user presets, standard cipher is made up of the characteristic value of several identification informations;
Unlock interface generation unit 302, for when receiving unlock command, several identification informations of stochastic generation on the touchscreen, and the record positional information of identification information on the touchscreen and the corresponding relation of the characteristic value of this identification information;
Obtain password unit 303, for obtaining the positional information that user clicks on the touchscreen, the characteristic value of several corresponding identification informations is obtained, the unlocking pin of the characteristic value composition user input of several identification informations of acquisition according to several positional informations of user's click;
Verification unit 304, for judging that whether unlocking pin is identical with standard cipher, if so, then unlocking successfully, if not, then unlocking failure.
Shown in Figure 5, a kind of cipher authentication device can also comprise:
Set up cryptographic libraries unit 305, for setting up encrypted message storehouse, encrypted message storehouse comprises password default information bank and/or User Defined encrypted message storehouse; Password default information bank comprises several identification informations that system generates; User Defined encrypted message storehouse comprises several identification informations that user adds; For each identification information in encrypted message storehouse distributes characteristic of correspondence value; Identification information is numeral, character or picture.
Concrete, shown in Figure 6, unlock interface generation unit 302 can comprise:
Generate subelement 3021, for when receiving unlock command, several identification informations of stochastic generation on the touchscreen;
Record subelement 3022, for recording the one-to-one relationship of the positional information of each identification information on the touchscreen and the characteristic value of this identification information.
Same, unlock interface generation unit 302 also can comprise:
Generate subelement 3021, for when receiving unlock command, several identification informations of stochastic generation on the touchscreen;
Record subelement 3022, for the one-to-one relationship of the positional information of the identification information in record standard password and the characteristic value of this identification information, records the position relationship of other identification informations on the touchscreen and the corresponding relation of miscue characteristic value.
Shown in Figure 7, obtaining password unit 303 can comprise:
First obtains subelement 3031, for obtaining the positional information of the identification information that user clicks on the touchscreen successively; Or, obtain user's line positional information of identification information of streaking on the touchscreen; Or, obtain the positional information that user drags to the identification information of appointed area on the touchscreen.
Second obtains subelement 3032, and several positional informations for clicking according to user obtain the characteristic value of several corresponding identification informations, the unlocking pin of the characteristic value composition user input of several identification informations of acquisition.
In addition, a kind of cipher authentication device of the present invention can also comprise:
Setting code territory element, for presetting Password Input region, and records the position range in Password Input region;
Judging unit, for after obtaining the positional information that inputs on the touchscreen of user, judge whether positional information that user inputs on the touchscreen belongs to the position range in Password Input region, if, the characteristic value of several corresponding identification informations is obtained according to several positional informations obtained, if not, then failure is unlocked.
Like this, when user unlocks, stochastic generation comprises the identifying information of each password symbol in standard cipher on the touchscreen, user completes Password Input by the random site clicking each password symbol place, realize when unlocking at every turn, the position that user inputs password is all different, and password is not easily by eye recognition, the certification of the slide mark stayed on next time does not affect, and inputs not easily Brute Force by touch.In addition, user can arrange self-defined encrypted message storehouse, and use pattern order for user's comparison image (such as tourism order), password is not easily forgotten, and for other people without any meaning, password not easily cracks.
It should be noted that, in this specification, each embodiment adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar portion mutually see.For system disclosed in embodiment or device, because it corresponds to the method disclosed in Example, so description is fairly simple, relevant part illustrates see method part.
Also it should be noted that, in this article, the such as relational terms of first and second grades and so on is only used for an entity or operation to separate with another entity or operating space, and not necessarily requires or imply the relation that there is any this reality between these entities or operation or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or equipment.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment comprising described key element and also there is other identical element.
The software module that the method described in conjunction with embodiment disclosed herein or the step of algorithm can directly use hardware, processor to perform, or the combination of the two is implemented.Software module can be placed in the storage medium of other form any known in random asccess memory (RAM), internal memory, read-only memory (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field.
To the above-mentioned explanation of the disclosed embodiments, professional and technical personnel in the field are realized or uses the present invention.To be apparent for those skilled in the art to the multiple amendment of these embodiments, General Principle as defined herein can without departing from the spirit or scope of the present invention, realize in other embodiments.Therefore, the present invention can not be restricted to these embodiments shown in this article, but will meet the widest scope consistent with principle disclosed herein and features of novelty.

Claims (10)

1. a cipher authentication method, is characterized in that, sets up encrypted message storehouse, and described encrypted message storehouse comprises password default information bank and/or User Defined encrypted message storehouse; Described password default information bank comprises several identification informations that system generates; Described User Defined encrypted message storehouse comprises several identification informations that user adds; For each identification information in described encrypted message storehouse distributes characteristic of correspondence value; Described identification information is numeral, character or picture, and described method comprises:
Receive the standard cipher that user presets, described standard cipher is made up of the characteristic value of several identification informations;
When receiving unlock command, several identification informations of stochastic generation on the touchscreen, and the record positional information of identification information on the touchscreen and the corresponding relation of the characteristic value of this identification information, several identification informations of stochastic generation comprise each identification information in described standard cipher on the touchscreen, and the quantity of the identification information of stochastic generation is more than or equal to the quantity of described standard cipher identification information on the touchscreen;
Obtain the positional information that user inputs on the touchscreen, obtain the characteristic value of several corresponding identification informations according to several positional informations obtained, the unlocking pin of the characteristic value composition user input of several identification informations of acquisition;
Judge that whether described unlocking pin is identical with described standard cipher, if so, then unlock successfully, if not, then unlock failure.
2. method according to claim 1, is characterized in that, the corresponding relation of the positional information of described record identification information on the touchscreen and the characteristic value of this identification information, comprising:
The record positional information of each identification information on the touchscreen and the one-to-one relationship of the characteristic value of this identification information.
3. method according to claim 1, is characterized in that, the corresponding relation of the positional information of described record identification information on the touchscreen and the characteristic value of this identification information, comprising:
Record the one-to-one relationship of the positional information of the identification information in described standard cipher and the characteristic value of this identification information, record the positional information of other identification informations on the touchscreen and the corresponding relation of miscue characteristic value.
4. method according to claim 1, is characterized in that, obtains the positional information that user inputs on the touchscreen, comprising:
Obtain the positional information of the identification information that user clicks on the touchscreen successively;
Or,
Obtain user's line positional information of identification information of streaking on the touchscreen;
Or,
Obtain the positional information that user drags to the identification information of appointed area on the touchscreen.
5. method according to claim 1, is characterized in that, described method also comprises:
Preset Password Input region, and record the position range in described Password Input region;
After the positional information that acquisition user inputs on the touchscreen, judge whether positional information that user inputs on the touchscreen belongs to the position range in described Password Input region, if, continue to perform step obtains several corresponding identification informations characteristic value and subsequent step thereof according to several positional informations obtained, if not, then failure is unlocked.
6. a cipher authentication device, is characterized in that, described device comprises:
Set up cryptographic libraries unit, for setting up encrypted message storehouse, described encrypted message storehouse comprises password default information bank and/or User Defined encrypted message storehouse; Described password default information bank comprises several identification informations that system generates; Described User Defined encrypted message storehouse comprises several identification informations that user adds; For each identification information in described encrypted message storehouse distributes characteristic of correspondence value; Described identification information is numeral, character or picture;
Create password unit, for receiving the standard cipher that user presets, described standard cipher is made up of the characteristic value of several identification informations;
Unlock interface generation unit, for when receiving unlock command, several identification informations of stochastic generation on the touchscreen, and the record positional information of identification information on the touchscreen and the corresponding relation of the characteristic value of this identification information, several identification informations of stochastic generation comprise each identification information in described standard cipher on the touchscreen, and the quantity of the identification information of stochastic generation is more than or equal to the quantity of described standard cipher identification information on the touchscreen;
Obtaining password unit, for obtaining the positional information that user inputs on the touchscreen, obtaining the characteristic value of several corresponding identification informations according to several positional informations obtained, the unlocking pin of the characteristic value composition user input of several identification informations of acquisition;
Verification unit, for judging that whether described unlocking pin is identical with described standard cipher, if so, then unlocking successfully, if not, then unlocking failure.
7. device according to claim 6, is characterized in that, described unlock interface generation unit comprises:
Generate subelement, for when receiving unlock command, several identification informations of stochastic generation on the touchscreen;
Record subelement, for recording the one-to-one relationship of the positional information of each identification information on the touchscreen and the characteristic value of this identification information.
8. device according to claim 6, is characterized in that, described unlock interface generation unit comprises:
Generate subelement, for when receiving unlock command, several identification informations of stochastic generation on the touchscreen;
Record subelement, for the one-to-one relationship of the characteristic value of the positional information and this identification information that record the identification information in described standard cipher, records the positional information of other identification informations on the touchscreen and the corresponding relation of miscue characteristic value.
9. device according to claim 6, is characterized in that, described acquisition password unit comprises:
First obtains subelement, for obtaining the positional information of the identification information that user clicks on the touchscreen successively; Or, obtain user's line positional information of identification information of streaking on the touchscreen; Or, obtain the positional information that user drags to the identification information of appointed area on the touchscreen;
Second obtains subelement, and several positional informations for clicking according to user obtain the characteristic value of several corresponding identification informations, the unlocking pin of the characteristic value composition user input of several identification informations of acquisition.
10. device according to claim 6, is characterized in that, described device also comprises:
Setting code territory element, for presetting Password Input region, and records the position range in described Password Input region;
Judging unit, for after obtaining the positional information that inputs on the touchscreen of user, judge whether positional information that user inputs on the touchscreen belongs to the position range in described Password Input region, if, the characteristic value of several corresponding identification informations is obtained according to several positional informations obtained, if not, then failure is unlocked.
CN201310149658.4A 2013-04-26 2013-04-26 A kind of cipher authentication method and device Active CN103200011B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310149658.4A CN103200011B (en) 2013-04-26 2013-04-26 A kind of cipher authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310149658.4A CN103200011B (en) 2013-04-26 2013-04-26 A kind of cipher authentication method and device

Publications (2)

Publication Number Publication Date
CN103200011A CN103200011A (en) 2013-07-10
CN103200011B true CN103200011B (en) 2016-04-13

Family

ID=48722378

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310149658.4A Active CN103200011B (en) 2013-04-26 2013-04-26 A kind of cipher authentication method and device

Country Status (1)

Country Link
CN (1) CN103200011B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104516652A (en) * 2013-09-26 2015-04-15 深圳富泰宏精密工业有限公司 Unlocking system and method of electronic device
CN104660786B (en) * 2013-11-21 2018-04-06 上海斐讯数据通信技术有限公司 The method to set up and unlocking method of a kind of mobile terminal, unlocking pin
CN103729605A (en) * 2014-01-13 2014-04-16 深圳市中航软件技术有限公司 Password input method based on touch screen, and touch terminal
CN103701614B (en) * 2014-01-15 2018-08-10 网易宝有限公司 A kind of auth method and device
CN103761042B (en) * 2014-01-15 2017-12-29 联想(北京)有限公司 A kind of display methods and electronic equipment
TW201539247A (en) * 2014-04-09 2015-10-16 hong-jian Zhou Password input and verification method and system thereof
WO2016065895A1 (en) * 2014-10-31 2016-05-06 深圳市金立通信设备有限公司 Terminal unlocking method and terminal
CN105631308A (en) * 2014-11-06 2016-06-01 阿里巴巴集团控股有限公司 Password verification method and device and electronic device
CN105278854B (en) * 2014-12-16 2018-10-16 维沃移动通信有限公司 The unlocking method and mobile terminal of mobile terminal
CN105469002A (en) * 2015-03-04 2016-04-06 福州汇智集佳电子技术有限公司 Locking device and unlocking device
CN105468944A (en) * 2015-03-04 2016-04-06 福州汇智集佳电子技术有限公司 Unlocking method and apparatus
CN107340960A (en) * 2016-04-29 2017-11-10 南宁富桂精密工业有限公司 User interface control method and system
CN106407788A (en) * 2016-08-31 2017-02-15 深圳天珑无线科技有限公司 Unlocking method, unlocking apparatus, and terminal
CN107506989A (en) * 2017-08-18 2017-12-22 特兰旗(厦门)科技有限公司 Exchange method and device
CN113111318A (en) * 2021-03-29 2021-07-13 盛林妹 Authentication method, equipment for realizing authentication and intelligent lock

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101986251A (en) * 2010-10-28 2011-03-16 华为终端有限公司 Touch pattern locking/unlocking method and device
CN102025482A (en) * 2009-09-10 2011-04-20 中国科学院华南植物园 Virtual genome-based cryptosystem (VGC)
CN102722242A (en) * 2012-05-21 2012-10-10 奇智软件(北京)有限公司 Method and device for operating touch screen of electronic equipment
CN102857615A (en) * 2012-09-24 2013-01-02 武汉大学 Unlocking method for touch screen mobile phone based on dynamic password

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070277224A1 (en) * 2006-05-24 2007-11-29 Osborn Steven L Methods and Systems for Graphical Image Authentication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025482A (en) * 2009-09-10 2011-04-20 中国科学院华南植物园 Virtual genome-based cryptosystem (VGC)
CN101986251A (en) * 2010-10-28 2011-03-16 华为终端有限公司 Touch pattern locking/unlocking method and device
CN102722242A (en) * 2012-05-21 2012-10-10 奇智软件(北京)有限公司 Method and device for operating touch screen of electronic equipment
CN102857615A (en) * 2012-09-24 2013-01-02 武汉大学 Unlocking method for touch screen mobile phone based on dynamic password

Also Published As

Publication number Publication date
CN103200011A (en) 2013-07-10

Similar Documents

Publication Publication Date Title
CN103200011B (en) A kind of cipher authentication method and device
JP5345850B2 (en) Method and apparatus for securely entering password or PIN by scrolling mouse wheel
US20200387594A1 (en) Graphic Pattern-Based Passcode Generation and Authentication
US9507928B2 (en) Preventing the discovery of access codes
CN106612277B (en) Method and system for realizing verification of verification code by using password disk
US10448247B2 (en) Method and apparatus for information verification
CN105956857A (en) System and method for generating security virtual password keyboard
CN105678147B (en) Touch operation method and device
WO2014188210A1 (en) User authentication system and method
CN104978512A (en) Password input and confirmation method and system thereof
CN103514388B (en) Graphic password trajectory setting system
CN105897417A (en) Encrypted data input method and encrypted data input device
CN102957688A (en) Password input and verification method and device
CN103971045A (en) Click type verification code implementation method
KR101711021B1 (en) System for providing electric signature based on mobile trusted module and method thereof
CN101655768A (en) Anti-peep password input method
WO2017059696A1 (en) Touch screen unlocking method and system, storage medium
CN107301547B (en) Method, device and system for sliding password input in network payment
CN105354462B (en) A kind of guard method of mobile memory and mobile memory
CN107247558A (en) A kind of terminal control method, device, computer installation and readable storage medium storing program for executing
CN111127019B (en) Method, system and device for backing up mnemonic words
CN105447373A (en) Password authentication method and device
CN106209738B (en) A kind of secret key verification method and equipment
KR101937476B1 (en) User hierarchical authentication apparatus and method for the same
CN106406686A (en) Password authentication method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210309

Address after: Room 205, building 22, 785 Hutai Road, Jing'an District, Shanghai

Patentee after: Shanghai Rongan Technology Co.,Ltd.

Address before: 4f, area B, Fujian Overseas Students Pioneer Park, 108 Jiangbin East Avenue, Mawei District, Fuzhou City, Fujian Province, 350015

Patentee before: FUJIAN ETIM INFORMATION & TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right